Monitoring, Analysis and Modeling of HTTP and HTTPS Requests in a Campus LAN Shriparen Sriskandarajah and Nalin Ranasinghe.

Size: px
Start display at page:

Download "Monitoring, Analysis and Modeling of HTTP and HTTPS Requests in a Campus LAN Shriparen Sriskandarajah and Nalin Ranasinghe."

Transcription

1 Monitoring, Analysis and Modeling of HTTP and HTTPS Requests in a Campus LAN Shriparen Sriskandarajah and Nalin Ranasinghe. Abstract In this paper we monitored, analysed and modeled Hypertext Transfer Protocol (HTTP) and HTTP Secure (HTTPS) requests generated from a campus Local Area Network (LAN) to various web servers in the Internet. We focused on the parameter TCP session inter-arrival times. The TCP session inter-arrival times are analysed and fitted with standard distributions such as Exponential, Gamma, Lognormal, Weibull and Pareto distributions. With this study we found that for traffic chunks of less than or equal to 30 minutes time period, Gamma distribution provides best fit to the empirical TCP session inter-arrival times of HTTP and HTTPS requests. Keywords Traffic modelling, TCP session, Inter-arrival time, Gamma distribution, HTTP, HTTPS. I. INTRODUCTION The field of computer networking and today s Internet trace their beginning back to the early 1960s. Network traffic analysis and developing Mathematical models for network traffic are useful in many fields such as planning the network, optimizing the system configuration, developing new applications, and simulating the network. Basically network traffic models are used in two ways: First a good traffic model leads to a better understanding of the characteristic of the Network traffic. Second to derive an accurate network simulation. In turn these simulations must be performed in order to study and validate algorithms and protocols to be applied to real traffic and to detect network anomalies such as TCP SYN flooding attack. Many organisations and Internet service providers continuously monitor and analyse their network traffic in order to find out the utilization levels on different parts of the network. It includes monitoring user requests and accessing of network resources and observing the network traffic load at various time periods. By identifying congested links and links with low utilization levels, service providers can equalize the traffic pattern, for example by finding out alternative paths, making the network functioning more efficiently. The main contribution of this paper is to monitor, analyse campus LAN traffic and to develop a Mathematical model for TCP session inter-arrival times of HTTP and HTTPS requests generated from the campus LAN to various web servers in the Internet. In this paper a trace driven approach is used to analyse and model the TCP/IP campus LAN traffic, that is, the properties of a campus LAN traffic are obtained via statistical analysis of actual traces. S. Shriparen is with the Computer Unit, University of Jaffna, P.O.Box 57, Thirunelvely, Jaffna, Sri Lanka (phone: ; fax: ; shriparen@jfn.ac.lk). N. Ranasinghe is with University of Colombo School of Computing, UCSC Building Complex, No. 35, Reid Avenue, Colombo-7, Sri Lanka. ( dnr@ucsc.cmb.ac.lk). The alternative approach is to derive models from the TCP mechanism itself and not on actual traces [1]-[3]. However, the trace driven approach is more realistic as the concomitant effect of user behavior, network protocols and channel conditions are implicitly captured by the TCP/IP traffic traces [4]. A measurement infrastructure is designed and implemented to capture the network traffic traces and to store the trace files. The measurement infrastructure has a monitoring point to monitor all HTTP and HTTPS request generated from the campus LAN to various web servers in the Internet. The network traffic traces are captured using a free and open source packet capture tool. The analysis and model fitting are done using a free and open source software environment for statistical computing and graphics. This paper is organised as follows. Section II describes the related work. Section III provides the method used to monitor and collect traffic traces. In section IV, our modelling methodology is formally stated. Section V presents results and analysis. The paper ends with conclusion and future work in section VI. II. RELATED WORK Network traffic can be modeled as sequence of arrivals of discrete entities, such as packets, cells, etc. Mathematically, this leads to the usage of two equivalent representations: counting process and inter-arrival time processes [5]. A counting process {N(t)} t=0.. is a continuous-time, integervalued stochastic process, where N(t) expresses the number of arrivals in the time interval (o,t]. An inter-arrival time process is a non-negative random sequence {A n }, where A n =T n -T n-1 indicates the length of the interval separating arrivals of n-1 and n. The two kinds of processes are related through (1). * ( ) + * + { } ( ) In case of compound traffic, arrivals may happen in batches, that is, several arrivals can happen at the same instant T n. This fact can be modeled by using an additional non-negative random sequence {B n } n=1.., where B n is the cardinality of the n th batch. Mark and Bestavros [6] showed that the subset of network traffic that is due to World Wide Web transfer can show

2 characteristics that are consistent with self-similarity. Will E. Leland et al. [7] analyzed LAN traffic offered to a high-speed public network supporting LAN interconnection, a B-ISDN service. The main result of their statistical analysis is that the Ethernet LAN traffic shows statistically self-similar behaviour. A research done by Cao et al. [8] addresses the non-stationary of Internet traffic and suggests that the multi-fractal traffic structure evidence at the edges of the network diminishing within the core of the large network. Paxson and Floyd [9] studied telnet traffic and found that the session arrival process is well-modeled with a Poisson process, though with a timevarying rate (e.g. hourly). Arlitt and Williamson [10] found that the user requests for individual web pages are often wellmodeled by Poisson process. Barakat et al. [11] proposed a traffic model for uncongested IP backbone that is different from all the above mentioned traffic models in that it uses any flavor of flow definition to model the variation and the correlation of the traffic. The model relies on Poison shot-noise with only 3 parameters (λ, arrival rate of flows, E[S n ], average size of a flow, and 2 [ S n / D n ], average value of the ratio of the square of a flow size and its duration), the model is able to find good approximations for the average of the total rate (the throughput) on a backbone link and for its variations at short time scale. Feldman [12] showed that the TCP connection arrival process shows self-similar behavior and that TCP connection inter-arrival times are statistically better modeled by distributions with heavy tails especially the Weibull distribution than the traditional models. Nuzman et al. [13] proposed a two level model for TCP connection arrivals in local area networks. The first level is user sessions whose arrival is time-varying Poisson distribution. The second level is connections within a user session. Their number and mean inter-arrival are independent and bipareto distribution across user session. The inter-arrival process within a user session are well modeled by Weibull distribution, and across all users are correlated by Weibull distribution. The analysis done on wireless network traffic by Lee and Abraham, [4] addresses the modeling wireless TCP/IP traffic and shown that conventional distributions are inadequate to model the marginal distributions of wireless TCP flow inter-arrival times. They shown that marginal distribution of flow inter-arrival times is piecewise Weibull distributed. And the second and higher order statistics show that the flow inter-arrival times are long-range dependent and exhibit multi fractal scaling. III. MONITORING AND COLLECTING TRAFFIC TRACES The network traffic traces were collected from TCP/IP network that is located at Network Operating Centre (NOC) at the University of Jaffna, Jaffna, Sri Lanka, which Gigabit and 10/100 Ethernet links interconnecting routers, switches and servers. There were approximately 200 users - staff and students - accessing the Internet and campus network services from their LAN connected workstations, personal computers or Laptops. The Internet connectivity is provided by LEARN (Lanka Education and Research Network) which is 10Mbps optical fibre VPLS (Virtual Private LAN Service) link. The squid proxy server and other public servers such as mail server and web server are connected to a core switch. A. Network Measurement Infrastructure The entire web request from campus LAN users are directed via a squid proxy server. The proxy server authenticates users using a username and a password and based on the authentication, it allows web accesses and campus network services. It is thus possible to monitor and tap the entire web request in the interconnection link between the proxy server and the core switch. There is a monitoring system running on a workstation to monitor and capture all HTTP and HTTPS requests from the campus LAN to various web servers in the Internet. The traffic traces captured in the monitoring system are transferred to a workstation that is used as the storage. The network measurement infrastructure is illustrated graphically in Fig.1. Fig. 1: Measurement Infrastructure B. Network Traffic Monitoring The monitoring system records the traces using tcpdump [14] packet capture tool running on Linux operating system. The tcpdump filter is used to capture only those TCP packets with SYN flag bit is set to 1 in the segment header. When a LAN connected client sends a HTTP or HTTPS request to a server, the client application process informs the client TCP

3 that it wants to establish a connection to a process in the server. The TCP in the client then proceeds to establish a TCP connection to with the TCP in the server. The client-side TCP first sends a special TCP segment to the server-side TCP. This special segment contains no application-layer data. But one of the flag bits in the segment s header the SYN bit is set to one [15]. C. Collecting Traffic Traces The primary task of the data collection system is to gather the trace files captured from the monitoring workstation in the monitoring point to a single platform. The traffic trace files are transferred using remote login facility with SSH2 protocol. The captured trace files are transferred to the data collection point after working hours to minimize the effect it has on the monitoring workstation. The summaries of dataset selected for analysis are listed in Table 1. The selected traces were collected on 30 th March, 31 st March, 1 st April and 4 th of April The second column gives the total number of TCP SYN packets received by the kernel for each dataset. Each dataset was then trimmed to span exactly 7 hours from 09:00 to 16:00. TABLE I SUMMARY DATA SET OF HTTP AND HTTPS REQUESTS Date No. of TCP Session Start Time End Time 30-Mar ,123 8:10 17:21 31-Mar ,340 8:57 22:21 1-Apr ,923 7:16 17:04 4-Apr ,245 8:34 17:31 IV. MODELING METHODOLOGY In this research work to analyse the network traffic and to fit suitable mathematical model for the network traffic, we used the statistical parameter TCP session inter-arrival time (IAT) X i, i = 1, 2,, N. A new TCP session begins by the arrival of a TCP SYN packet with ACK bit set to 0 at a client host or a unique TCP port pair. A. Definition of TCP session inter-arrival time Assume that within an observation period of 0 < t < T, client i requests for a new TCP session at times t i (1), t i (2),, t i (N), where Ni is the number of new TCP sessions observed for client i in 0 < t < T. Similarly, client j requests for a new TCP session at times t j (1), t j (2),, t j (N). The new TCP session times are collected and ordered based on their time occurrence to produce a point process at times, say t(0), t(1),, t(n), where N is the total number of session in 0 < t < T. The TCP session inter-arrival times are defined as Xi = t(i) t(i-1) for i = 1, 2,, N. The TCP session inter-arrival times are analysed by considering following time intervals: One day traffic- that is, TCP session inter-arrival times of all HTTP and HTTPS requests in working hours in a day between 9:00 to 16:00 10 minutes traffic- that is, split the day data traffic into 10 minutes interval slots such as 9:00 to 9:10, 9:10 to 9:20,, 15:50 to 16:00 20 minutes traffic- that is, split into 20 minutes interval slots such as 9:00 to 9:20, 9:20 to 9:40,, 15:40 to16:00 30 minutes traffic- that is, split into 30 minutes interval slots such as 9:00 to 9:30, 9:30 to 10:00, 15:30 to 16:00, and One hour traffic- that is, split into one hour interval slots such as 9:00 to 10:00, 10:00 to 11:00,.15:00 to 16:00 The data set split into smaller time periods to perform closer analysis on the data and to reduce the number of observations. The statistical parameter TCP session inter-arrival times are checked whether the dataset best fits with the standard distributions Exponential, Gamma, Lognormal, Weibull and Pareto. The data analysis and model fitting are done using R [16], a package in R, known as fitdistrplus is used to select the best fit distribution. The probability density function of the models considered here are listed in Table II. TABLE II PROBABILITY DENSITY FUNCTION OF STANDARD DISTRIBUTIONS Distribution Exponential Gamma Lognormal Probability Density Function f(x) ( ) ( ) ( ) * ( ) + Weibul ( ) [ ( ) ] Pareto ( ) A Quantile-Quantile (Q-Q) plot is drawn to compare empirical quantities with the theoretical quantities of a distribution. It is a graphical technique for determining if a data set follows a certain distribution. A 45-degree reference line also plotted. If the empirical data come from the population with the chosen distribution, the points should fall approximately along this reference line. After choosing a model that can mathematically represent our data we estimated the parameters of such model. The method of maximum likelihood is used to estimate the parameters. We used the likelihood function as: L(x 1,x 2,.,x n,θ) = ( ) (2)

4 Maximum likelihood estimate consist in finding θ which maximizes L(x 1,x 2,.,x n,θ). Goodness of fit test is done to test whether or not it is reasonable that the data follow a specified distribution. The goodness of fit test is defined for the following hypothesis: H 0 : the data follow specified distribution H A : the data do not follow the specified distribution The P-value is used as a measure of how much evidence we have against the null hypothesis. The null hypothesis, represented by the symbol H 0, represents the hypothesis of no change or no effect. The smaller the p-value, the more evidence we have against H 0. The Kolmogrov-Smirnov statistics also calculated to decide that the sample comes from a population with a specified distribution. V. RESULTS AND ANALYSIS A. One Day Traffic We first considered the TCP session inter-arrival times of all HTTP and HTTPS requests to various web servers. From the captured data set, we selected a trace file captured on 01 April 2011, Friday. The day selected for detail analysis is a working day and it demonstrates smooth overall traffic rate without major anomalies. The selection to focus on working days is obvious, since they contain the most traffic to be analysed. The network is most utilized in working hours, it is observed that between 9:00 A.M. and 04:00 P.M. is the busy hours in the data collected site. The number of observed TCP sessions is The mean value is micro second and the standard deviation is micro second. Quantile-Quantile plot is drawn (Fig. 3) to compare empirical quantities with the theoretical quantities of Gamma distribution. In this plot on the x-axis we have theoretical quantities got by theoretical model and on y-axis we have empirical quantities. And a 45-degree reference line is also plotted. The Quantile-Quantile plot shows difference on sample quantities from the reference line. So the evidence for the conclusion that the data set does not best fit with Gamma distribution. Similarly, other standard distributions such as Exponential, Lognormal, Weibull and Pareto distributions are examined. As the result data set does not fit with any standard distributions examined. The results are quantitatively confirmed by Kolmogrov-Smirnov statistics given in table III. TABLE III KOLMOGOROV-SMIRNOV STATISTIC FOR EXAMINED DISTRIBUTIONS Distribution Kolmogorov-Smirnov Statistic Exponential Gamma Lognormal Weibull Pareto Fig. 2: Quantile-Quantile Plot Fitting Gamma distribution, 01 April 2011 between 09:00 and 16:00 B. 30 Minutes Traffic As explained in section V.A, the analysis results of dataset captured on 01 April 2011 between 09:00 and 16:00 shows that, it does not follow any standard distributions. Even though we are come to the conclusion that the data set does not fit with any standard distributions, we can observe from analysis that the dataset tends to Gamma distribution. So further analysis has been done on fitting Gamma distribution by splitting the data set into smaller time period. This objective is approach by considering shorter time intervals such as 10 minutes, 20 minutes, 30 minutes and 01 hour. As the result 10, 20 and 30 minutes analysis yield best fit to Gamma distribution. When the traffic chunk time interval increased to one hour, the results are not exactly fit to Gamma distribution but tend to Gamma distribution. TABLE IV GAMMA DISTRIBUTION PARAMETER ESTIMATES, 01 APRIL 2011, 30 MINUTES SLOTS No. Time Interval No of TCP session Shape (x10-1 ) Gamma Distribution Rate (x10-6 ) KS Statistic 1 09:00-09: :30-10: :00-10: :30-11: :00-11: :30-12: :00-12: :30-13: :00-13: :30-14: :00-14: :30-15: :00-15: :30-16:

5 To optimize the number of intervals to be analysed, let us consider each and every 30 minutes interval between 09:00 and 16:00. There are fourteen slots of 30 minutes interval are considered for analysis. The statistic results of TCP session inter-arrival time on 01 April 2011, 30 minutes intervals are given in Table IV. The third column gives the total number of packets received by kernel for each time interval. The forth and fifth column lists the shape and rate parameters of Gamma distribution respectively. The sixth column lists the Kolmogorov-Smirnov (K-S) Statistic for each time interval. One of the slots out of fourteen is taken for further analysis. We have selected the slot between time interval 10:00 and 10:30 as is shows the busiest hour. In the histogram of observed data (Fig. 3) inter-arrival times are split into equal size classes on x-axis and y-axis denotes frequency counts for each classes. Fig. 4 shows the empirical cumulative distribution function on 01 April 2011 between 10:00 and 10:30A.M.. Chi-square goodness of fit test: H O : The data follow Gamma distribution H A : The data do not follow Gamma distribution Calculated P-value is H O is accepted as the P-value is greater than of a significance level fixed at least in 5%. Calculated Kolmogorov-Smirnov (K-S) statistics is Fig 5: Quantile-Quantile Plot Fitting Gamma distribution, 01 April 2011 between 10:00 and 10:30A.M. Fig. 3: Histogram of observed data, 01 April 2011 between 10:00 and 10:30 A.M. Fig 6: Probability-Probability Plot Fitting Gamma distribution, 01 April 2011 between 10:00 and 10:30A.M. Fig. 4: Empirical cumulative distribution function 01 April 2011, between 10:00and 10:30A.M. By examining the Quantile-Quantile plot shown in Fig. 5 and the Probability-Probability plot shown in Fig. 6, We can come to a conclusion that the dataset best fit to Gamma distribution with parameter estimate, Shape, α = x 10-1 and Rate, λ = x 10-6 VI. CONCLUSION AND FUTURE WORK In this research work we have monitored, analysed and mathematically modeled the HTTP and HTTPS requests generated from a campus LAN. The statistical parameter TCP session inter-arrival time was defined and used to analyse and fit with standard distributions Exponential, Gamma, Lognormal, Weibull and Pareto distributions. The data captured in working hours between 9:00 A.M. and 4:00 P.M. in a day was first considered for analysis. This data set did not show good fit with the standard distributions. Even though the data set did not show good fit with the standard distribution, we could observe from analysis that the dataset approximately follow gamma distribution. So further analysis has been done on fitting Gamma distribution by splitting the data set into smaller time period traffic chunks such as 10 minutes, 20 minutes, 30 minutes and one hour. As a result 10, 20 and 30 minutes data best fit to Gamma distribution. When the traffic

6 chunk time interval increased to one hour, the results are not exactly fit to Gamma distribution but tend to Gamma distribution. We found that, for traffic chunks of less than or equal to 30 minutes time period, Gamma distribution provides best fit to the empirical TCP session inter-arrival times of HTTP and HTTPS requests generated from campus LAN to various web servers in the Internet. This research work can be extended to identify the changes in the fitted distribution when a denial of service attack such as TCP SYN flooding attack created from the campus LAN. Since we are identifying a new TCP session by the arrival of TCP packet with SYN bit set to one, In the SYN flooding attack, the attack generating clients send large number of TCP SYN segments, without completing the handshake step [15]. To achieve this, first simulate a similar network used in this research using one of network simulator. Simulate a SYN flooding attack; capture the network traffic traces during attack simulation time. By using the captured traffic traces identify the changes in the derived distribution. The distributions tested here were chosen to fit to TCP session inter-arrival time curve. The similar research work can be done on TCP session duration time as well. The TCP session duration can be calculated by identifying the arrival of a new TCP session by capturing the TCP packet with SYN flag set to one and the corresponding final packet by capture the TCP packet with FIN flag set to one. ACKNOWLEDGEMENTS We are grateful to the administrators from Network Operating Centre of the University of Jaffna for allowing us to access real network traffic traces. REFERENCES [1] A. Kumar, Comparative performance analysis of versions of TCP in a local network with lossy links, IEEE/ACM Transactions on Networking, vol.6, No.4, pp , [2] A. Abouzeid, S. Roya and M. Azizoglu, Stochastic modeling of TCP over lossy links, IEEE INFOCOM, pp , [3] M. Rossi, R. Vicenzi and M. Zorzi, Accurate analysis of TCP on channels with memory and finite round-trip delay, IEEE Transactions on Wireless Communications, vol 3, No.2, pp , [4] I.W.C. Lee and O.F. Abraham, Analysis and modeling of a campus wireless network TCP/IP traffic, Computer Networks, Vol. 53, No. 15, pp , [5] M. Becchi, From Poisson Processes to Self-Similarity: A Survey of Network Traffic Models, [6] E.C. Marka and A. Bestavros, Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, IEEE/ACM Transactions on Networking Vol 5, No. 6, [7] E.W. Leland, S.T. Murad, W. Walter and V.W. Daniel, On the selfsimilar nature of Ethernet Traffic, IEEE/ACM Transaction on Networking. Vol.2, No.1, [8] J. Cao, W. Clevland, D. Lin and D. Sun, On the Nonstationary of Internet Traffic, Proceeding of ACM SIGMETRICS, [9] V. Paxson and S. Floyd, Wide Area Traffic: The Failure of Poisson Modeling IEEE/ACM Transactions on Networking Vol 3, No.3, [10] M. Arlitt and C. Williamson, Internet Web Servers: Workload Characterization and Performance Implications", IEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp , [11] C. Barakat, P. Thiran, G. Iannaccone, C. Diot and P. Owezarski, A Flow-based model for Internet backbone traffic, [12] A. Feldman, Characteristics of TCP Connection Arrivals, [13] C.J. Nuzman, I. Saniee, W. Sweldensa and A. Weiss, A Compound Model for TCP Connection Arrival, [14] S. McCanne, C. Leres, and V. Jacobson, Tcpdump [15] F. Kurose and W. Ross, Computer Networking A top down approach, Fifth edition, [16]

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis Empirical Models of TCP and UDP End User Network Traffic from NETI@home Data Analysis Charles R. Simpson, Jr., Dheeraj Reddy, George F. Riley School of Electrical and Computer Engineering Georgia Institute

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Analysis of WLAN Traffic in the Wild

Analysis of WLAN Traffic in the Wild Analysis of WLAN Traffic in the Wild Caleb Phillips and Suresh Singh Portland State University, 1900 SW 4th Avenue Portland, Oregon, 97201, USA {calebp,singh}@cs.pdx.edu Abstract. In this paper, we analyze

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview Basic concepts Characterization of traffic properties that are important to measure

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl

More information

Measuring Conditional Web Throughput

Measuring Conditional Web Throughput Measuring Conditional Web Throughput Gianluca Mardente, Marco Mellia, Andrea Bianco Dipartimento di Elettronica - Politecnico di Torino - Italy e-mail: fmardente, mellia, biancog@mail.tlc.polito.it Abstract

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl

More information

Modeling Internet Backbone Traffic at the Flow Level

Modeling Internet Backbone Traffic at the Flow Level IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 8, AUGUST 2003 2111 Modeling Internet Backbone Traffic at the Flow Level Chadi Barakat, Patrick Thiran, Gianluca Iannaccone, Christophe Diot, and Philippe

More information

SIMULATING CDPD NETWORKS USING OPNET

SIMULATING CDPD NETWORKS USING OPNET Michael Jiang Stephen Hardy Ljiljana Trajkovic SIMULATING CDPD NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road Map Introduction Simulation

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Simulation Input Data Modeling

Simulation Input Data Modeling Introduction to Modeling and Simulation Simulation Input Data Modeling OSMAN BALCI Professor Department of Computer Science Virginia Polytechnic Institute and State University (Virginia Tech) Blacksburg,

More information

Slides 11: Verification and Validation Models

Slides 11: Verification and Validation Models Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Buffer Management for Self-Similar Network Traffic

Buffer Management for Self-Similar Network Traffic Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering

More information

WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis

WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis Nayden Markatchev Carey Williamson Department of Computer Science University of Calgary E-mail: {nayden,carey}@cpsc.ucalgary.ca Abstract

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL 2009 405 Web User-Session Inference by Means of Clustering Techniques Andrea Bianco, Member, IEEE, Gianluca Mardente, Marco Mellia, Member, IEEE,

More information

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San

More information

SIMULATING CDPD NETWORKS USING OPNET

SIMULATING CDPD NETWORKS USING OPNET SIMULATING CDPD NETWORKS USING OPNET Michael Jiang, Stephen Hardy, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia Canada V5A 1S6 {zjiang, steve,

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L.

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Evidence Gathering for Network Security and Forensics DFRWS EU 2017 Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing Talk outline Context and problem Objective Evidence gathering framework

More information

A Capacity Planning Methodology for Distributed E-Commerce Applications

A Capacity Planning Methodology for Distributed E-Commerce Applications A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The

More information

Spatio-Temporal Modeling of campus WLAN traffic demand

Spatio-Temporal Modeling of campus WLAN traffic demand Spatio-Temporal Modeling of campus WLAN traffic demand Félix Hernández-Campos a Merkourios Karaliopoulos b Maria Papadopouli a,b,c Haipeng Shen d a. Department of Computer Science, University of North

More information

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation November 2010 Nelson Shaw njd50@uclive.ac.nz Department of Computer Science and Software Engineering University of Canterbury,

More information

UCLA Computer Science. Department. Off Campus Gateway. Department. UCLA FDDI Backbone. Servers. Traffic Measurement Connection

UCLA Computer Science. Department. Off Campus Gateway. Department. UCLA FDDI Backbone. Servers. Traffic Measurement Connection Contradictory Relationship between Hurst Parameter and Queueing Performance Ronn Ritke, Xiaoyan Hong and Mario Gerla UCLA { Computer Science Department, 45 Hilgard Ave., Los Angeles, CA 924 ritke@cs.ucla.edu,

More information

CREATING THE DISTRIBUTION ANALYSIS

CREATING THE DISTRIBUTION ANALYSIS Chapter 12 Examining Distributions Chapter Table of Contents CREATING THE DISTRIBUTION ANALYSIS...176 BoxPlot...178 Histogram...180 Moments and Quantiles Tables...... 183 ADDING DENSITY ESTIMATES...184

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Jay Aikat*, Shaddi Hasan +, Kevin Jeffay*, and F. Donelson Smith* *University of North Carolina at Chapel

More information

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

Tracking the Evolution of Web Traffic:

Tracking the Evolution of Web Traffic: The University of North Carolina at Chapel Hill Department of Computer Science 11 th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing Shao and Ljiljana Trajković Simon Fraser University Vancouver, Canada {qshao, ljilja}@cs.sfu.ca Keywords: satellite-terrestrial

More information

Analysis of Random Access Protocol under Bursty Traffic

Analysis of Random Access Protocol under Bursty Traffic Analysis of Random Access Protocol under Bursty Traffic Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles, CA 90095 {jbgao, rubin}@ee.ucla.edu Abstract.

More information

Ch. 13: Measuring Performance

Ch. 13: Measuring Performance Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction

More information

Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix

Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix KAI BELOW, ULRICH KILLAT Department of Communication Networks Technical University Hamburg-Harburg (TUHH) Denickestr.

More information

Inferring web user sessions by Clustering techniques

Inferring web user sessions by Clustering techniques Inferring web user sessions by Clustering techniques N. kalpana,g.v.s.n.r.v.prasad 2 Computer Science & Engineering, Gudlavalleru Engineering College, Gudlavalleru (A.P), India. Abstract This paper focuses

More information

Simulation Evaluation of Wireless Web Performance in an IEEE b Classroom Area Network

Simulation Evaluation of Wireless Web Performance in an IEEE b Classroom Area Network Simulation Evaluation of Wireless Web Performance in an IEEE.b Classroom Area Network Guangwei Bai Carey Williamson Department of Computer Science University of Calgary Email: fbai,careyg@cpsc.ucalgary.ca

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES Hakan Yılmaz TÜBİTAK Marmara Research Center Information Technologies Research Institute Kocaeli, Turkey hy@btae.mam.gov.tr Bülent Sankur Boğaziçi

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Characterizing Flows in Large Wireless Data Networks

Characterizing Flows in Large Wireless Data Networks Characterizing Flows in Large Wireless Data Networks Xiaoqiao (George) Meng, Starsky H.Y. Wong, Yuan Yuan, Songwu Lu Computer Science Department Computer Science Department University of California University

More information

A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR.

A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. UNIVERSITY OF LJUBLJANA Faculty of Electrical Engineering Daniel Alonso Martinez A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. Erasmus exchange project

More information

BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION

BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION Proceedings of the 1996 Winter Simulation Conference ed. J. M. Charnes, D. J. Morrice, D. T. Brunner, and J. J. S\vain BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION Linda lankauskas Sam

More information

Simulation of web data traffic patterns using fractal statistical modelling

Simulation of web data traffic patterns using fractal statistical modelling Simulation of web data traffic patterns using fractal statistical modelling Shanyu Tang and Hassan B. Kazemian Faculty of Computing, London Metropolitan University 66 22 Holloway Road, London N7 8DB, UK.

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Impact of Short-lived TCP Flows on TCP Link Utilization over 10Gbps High-speed Networks

Impact of Short-lived TCP Flows on TCP Link Utilization over 10Gbps High-speed Networks Impact of Short-lived TCP Flows on TCP Link Utilization over Gbps High-speed Networks Lin Xue, Chui-hui Chiu, and Seung-Jong Park Department of Computer Science, Center for Computation & Technology, Louisiana

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

Passive Packet Loss Detection in Wi-Fi Networks and its Effect on HTTP Traffic Characteristics

Passive Packet Loss Detection in Wi-Fi Networks and its Effect on HTTP Traffic Characteristics Passive Packet Loss Detection in Wi-Fi Networks and its Effect on HTTP Traffic Characteristics Saeed Ullah, Imdad Ullah, Hassaan Khaliq Qureshi, Rim Haw, Sungman Jang, and Choong Seon Hong Department of

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

Characterisation of Web Traffic

Characterisation of Web Traffic Characterisation of Web Traffic E. Casilari, A. Reyes-Lecuona, F.J. González, A. Díaz-Estrella and F. Sandoval Dpto. Tecnología Electrónica, E.T.S.I. Telecomunicación, University of Málaga Campus de Teatinos,

More information

Game Traffic Analysis: An MMORPG Perspective

Game Traffic Analysis: An MMORPG Perspective Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer

More information

What We ll Do... Random

What We ll Do... Random What We ll Do... Random- number generation Random Number Generation Generating random variates Nonstationary Poisson processes Variance reduction Sequential sampling Designing and executing simulation

More information

A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic

A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic Félix Hernández-Campos ndez-campos Kevin Jeffay Don Smith Department

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

The structural cause of file size distributions

The structural cause of file size distributions To appear at MASCOTS 0 The structural cause of file size distributions Allen B. Downey Wellesley College adowney@wellesley.edu Abstract We propose a user model that explains the shape of the distribution

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

Video at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016

Video at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016 Video at the Edge passive delay measurements Kathleen Nichols Pollere, Inc nichols@pollere.net November 17, 2016 Talk Roadmap Netflix and YouTube network characterization delay profiles delay localization

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

Chapter 3. Bootstrap. 3.1 Introduction. 3.2 The general idea

Chapter 3. Bootstrap. 3.1 Introduction. 3.2 The general idea Chapter 3 Bootstrap 3.1 Introduction The estimation of parameters in probability distributions is a basic problem in statistics that one tends to encounter already during the very first course on the subject.

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Detecting Distributed Denial-of. of-service Attacks by analyzing TCP SYN packets statistically. Yuichi Ohsita Osaka University

Detecting Distributed Denial-of. of-service Attacks by analyzing TCP SYN packets statistically. Yuichi Ohsita Osaka University Detecting Distributed Denial-of of-service Attacks by analyzing TCP SYN packets statistically Yuichi Ohsita Osaka University Contents What is DDoS How to analyze packet Traffic modeling Method to detect

More information

Interest-based Mining and Modeling of Big Mobile Networks

Interest-based Mining and Modeling of Big Mobile Networks Interest-based Mining and Modeling of Big Mobile Networks Saeed Moghaddam, Ahmed Helmy University of Florida saeed@cise.ufl.edu, helmy@cise.ufl.edu Abstract Usage of mobile wireless Internet has grown

More information

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool SMA6304 M2 ---Factory Planning and scheduling Lecture Discrete Event of Manufacturing Systems Simulation Sivakumar AI Lecture: 12 copyright 2002 Sivakumar 1 Simulation Simulation - A Predictive Tool Next

More information

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title 4IPP Traffic Model for IEEE 802.16.3 Date Submitted Source(s) 2000-10-31 C. R. Baugh, Ph.D. Harris Communications,

More information

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

Trace Traffic Integration into Model-Driven Simulations

Trace Traffic Integration into Model-Driven Simulations Trace Traffic Integration into Model-Driven Simulations Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-10230-10 Telecommunications and Information Sciences Laboratory Department of Electrical

More information

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection Web File Transmission by Performance Comparison with and Hiroshi Fujinoki, Murugesan Sanjay, and Chintan Shah Department of Computer Science Southern Illinois University at Edwardsville Edwardsville, Illinois

More information

Rapid Model Parameterization from Traffic Measurements

Rapid Model Parameterization from Traffic Measurements Rapid Model Parameterization from Traffic Measurements KUN-CHAN LAN and JOHN HEIDEMANN USC Information Sciences Institute The utility of simulations and analysis heavily relies on good models of network

More information

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed

More information

SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN

SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum Faculty Of Mathematical Sciences hudaalhajj@yahoo.com The

More information

QoS Integration of the Internet and Wireless Sensor Networks

QoS Integration of the Internet and Wireless Sensor Networks QoS Integration of the Internet and Wireless Sensor Networks Department of Electrical and Computer Engineering Naval Postgraduate School Monterey, CA 93943 USA {weilian, balmahar}@nps.edu http://web.nps.navy.mil/

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University DEVELOPMENT AND APPLICATION OF A NEW CURRICULUM FOR COMPUTER NETWORKING Presenter Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University Gabriel

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1

More information

Improved Model for a Non-Standard TCP Behavior

Improved Model for a Non-Standard TCP Behavior IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 45 Improved Model for a Non-Standard TCP Behavior Mohammed Abdullah Alnuem, King Saud University, Riyadh,

More information

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation

More information

COMPUTER AND DATA NETWORKS

COMPUTER AND DATA NETWORKS COMPUTER AND DATA NETWORKS (EE2.CDN, Spring 2003) Dr. Z. SUN University of Surrey Guildford Surrey GU2 5XH Tel: 01483 68 9493 Fax: 01483 68 6011 Email: Z.Sun@eim.surrey.ac.uk 1 Dr.Z.Sun SCHEDULE Week 1

More information

A Behavioral Model of Web Traffic

A Behavioral Model of Web Traffic A Behavioral Model of Web Traffic Hyoung-Kee Choi School of Electrical and Computer Engineering John O. Limb College of Computing Georgia Institute of Technology {hkchoi, limb}@cc.gatech.edu Abstract The

More information

Catching IP traffic burstiness with a lightweight generator

Catching IP traffic burstiness with a lightweight generator Catching IP traffic burstiness with a lightweight generator Chloé Rolland 1, Julien Ridoux 2, and Bruno Baynat 1 1 Université Pierre et Marie Curie - Paris VI, LIP6/CNRS, UMR 7606, Paris, France {rolland,

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

Modeling and Performance Analysis with Discrete-Event Simulation

Modeling and Performance Analysis with Discrete-Event Simulation Simulation Modeling and Performance Analysis with Discrete-Event Simulation Chapter 10 Verification and Validation of Simulation Models Contents Model-Building, Verification, and Validation Verification

More information

WEB traffic characterization and performance analysis

WEB traffic characterization and performance analysis WEB traffic characterization and performance analysis Summary Objectives of our work Web traffic characterisation through measurements Performance evaluation and analytical model validation Packet level

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information