Experimental Networking Research and Performance Evaluation

Size: px
Start display at page:

Download "Experimental Networking Research and Performance Evaluation"

Transcription

1 Generating Realistic TCP Workloads Felix Hernandez-Campos Ph. D. Candidate Dept. of Computer Science Univ. of North Carolina at Chapel Hill Recipient of the 2001 CMG Fellowship Joint work with F. Donelson Smith and Kevin Jeffay Experimental Networking Research and Performance Evaluation Evaluating network protocols and mechanisms requires careful experimentation Network simulation (NS, Opnet, etc.) Network testbeds A critical element of these experiments is the traffic workload Are current workloads realistic? Let s s look at some measurements Sprint s s tier-1 backbone network Sprint ATL 2004 Sprint ATL TCP is the dominant transport protocol OC-48 Link in San Jose, CA February 3 rd, 2004 Internet traffic is driven by a large number of applications 3 4

2 Internet Generation Testbed example Internet Generation Testbed example Evaluate queuing mechanisms in the routers Evaluate transport protocols Evaluate intrusion/anomaly detection mechanisms Evaluate traffic monitoring techniques / / 5 6 Generation State-of-the-Art Application-Specific Modeling Model Example Open-loop Large number of sophisticated models» Packet-level modeling But TCP is a closed-loop protocol» Open-loop traffic generation breaks reliability, flow control, and congestion control Closed-loop The idea is to simulate the behavior of users/applications» Source-level modeling of specific application Time Active OFF times Inactive OFF times (user think time) sizes, File sizes Web Page s to same server 7 8

3 SURGE Model [Barford and Crovella,, 1998] Application-Specific Models Shortcomings Time Active OFF times Inactive OFF times (user think time) OFF Time Durations: Pareto(k = 10K, = 1.0) Sizes: Lognormal(µ = 7.63, = 1.001) Body Pareto(k = 10K, = 1.0) Tail Web Page No. of Objects: : Pareto(k = 2, = 1.245) sizes, File sizes Object Sizes: Lognormal(µ = 8.215, = 1.46) s to same server Creating application models is a challenging, time- consuming task mixes are driven by a large number of applications Set of dominant applications evolves quickly Applications themselves also evolve We cannot even identify a significant fraction of the traffic Modeling closed application protocols requires reverse-engineering Privacy considerations complicate data acquisition TCP header traces are ok, application data is not 9 10 Our Approach Different Views of Internet Abstract Source-level Modeling Abstract source-level modeling Application-neutral technique to describe the source-level behavior of any TCP connection Efficient analysis applicable any arbitrary trace of TCP headers (no analysis of payloads) We can also measure network-level parameters, such as round-trip times, receiver window sizes, etc. Source-level trace replay Replaying abstract source-level behavior Validation in network testbed We wrote a distributed, scalable traffic generator (tmix( tmix) Comparison of original and synthetic traces UNC from UNC Per-Flow Filtering from Internet UNC Internet from Inet 2,500 bytes 4,800 bytes 800 b 1,800 b URL HTML Source Req. Image time Aggregate Packet Arrival Level Single-Flow Packet Arrivals Abstract Source Level Application Level (e.g., web traffic) Our Approach 11 12

4 BROWSER SERVER Client-Server Applications Persistent Example Epoch b 803 b Response secs b Epoch 2 Epoch 3 25,821 b Response secs b 1,198 b Response 3 We call a pair of application data units (ADUs( ADUs) ) that carry a request/response exchange an epoch Quiet times are also part of the workload of TCP Sequential A-b-t Model Abstract source-level model for describing the workload of TCP connections Each connection is summarized using a connection vector of the form C i = (e( 1, e 2,, e n ) with n 1 epochs Each epoch has the form e j = (a( j, ta j, b j, tb j ) Connection vectors can be extracted from trace of TCP segment headers Sequence number directionality, timing analysis, write size and packet size interactions O(n n log n) + O(n*W) Client-Server Applications SMTP and Examples Beyond the Client-Server Model Icecast Internet Radio SMTP SENDER SMTP RECEIVER 93 b 220 Host Info MODE READER 13 b READER 53 b SERVER 200 News Srv 5.7b1 HELO 32 b 42 b 200 News Service 191 b 250 Domain Info MAIL 77 b GROUP GROUP unc.help unc.test 19 b 42 b 15 b unc.support status 32 b unccs.test status RCPT 75b 6b 59b 38b 50b 250 Ok 250 Ok 250 Ok XOVER 15 b 32 b 224 data [header n] ARTICLE n 5.02 secs 12 b Message 22,568 b 44b 250 Ok 1056 bytes 220 n <id1> article retrieved [article] msecs. msecs. ms. ms. msecs. ms. msecs. 392b PLAYER SERVER 217b 1253b 1686b 432b 863b 2442b 436b 1671b Audio Frames Server PUSH applications do not follow the traditional client-server model The sequential a-b-t model is still applicable Make a i and tb i zero 16

5 Beyond the Client-Server Model in Stream-Mode MODE STREAM PEER 13 b 52 b PEER 201 Server Ready 43 b 203 StreamOK CHECK CHECK <id2> <id4> CHECK CHECK <id1> 41 b 41 b <id3> 43 b 41 b 49 b 438 don t <id1> BitTorrent Unchoke Protocol Bitfield Interested 42 b 238 <id2> i PEER A 68 b 657 b 5b 5b b PEER B 68 b 657 b 5b 17b 17b BitTorrent Interested Protocol j Bitfield i j b 51 b 438 don t <id3> TAKETHIS <id2> [article] 15,678 bytes m 17b 49 b 438 don t <id4> k b 17b k 17b b m l l b Concurrent A-b-t Model Some connections are said to exhibit data exchange concurrency Two reasons: Increasing performance Enabling natural concurrency Concurrent a-b-t model describes each side of the connection separately ((a 1, ta 1 ), (a( 2, ta 2 ),,, (a( n, ta n )) ((b 1, tb 1 ), (b( 2, tb 2 ),,, (b( m, tb m )) Concurrency can be detected with high probability p.seqno > q.ackno and q.seqno > p.ackno O(n*W) Source-Level Trace Replay Generation in Lab Testbed Sample Comparison Anonymized Packet Header Trace Processing Source-level Trace: Set of Connection Vectors Workload Partitioning Source-level Performance Metrics TESTBED Synthetic Packet Header Trace 19 20

6 Conclusion New method for modeling traffic mixes Empirically-derived connection vectors Studied sequential vs. concurrent dichotomy Fully automated, efficient analysis New traffic generation approach Enables comparison of real and synthetic traffic Implemented a distributed traffic generator Techniques for scaling traffic load 21 22

From Traffic Measurement to Realistic Workload Generation

From Traffic Measurement to Realistic Workload Generation From Traffic Measurement to Realistic Workload Generation Felix Hernandez-Campos Ph. D. Candidate Dept. of Computer Science Univ. of North Carolina at Chapel Hill Joint work with F. Donelson Smith and

More information

A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic

A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic Félix Hernández-Campos ndez-campos Kevin Jeffay Don Smith Department

More information

GENERATING REALISTIC TCP WORKLOADS

GENERATING REALISTIC TCP WORKLOADS GENERATING REALISTIC TCP WORKLOADS F. Hernández-Campos F. Donelson Smith K. Jeffay Department of Computer Science University of North Carolina at Chapel Hill {fhernand,smithfd,jeffay}@cs.unc.edu Abstract

More information

Tracking the Evolution of Web Traffic:

Tracking the Evolution of Web Traffic: The University of North Carolina at Chapel Hill Department of Computer Science 11 th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)

More information

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Jay Aikat*, Shaddi Hasan +, Kevin Jeffay*, and F. Donelson Smith* *University of North Carolina at Chapel

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

GENERATING Tmix-BASED TCP APPLICATION. WORKLOADS IN NS-2 AND GTNetS. A Thesis. Presented to. the Graduate School of. Clemson University

GENERATING Tmix-BASED TCP APPLICATION. WORKLOADS IN NS-2 AND GTNetS. A Thesis. Presented to. the Graduate School of. Clemson University GENERATING Tmix-BASED TCP APPLICATION WORKLOADS IN NS-2 AND GTNetS A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Master of Science

More information

Exposing server performance to network managers through passive network measurements

Exposing server performance to network managers through passive network measurements Exposing server performance to network managers through passive network measurements Jeff Terrell Dept. of Computer Science University of North Carolina at Chapel Hill October 19, 2008 1 databases web

More information

Understanding Patterns of TCP Connection Usage with Statistical Clustering

Understanding Patterns of TCP Connection Usage with Statistical Clustering Understanding Patterns of TCP Connection Usage with Statistical Clustering Félix Hernández-Campos Andrew B. Nobel 2 F. Donelson Smith Kevin Jeffay Department of Computer Science 2 Department of Statistics

More information

Passive, Streaming Inference of TCP Connection Structure for Network Server Management

Passive, Streaming Inference of TCP Connection Structure for Network Server Management Passive, Streaming Inference of TCP Connection Structure for Network Server Management Jeff Terrell,KevinJeffay,F.DonelsonSmith, Jim Gogan 2, and Joni Keller 2 Department of Computer Science 2 ITS Communication

More information

Differential Congestion Notification: Taming the Elephants

Differential Congestion Notification: Taming the Elephants Differential Congestion Notification: Taming the Elephants Long Le, Jay Kikat, Kevin Jeffay, and Don Smith Department of Computer science University of North Carolina at Chapel Hill http://www.cs.unc.edu/research/dirt

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

A Better-Than-Best Effort Forwarding Service For UDP

A Better-Than-Best Effort Forwarding Service For UDP University of North Carolina at Chapel Hill A Better-Than-Best Effort Forwarding Service For UDP Lightweight Active Queue Management for Multimedia Networking Kevin Jeffay Mark Parris Don Smith http://www.cs.unc.edu/reseach/dirt

More information

CHAPTER 3. Abstract Source-level Modeling

CHAPTER 3. Abstract Source-level Modeling CHAPTER 3 Abstract Source-level Modeling model: (11a) a description or analogy used to help visualize something (as an atom) that cannot be directly observed. Merrian Webster English Dictionary Anything

More information

COMP 249 Advanced Distributed Systems Multimedia Networking. Performance of Multimedia Delivery on the Internet Today

COMP 249 Advanced Distributed Systems Multimedia Networking. Performance of Multimedia Delivery on the Internet Today COMP 249 Advanced Distributed Systems Multimedia Networking Performance of Multimedia Delivery on the Internet Today Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill

More information

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis Empirical Models of TCP and UDP End User Network Traffic from NETI@home Data Analysis Charles R. Simpson, Jr., Dheeraj Reddy, George F. Riley School of Electrical and Computer Engineering Georgia Institute

More information

Application-Level Measurements of Performance on the vbns *

Application-Level Measurements of Performance on the vbns * Application-Level Measurements of Performance on the vbns * Michele Clark Kevin Jeffay University of North Carolina at Chapel Hill Department of Computer Science Chapel Hill, NC 2799-317 USA {clark,jeffay}@cs.unc.edu

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

A Whirlwind Introduction to the Internet Overview

A Whirlwind Introduction to the Internet Overview Overview What s the Internet What s a protocol? Network edge Network core ccess nets, media Performance: loss, delay Protocol layers, service models ackbones, NPs, ISPs local ISP company regional ISP queuing

More information

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

A Comparative Study of the Realization of Rate-Based Computing Services in General Purpose Operating Systems

A Comparative Study of the Realization of Rate-Based Computing Services in General Purpose Operating Systems A technology for real-time computing on the desktop A Comparative Study of the Realization of Rate-Based Computing Services in General Purpose Operating Systems Kevin Jeffay Department of Computer Science

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

WEB traffic characterization and performance analysis

WEB traffic characterization and performance analysis WEB traffic characterization and performance analysis Summary Objectives of our work Web traffic characterisation through measurements Performance evaluation and analytical model validation Packet level

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

Review. Review. Review. How to Send a Message over a Network? LAN LAN. LAN Routing Addressing Reliable Data Transfer Congestion Control LAN

Review. Review. Review. How to Send a Message over a Network? LAN LAN. LAN Routing Addressing Reliable Data Transfer Congestion Control LAN Review Review Computer etworks Multiaccess or Shared Media Broadcast Switched Point-to-Point Packet Switched or Store-and-foward Circuit Switched Virtual Ciruit or Connection-Oriented Datagram or Connectionless

More information

Multimedia Networking Research at UNC. University of North Carolina at Chapel Hill. Multimedia Networking Research at UNC

Multimedia Networking Research at UNC. University of North Carolina at Chapel Hill. Multimedia Networking Research at UNC University of North Carolina at Chapel Hill Multimedia Networking Research at UNC Adaptive, Best-Effort Congestion Control Mechanisms for Real-Time Communications on the Internet Kevin Jeffay F. Donelson

More information

An Empirical Study of Delay Jitter Management Policies

An Empirical Study of Delay Jitter Management Policies An Empirical Study of Delay Jitter Management Policies D. Stone and K. Jeffay Computer Science Department University of North Carolina, Chapel Hill ACM Multimedia Systems Volume 2, Number 6 January 1995

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #1 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Intersession 2009 Question Paper NOTE: Students may take this

More information

CSE 3214: Computer Network Protocols and Applications. Midterm Examination

CSE 3214: Computer Network Protocols and Applications. Midterm Examination Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Midterm Examination Instructions: Instructor: Peter Lian Date: February 14, 2013 1. Examination time:

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve

More information

Internet Architecture and Experimentation

Internet Architecture and Experimentation Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

COMP 249 Advanced Distributed Systems Multimedia Networking. The Integrated Services Architecture for the Internet

COMP 249 Advanced Distributed Systems Multimedia Networking. The Integrated Services Architecture for the Internet COMP 249 Advanced Distributed Systems Multimedia Networking The Integrated Services Architecture for the Internet Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Configuring Application Visibility and Control for Cisco Flexible Netflow

Configuring Application Visibility and Control for Cisco Flexible Netflow Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also

More information

Outline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices

Outline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices Outline QoS routing in ad-hoc networks QoS in ad-hoc networks Classifiction of QoS approaches Instantiation in IEEE 802.11 The MAC protocol (recap) DCF, PCF and QoS support IEEE 802.11e: EDCF, HCF Streaming

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

Announcements. priority on the waiting list for students with a C or better in 412. this class counts for MS but not Ph.D. comp credit.

Announcements. priority on the waiting list for students with a C or better in 412. this class counts for MS but not Ph.D. comp credit. Announcements Enrollment priority on the waiting list for students with a C or better in 412. this class counts for MS but not Ph.D. comp credit. Changes in TA Office hours starting next week office hours

More information

arxiv: v1 [stat.ap] 6 Oct 2010

arxiv: v1 [stat.ap] 6 Oct 2010 The Annals of Applied Statistics 2010, Vol. 4, No. 1, 26 52 DOI: 10.1214/09-AOAS268 c Institute of Mathematical Statistics, 2010 ANALYSIS OF DEPENDENCE AMONG SIZE, RATE AND DURATION IN INTERNET FLOWS arxiv:1010.1108v1

More information

Implementation of a leaky bucket module for simulations in NS-3

Implementation of a leaky bucket module for simulations in NS-3 Implementation of a leaky bucket module for simulations in NS-3 P. Baltzis 2, C. Bouras 1,2, K. Stamos 1,2,3, G. Zaoudis 1,2 1 Computer Technology Institute and Press Diophantus Patra, Greece 2 Computer

More information

BEng. (Hons) Telecommunications. Examinations for / Semester 2

BEng. (Hons) Telecommunications. Examinations for / Semester 2 BEng. (Hons) Telecommunications Cohort: BTEL/16B/FT Examinations for 2016 2017 / Semester 2 Resit Examinations for BTEL/15B/FT MODULE: NETWORKS MODULE CODE: CAN 1102C Duration: 2 ½ hours Instructions to

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

Trace based application layer modeling in ns-3

Trace based application layer modeling in ns-3 Trace based application layer modeling in ns-3 Prakash Agrawal and Mythili Vutukuru Department of Computer Science and Engineering, Indian Institute of Technology, Bombay {prakashagr, mythili }@cse.iitb.ac.in

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Computer Networks. HTTP and more. Jianping Pan Spring /20/17 CSC361 1

Computer Networks. HTTP and more. Jianping Pan Spring /20/17 CSC361 1 Computer Networks HTTP and more Jianping Pan Spring 2017 1/20/17 CSC361 1 First things first W1 due next Monday (Jan 23) submit a single PDF file through connex Noah posted a docx for for questions on

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review What is AIMD? When do we use it? What is the steady state profile

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Computer Networks - Midterm

Computer Networks - Midterm Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

MCS-377 Intra-term Exam 1 Serial #:

MCS-377 Intra-term Exam 1 Serial #: MCS-377 Intra-term Exam 1 Serial #: This exam is closed-book and mostly closed-notes. You may, however, use a single 8 1/2 by 11 sheet of paper with hand-written notes for reference. (Both sides of the

More information

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work

More information

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

A report on a few steps in the evolution of congestion control. Sally Floyd June 10, 2002 IPAM Program in Large Scale Communication Networks

A report on a few steps in the evolution of congestion control. Sally Floyd June 10, 2002 IPAM Program in Large Scale Communication Networks A report on a few steps in the evolution of congestion control Sally Floyd June 10, 2002 IPAM Program in Large Scale Communication Networks 1 Topics: High-speed TCP. Faster Start-up? AQM: Adaptive RED

More information

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

Lecture 10: Protocol Design

Lecture 10: Protocol Design Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously.

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously. EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

CS 638 Lab 6: Transport Control Protocol (TCP)

CS 638 Lab 6: Transport Control Protocol (TCP) CS 638 Lab 6: Transport Control Protocol (TCP) Joe Chabarek and Paul Barford University of Wisconsin Madison jpchaba,pb@cs.wisc.edu The transport layer of the network protocol stack (layer 4) sits between

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Universal Packet Scheduling. Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker UC Berkeley

Universal Packet Scheduling. Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker UC Berkeley Universal Packet Scheduling Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker UC Berkeley Packet Scheduling Active research literature with many Algorithms FIFO, DRR, virtual clocks, priorities

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use

More information

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011 Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2011/2012 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 2/05/2012 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #1 Assigned today Due in one week Application layer: DNS, HTTP, protocols Recommend you start early

More information

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2 Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram

More information

Strategies, approaches and ethical considerations

Strategies, approaches and ethical considerations Strategies, approaches and ethical considerations q Internet design principles and measurements q Strategies and standards q Experimental approaches q Ethical considerations Design principles of the Internet

More information

The Controlled Delay (CoDel) AQM Approach to fighting bufferbloat

The Controlled Delay (CoDel) AQM Approach to fighting bufferbloat The Controlled Delay (CoDel) AQM Approach to fighting bufferbloat BITAG TWG Boulder, CO February 27, 2013 Kathleen Nichols Van Jacobson Background The persistently full buffer problem, now called bufferbloat,

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose

More information

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Chapter 7 Multimedia Networking

Chapter 7 Multimedia Networking Chapter 7 Multimedia Networking Principles Classify multimedia applications Identify the network services and the requirements the apps need Making the best of best effort service Mechanisms for providing

More information

Multimedia Networking

Multimedia Networking Multimedia Networking 1 Multimedia, Quality of Service (QoS): What is it? Multimedia applications: Network audio and video ( continuous media ) QoS Network provides application with level of performance

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Streaming Video and TCP-Friendly Congestion Control

Streaming Video and TCP-Friendly Congestion Control Streaming Video and TCP-Friendly Congestion Control Sugih Jamin Department of EECS University of Michigan jamin@eecs.umich.edu Joint work with: Zhiheng Wang (UofM), Sujata Banerjee (HP Labs) Video Application

More information