YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes
|
|
- Letitia Nicholson
- 6 years ago
- Views:
Transcription
1 YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis Politecnico di Torino Alok Tongankar, Sabyasachi Sasha Narus Inc.
2 Outline Motivation YouLighter methodology Parameter settings Results Conclusion 2
3 Outline Motivation YouLighter methodology Parameter settings Results Conclusion 3
4 Why monitoring YouTube CDN? A massive, distributed infrastructure Generates 20+% of world wide traffic Several thousands of caches (single servers) Grouped into Hundreds of edge-nodes (groups of caches) However Almost no information about YouTube CDN are available Internet Service Provider (ISP) have no control over YouTube CDN which changes frequently and suddenly sometimes causing QoE degradations possibly causing users complaining 4
5 Why monitoring YouTube CDN? A massive, distributed infrastructure Generates 20+% of world wide traffic Several thousands of caches (single servers) Grouped into Hundreds of edge-nodes (groups of caches) However Almost no information about YouTube CDN are available Internet Service Provider (ISP) have no control over YouTube CDN which changes frequently and suddenly sometimes causing QoE degradations possibly causing users complaining 5
6 Scenario Edge-node 1 Edge-node 2 Edge-node 3 Internet Tstat Tstat PoP1 PoP2 Passive measurements only Probe: Tstat 100+ per-flow statistics RTT, TTL, number of packets sent and received, number of byte sent and received, hostname, etc.. 6
7 Experiments and Validation Three Tstat probes Two probes in ISP1 One probe in ISP2 Consider traffic snapshots sliding window which moves forward each day (ΔT=1d) Trace Period Volume # Unique Videos Caches ISP1-A 01/04/ /02/ TB 2,892,452 8,664 ISP1-B 01/04/ /02/ TB 2,848,625 8,899 ISP1-C 01/04/ /02/ TB 2,711,179 9,028 ISP2 01/03/ /07/ TB 305,802 3,755 7
8 Problem 1: unveil the infrastructure 1. monitoring the single cache is not effective Load distribution changes very frequently The rank of most used caches changes deeply everyday! Idea: monitor edge-nodes, not caches 8
9 Problem 2: Edge-node change over time Get RTT data Generate RTT Distribution for each cache Evaluate behavior of 5 percentiles Points of Distribution
10 Problem 2: Edge-node change over time Get RTT data Generate RTT Distribution for each cache Evaluate behavior of 5 percentiles Points of Distribution X (1) 10
11 Problem 2: Edge-node change over time How can we measure edge-node change over time? X (1) Edge-Nodes 10 X (2) 11
12 Our Solution: YouLighter Edge-node 1 Edge-node 2 Edge-node 3 Internet Tstat YouLighter Tstat PoP1 PoP2 1. Find edge-nodes: Design an unsupervised methodology to group single caches 2. Observe changes: Define a distance to highlight changes in edge-nodes definition and usage over time 12
13 Validation Can we exploit an oracle to validate the results? Yes! YouTube use IATA codes to name edge-nodes and caches rx--abcxxtxx.c.youtube.com Where ABC corresponds to the cache s closest airport e.g., r7--fra07t16.c.youtube.com Frankfurt But, turns out to be not reliable ping r7--fra07t16.c.youtube.com ~= 50ms, 60TTL ping r7--fra09t21.c.youtube.com ~= 110ms, 55TTL Some caches sharing same IATA behave differently! [more complicated than this see the paper] 13
14 Outline Motivation YouLighter methodology Results Conclusion 14
15 Solution to Problem 1: Group caches 1. Get YouTube traffic logs from Tstat probes 2. Measurement consolidation and filtering 3. Feature selection extract RTT, TTL compute stats (percentiles, mean, variance, etc ) Standardize the features (stats) to a unitary space 4. Multi-dimensional clustering using DBSCAN Input: list of (cache_name, <feature1, feature2,, featuren>) tuples Output: A set of clusters (possibly edge-nodes) + Cluster of outlier Parameters: Min Points (MP): min number of points to create a cluster Epsilon (ε): maximum distance between any given point in a cluster and its MP th closest neighbor in the same cluster (critical) 15
16 DBSCAN Performance and Parameter Sensitivity Tuning of DBSCAN Which features? Different statistics Percentiles (20 th, 35 th, 50 th, 65 th, 80 th ), mean+variance, etc.. Which ε choice? Performance indices for clustering evaluation: True Positive Rate: ratio between # of correctly labeled caches and total # of caches Fragmentation: ratio between # of clusters and the # of observed labels Pureness: ratio between # of assigned labels and total # of labels in the ground truth Best result when all indices are equal to 1 16
17 DBSCAN Performance and Parameter Sensitivity (cont d) 1 st week of November 2013 in ISP1 stable situation controlled by manual verification Percentiles vs Mean+Standard Deviation using different ε Percentiles are more robust Fix ε =
18 Now we can find Edge-nodes. And now how can we analyze Edge-Node evolution over time? 18
19 Solution to Problem 2: Constellation distance Surprisingly, no methodology in literature 1. Summarize each cluster in a single point called star Ĉ (n) 2. Astral Distance For each star in Ĉ (n) compute all distances to stars in Ĉ (n+1) and take min Repeat in the opposite direction 3. Constellation Distance Sum of all Astral Distances AD ( ˆx ) 1,Ĉ(2) AD ( ŷ ) 4,Ĉ(1) X (1) Ĉ(1) X (2) Ĉ (2) 19
20 Outline Motivation YouLighter methodology Results Conclusion 20
21 Change observed from ISP1-A Constellation Distance is effective at detecting changes Big changes during May July 2013 Highlighted also in ISP1-B dataset 21
22 What happened in May 2013 Before change During change 22
23 What happened in May 2013 During change After change 23
24 What happened in May 2013 Before change During After change 24
25 Impact on QoE Frank splits in Bad Frank: caches with large std(rtt) Good Frank : caches with small std(rtt) Download throughput distribution of Frank vs Milan 25
26 Changes observed from ISP2 Changes detected in March 2014 No QoE impairment 26
27 Outline Motivation YouLighter methodology Results Conclusion 27
28 Conclusion YouLighter is effective at detecting changes in YouTube s CDN infrastructure Effective clustering to unveil YouTube infrastructure Definition of a novel Constellation Distance to identify changes between different clustering Help ISPs, network admins, etc. to react to changes To limit QoE impairments To improve traffic engineering Patent requested in 2014 Accepted in Italy Pending in USA 28
29 Thanks for you Attention 29
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes Danilo Giordano 1, Stefano Traverso 1, Luigi Grimaudo 1, Marco Mellia 1, Elena Baralis 1, Alok Tongaonkar 2, Sabyasachi Saha 2 1 Politecnico
More informationThe Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia
Measuring the Internet: challenges and applications Telecommunication Group presentation Speaker: Marco Mellia Politecnico di Torino 7/12/2011 The Internet today 2 A very complex scenario many eterogeneous
More informationAnalyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking
Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation
More informationNetwork Traffic Measurements and Analysis
DEIB - Politecnico di Milano Fall, 2017 Introduction Often, we have only a set of features x = x 1, x 2,, x n, but no associated response y. Therefore we are not interested in prediction nor classification,
More informationFlowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert
Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data
More informationNetworked systems and their users
Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of
More informationMultimedia Streaming. Mike Zink
Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=
More informationUnderstanding QoS measurements: Experience from the mplane European Project
Understanding QoS measurements: Experience from the mplane European Project Marco Mellia Politecnico di Torino ITU Regional Workshop for Europe New Issues in QoS Measuring and Monitoring 25-26 November
More informationLecture 15: Datacenter TCP"
Lecture 15: Datacenter TCP" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mohammad Alizadeh Lecture 15 Overview" Datacenter workload discussion DC-TCP Overview 2 Datacenter Review"
More informationFinding a needle in Haystack: Facebook's photo storage
Finding a needle in Haystack: Facebook's photo storage The paper is written at facebook and describes a object storage system called Haystack. Since facebook processes a lot of photos (20 petabytes total,
More informationmeasurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic
measurement goals Traffic Measurement and Analysis () SOI ASIA Lecture 22//26 Kenjiro Cho Sony Computer Science Labs, Inc. kjc@csl.sony.co.jp for operations trouble shooting diagnosis and tuning of performance,
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet
More informationCS 425 / ECE 428 Distributed Systems Fall 2015
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Measurement Studies Lecture 23 Nov 10, 2015 Reading: See links on website All Slides IG 1 Motivation We design algorithms, implement
More informationContent distribution networks
Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at
More informationInternet Path Stability: Exploring the Impact of MPLS. Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015
Internet Path Stability: Exploring the Impact of MPLS Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015 1 Outline Introduction Related Work Contribution Methodology Results Conclusions 2 About Myself
More informationInternet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010
Internet Inter-Domain Traffic C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010 Motivation! Measuring the Internet is hard! Significant previous work on Router
More informationSmart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu
Smart Home Network Management with Dynamic Traffic Distribution Chenguang Zhu Xiang Ren Tianran Xu Motivation Motivation Per Application QoS In small home / office networks, applications compete for limited
More informationWhy running measurements?
Network Measurements: Passive, Active and Hybrid approaches Stefano Traverso stefano.traverso@polito.it Why running measurements? The Internet is the first thing that humanity has built that humanity doesn't
More informationArchitecture of a Network-Aware P2P-TV Application: the NAPA- WINE Approach
Architecture of a Network-Aware P2P-TV Application: the NAPA- WINE Approach Slough, 11th November 2011 Emilio Leonardi Politecnico di Torino COMET-ENVISION Workshop Slough 11th November 2011 Internet Video
More informationVivaldi: A Decentralized Coordinate System
Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer
More informationBased on Big Data: Hype or Hallelujah? by Elena Baralis
Based on Big Data: Hype or Hallelujah? by Elena Baralis http://dbdmg.polito.it/wordpress/wp-content/uploads/2010/12/bigdata_2015_2x.pdf 1 3 February 2010 Google detected flu outbreak two weeks ahead of
More informationRevealing Skype Traffic: When Randomness Plays with You
Revealing Skype Traffic: When Randomness Plays with You Dario Bonfiglio Marco Mellia Michela Meo Dario Rossi Paolo Tofanelli Our Goal Identify Skype traffic Motivations Operators need to know what is running
More informationK Nearest Neighbor Wrap Up K- Means Clustering. Slides adapted from Prof. Carpuat
K Nearest Neighbor Wrap Up K- Means Clustering Slides adapted from Prof. Carpuat K Nearest Neighbor classification Classification is based on Test instance with Training Data K: number of neighbors that
More informationCSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017
CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons
More informationDETECTING RESOLVERS AT.NZ. Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018
DETECTING RESOLVERS AT.NZ Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018 BACKGROUND DNS-OARC 29 2 DNS TRAFFIC IS NOISY Despite general belief, not all the sources at auth nameserver are
More informationA Tale of Three CDNs
A Tale of Three CDNs An Active Measurement Study of Hulu and Its CDNs Vijay K Adhikari 1, Yang Guo 2, Fang Hao 2, Volker Hilt 2, and Zhi-Li Zhang 1 1 University of Minnesota - Twin Cities 2 Bell Labs,
More informationEnd-to-End Mechanisms for QoS Support in Wireless Networks
End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of
More informationIV Conference on Application Security and Modern Technologies
IV Conference on Application Security and Modern Technologies In collaborazione con Venezia, Università Ca Foscari 23 Settembre 2016 1 Dipartimento di Elettronica Informazione e Bioingegneria BankSealer:
More informationAnalyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer The Beautiful World of IoT 06.03.2018 garcia@tk.tu-darmstadt.de
More informationInternet trafic monitoring
Internet trafic monitoring A step forward in traffic control and management Philippe OWEZARSKI LAAS-CNRS Toulouse, France owe@laas.fr 1 Outline 4 Active vs. Passive measurements 4 Internet traffic characterization
More informationPOLITECNICO DI TORINO Repository ISTITUZIONALE
POLITECNICO DI TORINO Repository ISTITUZIONALE Personal cloud storage: Usage, performance and impact of terminals Original Personal cloud storage: Usage, performance and impact of terminals / Bocchi, Enrico;
More informationCloud Control with Distributed Rate Limiting. Raghaven et all Presented by: Brian Card CS Fall Kinicki
Cloud Control with Distributed Rate Limiting Raghaven et all Presented by: Brian Card CS 577 - Fall 2014 - Kinicki 1 Outline Motivation Distributed Rate Limiting Global Token Bucket Global Random Drop
More informationIntroduction. Can we use Google for networking research?
Unconstrained Profiling of Internet Endpoints via Information on the Web ( Googling the Internet) Ionut Trestian1 Soups Ranjan2 Aleksandar Kuzmanovic1 Antonio Nucci2 1 Northwestern 2 Narus University Inc.
More informationMobility Data Management & Exploration
Mobility Data Management & Exploration Ch. 07. Mobility Data Mining and Knowledge Discovery Nikos Pelekis & Yannis Theodoridis InfoLab University of Piraeus Greece infolab.cs.unipi.gr v.2014.05 Chapter
More informationAutomated Application Signature Generation Using LASER and Cosine Similarity
Automated Application Signature Generation Using LASER and Cosine Similarity Byungchul Park, Jae Yoon Jung, John Strassner *, and James Won-ki Hong * {fates, dejavu94, johns, jwkhong}@postech.ac.kr Dept.
More informationUser Patience and the Web: a hands-on investigation
User Patience and the Web: a hands-on investigation D. Rossi, M. Mellia, C. Casetti CERCOM - Dipartimento di Elettronica Politecnico di Torino, Torino, Italy E-mail: rossi, casetti, mellia @mail.tlc.polito.it
More informationCS 347 Parallel and Distributed Data Processing
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 CS 347 Notes 12 5 Web Search Engine Crawling
More informationCS 347 Parallel and Distributed Data Processing
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 Web Search Engine Crawling Indexing Computing
More informationNetwork infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider
Network infrastructure, routing and traffic q Internet inter-domain traffic q Traffic estimation for the outsider Internet Inter-Domain Traffic C. Labovitz, S. Lekel-Johnson, D. McPherson, J. Oberheide,
More informationData Mining: Exploring Data. Lecture Notes for Chapter 3
Data Mining: Exploring Data Lecture Notes for Chapter 3 1 What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include
More informationPerformance Characterization of a Commercial Video Streaming Service. Mojgan Ghasemi, Akamai Technologies - Princeton University
Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Akamai Technologies - Princeton University MGhasemi,PKanuparthy,AMansy,TBenson,andJRexford ACM IMC 2016 1 2 First study
More informationNaming in Distributed Systems
Naming in Distributed Systems Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Overview: Names, Identifiers,
More informationMeasurement of QoE in Tsinghua university. CERNET Center Qianli Zhang
Measurement of QoE in Tsinghua university CERNET Center Qianli Zhang zhang@cernet.edu.cn Background Internet has evolved as a complex set of independently developed and deployed protocols, technologies,
More informationOn Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services
On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement
More informationVivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04
Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates
More informationIntroduction to Web Clustering
Introduction to Web Clustering D. De Cao R. Basili Corso di Web Mining e Retrieval a.a. 2008-9 June 26, 2009 Outline Introduction to Web Clustering Some Web Clustering engines The KeySRC approach Some
More informationThe UCSD Network Telescope
The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed
More informationData Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining
Data Mining: Exploring Data Lecture Notes for Chapter 3 Introduction to Data Mining by Tan, Steinbach, Kumar What is data exploration? A preliminary exploration of the data to better understand its characteristics.
More informationLENTA: Longitudinal Exploration for Network Traffic Analysis
2018 30th International Teletraffic Congress LENTA: Longitudinal Exploration for Network Traffic Analysis Andrea Morichetta, Marco Mellia Politecnico di Torino andrea.morichetta@polito.it, marco.mellia@polito.it
More informationDeploying IPTV and OTT
Deploying IPTV and OTT Using New OSS Tools to Improve Video QoE and Reduce Operational Costs Patricio S. Latini Senior Vice President Engineering Title Table of Contents Page Number INTRODUCTION 3 CURRENT
More informationData Mining: Exploring Data. Lecture Notes for Data Exploration Chapter. Introduction to Data Mining
Data Mining: Exploring Data Lecture Notes for Data Exploration Chapter Introduction to Data Mining by Tan, Steinbach, Karpatne, Kumar 02/03/2018 Introduction to Data Mining 1 What is data exploration?
More informationUnsupervised Learning and Clustering
Unsupervised Learning and Clustering Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
More informationCenter for Networked Computing
Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No
More informationPerformance and Quality-of-Service Analysis of a Live P2P Video Multicast Session on the Internet
Performance and Quality-of-Service Analysis of a Live P2P Video Multicast Session on the Internet Sachin Agarwal 1, Jatinder Pal Singh 1, Aditya Mavlankar 2, Pierpaolo Bacchichet 2, and Bernd Girod 2 1
More informationConfiguring IP SLAs UDP Jitter Operations
This document describes how to configure an IP Service Level Agreements (SLAs) UDP jitter operation to analyze round-trip delay, one-way delay, one-way jitter, one-way packet loss, and connectivity in
More informationNo-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz
No-reference perceptual quality metric for H.264/AVC encoded video Tomás Brandão Maria Paula Queluz IT ISCTE IT IST VPQM 2010, Scottsdale, USA, January 2010 Outline 1. Motivation and proposed work 2. Technical
More informationA DNS Reflection Method for Global Traffic Management
A DNS Reflection Method for Global Traffic Management Cheng Huang Microsoft Research Albert Greenberg Microsoft Research Nick Holt Microsoft Corporation Jin Li Microsoft Research Y. Angela Wang Polytechnic
More informationDistributed Summary Statistics with Bro. Vlad Grigorescu
Distributed Summary Statistics with Bro Vlad Grigorescu 1 > whoami Member of the Bro development team Senior Developer at Broala LLC Senior Information Security Engineer at Carnegie Mellon University https://github.com/grigorescu
More informationPerformance Characterization of a Commercial Video Streaming Service
Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Princeton University P. Kanuparthy, 1 A. Mansy, 1 T. Benson, 2 J. Rexford 3 1 Yahoo, 2 Duke University, 3 Princeton
More informationInitial Performance Metric Registry Entries
Initial Performance Metric Registry Entries draft-mornuley-ippm-initial-registry-01,2,3 draft-morton-ippm-initial-registry-0,1,2,3,4 draft-ietf-ippm-initial-registry-05 A. Morton, M. Bagnulo, P. Eardley,
More informationReliable Transport II: TCP and Congestion Control
Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design
More informationarxiv: v3 [cs.ni] 3 May 2017
Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology
More informationSolidFire and Pure Storage Architectural Comparison
The All-Flash Array Built for the Next Generation Data Center SolidFire and Pure Storage Architectural Comparison June 2014 This document includes general information about Pure Storage architecture as
More informationRevealing the Load-balancing Behavior of YouTube Traffic on Interdomain Links
Revealing the Load-balancing Behavior of YouTube Traffic on Interdomain Links Ricky K. P. Mok, Vaibhav Bajpai, Amogh Dhamdhere, and kc claffy CAIDA/UCSD, San Diego, USA cskpmok amogh kc@caida.org Technische
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationBe Fast, Cheap and in Control with SwitchKV. Xiaozhou Li
Be Fast, Cheap and in Control with SwitchKV Xiaozhou Li Goal: fast and cost-efficient key-value store Store, retrieve, manage key-value objects Get(key)/Put(key,value)/Delete(key) Target: cluster-level
More informationA Measurement Study of BGP Misconfiguration
A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and
More informationLessons learnt from the Beijing Olympic Games Website Measurement
Lessons learnt from the Beijing Olympic Games Website Measurement Rocky K. C. Chang The Internet Infrastructure and Security Group The Hong Kong Polytechnic University September 30, 2008 1 Motivations
More informationPerformance and cost effectiveness of caching in mobile access networks
Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff
More informationTBIT: TCP Behavior Inference Tool
TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results
More informationEECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson
EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves
More informationMeasuring Video QoE from Encrypted Traffic
Measuring Video QoE from Encrypted Traffic Giorgos Dimopoulos UPC BarcelonaTech gd@ac.upc.edu Ilias Leontiadis Telefonica Research ilias.leontiadis@telefonica.com Konstantina Papagiannaki Telefonica Research
More informationIt s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley
It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution
More informationTCP Throughput Testing
TCP Throughput Testing Test TCP Throughput Performance Based on RFC 6349 The Transmission Control Protocol (TCP) turns the best effort nature of IP networks into reliable communication services. Tests
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationOnline Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations
LOGO Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal s Le Xie Texas A&M University NASPI International Synchrophasor Symposium March 24, 2016 Content 1 Introduction 2 Technical
More informationPage 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies
Outline 15-441/15-641 Computer Networking Lecture 18 Internet Video Delivery Peter Steenkiste Slides by Professor Hui Zhang Background Technologies: - HTTP download - Real-time streaming - HTTP streaming
More informationLessons learnt from the Beijing Olympic Games
Lessons learnt from the Beijing Olympic Games Website Measurement Rocky K. C. Chang The Internet Infrastructure and Security Group The Hong Kong Polytechnic University October 28 1 Motivations Test and
More informationGPU ACCELERATED SELF-JOIN FOR THE DISTANCE SIMILARITY METRIC
GPU ACCELERATED SELF-JOIN FOR THE DISTANCE SIMILARITY METRIC MIKE GOWANLOCK NORTHERN ARIZONA UNIVERSITY SCHOOL OF INFORMATICS, COMPUTING & CYBER SYSTEMS BEN KARSIN UNIVERSITY OF HAWAII AT MANOA DEPARTMENT
More informationCover Page. The handle holds various files of this Leiden University dissertation.
Cover Page The handle http://hdl.handle.net/1887/22055 holds various files of this Leiden University dissertation. Author: Koch, Patrick Title: Efficient tuning in supervised machine learning Issue Date:
More informationBehavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure
Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure Chun-Ying Huang chuang@ntou.edu.tw Assistant Professor Department of Computer Science and Engineering National
More informationUncovering the Big Players of the Web
Uncovering the Big Players of the Web Vinicius Gehlen, Alessandro Finamore 2, Marco Mellia 2, Maurizio M. Munafò 2 CNIT - UoR c/o Politecnico di Torino 2 Dept. of Electronics and Telecommunications - Politecnico
More informationMul$media Networking. #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya
Mul$media Networking #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya Schedule of Class Mee$ng 1. Introduc$on 2. Applica$ons of MN 3. Requirements of MN 4. Coding and Compression 5. RTP
More informationWatching User Generated Videos with Prefetching
Watching User Generated Videos with Prefetching Samamon Khemmarat, Renjie Zhou, Lixin Gao, Michael Zink Electrical and Computer Engineering Department UMass Amherst MMSys 2011, Feb. 24 th User Generated
More informationOn the State of ECN and TCP Options on the Internet
On the State of ECN and TCP Options on the Internet PAM 2013, March 19, Hong Kong Mirja Kühlewind Sebastian Neuner Brian
More informationData Mining. 3.5 Lazy Learners (Instance-Based Learners) Fall Instructor: Dr. Masoud Yaghini. Lazy Learners
Data Mining 3.5 (Instance-Based Learners) Fall 2008 Instructor: Dr. Masoud Yaghini Outline Introduction k-nearest-neighbor Classifiers References Introduction Introduction Lazy vs. eager learning Eager
More informationCONTENT-DISTRIBUTION NETWORKS
CONTENT-DISTRIBUTION NETWORKS George Porter June 1, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license These
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationFactors Affecting Performance of Web Flows in Cellular Networks
in Cellular Networks Ermias A. Walelgne, Kim Setälä, Vaibhav Bajpai, Stefan Neumeier, Jukka Manner, Jörg Ott October 17, 2018 - RIPE 77, Amsterdam Introduction Introduction Introduction Motivation 99%
More informationMeasuring, modeling and troubleshooting Quality of Experience at Internet access:
Measuring, modeling and troubleshooting Quality of Experience at Internet access: Inferring traffic differentiation with ChkDiff Riccardo Ravaioli, I3S/CNRS/UNS Guillaume Urvoy-Keller, I3S/CNRS/UNS, INRIA
More informationCo-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms. SAMOS XIV July 14-17,
Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms SAMOS XIV July 14-17, 2014 1 Outline Introduction + Motivation Design requirements for many-accelerator SoCs Design problems
More informationReal-Time Model-Free Detection of Low-Quality Synchrophasor Data
Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March
More informationData Center TCP (DCTCP)
Data Center TCP (DCTCP) Mohammad Alizadeh, Albert Greenberg, David A. Maltz, Jitendra Padhye Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, Murari Sridharan Microsoft Research Stanford University 1
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationCorrelating Network Congestion with Video QoE Degradation - a Last-Mile Perspective
Correlating Congestion with Video QoE Degradation - a Last-Mile Perspective Francesco Bronzino, Paul Schmitt, Renata Teixeira, Nick Feamster, Srikanth Sundaresan AIMS 13 March 2018 Last-Mile Measurement:
More informationEE368 Project: Visual Code Marker Detection
EE368 Project: Visual Code Marker Detection Kahye Song Group Number: 42 Email: kahye@stanford.edu Abstract A visual marker detection algorithm has been implemented and tested with twelve training images.
More informationStatistical Network Monitoring: Methodology and Application to Carrier-Grade NAT
Statistical Network Monitoring: Methodology and Application to Carrier-Grade NAT Enrico Bocchi 1,2, Ali Safari Khatouni 1, Stefano Traverso 1, Alessandro Finamore 3, Maurizio Munafò 1, Marco Mellia 1,
More informationAutomated Routing Protocol Selection in Mobile Ad Hoc Networks
Automated Routing Protocol Selection in Mobile Ad Hoc Networks Taesoo Jun and Christine Julien March 13, 2007 Presented by Taesoo Jun The Mobile and Pervasive Computing Group Electrical and Computer Engineering
More informationGermán Llort
Germán Llort gllort@bsc.es >10k processes + long runs = large traces Blind tracing is not an option Profilers also start presenting issues Can you even store the data? How patient are you? IPDPS - Atlanta,
More informationData mining fundamentals
Data mining fundamentals Elena Baralis Politecnico di Torino Data analysis Most companies own huge bases containing operational textual documents experiment results These bases are a potential source of
More information