YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes

Size: px
Start display at page:

Download "YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes"

Transcription

1 YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis Politecnico di Torino Alok Tongankar, Sabyasachi Sasha Narus Inc.

2 Outline Motivation YouLighter methodology Parameter settings Results Conclusion 2

3 Outline Motivation YouLighter methodology Parameter settings Results Conclusion 3

4 Why monitoring YouTube CDN? A massive, distributed infrastructure Generates 20+% of world wide traffic Several thousands of caches (single servers) Grouped into Hundreds of edge-nodes (groups of caches) However Almost no information about YouTube CDN are available Internet Service Provider (ISP) have no control over YouTube CDN which changes frequently and suddenly sometimes causing QoE degradations possibly causing users complaining 4

5 Why monitoring YouTube CDN? A massive, distributed infrastructure Generates 20+% of world wide traffic Several thousands of caches (single servers) Grouped into Hundreds of edge-nodes (groups of caches) However Almost no information about YouTube CDN are available Internet Service Provider (ISP) have no control over YouTube CDN which changes frequently and suddenly sometimes causing QoE degradations possibly causing users complaining 5

6 Scenario Edge-node 1 Edge-node 2 Edge-node 3 Internet Tstat Tstat PoP1 PoP2 Passive measurements only Probe: Tstat 100+ per-flow statistics RTT, TTL, number of packets sent and received, number of byte sent and received, hostname, etc.. 6

7 Experiments and Validation Three Tstat probes Two probes in ISP1 One probe in ISP2 Consider traffic snapshots sliding window which moves forward each day (ΔT=1d) Trace Period Volume # Unique Videos Caches ISP1-A 01/04/ /02/ TB 2,892,452 8,664 ISP1-B 01/04/ /02/ TB 2,848,625 8,899 ISP1-C 01/04/ /02/ TB 2,711,179 9,028 ISP2 01/03/ /07/ TB 305,802 3,755 7

8 Problem 1: unveil the infrastructure 1. monitoring the single cache is not effective Load distribution changes very frequently The rank of most used caches changes deeply everyday! Idea: monitor edge-nodes, not caches 8

9 Problem 2: Edge-node change over time Get RTT data Generate RTT Distribution for each cache Evaluate behavior of 5 percentiles Points of Distribution

10 Problem 2: Edge-node change over time Get RTT data Generate RTT Distribution for each cache Evaluate behavior of 5 percentiles Points of Distribution X (1) 10

11 Problem 2: Edge-node change over time How can we measure edge-node change over time? X (1) Edge-Nodes 10 X (2) 11

12 Our Solution: YouLighter Edge-node 1 Edge-node 2 Edge-node 3 Internet Tstat YouLighter Tstat PoP1 PoP2 1. Find edge-nodes: Design an unsupervised methodology to group single caches 2. Observe changes: Define a distance to highlight changes in edge-nodes definition and usage over time 12

13 Validation Can we exploit an oracle to validate the results? Yes! YouTube use IATA codes to name edge-nodes and caches rx--abcxxtxx.c.youtube.com Where ABC corresponds to the cache s closest airport e.g., r7--fra07t16.c.youtube.com Frankfurt But, turns out to be not reliable ping r7--fra07t16.c.youtube.com ~= 50ms, 60TTL ping r7--fra09t21.c.youtube.com ~= 110ms, 55TTL Some caches sharing same IATA behave differently! [more complicated than this see the paper] 13

14 Outline Motivation YouLighter methodology Results Conclusion 14

15 Solution to Problem 1: Group caches 1. Get YouTube traffic logs from Tstat probes 2. Measurement consolidation and filtering 3. Feature selection extract RTT, TTL compute stats (percentiles, mean, variance, etc ) Standardize the features (stats) to a unitary space 4. Multi-dimensional clustering using DBSCAN Input: list of (cache_name, <feature1, feature2,, featuren>) tuples Output: A set of clusters (possibly edge-nodes) + Cluster of outlier Parameters: Min Points (MP): min number of points to create a cluster Epsilon (ε): maximum distance between any given point in a cluster and its MP th closest neighbor in the same cluster (critical) 15

16 DBSCAN Performance and Parameter Sensitivity Tuning of DBSCAN Which features? Different statistics Percentiles (20 th, 35 th, 50 th, 65 th, 80 th ), mean+variance, etc.. Which ε choice? Performance indices for clustering evaluation: True Positive Rate: ratio between # of correctly labeled caches and total # of caches Fragmentation: ratio between # of clusters and the # of observed labels Pureness: ratio between # of assigned labels and total # of labels in the ground truth Best result when all indices are equal to 1 16

17 DBSCAN Performance and Parameter Sensitivity (cont d) 1 st week of November 2013 in ISP1 stable situation controlled by manual verification Percentiles vs Mean+Standard Deviation using different ε Percentiles are more robust Fix ε =

18 Now we can find Edge-nodes. And now how can we analyze Edge-Node evolution over time? 18

19 Solution to Problem 2: Constellation distance Surprisingly, no methodology in literature 1. Summarize each cluster in a single point called star Ĉ (n) 2. Astral Distance For each star in Ĉ (n) compute all distances to stars in Ĉ (n+1) and take min Repeat in the opposite direction 3. Constellation Distance Sum of all Astral Distances AD ( ˆx ) 1,Ĉ(2) AD ( ŷ ) 4,Ĉ(1) X (1) Ĉ(1) X (2) Ĉ (2) 19

20 Outline Motivation YouLighter methodology Results Conclusion 20

21 Change observed from ISP1-A Constellation Distance is effective at detecting changes Big changes during May July 2013 Highlighted also in ISP1-B dataset 21

22 What happened in May 2013 Before change During change 22

23 What happened in May 2013 During change After change 23

24 What happened in May 2013 Before change During After change 24

25 Impact on QoE Frank splits in Bad Frank: caches with large std(rtt) Good Frank : caches with small std(rtt) Download throughput distribution of Frank vs Milan 25

26 Changes observed from ISP2 Changes detected in March 2014 No QoE impairment 26

27 Outline Motivation YouLighter methodology Results Conclusion 27

28 Conclusion YouLighter is effective at detecting changes in YouTube s CDN infrastructure Effective clustering to unveil YouTube infrastructure Definition of a novel Constellation Distance to identify changes between different clustering Help ISPs, network admins, etc. to react to changes To limit QoE impairments To improve traffic engineering Patent requested in 2014 Accepted in Italy Pending in USA 28

29 Thanks for you Attention 29

YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes

YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes Danilo Giordano 1, Stefano Traverso 1, Luigi Grimaudo 1, Marco Mellia 1, Elena Baralis 1, Alok Tongaonkar 2, Sabyasachi Saha 2 1 Politecnico

More information

The Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia

The Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia Measuring the Internet: challenges and applications Telecommunication Group presentation Speaker: Marco Mellia Politecnico di Torino 7/12/2011 The Internet today 2 A very complex scenario many eterogeneous

More information

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation

More information

Network Traffic Measurements and Analysis

Network Traffic Measurements and Analysis DEIB - Politecnico di Milano Fall, 2017 Introduction Often, we have only a set of features x = x 1, x 2,, x n, but no associated response y. Therefore we are not interested in prediction nor classification,

More information

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data

More information

Networked systems and their users

Networked systems and their users Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Understanding QoS measurements: Experience from the mplane European Project

Understanding QoS measurements: Experience from the mplane European Project Understanding QoS measurements: Experience from the mplane European Project Marco Mellia Politecnico di Torino ITU Regional Workshop for Europe New Issues in QoS Measuring and Monitoring 25-26 November

More information

Lecture 15: Datacenter TCP"

Lecture 15: Datacenter TCP Lecture 15: Datacenter TCP" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mohammad Alizadeh Lecture 15 Overview" Datacenter workload discussion DC-TCP Overview 2 Datacenter Review"

More information

Finding a needle in Haystack: Facebook's photo storage

Finding a needle in Haystack: Facebook's photo storage Finding a needle in Haystack: Facebook's photo storage The paper is written at facebook and describes a object storage system called Haystack. Since facebook processes a lot of photos (20 petabytes total,

More information

measurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic

measurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic measurement goals Traffic Measurement and Analysis () SOI ASIA Lecture 22//26 Kenjiro Cho Sony Computer Science Labs, Inc. kjc@csl.sony.co.jp for operations trouble shooting diagnosis and tuning of performance,

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

CS 425 / ECE 428 Distributed Systems Fall 2015

CS 425 / ECE 428 Distributed Systems Fall 2015 CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Measurement Studies Lecture 23 Nov 10, 2015 Reading: See links on website All Slides IG 1 Motivation We design algorithms, implement

More information

Content distribution networks

Content distribution networks Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at

More information

Internet Path Stability: Exploring the Impact of MPLS. Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015

Internet Path Stability: Exploring the Impact of MPLS. Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015 Internet Path Stability: Exploring the Impact of MPLS Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015 1 Outline Introduction Related Work Contribution Methodology Results Conclusions 2 About Myself

More information

Internet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010

Internet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010 Internet Inter-Domain Traffic C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010 Motivation! Measuring the Internet is hard! Significant previous work on Router

More information

Smart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu

Smart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu Smart Home Network Management with Dynamic Traffic Distribution Chenguang Zhu Xiang Ren Tianran Xu Motivation Motivation Per Application QoS In small home / office networks, applications compete for limited

More information

Why running measurements?

Why running measurements? Network Measurements: Passive, Active and Hybrid approaches Stefano Traverso stefano.traverso@polito.it Why running measurements? The Internet is the first thing that humanity has built that humanity doesn't

More information

Architecture of a Network-Aware P2P-TV Application: the NAPA- WINE Approach

Architecture of a Network-Aware P2P-TV Application: the NAPA- WINE Approach Architecture of a Network-Aware P2P-TV Application: the NAPA- WINE Approach Slough, 11th November 2011 Emilio Leonardi Politecnico di Torino COMET-ENVISION Workshop Slough 11th November 2011 Internet Video

More information

Vivaldi: A Decentralized Coordinate System

Vivaldi: A Decentralized Coordinate System Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer

More information

Based on Big Data: Hype or Hallelujah? by Elena Baralis

Based on Big Data: Hype or Hallelujah? by Elena Baralis Based on Big Data: Hype or Hallelujah? by Elena Baralis http://dbdmg.polito.it/wordpress/wp-content/uploads/2010/12/bigdata_2015_2x.pdf 1 3 February 2010 Google detected flu outbreak two weeks ahead of

More information

Revealing Skype Traffic: When Randomness Plays with You

Revealing Skype Traffic: When Randomness Plays with You Revealing Skype Traffic: When Randomness Plays with You Dario Bonfiglio Marco Mellia Michela Meo Dario Rossi Paolo Tofanelli Our Goal Identify Skype traffic Motivations Operators need to know what is running

More information

K Nearest Neighbor Wrap Up K- Means Clustering. Slides adapted from Prof. Carpuat

K Nearest Neighbor Wrap Up K- Means Clustering. Slides adapted from Prof. Carpuat K Nearest Neighbor Wrap Up K- Means Clustering Slides adapted from Prof. Carpuat K Nearest Neighbor classification Classification is based on Test instance with Training Data K: number of neighbors that

More information

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017 CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons

More information

DETECTING RESOLVERS AT.NZ. Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018

DETECTING RESOLVERS AT.NZ. Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018 DETECTING RESOLVERS AT.NZ Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018 BACKGROUND DNS-OARC 29 2 DNS TRAFFIC IS NOISY Despite general belief, not all the sources at auth nameserver are

More information

A Tale of Three CDNs

A Tale of Three CDNs A Tale of Three CDNs An Active Measurement Study of Hulu and Its CDNs Vijay K Adhikari 1, Yang Guo 2, Fang Hao 2, Volker Hilt 2, and Zhi-Li Zhang 1 1 University of Minnesota - Twin Cities 2 Bell Labs,

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

IV Conference on Application Security and Modern Technologies

IV Conference on Application Security and Modern Technologies IV Conference on Application Security and Modern Technologies In collaborazione con Venezia, Università Ca Foscari 23 Settembre 2016 1 Dipartimento di Elettronica Informazione e Bioingegneria BankSealer:

More information

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer The Beautiful World of IoT 06.03.2018 garcia@tk.tu-darmstadt.de

More information

Internet trafic monitoring

Internet trafic monitoring Internet trafic monitoring A step forward in traffic control and management Philippe OWEZARSKI LAAS-CNRS Toulouse, France owe@laas.fr 1 Outline 4 Active vs. Passive measurements 4 Internet traffic characterization

More information

POLITECNICO DI TORINO Repository ISTITUZIONALE

POLITECNICO DI TORINO Repository ISTITUZIONALE POLITECNICO DI TORINO Repository ISTITUZIONALE Personal cloud storage: Usage, performance and impact of terminals Original Personal cloud storage: Usage, performance and impact of terminals / Bocchi, Enrico;

More information

Cloud Control with Distributed Rate Limiting. Raghaven et all Presented by: Brian Card CS Fall Kinicki

Cloud Control with Distributed Rate Limiting. Raghaven et all Presented by: Brian Card CS Fall Kinicki Cloud Control with Distributed Rate Limiting Raghaven et all Presented by: Brian Card CS 577 - Fall 2014 - Kinicki 1 Outline Motivation Distributed Rate Limiting Global Token Bucket Global Random Drop

More information

Introduction. Can we use Google for networking research?

Introduction. Can we use Google for networking research? Unconstrained Profiling of Internet Endpoints via Information on the Web ( Googling the Internet) Ionut Trestian1 Soups Ranjan2 Aleksandar Kuzmanovic1 Antonio Nucci2 1 Northwestern 2 Narus University Inc.

More information

Mobility Data Management & Exploration

Mobility Data Management & Exploration Mobility Data Management & Exploration Ch. 07. Mobility Data Mining and Knowledge Discovery Nikos Pelekis & Yannis Theodoridis InfoLab University of Piraeus Greece infolab.cs.unipi.gr v.2014.05 Chapter

More information

Automated Application Signature Generation Using LASER and Cosine Similarity

Automated Application Signature Generation Using LASER and Cosine Similarity Automated Application Signature Generation Using LASER and Cosine Similarity Byungchul Park, Jae Yoon Jung, John Strassner *, and James Won-ki Hong * {fates, dejavu94, johns, jwkhong}@postech.ac.kr Dept.

More information

User Patience and the Web: a hands-on investigation

User Patience and the Web: a hands-on investigation User Patience and the Web: a hands-on investigation D. Rossi, M. Mellia, C. Casetti CERCOM - Dipartimento di Elettronica Politecnico di Torino, Torino, Italy E-mail: rossi, casetti, mellia @mail.tlc.polito.it

More information

CS 347 Parallel and Distributed Data Processing

CS 347 Parallel and Distributed Data Processing CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 CS 347 Notes 12 5 Web Search Engine Crawling

More information

CS 347 Parallel and Distributed Data Processing

CS 347 Parallel and Distributed Data Processing CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 Web Search Engine Crawling Indexing Computing

More information

Network infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider

Network infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider Network infrastructure, routing and traffic q Internet inter-domain traffic q Traffic estimation for the outsider Internet Inter-Domain Traffic C. Labovitz, S. Lekel-Johnson, D. McPherson, J. Oberheide,

More information

Data Mining: Exploring Data. Lecture Notes for Chapter 3

Data Mining: Exploring Data. Lecture Notes for Chapter 3 Data Mining: Exploring Data Lecture Notes for Chapter 3 1 What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include

More information

Performance Characterization of a Commercial Video Streaming Service. Mojgan Ghasemi, Akamai Technologies - Princeton University

Performance Characterization of a Commercial Video Streaming Service. Mojgan Ghasemi, Akamai Technologies - Princeton University Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Akamai Technologies - Princeton University MGhasemi,PKanuparthy,AMansy,TBenson,andJRexford ACM IMC 2016 1 2 First study

More information

Naming in Distributed Systems

Naming in Distributed Systems Naming in Distributed Systems Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Overview: Names, Identifiers,

More information

Measurement of QoE in Tsinghua university. CERNET Center Qianli Zhang

Measurement of QoE in Tsinghua university. CERNET Center Qianli Zhang Measurement of QoE in Tsinghua university CERNET Center Qianli Zhang zhang@cernet.edu.cn Background Internet has evolved as a complex set of independently developed and deployed protocols, technologies,

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates

More information

Introduction to Web Clustering

Introduction to Web Clustering Introduction to Web Clustering D. De Cao R. Basili Corso di Web Mining e Retrieval a.a. 2008-9 June 26, 2009 Outline Introduction to Web Clustering Some Web Clustering engines The KeySRC approach Some

More information

The UCSD Network Telescope

The UCSD Network Telescope The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed

More information

Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining

Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining Data Mining: Exploring Data Lecture Notes for Chapter 3 Introduction to Data Mining by Tan, Steinbach, Kumar What is data exploration? A preliminary exploration of the data to better understand its characteristics.

More information

LENTA: Longitudinal Exploration for Network Traffic Analysis

LENTA: Longitudinal Exploration for Network Traffic Analysis 2018 30th International Teletraffic Congress LENTA: Longitudinal Exploration for Network Traffic Analysis Andrea Morichetta, Marco Mellia Politecnico di Torino andrea.morichetta@polito.it, marco.mellia@polito.it

More information

Deploying IPTV and OTT

Deploying IPTV and OTT Deploying IPTV and OTT Using New OSS Tools to Improve Video QoE and Reduce Operational Costs Patricio S. Latini Senior Vice President Engineering Title Table of Contents Page Number INTRODUCTION 3 CURRENT

More information

Data Mining: Exploring Data. Lecture Notes for Data Exploration Chapter. Introduction to Data Mining

Data Mining: Exploring Data. Lecture Notes for Data Exploration Chapter. Introduction to Data Mining Data Mining: Exploring Data Lecture Notes for Data Exploration Chapter Introduction to Data Mining by Tan, Steinbach, Karpatne, Kumar 02/03/2018 Introduction to Data Mining 1 What is data exploration?

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervised Learning and Clustering Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)

More information

Center for Networked Computing

Center for Networked Computing Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No

More information

Performance and Quality-of-Service Analysis of a Live P2P Video Multicast Session on the Internet

Performance and Quality-of-Service Analysis of a Live P2P Video Multicast Session on the Internet Performance and Quality-of-Service Analysis of a Live P2P Video Multicast Session on the Internet Sachin Agarwal 1, Jatinder Pal Singh 1, Aditya Mavlankar 2, Pierpaolo Bacchichet 2, and Bernd Girod 2 1

More information

Configuring IP SLAs UDP Jitter Operations

Configuring IP SLAs UDP Jitter Operations This document describes how to configure an IP Service Level Agreements (SLAs) UDP jitter operation to analyze round-trip delay, one-way delay, one-way jitter, one-way packet loss, and connectivity in

More information

No-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz

No-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz No-reference perceptual quality metric for H.264/AVC encoded video Tomás Brandão Maria Paula Queluz IT ISCTE IT IST VPQM 2010, Scottsdale, USA, January 2010 Outline 1. Motivation and proposed work 2. Technical

More information

A DNS Reflection Method for Global Traffic Management

A DNS Reflection Method for Global Traffic Management A DNS Reflection Method for Global Traffic Management Cheng Huang Microsoft Research Albert Greenberg Microsoft Research Nick Holt Microsoft Corporation Jin Li Microsoft Research Y. Angela Wang Polytechnic

More information

Distributed Summary Statistics with Bro. Vlad Grigorescu

Distributed Summary Statistics with Bro. Vlad Grigorescu Distributed Summary Statistics with Bro Vlad Grigorescu 1 > whoami Member of the Bro development team Senior Developer at Broala LLC Senior Information Security Engineer at Carnegie Mellon University https://github.com/grigorescu

More information

Performance Characterization of a Commercial Video Streaming Service

Performance Characterization of a Commercial Video Streaming Service Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Princeton University P. Kanuparthy, 1 A. Mansy, 1 T. Benson, 2 J. Rexford 3 1 Yahoo, 2 Duke University, 3 Princeton

More information

Initial Performance Metric Registry Entries

Initial Performance Metric Registry Entries Initial Performance Metric Registry Entries draft-mornuley-ippm-initial-registry-01,2,3 draft-morton-ippm-initial-registry-0,1,2,3,4 draft-ietf-ippm-initial-registry-05 A. Morton, M. Bagnulo, P. Eardley,

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

arxiv: v3 [cs.ni] 3 May 2017

arxiv: v3 [cs.ni] 3 May 2017 Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology

More information

SolidFire and Pure Storage Architectural Comparison

SolidFire and Pure Storage Architectural Comparison The All-Flash Array Built for the Next Generation Data Center SolidFire and Pure Storage Architectural Comparison June 2014 This document includes general information about Pure Storage architecture as

More information

Revealing the Load-balancing Behavior of YouTube Traffic on Interdomain Links

Revealing the Load-balancing Behavior of YouTube Traffic on Interdomain Links Revealing the Load-balancing Behavior of YouTube Traffic on Interdomain Links Ricky K. P. Mok, Vaibhav Bajpai, Amogh Dhamdhere, and kc claffy CAIDA/UCSD, San Diego, USA cskpmok amogh kc@caida.org Technische

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Be Fast, Cheap and in Control with SwitchKV. Xiaozhou Li

Be Fast, Cheap and in Control with SwitchKV. Xiaozhou Li Be Fast, Cheap and in Control with SwitchKV Xiaozhou Li Goal: fast and cost-efficient key-value store Store, retrieve, manage key-value objects Get(key)/Put(key,value)/Delete(key) Target: cluster-level

More information

A Measurement Study of BGP Misconfiguration

A Measurement Study of BGP Misconfiguration A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and

More information

Lessons learnt from the Beijing Olympic Games Website Measurement

Lessons learnt from the Beijing Olympic Games Website Measurement Lessons learnt from the Beijing Olympic Games Website Measurement Rocky K. C. Chang The Internet Infrastructure and Security Group The Hong Kong Polytechnic University September 30, 2008 1 Motivations

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

TBIT: TCP Behavior Inference Tool

TBIT: TCP Behavior Inference Tool TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results

More information

EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson

EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves

More information

Measuring Video QoE from Encrypted Traffic

Measuring Video QoE from Encrypted Traffic Measuring Video QoE from Encrypted Traffic Giorgos Dimopoulos UPC BarcelonaTech gd@ac.upc.edu Ilias Leontiadis Telefonica Research ilias.leontiadis@telefonica.com Konstantina Papagiannaki Telefonica Research

More information

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution

More information

TCP Throughput Testing

TCP Throughput Testing TCP Throughput Testing Test TCP Throughput Performance Based on RFC 6349 The Transmission Control Protocol (TCP) turns the best effort nature of IP networks into reliable communication services. Tests

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations

Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations LOGO Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal s Le Xie Texas A&M University NASPI International Synchrophasor Symposium March 24, 2016 Content 1 Introduction 2 Technical

More information

Page 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies

Page 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies Outline 15-441/15-641 Computer Networking Lecture 18 Internet Video Delivery Peter Steenkiste Slides by Professor Hui Zhang Background Technologies: - HTTP download - Real-time streaming - HTTP streaming

More information

Lessons learnt from the Beijing Olympic Games

Lessons learnt from the Beijing Olympic Games Lessons learnt from the Beijing Olympic Games Website Measurement Rocky K. C. Chang The Internet Infrastructure and Security Group The Hong Kong Polytechnic University October 28 1 Motivations Test and

More information

GPU ACCELERATED SELF-JOIN FOR THE DISTANCE SIMILARITY METRIC

GPU ACCELERATED SELF-JOIN FOR THE DISTANCE SIMILARITY METRIC GPU ACCELERATED SELF-JOIN FOR THE DISTANCE SIMILARITY METRIC MIKE GOWANLOCK NORTHERN ARIZONA UNIVERSITY SCHOOL OF INFORMATICS, COMPUTING & CYBER SYSTEMS BEN KARSIN UNIVERSITY OF HAWAII AT MANOA DEPARTMENT

More information

Cover Page. The handle holds various files of this Leiden University dissertation.

Cover Page. The handle   holds various files of this Leiden University dissertation. Cover Page The handle http://hdl.handle.net/1887/22055 holds various files of this Leiden University dissertation. Author: Koch, Patrick Title: Efficient tuning in supervised machine learning Issue Date:

More information

Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure

Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure Chun-Ying Huang chuang@ntou.edu.tw Assistant Professor Department of Computer Science and Engineering National

More information

Uncovering the Big Players of the Web

Uncovering the Big Players of the Web Uncovering the Big Players of the Web Vinicius Gehlen, Alessandro Finamore 2, Marco Mellia 2, Maurizio M. Munafò 2 CNIT - UoR c/o Politecnico di Torino 2 Dept. of Electronics and Telecommunications - Politecnico

More information

Mul$media Networking. #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya

Mul$media Networking. #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya Mul$media Networking #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya Schedule of Class Mee$ng 1. Introduc$on 2. Applica$ons of MN 3. Requirements of MN 4. Coding and Compression 5. RTP

More information

Watching User Generated Videos with Prefetching

Watching User Generated Videos with Prefetching Watching User Generated Videos with Prefetching Samamon Khemmarat, Renjie Zhou, Lixin Gao, Michael Zink Electrical and Computer Engineering Department UMass Amherst MMSys 2011, Feb. 24 th User Generated

More information

On the State of ECN and TCP Options on the Internet

On the State of ECN and TCP Options on the Internet On the State of ECN and TCP Options on the Internet PAM 2013, March 19, Hong Kong Mirja Kühlewind Sebastian Neuner Brian

More information

Data Mining. 3.5 Lazy Learners (Instance-Based Learners) Fall Instructor: Dr. Masoud Yaghini. Lazy Learners

Data Mining. 3.5 Lazy Learners (Instance-Based Learners) Fall Instructor: Dr. Masoud Yaghini. Lazy Learners Data Mining 3.5 (Instance-Based Learners) Fall 2008 Instructor: Dr. Masoud Yaghini Outline Introduction k-nearest-neighbor Classifiers References Introduction Introduction Lazy vs. eager learning Eager

More information

CONTENT-DISTRIBUTION NETWORKS

CONTENT-DISTRIBUTION NETWORKS CONTENT-DISTRIBUTION NETWORKS George Porter June 1, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license These

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

Factors Affecting Performance of Web Flows in Cellular Networks

Factors Affecting Performance of Web Flows in Cellular Networks in Cellular Networks Ermias A. Walelgne, Kim Setälä, Vaibhav Bajpai, Stefan Neumeier, Jukka Manner, Jörg Ott October 17, 2018 - RIPE 77, Amsterdam Introduction Introduction Introduction Motivation 99%

More information

Measuring, modeling and troubleshooting Quality of Experience at Internet access:

Measuring, modeling and troubleshooting Quality of Experience at Internet access: Measuring, modeling and troubleshooting Quality of Experience at Internet access: Inferring traffic differentiation with ChkDiff Riccardo Ravaioli, I3S/CNRS/UNS Guillaume Urvoy-Keller, I3S/CNRS/UNS, INRIA

More information

Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms. SAMOS XIV July 14-17,

Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms. SAMOS XIV July 14-17, Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms SAMOS XIV July 14-17, 2014 1 Outline Introduction + Motivation Design requirements for many-accelerator SoCs Design problems

More information

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March

More information

Data Center TCP (DCTCP)

Data Center TCP (DCTCP) Data Center TCP (DCTCP) Mohammad Alizadeh, Albert Greenberg, David A. Maltz, Jitendra Padhye Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, Murari Sridharan Microsoft Research Stanford University 1

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Correlating Network Congestion with Video QoE Degradation - a Last-Mile Perspective

Correlating Network Congestion with Video QoE Degradation - a Last-Mile Perspective Correlating Congestion with Video QoE Degradation - a Last-Mile Perspective Francesco Bronzino, Paul Schmitt, Renata Teixeira, Nick Feamster, Srikanth Sundaresan AIMS 13 March 2018 Last-Mile Measurement:

More information

EE368 Project: Visual Code Marker Detection

EE368 Project: Visual Code Marker Detection EE368 Project: Visual Code Marker Detection Kahye Song Group Number: 42 Email: kahye@stanford.edu Abstract A visual marker detection algorithm has been implemented and tested with twelve training images.

More information

Statistical Network Monitoring: Methodology and Application to Carrier-Grade NAT

Statistical Network Monitoring: Methodology and Application to Carrier-Grade NAT Statistical Network Monitoring: Methodology and Application to Carrier-Grade NAT Enrico Bocchi 1,2, Ali Safari Khatouni 1, Stefano Traverso 1, Alessandro Finamore 3, Maurizio Munafò 1, Marco Mellia 1,

More information

Automated Routing Protocol Selection in Mobile Ad Hoc Networks

Automated Routing Protocol Selection in Mobile Ad Hoc Networks Automated Routing Protocol Selection in Mobile Ad Hoc Networks Taesoo Jun and Christine Julien March 13, 2007 Presented by Taesoo Jun The Mobile and Pervasive Computing Group Electrical and Computer Engineering

More information

Germán Llort

Germán Llort Germán Llort gllort@bsc.es >10k processes + long runs = large traces Blind tracing is not an option Profilers also start presenting issues Can you even store the data? How patient are you? IPDPS - Atlanta,

More information

Data mining fundamentals

Data mining fundamentals Data mining fundamentals Elena Baralis Politecnico di Torino Data analysis Most companies own huge bases containing operational textual documents experiment results These bases are a potential source of

More information