Tracking the Evolution of Web Traffic:
|
|
- Polly Cunningham
- 6 years ago
- Views:
Transcription
1 The University of North Carolina at Chapel Hill Department of Computer Science 11 th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Orlando, October 13 th, 2003 Tracking the Evolution of Web Traffic: Félix Hernández-Campos Kevin Jeffay F. Donelson Smith Web Traffic Measurement and Analysis at UNC-Chapel Hill In 1997, populating web traffic generators for experimental networking research motivated a large- scale study of web traffic at UNC with three goals: Develop a light-weight methodology Based on passive measurement Easy to maintain models up-to-date Replace smaller-scale, quickly aging models Mah,, 1995 data set Crovella et. al,, 1995 data set (revised with 1998 data) Characterize the use of the protocol E.g.,, Use of persistent connections 1 2 Web Traffic Measurement and Analysis at UNC-Chapel Hill Our methodology and first results were published in SIGMETRICS/Performance 01 What TCP/IP Protocol Headers Can Tell Us About the Web Modeling aspect explored in a series of papers E.g., Variable Heavy Tails in Internet Traffic (with J.S. Marron)»(Part» I: Understanding Heavy Tails published in MASCOTS 02) In this talk, I will describe our approach and our observation on the evolution of web traffic: Three data sets: 1999, 2001 and 2003 Comparisons to Mah and Crovella et al. Methodology Study of Web Content Consumers University of North Carolina at Chapel Hill Web Clients Requests Responses Internet Web Servers We studied a large collection of users (~35,000) as web content consumers The only source of data for our study were packet header traces Anonymized IP addresses No headers 3 4
2 Methodology One-Way Packet Header Traces Methodology Processing Sequence Overview University of North Carolina at Chapel Hill Web Clients Gigabit Ethernet Traffic Monitor (tcpdump) Internet Web Servers tcpdump Raw TCP/IP headers trace Filter & Sort TCP Connections (Port 80) Connection-level Analysis Only inbound TCP/IP headers are captured Eliminate synchronization and buffering issues on the NIC Reduce trace size Trace collection: 2.7 TB of packet headers ~40 billion packets ~16 TB of data transfers Client Behavior Client-level Analysis Statistical Analysis Req/Rsp Rsp Exchanges 5 6 TCP/IP Headers and Request/response Exchange Web Client (UNC) Request SYN SYN- - - seqno 305 ackno 1 seqno 1 ackno 305 seqno 1461 ackno 305 seqno 2876 ackno 305 seqno 305 ackno 2876 Web Server (Internet) Response 7 TCP/IP Headers and Server-to-client Segments Only Web Client (UNC) Request Response SYN- seqno 1 ackno 1 - seqno 1 ackno 305 seqno 1461 ackno 305 seqno 2876 ackno 305 Web Server (Internet) Ackno Seqno 8
3 Methodology Request/Response Traces Unidirectional TCP/IP header traces are sufficient for capturing application-level behavior Web Client Request Computed Response Directly Observed Web Server Persistent Connections in Example TCP/IP Headers Web Client (UNC) Request 1 Response 1 Request bytes Response bytes SYN- seqno 1 ackno 305 seqno 1461 ackno 305 seqno 2876 ackno 305 seqno 2876 ackno 567 seqno 4336 ackno 567 seqno 5796 ackno 567 seqno 6341 ackno seqno 1 ackno 1 Web Server (Internet) Ackno Seqno Ackno 9 10 Sizes of Requests Empirical CDFs Sizes of Requests Empirical CCDFs Complementary 0.3e-5 1 MB % 296 Requests 2.7% Bytes Size in Bytes 11 No. of Bytes 12
4 Response Sizes Response Sizes LogNormal Fits Complementary Systematic Wobbles Pareto Fits Size in Bytes 13 No. of Bytes 14 Page Identification Heuristic Two TCP Connections Example Objects Per Page Client Top-level Object Server Page 1 Quiet Time >1 second Client Embedded Objects Server Page 2 15 No. of Objects ( Exchanges) 16
5 Objects Per Page Page Requests Per IP Address Complementary No. of Objects ( Exchanges) 17 No. of Page Requests 18 Impact of Tracing Interval Length Questions: Can we obtain a sufficiently large sample with a small number of short traces? How does the length of the tracing interval affect the overall empirical distribution shapes? Should we include in the empirical distributions the data from incomplete TCP connections? Approach: Examine a wide range of trace lengths»4» 4 h., 2 h., 1h., 30 min., 15 min., 5 min. and 90 sec. Construct datasets by sub-sampling the 21 4-hour-long traces collected in 2001 E.g.,, remove first and last hour of each trace to produce 21 2-hour-long traces 19 Response Size in Bytes 20
6 Impact of Tracing Interval Length Impact of Tracing Interval Length Complementary Response Size in Bytes 21 No. of Pages Per Client IP Address 22 Impact of Partially-Captured Objects Impact of Partially-Captured Objects Complementary Response Size in Bytes 23 No. of Bytes 24
7 Summary and Conclusions Web Traffic Characterization New data to populate traffic generators Request sizes Response sizes Use of persistent connections... 1-hour long traces are sufficient to capture application-level behavior Short traces cut off large objects, which skews the tails of the distributions Persistent Connections: ~15% of all the connections 40-50% of all the transferred bytes 25
From Traffic Measurement to Realistic Workload Generation
From Traffic Measurement to Realistic Workload Generation Felix Hernandez-Campos Ph. D. Candidate Dept. of Computer Science Univ. of North Carolina at Chapel Hill Joint work with F. Donelson Smith and
More informationA Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic Félix Hernández-Campos ndez-campos Kevin Jeffay Don Smith Department
More informationExperimental Networking Research and Performance Evaluation
Generating Realistic TCP Workloads Felix Hernandez-Campos Ph. D. Candidate Dept. of Computer Science Univ. of North Carolina at Chapel Hill Recipient of the 2001 CMG Fellowship Joint work with F. Donelson
More informationDiscrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation
Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Jay Aikat*, Shaddi Hasan +, Kevin Jeffay*, and F. Donelson Smith* *University of North Carolina at Chapel
More informationExposing server performance to network managers through passive network measurements
Exposing server performance to network managers through passive network measurements Jeff Terrell Dept. of Computer Science University of North Carolina at Chapel Hill October 19, 2008 1 databases web
More informationTuning RED for Web Traffic
Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)
More informationWhat TCP/IP Protocol Headers Can Tell Us About the Web*
What TCP/IP Protocol Headers Can Tell Us About the Web* F. Donelson Smith Félix Hernández Campos Kevin Jeffay David Ott University of North Carolina at Chapel Hill Department of Computer Science Chapel
More informationDifferential Congestion Notification: Taming the Elephants
Differential Congestion Notification: Taming the Elephants Long Le, Jay Kikat, Kevin Jeffay, and Don Smith Department of Computer science University of North Carolina at Chapel Hill http://www.cs.unc.edu/research/dirt
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet
More informationCPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary
CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)
More informationAn Empirical Study of Delay Jitter Management Policies
An Empirical Study of Delay Jitter Management Policies D. Stone and K. Jeffay Computer Science Department University of North Carolina, Chapel Hill ACM Multimedia Systems Volume 2, Number 6 January 1995
More informationGENERATING REALISTIC TCP WORKLOADS
GENERATING REALISTIC TCP WORKLOADS F. Hernández-Campos F. Donelson Smith K. Jeffay Department of Computer Science University of North Carolina at Chapel Hill {fhernand,smithfd,jeffay}@cs.unc.edu Abstract
More informationEmpirical Models of TCP and UDP End User Network Traffic from Data Analysis
Empirical Models of TCP and UDP End User Network Traffic from NETI@home Data Analysis Charles R. Simpson, Jr., Dheeraj Reddy, George F. Riley School of Electrical and Computer Engineering Georgia Institute
More informationAppendix A. Methodology
193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.
More informationRapid Model Parameterization from Traffic Measurements
Rapid Model Parameterization from Traffic Measurements KUN-CHAN LAN and JOHN HEIDEMANN USC Information Sciences Institute The utility of simulations and analysis heavily relies on good models of network
More informationUnderstanding Patterns of TCP Connection Usage with Statistical Clustering
Understanding Patterns of TCP Connection Usage with Statistical Clustering Félix Hernández-Campos Andrew B. Nobel 2 F. Donelson Smith Kevin Jeffay Department of Computer Science 2 Department of Statistics
More informationTCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.
Overview Formats, Data Transfer, etc. Connection Management (modified by Malathi Veeraraghavan) 1 Overview TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end
More informationAppendix B. Standards-Track TCP Evaluation
215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error
More informationVideo at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016
Video at the Edge passive delay measurements Kathleen Nichols Pollere, Inc nichols@pollere.net November 17, 2016 Talk Roadmap Netflix and YouTube network characterization delay profiles delay localization
More informationLong-Range Dependence in a Changing Internet Traffic Mix
Long-Range Dependence in a Changing Internet Traffic Mix Cheolwoo Park Statistical and Applied Mathematical Sciences Institute, RTP, NC J. S. Marron Department of Statistics and Operations Research, University
More informationCharacterizing Internet Load as a Non-regular Multiplex of TCP Streams
Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es
More informationarxiv: v1 [stat.ap] 6 Oct 2010
The Annals of Applied Statistics 2010, Vol. 4, No. 1, 26 52 DOI: 10.1214/09-AOAS268 c Institute of Mathematical Statistics, 2010 ANALYSIS OF DEPENDENCE AMONG SIZE, RATE AND DURATION IN INTERNET FLOWS arxiv:1010.1108v1
More informationPassive, Streaming Inference of TCP Connection Structure for Network Server Management
Passive, Streaming Inference of TCP Connection Structure for Network Server Management Jeff Terrell,KevinJeffay,F.DonelsonSmith, Jim Gogan 2, and Joni Keller 2 Department of Computer Science 2 ITS Communication
More informationCOMP 249 Advanced Distributed Systems Multimedia Networking. Performance of Multimedia Delivery on the Internet Today
COMP 249 Advanced Distributed Systems Multimedia Networking Performance of Multimedia Delivery on the Internet Today Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill
More informationA Better-Than-Best Effort Forwarding Service For UDP
University of North Carolina at Chapel Hill A Better-Than-Best Effort Forwarding Service For UDP Lightweight Active Queue Management for Multimedia Networking Kevin Jeffay Mark Parris Don Smith http://www.cs.unc.edu/reseach/dirt
More informationWEB traffic characterization and performance analysis
WEB traffic characterization and performance analysis Summary Objectives of our work Web traffic characterisation through measurements Performance evaluation and analytical model validation Packet level
More informationA Comparative Study of the Realization of Rate-Based Computing Services in General Purpose Operating Systems
A technology for real-time computing on the desktop A Comparative Study of the Realization of Rate-Based Computing Services in General Purpose Operating Systems Kevin Jeffay Department of Computer Science
More informationTBIT: TCP Behavior Inference Tool
TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results
More informationMultimedia Networking Research at UNC. University of North Carolina at Chapel Hill. Multimedia Networking Research at UNC
University of North Carolina at Chapel Hill Multimedia Networking Research at UNC Adaptive, Best-Effort Congestion Control Mechanisms for Real-Time Communications on the Internet Kevin Jeffay F. Donelson
More informationSSFNET TCP Simulation Analysis by tcpanaly
SSFNET TCP Simulation Analysis by tcpanaly Hongbo Liu hongbol@winlabrutgersedu Apr 16, 2000 Abstract SSFNET is a collection of SSF-based models for simulating Internet protocols and networks It is designed
More informationDifferential Congestion Notification: Taming the Elephants
Differential Congestion Notification: Taming the Elephants Long Le Jay Aikat Kevin Jeffay F. Donelson Smith Department of Computer Science University of North Carolina at Chapel Hill http://www.cs.unc.edu/research/dirt
More informationTrace based application layer modeling in ns-3
Trace based application layer modeling in ns-3 Prakash Agrawal and Mythili Vutukuru Department of Computer Science and Engineering, Indian Institute of Technology, Bombay {prakashagr, mythili }@cse.iitb.ac.in
More informationImproving Confidence in Network Simulations
Improving Confidence in Network Simulations Michele C. Weigle Department of Computer Science Old Dominion University Winter Simulation Conference December 5, 2006 Introduction! Credibility crisis in networking
More informationTransport Layer TCP / UDP
Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC
More informationObjectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.
Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and
More informationCS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal
CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve
More informationGENERATING Tmix-BASED TCP APPLICATION. WORKLOADS IN NS-2 AND GTNetS. A Thesis. Presented to. the Graduate School of. Clemson University
GENERATING Tmix-BASED TCP APPLICATION WORKLOADS IN NS-2 AND GTNetS A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Master of Science
More informationMonitoring, Analysis and Modeling of HTTP and HTTPS Requests in a Campus LAN Shriparen Sriskandarajah and Nalin Ranasinghe.
Monitoring, Analysis and Modeling of HTTP and HTTPS Requests in a Campus LAN Shriparen Sriskandarajah and Nalin Ranasinghe. Abstract In this paper we monitored, analysed and modeled Hypertext Transfer
More informationTraffic Classification Using Visual Motifs: An Empirical Evaluation
Traffic Classification Using Visual Motifs: An Empirical Evaluation Wilson Lian 1 Fabian Monrose 1 John McHugh 1,2 1 University of North Carolina at Chapel Hill 2 RedJack, LLC VizSec 2010 Overview Background
More informationLab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2
Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram
More informationTraffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet
Traffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet Aamir Shaikh and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa,
More informationFall 2012: FCM 708 Bridge Foundation I
Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport
More informationNetwork Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM
Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers
More informationQuantifying the effects of recent protocol improvements to TCP: Impact on Web performance
Computer Communications xxx (26) xxx xxx www.elsevier.com/locate/comcom Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance Michele C. Weigle a, *, Kevin Jeffay b,
More informationIntroduction to OSI model and Network Analyzer :- Introduction to Wireshark
Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2014 Networking Laboratory 1/56 An Overview Internet
More informationCatching IP traffic burstiness with a lightweight generator
Catching IP traffic burstiness with a lightweight generator Chloé Rolland 1, Julien Ridoux 2, and Bruno Baynat 1 1 Université Pierre et Marie Curie - Paris VI, LIP6/CNRS, UMR 7606, Paris, France {rolland,
More informationCOMP 249 Advanced Distributed Systems Multimedia Networking. The Integrated Services Architecture for the Internet
COMP 249 Advanced Distributed Systems Multimedia Networking The Integrated Services Architecture for the Internet Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill
More informationGame Traffic Analysis: An MMORPG Perspective
Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer
More informationVisualization of Internet Traffic Features
Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,
More informationCOMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B
More informationEE 122: HyperText Transfer Protocol (HTTP)
Background EE 122: HyperText Transfer Protocol (HTTP) Ion Stoica Nov 25, 2002 World Wide Web (WWW): a set of cooperating clients and servers that communicate through HTTP HTTP history - First HTTP implementation
More informationMultimedia Streaming. Mike Zink
Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=
More informationUniversität Stuttgart
Universität Stuttgart INSTITUT FÜR KOMMUNIKATIONSNETZE UND RECHNERSYSTEME Prof. Dr.-Ing. A. Kirstädter Copyright Notice c 2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish
More informationWeb Caching and Content Delivery
Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same
More informationInvestigating Forms of Simulating Web Traffic. Yixin Hua Eswin Anzueto Computer Science Department Worcester Polytechnic Institute Worcester, MA
Investigating Forms of Simulating Web Traffic Yixin Hua Eswin Anzueto Computer Science Department Worcester Polytechnic Institute Worcester, MA Outline Introduction Web Traffic Characteristics Web Traffic
More information9. Wireshark I: Protocol Stack and Ethernet
Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the
More informationA Fluid-Flow Characterization of Internet1 and Internet2 Traffic *
A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620
More informationCongestion Control Without a Startup Phase
Congestion Control Without a Startup Phase Dan Liu 1, Mark Allman 2, Shudong Jin 1, Limin Wang 3 1. Case Western Reserve University, 2. International Computer Science Institute, 3. Bell Labs PFLDnet 2007
More informationA Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory
Shawn Koch Mark Doughty ELEC 525 4/23/02 A Simulation: Improving Throughput and Reducing PCI Bus Traffic by Caching Server Requests using a Network Processor with Memory 1 Motivation and Concept The goal
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationTopics in P2P Networked Systems
600.413 Topics in P2P Networked Systems Week 4 Measurements Andreas Terzis Slides from Stefan Saroiu Content Delivery is Changing Thirst for data continues to increase (more data & users) New types of
More informationEvaluation of short-term traffic forecasting algorithms in wireless networks
Evaluation of short-term traffic forecasting algorithms in wireless networks Maria Papadopouli Elias Raftopoulos Haipeng Shen Abstract Our goal is to characterize the traffic load in an IEEE82. infrastructure.
More informationNetwork Awareness and Network Security
Network Awareness and Network Security John McHugh Canada Research Chair in Privacy and Security Director, oratory Dalhousie University, Halifax, NS CASCON CyberSecurity Workshop 17 October 2005 Overview
More informationAn In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver
More informationInternet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks
Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),
More informationthe past doesn t impact the future!
Memoryless property: suppose time between session arrivals Z is exponentially distributed note: Pr{Z >y} = y be bt dt = e by suppose a session has not arrived for y seconds what is the probability that
More informationApplication-Level Measurements of Performance on the vbns *
Application-Level Measurements of Performance on the vbns * Michele Clark Kevin Jeffay University of North Carolina at Chapel Hill Department of Computer Science Chapel Hill, NC 2799-317 USA {clark,jeffay}@cs.unc.edu
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationRealMedia Streaming Performance on an IEEE b Wireless LAN
RealMedia Streaming Performance on an IEEE 802.11b Wireless LAN T. Huang and C. Williamson Proceedings of IASTED Wireless and Optical Communications (WOC) Conference Banff, AB, Canada, July 2002 Presented
More informationSpatio-Temporal Modeling of campus WLAN traffic demand
Spatio-Temporal Modeling of campus WLAN traffic demand Félix Hernández-Campos a Merkourios Karaliopoulos b Maria Papadopouli a,b,c Haipeng Shen d a. Department of Computer Science, University of North
More informationLab Exercise UDP & TCP
Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
More informationPerformance Evaluation of Tcpdump
Performance Evaluation of Tcpdump Farhan Jiva University of Georgia Abstract With the onset of high-speed networks, using tcpdump in a reliable fashion can become problematic when facing the poor performance
More informationUNH-IOL PCIe CONSORTIUM
UNH-IOL PCIe CONSORTIUM PCIe Interoperability Test Suite v1.0 Technical Document Last Updated: September 26, 2013 2013 University of New Hampshire InterOperability Laboratory UNH IOL PCIe Consortium 121
More informationCSc 450/550: Computer Communications and Networks (Summer 2007)
1 2 3 4 5 6 CSc 450/550: Computer Communications and Networks (Summer 2007) Lab Project 3: A Simple Network Traffic Analyzer Spec Out: July 6, 2007 Demo Due: July 25, 2007 Code Due: July 27, 2007 7 8 9
More informationEnd-to-end available bandwidth estimation
End-to-end available bandwidth estimation Constantinos Dovrolis Computer and Information Sciences University of Delaware Constantinos Dovrolis - dovrolis@cis.udel.edu, IPAM workshop, March 2002 1 of 28%
More informationSpatio-Temporal Modeling of Traffic Workload in a Campus WLAN
Spatio-Temporal Modeling of Traffic Workload in a Campus WLAN Félix Hernández-Campos Department of Computer Science University of North Carolina Chapel Hill, United States fhernand@cs.unc.edu Maria Papadopouli
More informationEvaluation of short-term traffic forecasting algorithms in wireless networks
Evaluation of short-term traffic forecasting algorithms in wireless networks Maria Papadopouli Elias Raftopoulos Haipeng Shen Emails: maria@cs.unc.edu, eraftop@csd.uoc.gr, haipeng@email.unc.edu. Abstract
More informationA Passive State-Machine Based Approach for Reliable Estimation of TCP Losses
A Passive State-Machine Based Approach for Reliable Estimation of TCP Losses Sushant Rewaskar Jasleen Kaur Don Smith Department of Computer Science University of North Carolina at Chapel Hill Technical
More informationToward Efficient Querying of Compressed Network Payloads!
Toward Efficient Querying of Compressed Network Payloads By Teryl Taylor and Fabian Monrose University of North Carolina at Chapel Hill Scott E. Coull and John McHugh RedJack Motivation Get /BadExe Please
More informationNetwork traffic characterization
Network traffic characterization A historical perspective 1 Incoming AT&T traffic by port (18 hours of traffic to AT&T dial clients on July 22, 1997) Name port % bytes %packets bytes per packet world-wide-web
More informationNetwork traffic characterization. A historical perspective
Network traffic characterization A historical perspective 1 Incoming AT&T traffic by port (18 hours of traffic to AT&T dial clients on July 22, 1997) Name port %bytes %packets bytes per packet world-wide-web
More informationCS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy
More informationYour favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY
VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th
More informationOn the State of ECN and TCP Options on the Internet
On the State of ECN and TCP Options on the Internet PAM 2013, March 19, Hong Kong Mirja Kühlewind Sebastian Neuner Brian
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils
More informationDynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis
Dynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis Dr. Jim Martin Associate Professor School of Computing Clemson University jim.martin@cs.clemson.edu http://www.cs.clemson.edu/~jmarty
More informationImproving Packet Processing Efficiency on Multi-core Architectures with Single Input Queue
P. Orosz. / Carpathian Journal of Electronic and Computer Engineering 5 (2012) 44-48 44 Improving Packet Processing Efficiency on Multi-core Architectures with Single Input Queue Péter Orosz University
More informationThe trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap
Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It
More informationSpeeding up Transaction-oriented Communications in the Internet
Speeding up Transaction-oriented Communications in the Internet Tobias Küfner, Mark Doll, Götz Lichtwald, Martina Zitterbart Institute of Telematics, University of Karlsruhe {kuefner doll lichtwald zit}@tm.uka.de
More informationLab Exercise Protocol Layers
Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in 1.3 and 1.4 of your text. Review
More informationNetwork Test and Monitoring Tools
ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationBenchmarking and Compliance Methodology for White Rabbit Switches
Benchmarking and Compliance Methodology for White Rabbit Switches July 2011 Cesar Prados (c.pradosi@gsi.de) i Table of Contents Introduction....................................................... 1 1 Benchmarking
More informationNetwork Analyzer :- Introduction to Wireshark
Sungkyunkwan University Network Analyzer :- Introduction to Wireshark Syed M. Raza s.moh.raza@skku.edu H. Choo choo@skku.edu Copyright 2000-2018 Networking Laboratory Networking Laboratory 1/56 An Overview
More informationTool Manual (Version I)
EMIST Network Intrusion Detection (NID) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State Copyright (c) 2006 The Pennsylvania State University i TABLE OF CONTENTS 1.
More informationStatistical Clustering of Internet Communication Patterns
Statistical Clustering of Internet Communication Patterns Félix Hernández-Campos F. Donelson Smith Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill {fhernand,smithfd,jeffay}@cs.unc.edu
More informationIntroduction to Networks Network Types. BTEC Nat IT Computer Networks
Introduction to Networks Network Types 1 BTEC Nat IT Computer Networks Different types of Networks Understand the purpose of a computer network Create network drawings Understand Packet Switching BTEC
More informationplease study up before presenting
HIDDEN SLIDE Summary These slides are meant to be used as is to give an upper level view of perfsonar for an audience that is not familiar with the concept. You *ARE* allowed to delete things you don t
More informationOut-Of-Core Sort-First Parallel Rendering for Cluster-Based Tiled Displays
Out-Of-Core Sort-First Parallel Rendering for Cluster-Based Tiled Displays Wagner T. Corrêa James T. Klosowski Cláudio T. Silva Princeton/AT&T IBM OHSU/AT&T EG PGV, Germany September 10, 2002 Goals Render
More information