Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
WiFox: Scaling WiFi Performance for Large Audience Environments Arpit Gupta, Jeongki Min and Injong Rhee NC State University.
SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic CS740 Project Presentation by N. Gupta, S. Kumar, R. Rajamani.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Review of a research paper on Skype
1 Communication Networks Kolja Eger, Prof. Dr. U. Killat 1 From Packet-level to Flow-level Simulations of P2P Networks Kolja Eger, Ulrich Killat Hamburg.
APOHN: Subnetwork Layering to Improve TCP Performance over Heterogeneous Paths April 4, 2006 Dzmitry Kliazovich, Fabrizio Granelli, University of Trento,
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 10 TCP/IP Performance over Asymmetric Networks.
1 Network Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network Passive & Active Measurement Workshop 05 Boston, MA,
Performance Analysis of Orb Rabin Karki and Thangam V. Seenivasan 1.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
Comparing flow-oblivious and flow-aware adaptive routing Sara Oueslati and Jim Roberts France Telecom R&D CISS 2006 Princeton March 2006.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Available bandwidth measurement as simple as running wget D. Antoniades, M. Athanatos, A. Papadogiannakis, P. Markatos Institute of Computer Science (ICS),
1 Design study for multimedia transport protocol in heterogeneous networks Haitao Wu; Qian Zhang; Wenwu Zhu; Communications, ICC '03. IEEE International.
A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
Efficient Internet Traffic Delivery over Wireless Networks Sandhya Sumathy.
1 TCP Traffic Analysis in cooperation with Motorola Todd DeSantis and David Loose Advisor: Professor Mark Claypool Co-Advisor: Professor Robert Kinicki.
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Junxian Huang 1 Feng Qian 2 Yihua Guo 1 Yuanyuan Zhou 1 Qiang Xu 1 Z. Morley Mao 1 Subhabrata Sen 2 Oliver Spatscheck 2 1 University of Michigan 2 AT&T.
Doc.: IEEE /0728r1 SubmissionSlide 1 Network Optimization for Expected HEW Traffic Patterns Date: Authors: W.Carney, K.Agardh, H.Suzuki.
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
The Effects of Systemic Packets Loss on Aggregate TCP Flows Thomas J. Hacker May 8, 2002 Internet 2 Member Meeting.
Traffic Modeling.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
Performance of HTTP Application in Mobile Ad Hoc Networks Asifuddin Mohammad.
指導教授:林仁勇 老師 學生:吳忠融 2015/10/24 1. Author Chan, Y.-C. Chan, C.-T. Chen, Y.-C. Source IEE Proceedings of Communications, Volume 151, Issue 1, Feb 2004 Page(s):107.
Doc.: IEEE /342r0 Submission March 2014 Naveen Kakani, CSRSlide 1 Short Packet Optimizations Date: Authors:
Doc.: IEEE /0648r0 Submission May 2014 Chinghwa Yu et. al., MediaTekSlide 1 Performance Observation of a Dense Campus Network Date:
1 Measuring Congestion Responsiveness of Windows Streaming Media James Nichols Advisors: Prof. Mark Claypool Prof. Bob Kinicki Reader: Prof. David Finkel.
Localized Algorithm for Aggregate Fairness in Wireless Sensor Networks Authors : Shigang Chen, Zhan Zhang CISE university of Florida CISE university of.
18 November Root Cause Analysis of TCP Throughput: Methodology, Techniques, and Applications Matti Siekkinen Ph.D. Defense October 30, 2006 Institut.
1 Capacity Dimensioning Based on Traffic Measurement in the Internet Kazumine Osaka University Shingo Ata (Osaka City Univ.)
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
Fat Virtual Access Points Taken from Srikanth Kandula.
정하경 MMLAB Fundamentals of Internet Measurement: a Tutorial Nevil Brownlee, Chris Lossley, “Fundamentals of Internet Measurement: a Tutorial,” CMG journal.
SHADOWSTREAM: PERFORMANCE EVALUATION AS A CAPABILITY IN PRODUCTION INTERNET LIVE STREAM NETWORK ACM SIGCOMM CING-YU CHU.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
1 How to Identify the Speed Limiting Factor of a TCP Flow E2EMON 2006 Vancouver Mark Timmer April 3, 2006 Co-authors: Pieter-Tjerk de Boer and Aiko Pras.
Internet Measurement and Analysis Vinay Ribeiro Shriram Sarvotham Rolf Riedi Richard Baraniuk Rice University.
A Comparison of RaDiO and CoDiO over IEEE WLANs May 25 th Jeonghun Noh Deepesh Jain A Comparison of RaDiO and CoDiO over IEEE WLANs.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP Congestion Control.
Transport layer identification of P2P traffic Victor Gau Yi-Hsien Wang
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
© 2006 Andreas Haeberlen, MPI-SWS 1 Monarch: A Tool to Emulate Transport Protocol Flows over the Internet at Large Andreas Haeberlen MPI-SWS / Rice University.
Fast Pattern-Based Throughput Prediction for TCP Bulk Transfers
SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic
Wednesday, September 19, 2018 What Is the Internet?
Open Issues in Router Buffer Sizing
CPSC 641: Network Measurement
CPSC 641: WAN Measurement Carey Williamson
Inferring Queue Sizes in Access Networks by Active Measurement
IFIP – Performance 2007 A Modeling Framework to Understand the Tussle between ISPs and Peer-to-Peer File Sharing Users Michele Garetto - unito.
Javad Ghaderi, Tianxiong Ji and R. Srikant
Carey Williamson Department of Computer Science University of Calgary
CPSC 641: Network Measurement
Presentation transcript:

Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst W. Biersack, Institut Eurecom PAM April 6, 2007

23 February 2016 Outline  Introduction  Motivation  Techniques for root cause analysis of TCP throughput  Measurement setup  Analysis results  Conclusions

23 February 2016 Introduction  What?  Analyzed 24h packet trace from France Telecom’s ADSL access network  Studied throughput limitations experienced by clients  Why?  Knowing throughput limitations (=performance) is useful o ISPs want satisfied clients o Need to know what’s going on before things can be improved  How?  Root Cause Analysis of TCP Throughput o Analysis and inference of the reasons that prevent a given TCP connection from achieving a higher throughput. o Passive traffic analysis  Why TCP? o TCP typically over 90% of all traffic

23 February 2016 Background  “On the characteristics and origins of Internet flow rates” by Zhang et al. (SIGCOMM 2002)  Pioneering research work  Congestion is not always the cause for throughput limitations

23 February 2016 Limitation Causes for TCP Throughput  Application  The application does not even attempt to use all network resources  E.g. streaming applications and “bursty” applications (Web browsing)  Transport layer  TCP receiver o Receiver advertized window limits the rate o max amount of outstanding bytes = min(cwnd,rwnd) o Flow control o Configuration issue default receiver advertized window is set too low window scaling is not enabled  TCP protocol o Ramp-up period in slow start and congestion avoidance  Network layer  Congestion at a bottleneck link

23 February 2016 Measurement Setup  24 hours of traffic on March 10, 2006  Passively capture all TCP/IP headers analyze offline  290 GB of TCP traffic  64% downstream, 36% upstream  Observed packets from ~3000 clients, analyze only 1335  Excluded clients did not generate enough traffic for RCA Two pcap probes here Internet collect network access network

23 February 2016  Connections  Size distribution highly skewed  Use only 1% of the flows for RCA o Represent > 85% of all traffic  Clients  Heavy-hitters: 15% of clients generate 85-90% of traffic (up & down)  Low access link utilization Warming up…

23 February 2016 Results of Limitation Analysis  Few active clients overall  Application limitation dominates  Network limitation by distant bottleneck also experienced contains most bytes contains some bytes

23 February 2016 Application analysis: Application limited traffic  Quite stable and symmetric volumes  Vast majority of all traffic  eDonkey and “other” dominate P2P other eDonkey

23 February 2016 Application analysis: Saturated access link  No recognized P2P  Asymmetric port 80/8080 downstream  Real Web traffic?

23 February 2016 Impact of Limitation Causes  How far from optimal (access link saturation) are we?  Main observations  Very low downlink utilization for application limited traffic o Utilization < 20% during 65% of application limited periods of traffic  Uplink utilization < 50% during most of application and network limited uploads

23 February 2016 Connecting the evidence…  Most clients’ performance limited by applications  Very low link utilizations for application limited traffic  Most of application limited traffic seems to be P2P  Peers often have asymmetric uplink and downlink capacities  P2P applications/users enforce upload rate limits  Poor aggregate download performance Interne t Low downlink utilization Low uplink capacity +rate limiter downloading client uploading clients

23 February 2016 Conclusions  Analyzed 24h packet trace from France Telecom’s ADSL access network  Studied throughput limitations experienced by clients  Majority of clients mostly throughput limited by applications  P2P clients throttle upload rate o Too much?  Asymmetric link capacities  Impact and implications  ISP traffic is mostly application limited traffic  Things can change dramatically with o More intelligent P2P clients o Caches

23 February 2016 For the future…  Play with time scale  Extended case study on ADSL clients  We saw a day, what about a week?  Could we do things on-line?  Improving RCA techniques  Short connections  Non FIFO traffic (e.g. wireless)

Thank you for your attention

Backup slides

23 February 2016 Our approach (suppress)  Analyze passive traffic measurements  Capture and store all TCP/IP headers, analyze later off-line  Observe traffic only at a single measurement point  Applicable in diverse situations  E.g. at the edge of an ISP’s network o Know all about clients’ downloads and uploads  Bidirectional packet traces  Connection level analysis

23 February 2016 Scope (suppress)  Study long lived TCP connections  Short connections are another topic o Dominated by slow start?  Assume FIFO scheduling  Necessary for link capacity estimations with packet dispersion techniques  Reasonable assumption for most traffic  May not hold for cable modem and access networks

23 February 2016  Applications  Port based identification  Connections  Size distribution highly skewed  Use only 1% of them for RCA o Represent > 85% of all traffic  Clients  Heavy-hitters: 15% of clients generate 85-90% of traffic (up & down)  Low access link utilization o Why? Warming up… >5% of traffic each

23 February 2016 Client-level root cause analysis Limitation causes for clients 1.Application 2.Saturated access link 3.Network limitation due to distant bottleneck link 4.TCP configuration Connection-level RCA 1.ALPs 2.network limited BTPs during which utilization > 90% 3.network limited BTPs during which utilization < 90% 4.download (=local problem) BTPs limited by TCP layer associate bytes Extend the InTraBase framework

23 February 2016 Results of Limitation Analysis  Few active clients overall  Application limitation dominates  Network limitation by distant bottleneck also experienced similar contains most bytes contains some bytes

23 February 2016 Application analysis: Distant bottleneck link  Diverse mixture  Cause is not necessarily due to client’s behavior

23 February 2016 Impact of Limitation Causes  How far from optimal (access link saturation) are we?  Main observations  Uplink utilization < 50% during most of application and network limited uploads  Very low downlink utilization for application limited traffic o Utilization < 20% during 65% of ALPs

23 February 2016 Impact of Limitation Causes  Very low downlink utilization for application limited traffic upstream downstream How far from optimal (access link saturation) are we?