#16 Application Measurement Presentation by Bobin John.

Slides:



Advertisements
Similar presentations
A Measurement Study of Peer-to-Peer File Sharing Systems Presented by Cristina Abad.
Advertisements

Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Measurement, Modeling, and Analysis of a Peer-2-Peer File-Sharing Workload Presented For Cs294-4 Fall 2003 By Jon Hess.
Measurement, Modeling and Analysis of a Peer-to-Peer File-Sharing Workload Krishna Gummadi, Richard Dunn, Stefan Saroiu Steve Gribble, Hank Levy, John.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
Hypertext Transfer Protocol Kyle Roth Mark Hoover.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Measurement, Modeling, and Analysis of a Peer-to-Peer File sharing Workload Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry.
1 Web Performance Modeling Chapter New Phenomena in the Internet and WWW Self-similarity - a self-similar process looks bursty across several time.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
What’s a Web Cache? Why do people use them? Web cache location Web cache purpose There are two main reasons that Web cache are used:  to reduce latency.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
1 TCP Traffic Analysis in cooperation with Motorola Todd DeSantis and David Loose Advisor: Professor Mark Claypool Co-Advisor: Professor Robert Kinicki.
Investigating Forms of Simulating Web Traffic Yixin Hua Eswin Anzueto Computer Science Department Worcester Polytechnic Institute Worcester, MA.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Lesson 19 Internet Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Analyzing Peer-to-Peer Traffic Across Large Networks Jia Wang Joint work with Subhabrata Sen AT&T Labs - Research.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
1 mmdump Reference: “mmdump: A Tool for Monitoring Internet Multimedia Traffic” J. van der Merwe, R. Cceres, Y-H. Chu, C. Sreenan. ACM SIGCOMM Computer.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
1 CS 425 Distributed Systems Fall 2011 Slides by Indranil Gupta Measurement Studies All Slides © IG Acknowledgments: Jay Patel.
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
1 Welcome to CSC 301 Web Programming Charles Frank.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Introduction to Internet. Chapter 1 Objectives Origins of the Internet Packets and Routers TCP/IP DNS HTTP URL Client-Server.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
2007cs Servers on the Web. The World-Wide Web 2007 cs CSS JS HTML Server Browser JS CSS HTML Transfer of resources using HTTP.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
CFTP - A Caching FTP Server Mark Russell and Tim Hopkins Computing Laboratory University of Kent Canterbury, CT2 7NF Kent, UK 元智大學 資訊工程研究所 系統實驗室 陳桂慧.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
An Analysis of Internet Content Delivery Systems 19 rd November, 2007 Youngsub CSE, SNU.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
How HTTP Works Made by Manish Kushwaha.
WWW and HTTP King Fahd University of Petroleum & Minerals
The Devil and Packet Trace Anonymization
Securing the Network Perimeter with ISA 2004
Internet Networking recitation #12
Multimedia and Networks
CPSC 641: WAN Measurement Carey Williamson
Carey Williamson Department of Computer Science University of Calgary
Web Servers (IIS and Apache)
Presentation transcript:

#16 Application Measurement Presentation by Bobin John

1 st paper: Measurement, Modeling & Analysis of a Peer-to-Peer File- Sharing Workload (KaZaa paper)

KaZaa paper  P2P file sharing is the most dominant  This paper deals with KaZaa  200-day trace is taken  Model is developed  Locality-awareness can improve KaZaa performance

KaZaa paper  Trace Methodology  KaZaa trace summary statistics  KaZaa “usernames” used  KaZaaLite … IPs used  Easy to distinguish KaZaa-specific HTTP headers  Auto-update transactions filtered out

KaZaa paper  User Characteristics  KaZaa users are patient

KaZaa paper  User Characteristics  Users slow down as they age  2 reasons: attrition & slowing down over time

KaZaa paper  Client Activity

KaZaa paper  Object Characteristics  Diverse workload

KaZaa paper  Object Characteristics  Object Dynamics  Clients fetch objects at most once  Popularity of objects is often short-lived  Most popular objects tend to be recently born objects  Most requests are for old objects

KaZaa paper  Object Characteristics  NOT Zipf-like  Web access patterns follow the Zipf property

KaZaa paper  Model

KaZaa paper  Model for P2P file-sharing workloads  Model Description

KaZaa paper  Model for P2P  File-Sharing effectiveness diminishes with client age

KaZaa paper  Model for P2P  New Object Arrivals improve performance

KaZaa paper  Model for P2P  New clients cannot stabilize performance

KaZaa paper  Model for P2P  Model validation

KaZaa paper  New idea!  How to reduce bandwidth cost?  Use a proxy cache Legal & political problems  Locality-aware request routing Centralized request redirection redirector Decentralized request redirection supernodes

KaZaa paper  Locality awareness  Methodology  Benefits

KaZaa paper  Locality awareness  Accounting for Hits & Misses

KaZaa paper  Locality awareness  Availability

KaZaa paper  Conclusion  KaZaa workload is different  Does not follow Zipf  Can be improved with locality awareness  Drawbacks  A trace from a university ought not to be generalized to all KaZaa/P2P applications  Further implementation details of locality- awareness?  Scope of use for such a locality awareness tool?  I don’t think universities would like this

2 nd paper: An analysis of Internet Chat systems

Chat paper  Why is chat a worthwhile target for traffic characterization?  Chat offers computer mediated communication  Used by a large number of people … potential of being habit-forming

Chat paper  Different types of chat systems:  Internet Relay Chat [IRC]  Web-based chat systems  ICQ & AIM  Gale

Chat paper  Problem in analyzing chat traffic  Multitude & diversity of systems & protocols  Chat protocol realized on top of HTTP protocol … difficult to separate chat traffic  Resource limitations due to filtering demands

Chat paper  IRC  Set of connected servers  Client connection requests on port 6667  Unique nicknames  Discussion channels  Channel operators  Medium to share data  IRC operator

Chat paper  Web-chat  Not tty-based … Web browser interface  A single server to connect to  3 classes of chat systems:  HTML-Web-Chat  Applet-Web-Chat  Applet-IRC-Chat  Difference between IRC & Web-chat is only “social”

Chat paper  Identifying IRC chat traffic  Packet monitor that captures all TCP traffic involving port 6667  Can only capture text & control messages  Data/file transfers cannot be captured as they run on other TCP connections  IRC’s packet size distribution is mainly dominated by small packets  IRC session should last more than a few minutes  IRC sends keep-alive messages

Chat paper  Identifying Web-chat traffic  HTML-Web-chat:  Appropriate cache-control-headers  Adding state information  Cache-Control: Must-revalidate & Cache-Control: Private indicates non- chat traffic  Use of scripting languages e.g.,Javascript  Use of applet windows e.g., Java

Chat paper  Identifying Web-chat traffic  Applet-Web-chat:  User would have accessed a Java file or a script or even a page like “xxxchatyyy” … “chat” could occur even in the path

Chat paper  Overall strategy for extracting chat traffic

Chat paper  Overall strategy for extracting chat traffic  Repeat this process  Identify traffic that cannot be chat traffic  Remove it  Steps that filter out more non-chat traffic has to be implemented earlier  Other steps that need more processin gor pre-processing should be implemented later

Chat paper  Overall strategy for extracting chat traffic  Eliminate traces from ports < 1024 except port 80  Also eliminate trace from well-known application ports (e.g., Gnutella )  Group packets into flows  Mark & filter them according to the previous table

Chat paper  Experiment  At University of Saarland  Resource partitioning  Traces were generated after filtering  950GB > 1.2GB > 238MB (WEBCHAT1)  192MB (IRC1)  350MB (WEBCHAT2)

Chat paper:  Validation  2 aspects:  Recall – ability of a system to present all relevant items  Precision – ability of a system to present only relevant items

Chat paper  Validation  Lots of calculations “we can expect to locate about 91.7% of all real chat connections and that we expect that at least 93.1% of all connections we identify are indeed chat connections. “

Chat paper  Results  Session durations

Chat paper  Results  Interarrival times of sessions

Chat paper  Results  Packet sizes

Chat paper  Results  Sent & Received bytes

Chat paper  Conclusion  Chat-traffic was successfully filtered out  Accuracy was above 90%  Drawbacks  Use of this work?