A Packet Header Compression Algorithm based on TCP Flow Clustering and Huffman Encoding

Size: px
Start display at page:

Download "A Packet Header Compression Algorithm based on TCP Flow Clustering and Huffman Encoding"

Transcription

1 Anais do XXVI Congresso da SBC SEMISH l XXXIII Seminário Integrado de Software e Hardware 14 a 20 de julho de 2006 Campo Grande, MS A Packet Header Compression Algorithm based on TCP Flow Clustering and Huffman Encoding Raimir Holanda 1 1 Universidade de Fortaleza (UNIFOR) Mestrado em Informatica Aplicada Fortaleza CE Brazil raimir@unifor.br Abstract. Packet traces of Internet traffic are important tools for performance evaluation and design purposes of many network elements. For instance, packet traces can be used to evaluate prototypes of network systems such as routers, firewalls, Internet servers, etc. However, with the increase of link rates, the required storage for packet header traces of meaningful duration becomes too large. In this paper I am focused on the problem of compression of these potentially huge packet header traces. Previous compression methods have been developed for saving transmission bandwidth on channels such as wireless and slow point-to-point links. Here, we propose a combined packet header compression method based on TCP flow clustering for small flows and Huffman encoding for large flows. With our proposed method, storage size requirements for.tsh packet header traces are reduced to 16% of their original size. Others known methods have their compression ratio bounded to 50% and 32%. 1. Introduction A critical requirement for performance evaluation and design of network elements is the availability of realistic traffic traces. A popular scheme to obtain real traces for extended periods of time is to collect them from routers [CAIDA]. There are, however, several reasons that make difficult in many cases to have access to them. Firstly, Internet providers are usually reluctant to make public real traces captured in their networks. Moreover, when these traffic traces are made public [NLANR], they are delivered after some transformations, such as sanitization [Pang and Paxson 2003], which modify some basic semantic properties (such as IP address structure). Secondly, there are others problems which arise due to the increasing speed of Internet routers. Hardware for collecting traces at high speed (e.g. to link rates of 2.5 Gbps, 10 Gbps or even 40 Gbps) is usually expensive. Moreover, with the increase of link rates, the required storage for packet traces of meaningful duration becomes too large. A first approach to cope with the huge storage needs is to use a standard compression method. Content compress can be as simple as removing all extra space characters, inserting a single repeat character to indicate a string of repeated characters, and substituting smaller bit strings for frequently occurring characters. The compression is performed by algorithms which determine how to compress and decompress. Some of the most popular compression algorithms are the Huffman coding [Knuth 1985], LZ77 [LZ77], and Deflate [Deflate]. Those specifications define lossless compressed data formats. From our measurements, using these methods on files containing packet headers, we can expect a compression ratio of around 50%. 1

2 The previous methods do not take into account the specific properties of the data to be compressed. The compression techniques thought for the specific case of packet headers have been developed for saving transmission bandwidth on channels such as wireless and slow point-to-point links. The original scheme proposed for TCP/IP header compression in the context of transmission of Internet traffic through low speed serial links is Van Jacobson s header compression algorithm [Jacobson 1990]. The method is based on the fact that in TCP connections, the content of many TCP/IP header fields of consecutive packets of a flow can be usually predicted. As we will show, the achievable compression ratio using this method is around 30%, reducing the file size, for instance, from 100MB to 30MB. Since then, specifications for the compression of a number of other protocols have been written. Degermark proposed additional compression algorithms for UDP/IP and TCP/IPv6 [Degermark, Engan, Nordgren and Pink 1996]. Detailed specifications for compressing these protocols, as well as others such as RTP, were described in a number of subsequent RFC s [RFC2507], [RFC2508], and [RFC2509]. Each of these descriptions specify a solution for a given protocol. For multimedia services in wireless environments ROHC (Robust Header Compression) was introduced. ROHC was standardized in [ROHC] and will be an integral part of the 3GPP-UMTS specification [3GPP]. Equally for wireless environments, another scheme that makes use of the similarity in consecutive flows from or to a given mobile terminal is described in [Westphal 2003]. In this paper we propose a packet header compression method, focused not on the problem of reducing transmission bandwidth or latency in wireless or slow point-to-point links, but on the problem of saving storage space of these potentially huge packet traces. The method presented here, does not have some limitations of the previously mentioned methods, for instance we can know all the packets in a flow before compressing them and the compression ratio that we achieve is around 16%, reducing the file size, for instance, from 100MB to 16MB. To reach this performance, the method uses two classes of algorithms. A first class fits well for small flows and the second for large flows. Analysis using both classes have demonstrated that the best combined performance is reached when we consider small flows ranging from 1 to 12 packets per flow. In these analysis, we have assumed the most common case of storing TSH (Time Sequence Header) packet headers files [NLANR]. The method presented here is lossless, in the sense that for some fields the decompression algorithm regenerates exactly the original value, while for others, those for which the initial values are random as for instance initial TCP sequence number, the values are shifted, as if we were capturing the trace at another execution time. Evidently, these changes do not affect, in most cases, the analysis taken from the decompressed file. 2. Cluster Analysis In this work we propose a compression scheme based on multivariate statistics. Multivariate statistics are appropriate for any data set where multiple measurements are taken with possible correlations between the measurements. Multivariate techniques in general, account for the correlation structure of the variables being analyzed often yielding a more complete picture of the analysis results than if the variables had been analyzed separately [Johnson 1998]. Cluster analysis is a multivariate technique used for finding groups in observed data [Kaufman and Rousseeuw 1990]. We chose cluster analysis as a means of form- 2

3 ing normal groups of TCP/IP flows. The term cluster analysis encompasses a number of different algorithms and methods for grouping objects of similar kind into respective categories. A general question facing researchers in many areas of inquiry is how to organize observed data into meaningful structures. In other words, cluster analysis is an exploratory data analysis tool which aims at partitioning the components into groups so the members of a group are as similar as possible and different groups are as dissimilar as possible [Jain 1991]. Statistically, this implies that the intragroup variance should be as small as possible and intergroup variance should be as large as possible. Each cluster thus describes, in terms of data collected, the class to which its members belong; and this description may be abstracted through use from the particular to the general class or type. Cluster analysis is thus a tool of discovery. It may reveal associations and structure in data which, though not previously evident, nevertheless are sensible and useful once found. The results of cluster analysis may contribute to the definition of a formal classification scheme. A number of clustering techniques have been described in the literature. These techniques fall into two classes: hierarchical and nonhierarchical. In nonhierarchical approaches, one starts with an arbitrary set of k clusters, and the members of the clusters are moved until the intragroup variance is minimum. There are two kinds of hierarchical approaches: agglomerative and divisive. In the agglomerative hierarchical approach, given n components, one starts with n clusters (each cluster having one component). Then neighboring clusters are merged successively until the desired number of clusters is obtained. In the divisive hierarchical approach, on the other hand, one starts with one cluster (of n components) and then divides the cluster successively into two, three, and so on, until the desired number of clusters is obtained. 3. Data collection Network traffic measurements provides a mean to understand a local-area or wide-area network. Using specialized network measurement hardware or software, a network researcher can collect detailed information about the transmission of packets on the network, including their time structure and contents. With detailed packet-level measurements, and some knowledge of the Internet Protocol stack, it is possible to obtain significant information about the structure of an Internet application or the behavior of an Internet user. The Off-line analysis carried along this work were based on publicly available archive of traces collected and maintained by the National Laboratory for Applied Network Research (NLANR) [NLANR]. We downloaded traces collected from the following sites: Colorado State University (COS), Front Range GigaPOP (FRG), University of Buffalo (BUF), Columbia University (BWY). In all cases, the traces were stored using the TSH packet header format. For.tsh files the header size is 44 bytes: 8 bytes of timestamp and interface identifier, 20 bytes of IP, and 16 of TCP. No IP or TCP options are included. The packet payload is also not stored. 3

4 4. Flow Mapping In this work, we use a flow characterization approach that incorporates semantic characteristics of flows [Holanda 2004]. We understand by semantic characterization the joint analysis of traffic characteristics including the inter packet time and some of the most important fields (source and destination address, port numbers, packet length and TCP flags) of the TCP/IP headers content. Let us define a packet flow as a sequence of packets in which each packet has the same value for a 5-tuple of source and destination IP addresses, protocol number, and source and destination port numbers and such that the time between two consecutive packets does not exceed a threshold. In our case, we have adopted a threshold of 5 sec. For a best representation of the header fields as well as a way to analyze their behavior, we have developed a header field mapping (see Figure 1). In this mapping, for some header fields, the values are simply copied from the packets; for others the mapped value represents the increment or decrement between consecutive packets into a flow, and finally for some of them which the distribution of values is highly skewed, we can replace the original value by a transformation or function of the values. Bellow, we describe this mapping. P 5 P 5 3 (1) 3 (2) P 3 5 (3) F 5 3 (1) F 3 5 (2) F 5 3 (3) P4 5 (1) P4 5 (2) P 4 5 (3) F 4 5 (1) F 4 5 (2) F4 5 (3) Figure 1. Flow mapping Let Pi m be the packet header of the i-th packet of a flow consisting of m packets. Pi m (j) is a selected header field of Pi m. For each field Pi m (j), a function χ j performs a mapping into an integer value Fi m (j): For each packet, let F m i Fi m (j) = χ j (Pi m (j)) (1) = (Fi m (1), Fi m (2),...) (2) denote a vector of integers, where we include the selected fields. For the complete flow we can define: P m = (P m 1, P m 2,..., P m m ) (3) and F m = (F1 m, F 2 m,..., F m m ). (4) 4

5 Note that the vector F m can be viewed as a numerical representation of the m packet headers, as we substitute some selected packet header fields by integers. As an example of header fields that are simply copied are: Version, IHL, Type of service, Flags, Fragment Offset, Data Offset, and Control bits. However, for some fields; such as timestamp; we map their values in terms of the increment or decrement between consecutive packets. On the other hand, as we have said earlier, if the distribution of a parameter is highly skewed, one should consider the possibility of replacing the parameter by a transformation or function of the parameter. For instance, we can replace the TCP flags into more appropriate values. 5. Flow Clustering Using the flow mapping described in the last section, in a high-speed link we can find potentially a large variety of flows. However, from our studies, we have seen that the flows are not very different from each other. To study the variety among flows, we have used an approach based on cluster analysis, a classical technique used for workload characterization [Jain 1991]. Generally, a measured trace consists of a large number of flows. For analysis purposes, it is useful to classify these flows into a small number of classes or clusters such that the components within a cluster are very similar to each other. Later, one member from each cluster may be selected to represent the class. Our clustering analysis basically consists of mapping each component into an n- dimensional space and identifying components that are close to each other. Here n is the number of parameters. The closeness between two components is measured by defining a distance measure. The Euclidian distance is the most commonly used distance metric and is defined as: n d = { (x ik x jk ) 2 } 0.5 (5) k=1 Starting from a real trace, we break it down into flows with the same number of packets. Using the mapping described in the last section, from a set of vectors, we calculate the Euclidian distance between the F m vectors and the results are stored in a distance matrix of flows. Initially, each vector F m represents a cluster. Evidently, distance 0 means that two vectors are exactly identical. Later, we search the smallest element of the distance matrix. Let d rs, the distance between clusters r and s, be the smallest. We merge clusters r and s and also merge any other cluster pairs that have the same distance. We have used the Minimum Spanning Tree hierarchical clustering technique [Jain 1991], which starts with n clusters of one component each and successively joins to the nearest clusters until be reached a specific distance between the clusters. For each m (number of packets per flow), we apply, separately, the clustering method. After all, Templates of Flows are generated from the clusters. We started our analysis using the following header fields: interface, version, IHL, type of service, flags, fragment offset, time to live, data offset and control flags. More- 5

6 over, we use the definition of flow as a sequence of packets in which each packet has the same value for a 5-tuple of source and destination addresses, source and destination ports, protocol and such that the time between two consecutive packets does not exceed a threshold of 5 sec. For each flow, we converted it into a F m vector and we calculated the distance between the flows. For different values of m (flows with m packets), we observed that the number of clusters reach a limit, and the new read flows always fit with some of the previous clusters. To improve the accuracy of our outcomes, we extended our analysis to different networks. In Figure 2, we show, for m = 4 packets, the number of clusters when the flows inside each cluster have inter-distance greater than zero. The outcomes are from four ATM OC-3 traces downloaded from NLANR web site. The plotted curves are from Colorado State University (COS), Front Range GigaPOP (FRG), University of Buffalo (BUF), and Columbia University (BWY). Furthermore, in Figure 2, we see the behavior of the Joined Trace (upper curve). This trace was obtained joining the four downloaded NLANR traces. From Figure 2, we obtain two important conclusions: (i) we can obtain a small number of clusters to represent a packet trace; (ii) the number of clusters in the joined trace is less than the summation of clusters of the other four traces. This implies that the type of flows is basically the same in all traces. Similar behavior was obtained for different values of m. Number of Clusters Joined COS BUF BWY FRG Flows for m=4 packets Figure 2. Number of clusters for ATM OC-3 traces and joined trace - NLANR traces We have seen that the relation between the number of clusters and the number of flows for each class of m-packets flows is highly favorable for small flows. However, as we increase the value of m, this relation is impaired, what lead us to adopt another approach for large flows. The problem with large flows occurs because we have a small number of large flows with exactly m packets. Hence, for large flows, we changed the clustering analysis 6

7 executing a joint analysis into flows with different number of packets. In this case, m is a new parameter to be taken into consideration. Often, m is not the predominant parameter to define the cluster. From previous analysis, we have concluded that behind the great number of flows in a high-speed link, there is not so much variety among them and clearly they can be grouped into few clusters. Moreover, the TCP/IP flows are not equally distributed into the clusters, with a high predominance of few clusters. Under our point of view, these conclusions are consequence of the reduced amount of available tools used in the Internet which are concentrated in fews programs. For instance, almost all operating systems are Windows or Linux based, TCP is the dominant protocol, there are few TCP versions, and Web and P2P are the most common applications. Moreover, since that many people use the same type of searchers (google, scholar, etc) the users tend to show similar behavior when using the Internet. 6. Entropy of TCP/IP Header Fields As we have seen in the last section, behind the great number of flows in a high-speed link, there is not so much variety among them and clearly they can be grouped into a set of clusters. The evidence that Internet flows can be grouped into a small set of clusters leaded us to create templates of flows and apply this method to compress a packet trace file. Before start with the compression itself, we wanted to determine what was the limit of lossless compression for TCP/IP headers trace. To do that, we have used the definition of entropy. The entropy is a measure of the amount of information required on the average to describe the random variable. For data compression, the entropy H of a random variable is a lower bound on the average length of the shortest description of the random variable and is used to establish the fundamental limit for the compression of information. Data compression can be achieved by assigning short descriptions to the most frequent outcomes of the data source and necessarily longer descriptions to the less frequent outcomes. Thus the entropy is the data compression limit as well as the number of bits needed in random number representation. Codes achieving H turn out to be optimal. The entropy of a random variable X with a probability mass function p(x) is defined by H(X) = p(x)log 2 p(x) (6) Note that entropy is a functional of the distribution of X. It does not depend on the actual values taken by the random variable X, but only on the probability. Using logarithms to base 2 the entropy will then be measured in bits. It is the number of bits on the average required to describe the random variable Packet Level Entropy For a sequence of packets into a Internet trace, we can assume that the sequence of header field values constitute a stationary ergodic process. Moreover, given the high aggregation 7

8 level of high speed Internet links, we can assume also that the header field values of consecutive packets are independent. In this case, the joint entropy is: H(S i, S i+1 ) = H(S i ) + H(S i+1 H(S i )) (7) where H(S i ) is the header field entropy of packet i. For a sequence of n packets: H(S i, S i+1 ) = H(S i ) + H(S i+1 ) (8) H(S i, S i+1 ) = 2 H(S) (9) H(S i, S i+1,..., S n ) = H(S i ) + H(S i+1 H(S i )) H(S n S n 1,..., S 1 ) (10) H(S i, S i+1,..., S n ) = n H(S) (11) Using a header field approach, we have calculated for each one of the TSH header fields, what is the entropy. For our analysis, we used 1,000,000 packets. The summation of their correspondent code sizes give us the average length to establish the limit for the compression of packet headers. We have used the following header fields: timestamp, Interface, Version, Internet Header Length (IHL), Type of service (TOS), Total Length, Identification, Flags, Fragment Offset, Time to live, Protocol, Header checksum, Source address, Destination Address, Source port, Destination port, Sequence number, Acknowledgment number, Data Offset, Control Bits, and Window. Using a packet compression approach, the compression ratio is limited to 40%, what means that a packet header file of 100MB can be reduced at maximum to 40MB. Clearly, this compression bound is not satisfactory and other approaches must be evaluated to reach higher compression ratios Flow Level Entropy We have seen that for a sequence of packets into a Internet trace, we assumed that they are independent. However, this is not true for a sequence of packets into the same flow, where the sequence of some header fields show a strong dependence such as the IP address and TCP port numbers. Then, for a flow approach we have three scenarios. First scenario: From the chain rule for entropy we have that if X 1, X 2,..., X n is drawn according p(x 1, x 2,..., x n ), then: n H(X 1, X 2,..., X n ) = H(X i X i 1,..., X 1 ) (12) i=1 In the first scenario, we have that the entropy of the field F for a set of flows with n packets is: H(F 1 ) 0, H(F 2 ) 0,..., H(F n ) 0 (13) 8

9 consequently; H(F 1, F 2,..., F n ) 0 (14) This scenario embraces the following fields: Interface, Version, IHL, Type of Service, Flags, Fragment Offset, Protocol. and that: Second scenario: In the second scenario, we have: H(F 1 ) > 0, H(F 2 ) > 0,..., H(F n ) > 0 (15) H(F i, F i+1 ) = H(F i ) + H(F i+1 H(F i )) }{{} 0 (16) H(F i, F i+1 ) H(F ) (17) where H(F i ) is the entropy of the header field F into the packet i. For a flow with n packets: H(F i, F i+1,..., F n ) = H(F i ) + H(F i+1 H(F i )) }{{} H(F n F n 1,..., F 1 ) }{{} 0 (18) H(F i, F i+1,..., F n ) H(F ) (19) This scenario embraces the following fields: Source Address, Destination Address, Source Port, Destination Port, Time to Live, Data Offset, Control Bits. Third scenario: In the last scenario, the sequence of the header fields into a flow has the following behavior: H(F 1 ) > 0, H(F 2 ) > 0,..., H(F n ) > 0 (20) and the joint entropy is: H(F i, F i+1 ) = H(F i ) + H(F i+1 H(F i )) (21) H(F i, F i+1 ) = H(F i ) + H(F i+1 ) (22) For a flow with n packets: H(F i, F i+1 ) = 2 H(F ) (23) H(F i, F i+1,..., F n ) = H(F i ) + H(F i+1 H(F i )) H(F n F n 1,..., F 1 ) (24) H(F i, F i+1,..., F n ) = n H(F ) (25) This third scenario embraces the following fields: Timestamp, Total Length, Identification, Sequence Number, Acknowledgment Number, Window. From the three scenarios showed, we defined A m as: 9

10 A m = 1 st Scenario {}}{ H(F ) 2ndScenario + {}}{ 3rdScenario H(F ) + m {}}{ H(F ) m 352 where, the summation for the three scenarios are showed in the tables 1, 2 and 3 and 352 is the header packet size. In table 3 we are considering that the entropy for the Sequence and Acknowledgment number header fields are equal to zero because they can be deduced from the Total Length header field. (26) Table 1. 1st scenario entropy Header Field Entropy H(x) Interface Version IHL Type of Service Flags Fragment Offset Protocol Total Table 2. 2nd scenario entropy Header Field Entropy H(x) Time to Live Source Address Destination Address Source Port Destination Port Data Offset Control Bits Total Table 3. 3rd scenario entropy Header Field Entropy H(x) Timestamp Total Length Identification Sequence Number Acknowledgment Number Window Total Hence, the final expression for A n is: A m = m m 352 (27) 10

11 and the maximum compression ratio is: C A m f m (28) where f m is the flow probability distribution for m-packet flows. Applying the equations showed previously, we deduced that the compression bound for a TCP/IP header trace is around 13%. 7. Lossless Compression Method The main reason why header compression can be done at all is the fact that there is significant redundancy between header fields, both within consecutive packets belonging to the same flow and in particular between flows. The big gain of our proposed method comes from the observation that, for a set of selected header fields, the flows traveling into an Internet link are very similar. By utilizing a set of pre-computed templates of flows, and Huffman encoding, the header size can be significantly reduced. Hence, we have embarked upon the development of a new header compression scheme for packet header files that reduces drastically storage requirements. This section provides the details of how the method works, focusing on the fact that the decompressed header is functionally identical to the original header. First of all, we analyzed the behavior of the TCP/IP header fields for packets belonging to the same flow. Let F (i) be a header field for the i-th packet of a flow. We also define F (i) = F (i) F (1), where the minus operator represents an arithmetic operation. For the first packet of a flow, F (1) can be classified as F (1)-random, F (1)- predictable, or F (1)-not predictable: F (1)-random fields: Are fields whose initial values could or should be chosen at random: Identification, Sequence Number, and Acknowledgment Number. The identification field is primarily used for uniquely identifying fragments of an original IP datagram and many operating systems assign a sequential number for each packet. Hence, assigning a random number for the first fragment does not constitute a problem. Equally, the sequence number and acknowledgment number fields are not affected if we assign random values for the first packet of each flow. F (1)-predictable fields: Are fields whose value is usually known or at least predictable: Interface, Version, IHL, Type of Service, Flags, Fragment Offset, Protocol, Data Offset, Reserved, and Control Bits. The fields placed in this group preserve a high level of similarity among different flows. F (1)-not predictable fields: Are fields whose value cannot be predicted and has an specific meaning: Timestamp, TTL, Header Checksum, Total Length, Source Address, Source Port, Destination Address, Destination Port, and Window. This group embrace the fields that are very hard to guess their values for the first packet of each flow. For instance, we can not know previously, where will start each flow. Hence, is impossible to guess, for each flow, the value of the timestamp field of the first packet. The TTL field is modified in Internet header processing, hence depending of the amount of hops previously visited, its value must vary broadly for different flows. The total length carried by each packet as well the window field 11

12 also show a large variation. Finally, the source and destination address, represents a set of directions that is impossible to know in advance. Moreover, according with the F (i) behavior, the fields of the i-th packet of a flow were classified as F (i) = 0, F (i)-predictable, and F (i)-not predictable. F (i) = 0 fields: are header fields whose values are likely to stay constant over the life of a connection: Version, Type of Service, Protocol, Source Address, Destination Address, Source Port, and Destination Port. Here we are grouping the set of TSH header fields that is likely to stay constant over the life of a connection. F (i)-predictable fields: Are fields whose F (i) values are predictable, can be calculated based on the information stored in another field or follows sequential increments: Interface, IHL, Identification, Flags, Fragment Offset, Time to Live, Sequence Number, acknowledgment number, Data Offset, Reserved, and Control Bits. F (i)-not predictable fields: Are fields that are likely to change over the life of the conversation, and furthermore, are impossible to be calculated: timestamp, total length, header checksum, and Window. In this group are inserted fields that are likely to change over the life of the conversation, and furthermore, are impossible to be calculated. Our proposed compression method is in the context of saving storage space of potentially huge packet traces. The advantage of our proposed consists of know in advance the trace file and consequently the flows. Thus, we explore the properties of TCP/IP flows to predict some header fields and the Huffman encoding to obtain optimal compression ratio. A previous phase to the compression itself was the step to determine the clusters of TCP/IP flows and build a Huffman tree to them. The clusters were obtained from traces downloaded from NLANR. The following steps consist of traverse all trace file building the header field frequency tables examining the presence of new clusters and finally compress the file. We have applied different approaches for small flows and large flows. In both cases, the compression is carried out at flow level but for small flows we apply the clustering techniques described in the last sections. In the case of large flow, when it reaches the completed status, each packet is inspected by the compressor in order to determine the correspondent header field Huffman codding Compression Ratio The expected message length (L) can be calculated in order to measure the efficiency of the algorithm. Let N be the number of messages, P (i) the probability of the i-th value and L(i) the length of a message (number of bits assigned to it). Then: N L = P (i)l(i). (29) i=1 12

13 Moreover, the expected length L of any instantaneous code for a random variable X is greater than or equal to the entropy H(X), i.e., L H(X) (30) Is important to say that there are some data structures with informations related to this method that are also needed as for instance the Flow Clustering dataset. However, we do not take into account because they stay almost constant. Using the compression algorithm described here, the trace compression is around 16%, what means that for a header trace of 100 MB our method compress it to 16 MB. We studied the efficiency of the proposed compression method, comparing it against GZIP [Gailly and Adler - GZIP] and Van Jacobson methods. The GZIP and also ZIP and ZLIB [Gailly and Adler - ZLIB] applications use the deflation algorithm. The measures were taken from a TSH (Time Sequence Header) header trace file [NLANR]. The compressed file size obtained using the GZIP application is around 50% of the original TSH file size. For the Van Jacobson method, the header size of a compressed datagram ranges from 3 to 16 bytes. However, we must modify slightly the original method because the number of active flows is much more larger in a high-speed Internet link than in a low speed serial link (the scenario where Van Jacobson was originally proposed). Hence, we must increase thus the number of bytes needed to store the flow identifier (we have increased it from 1 byte to 3 bytes). Moreover, we assume that a time stamp (3 bytes) is added to each header. As a result we assume that minimal encoded headers becomes 8 bytes in the best case and 21 bytes in the worst case. Taking into account only the best case and considering the changes that we have explained before, the compression ratio for n-packet flows using the Van Jacobson method is bounded by: f V J (m) = obtaining thus a compression ratio given by: C V J Ratio = m (m 1), (31) 44m P V J m f V J (m) (32) Using this approach, we conclude that the compression rate of the Van Jacobson method reaches 32% in the best case. The performance of these three compression methods under analysis (our proposed method, GZIP method and Van Jacobson method) is depicted in Figure 3. For an uncompressed.tsh header file (X axis), we show the correspondent storage needs (Y axis). 8. Conclusions In this paper, we have introduced a novel lossless packet header compression method based on TCP flow clustering and Huffman encoding. The combined algorithm applies the Flow Clustering technique for small flows and the Huffman encoding for large flows. This approach has significantly increased the compression ratio. 13

14 Compressed file size (MBytes) GZIP method VJ method Proposed method Uncompressed file size (MBytes) Figure 3. Compression techniques comparison We have seen that the Flow Clustering technique fits well for small flows, where many flows are grouped in few templates. In these circumstances, the number of templates remains constant or shows small variations. The technique is based on semantic similarities among flows and TCP/IP functionalities. However, we have not seen the same behavior for large flows, where the number of templates tends to increase whenever new large flows arise. These characteristics led us to adopt another approach. This approach is based on Huffman encoding and explores the similarity between packets during the life of a connection. The analysis performed with both algorithms have concluded that for small flows the optimum number of packets per flow ranges from 1 to 12. On the other hand, flows with the number of packets greater than 12 is the best choice to define large flows. With our proposed method, storage size requirements for.tsh headers packet traces are reduced to 16% of its original size. The compression proposed here is more efficient than any other and simple to implement. Others known methods have their compression ratio bounded to 50% (GZIP) and 32% (Van Jacobson method), pointing out the effectiveness of our method. As future work, we intend to extend the compression method presented here to other header data formats. References DEFLATE. Compressed data format specification. In Available in ftp://ds.internic.net/rfc/rfc1951.txt. Gailly, J. L. and Adler, M. GZIP documentation and sources. In ftp://prep.ai.mit.edu/pub/gnu/. Gailly, J. L. and Adler, M. ZLIB documentation and sources. In ftp://ftp.uu.net/pub/archiving/zip/doc/. 14

15 Holanda R., Garcia J., and Almeida, V. (2004). Flow Clustering: a New Approach to Semantic Traffic Characterization. In 12th Conference on Measuring, Modelling, and Evaluation of Computer and Communication Systems, Dresden Germany. Jacobson, Van (1990). Compressing TCP/IP headers. In RFC Jain, R. (1991). The Art of Computer Systems Performance Analysis. In John Wiley Sons, Inc., New York. Johnson, D.E. (1998). Applied Multivariate Methods for Data Analysis. In Brooks/Cole Publisging Co. Kaufman, L. and Rousseeuw, P.J. (1990). Finding Groups in Data: An Introduction to Cluster Analysis. In Wiley and Sons, Inc.. Knuth, D. E. (1985). Dynamic Huffman coding. Journal of Algorithms,6: Ziv, J. and Lempel, A.. A universal algorithm for sequential data compression. In IEEE Transactions on Information Theory, Vol. 23, n o 3, pp NLANR. Measurement and Network Analysis. In CAIDA. The Cooperative Association for Internet Data Analysis. In Pang, R. and Paxson, V. (2003) A High-Level Programming Environment for Packet Trace Anonymization and Transformation. In Proceedings of ACM SIGCOMM Conference. Degermark, M., Engan, M., Nordgren, B., and Pink, S. (1996) Low-loss TCP/IP Header Compression for Wireless Networks. In Proc. MOBICOM, Rye, NY. Degermark, M., Nordgren, B., Pink, S. (1999) IP Header Compression. In Internet Engineering Task Force, RFC Casner, S. and Jacobson, V. (1999) Compressing IP/UDP/RTP Headers for Low-Speed Serial Links. In Internet Engineering Task Force, RFC Engan, M., Casner, S., and Bormann, C. (1999) IP Compression over PPP. In Internet Engineering Task Force, RFC Bormann, C. et al (2001) RObust Header Compression ROHC: Framework and four profiles: RTP, UDP, ESP, and uncompressed. In Request for Comments rd Generation Partnership Project (2002) Radio Acess Bearer Support Enhancements. In 3GPP, Tech. Rep.. Westphal, C. (2003) Improvements on IP Header Compression In GLOBECOM IEEE Global Telecommunications Conference, vol. 22, no. 1, pp

A Lossless Compression Method for Internet Packet Headers

A Lossless Compression Method for Internet Packet Headers A Lossless Compression Method for Internet Packet Headers Raimir Holanda and Jorge García Computer Architecture Dept. Technical University of Catalonia Barcelona, Spain Email: {rholanda,jorge}@ac.upc.edu

More information

A Review of IP Packet Compression Techniques

A Review of IP Packet Compression Techniques A Review of IP Packet Compression Techniques Ching Shen Tye and Dr. G. Fairhurst Electronics Research Group, Department of Engineering, Aberdeen University, Scotland, AB24 3UE. {c.tye, gorry}@erg.abdn.ac.uk

More information

Robust Header Compression (ROHC)

Robust Header Compression (ROHC) Robust Header Compression (ROHC) A step towards all-ip wireless networks Carsten Bormann TZI ISSLOW: Integrated Services over slow links Background: RTP is replacing TDM ISSLOW: 1996 initiative for packet

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Workload Characterization Techniques

Workload Characterization Techniques Workload Characterization Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse567-08/

More information

MILCOM October 2002 (Anaheim, California) Subject

MILCOM October 2002 (Anaheim, California) Subject MILCOM 2002 7-10 October 2002 (Anaheim, California) Subject PERFORMANCE ANALYSIS OF A NEW HEADER COMPRESSION SCHEME FOR TCP STREAMS IN IP BASED WIRELESS NETWORKS Authors: Prof. Pietro Camarda, Ing.. Sandro

More information

Robust Header Compression for Multimedia Services

Robust Header Compression for Multimedia Services Robust Header Compression for Multimedia Services Frank Fitzek Arizona State University 06/03/2002 Content Motivation, Introduction, Problems Related Work Robust Header Compression Wireless JSQ Testbed

More information

Adaptive Header Compression for Wireless Networks

Adaptive Header Compression for Wireless Networks Adaptive Header Compression for Wireless Networks Changli Jiao Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 Email: changli@katha.eng.wayne.edu Loren Schwiebert

More information

Image Compression for Mobile Devices using Prediction and Direct Coding Approach

Image Compression for Mobile Devices using Prediction and Direct Coding Approach Image Compression for Mobile Devices using Prediction and Direct Coding Approach Joshua Rajah Devadason M.E. scholar, CIT Coimbatore, India Mr. T. Ramraj Assistant Professor, CIT Coimbatore, India Abstract

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

On Data Latency and Compression

On Data Latency and Compression On Data Latency and Compression Joseph M. Steim, Edelvays N. Spassov, Kinemetrics, Inc. Abstract Because of interest in the capability of digital seismic data systems to provide low-latency data for Early

More information

Entropy-based event detection

Entropy-based event detection Entropy-based event detection New Zealand The Univer rsity of Auckland Ulrich Speidel Department of Computer Science The University of Auckland ulrich@cs.auckland.ac.nz Joint work with Raimund Eimann What

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

Evaluation of End-to-End TCP performance over WCDMA

Evaluation of End-to-End TCP performance over WCDMA Evaluation of End-to-End TCP performance over WCDMA Liang Hu Department of Communications, Optics & Materials Technical University of Denmark, Lyngby, Denmark Email:{lh}@com.dtu.dk Abstract this article

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

Automated Clustering-Based Workload Characterization

Automated Clustering-Based Workload Characterization Automated Clustering-Based Worload Characterization Odysseas I. Pentaalos Daniel A. MenascŽ Yelena Yesha Code 930.5 Dept. of CS Dept. of EE and CS NASA GSFC Greenbelt MD 2077 George Mason University Fairfax

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

An Information Theoretic Approach to Network Trace Compression

An Information Theoretic Approach to Network Trace Compression An Information Theoretic Approach to Network Trace Compression Yong Liu a, Don Towsley a, Jing Weng a, and Dennis Goeckel b a Computer Science, b Electrical & Computer Engineering, University of Massachusetts,

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

A Hybrid ARQ Scheme for Resilient Packet Header Compression

A Hybrid ARQ Scheme for Resilient Packet Header Compression A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA M. GAUS, G. R. JOUBERT, O. KAO, S. RIEDEL AND S. STAPEL Technical University of Clausthal, Department of Computer Science Julius-Albert-Str. 4, 38678

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Lecture 9: Internetworking

Lecture 9: Internetworking Lecture 9: Internetworking CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes,

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Covert channels in TCP/IP: attack and defence

Covert channels in TCP/IP: attack and defence Covert channels in TCP/IP: attack and defence The creation and detection of TCP/IP steganography for covert channels and device fingerprinting Steven J. Murdoch and Stephen Lewis http://www.cl.cam.ac.uk/users/{sjm217,

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Category: Informational May DEFLATE Compressed Data Format Specification version 1.3

Category: Informational May DEFLATE Compressed Data Format Specification version 1.3 Network Working Group P. Deutsch Request for Comments: 1951 Aladdin Enterprises Category: Informational May 1996 DEFLATE Compressed Data Format Specification version 1.3 Status of This Memo This memo provides

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Chapter 2 PROTOCOL ARCHITECTURE

Chapter 2 PROTOCOL ARCHITECTURE Chapter 2 PROTOCOL ARCHITECTURE 2.1 INTRODUCTION IPv6 is a new version of Internet protocol which is expected to substitute IPv4. It is very difficult to predict exactly when IPv4 will eventually come

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Internet Protocol version 6

Internet Protocol version 6 Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

IPv6 Header Compression

IPv6 Header Compression IPv6 Header Compression North American IPv6 Summit, June 2004 Emre Ertekin Christos Christou Booz Allen Hamilton {ertekin_emre, christou_chris}@bah.com 1 Outline Introduction Background on IETF Hop-by-Hop

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

Ch.7 Internet Protocol: Connectionless Datagram Delivery (IPv4, IPv6)

Ch.7 Internet Protocol: Connectionless Datagram Delivery (IPv4, IPv6) CSC521 Communication Protocols 網路通訊協定 Ch.7 Internet Protocol: Connectionless Datagram Delivery (IPv4, IPv6) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

Cédric Westphal Nokia Research Center, Mountain View, CA

Cédric Westphal Nokia Research Center, Mountain View, CA Improvements on IP Header Compression: a performance study Cédric Westphal Nokia Research Center, Mountain View, CA cedric.westphal@nokia.com Abstract Due to bandwidth constraints on the wireless link

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

A Novel Image Compression Technique using Simple Arithmetic Addition

A Novel Image Compression Technique using Simple Arithmetic Addition Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC A Novel Image Compression Technique using Simple Arithmetic Addition Nadeem Akhtar, Gufran Siddiqui and Salman

More information

Background: IP Protocol Stack

Background: IP Protocol Stack Networking and protocols for real-time signal transmissions by Hans-Peter Schwefel & Søren Vang Andersen Mm1 Introduction & simple performance models (HPS) Mm2 Real-time Support in Wireless Technologies

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Cluster Analysis. Angela Montanari and Laura Anderlucci

Cluster Analysis. Angela Montanari and Laura Anderlucci Cluster Analysis Angela Montanari and Laura Anderlucci 1 Introduction Clustering a set of n objects into k groups is usually moved by the aim of identifying internally homogenous groups according to a

More information

NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES

NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES RENATO PREIGSCHADT DE AZEVEDO, DOUGLAS CAMARGO FOSTER, RAUL CERETTA NUNES, ALICE KOZAKEVICIUS Universidade

More information

EE-575 INFORMATION THEORY - SEM 092

EE-575 INFORMATION THEORY - SEM 092 EE-575 INFORMATION THEORY - SEM 092 Project Report on Lempel Ziv compression technique. Department of Electrical Engineering Prepared By: Mohammed Akber Ali Student ID # g200806120. ------------------------------------------------------------------------------------------------------------------------------------------

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

UDP Lite for Real Time Multimedia Applications

UDP Lite for Real Time Multimedia Applications UDP Lite for Real Time Multimedia Applications Lars-Åke Larzon*, Mikael Degermark*, Stephen Pink* Extended Enterprise Laboratory HP Laboratories Bristol HPL-IRI-1999-001 April, 1999 E-mail: [11n,micke,steve]@cdt.luth.se

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS

THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS Yair Wiseman 1* * 1 Computer Science Department, Bar-Ilan University, Ramat-Gan 52900, Israel Email: wiseman@cs.huji.ac.il, http://www.cs.biu.ac.il/~wiseman

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

Clustering CS 550: Machine Learning

Clustering CS 550: Machine Learning Clustering CS 550: Machine Learning This slide set mainly uses the slides given in the following links: http://www-users.cs.umn.edu/~kumar/dmbook/ch8.pdf http://www-users.cs.umn.edu/~kumar/dmbook/dmslides/chap8_basic_cluster_analysis.pdf

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Exploiting Packet Header Redundancy for Zero Cost Dissemination of Dynamic Resource Information

Exploiting Packet Header Redundancy for Zero Cost Dissemination of Dynamic Resource Information Exploiting Packet Header Redundancy for Zero Cost Dissemination of Dynamic Resource Information Peter A. Dinda pdinda@cs.northwestern.edu Department of Computer Science Northwestern University Abstract.

More information

Category: Standards Track Lulea University of Technology/Telia Research AB S. Pink. Lulea University of Technology/SICS.

Category: Standards Track Lulea University of Technology/Telia Research AB S. Pink. Lulea University of Technology/SICS. Network Working Group M. Degermark Request for Comments: 2507 Lulea University of Technology/SICS Category: Standards Track B. Nordgren Lulea University of Technology/Telia Research AB S. Pink Lulea University

More information

A Real-Time Network Simulation Application for Multimedia over IP

A Real-Time Network Simulation Application for Multimedia over IP A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network

More information

Routing Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks

Routing Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks Advanced Computer Networks Khanna and Zinky, The Revised ARPANET Routing Metric, Proc. of ACM SIGCOMM '89, 19(4):45 46, Sep. 1989 Routing Metric Distributed route computation is a function of link cost

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Using Statistical Techniques to Improve the QC Process of Swell Noise Filtering

Using Statistical Techniques to Improve the QC Process of Swell Noise Filtering Using Statistical Techniques to Improve the QC Process of Swell Noise Filtering A. Spanos* (Petroleum Geo-Services) & M. Bekara (PGS - Petroleum Geo- Services) SUMMARY The current approach for the quality

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding

Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Seishi Taka" and Mikio Takagi Institute of Industrial Science, University of Tokyo Abstract Lossless gray scale

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 29 Source Coding (Part-4) We have already had 3 classes on source coding

More information

Reliable Multicast in Mobile Networks

Reliable Multicast in Mobile Networks Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

End-to-end UMTS Network Performance Modeling. 1. Introduction

End-to-end UMTS Network Performance Modeling. 1. Introduction End-to-end UMTS Network Performance Modeling Authors: David Houck*, Bong Ho Kim, Jae-Hyun Kim Lucent Technologies 101 Crawfords Corner Rd., Room 4L431 Holmdel, NJ 07733, USA Phone: +1 732 949 1290 Fax:

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)

More information

Modeling RTP Streams over ATM AAL5

Modeling RTP Streams over ATM AAL5 ENSC 835 Modeling RTP Streams over ATM AAL5 Kevin Ko (kkoa@sfu.ca) Naomi Ko (nko@sfu.ca) Outline of Presentation Project Overview Background Information Theory and Methodology OPNET Implementation Conclusion

More information

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 8, August -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Simulation

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

Clustering and Visualisation of Data

Clustering and Visualisation of Data Clustering and Visualisation of Data Hiroshi Shimodaira January-March 28 Cluster analysis aims to partition a data set into meaningful or useful groups, based on distances between data points. In some

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Improving the Efficiency of Fast Using Semantic Similarity Algorithm International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

Request for Comments: 5225 Category: Standards Track April 2008

Request for Comments: 5225 Category: Standards Track April 2008 Network Working Group Request for Comments: 5225 Category: Standards Track G. Pelletier K. Sandlund Ericsson April 2008 Status of This Memo RObust Header Compression Version 2 (ROHCv2): Profiles for RTP,

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Medical Sensor Application Framework Based on IMS/SIP Platform

Medical Sensor Application Framework Based on IMS/SIP Platform Medical Sensor Application Framework Based on IMS/SIP Platform I. Markota, I. Ćubić Research & Development Centre, Ericsson Nikola Tesla d.d. Poljička cesta 39, 21000 Split, Croatia Phone: +38521 305 656,

More information

Binary Encoded Attribute-Pairing Technique for Database Compression

Binary Encoded Attribute-Pairing Technique for Database Compression Binary Encoded Attribute-Pairing Technique for Database Compression Akanksha Baid and Swetha Krishnan Computer Sciences Department University of Wisconsin, Madison baid,swetha@cs.wisc.edu Abstract Data

More information

Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks

Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Computer Science Mohammad Ahsan Chishti / Shaima Quershi / Ajaz Hussain Mir Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Bibliographic information published by the

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Ch. 2: Compression Basics Multimedia Systems

Ch. 2: Compression Basics Multimedia Systems Ch. 2: Compression Basics Multimedia Systems Prof. Ben Lee School of Electrical Engineering and Computer Science Oregon State University Outline Why compression? Classification Entropy and Information

More information