Rethinking The Building Block: A Profiling Methodology for UDP Flows
|
|
- Aubrie Manning
- 5 years ago
- Views:
Transcription
1 Rethinking The Building Block: A Profiling Methodology for UDP Flows 123 Jing Cai 13 Zhibin Zhang 13 Peng Zhang 13 Xinbo Song 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China 2 Graduate University of Chinese Academy of Sciences, Beijing, China 3 National Engineering Laboratory for Information Security, Beijing, China caijing@software.ict.ac.cn Abstract With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on realtime considerations, these new applications mostly use UDP as transport layer protocol, which directly increase UDP traffic. However, traditional studies believe that TCP dominates the Internet traffic and previous traffic measurements were generally based on it while UDP was ignored. In view of this, we mainly discuss the profiling methodology of UDP flows in this paper. First, from the view of the network layer, we present a profiling methodology on the basis of the Claffy s parameter flow model. Next, due to the significant differences among the different applications, we found that using a unified methodology and ignoring the information of application layer is not appropriate for UDP flows. At last, we get the conclusion that for different applications, such as dns, qq[16], we must use corresponding profiling methodology based on their specific characteristics. I. INTRODUCTION The main purpose of the network traffic measurement is to enhance people s awareness about traffic characteristics. The traffic measurement that works based on the network layer started from the 198s. Earlier studies took the packet as the Building Block. But due to its small granularity, it could not meet the needs in many ways. According to the locality of network traffic in time and space, Claffy et al.[1][2] firstly proposed a parameters flow model. Since then, the traffic measurement based on flow had gradually become a hot issue in the field of network measurement. However, in the past, during the process of network traffic measurement, people generally believed that TCP traffic occupied the main body of the network traffic, and UDP traffic is negligible, and therefore ignored the measurements of the UDP flow. However, the situation has undergone tremendous changes at present. With the increase of network bandwidth, the traditional networking services based on images and text could no longer satisfy people s needs. More and more audio, video, and online games, have gradually become the main body of the network traffic. These applications mostly use UDP as their transport layer protocol[3], which directly results in the increase of UDP traffic. The organization of CAIDA[4] analyzed the trace collected in the period on several backbone links located in the US and Sweden, found the ratio between the UDP and TCP in packets, bytes, and flows have increased greatly. In China, as shown in Fig.1, after statistical analysis on the 24-hour data we collected from a backbone router, we found that the proportion of the UDP packets is around 4%. It could sometimes reach 8% at most. From the view of the proportion of UDP bytes, we also found that the proportion of the UDP bytes fluctuated greatly, but generally exceeded 4%, and sometimes was even above 8%. Since the increase of UDP traffic, more and more people have started to pay attention to the traffic of UDP. However, compared with the TCP, we found there at least exist two big differences. Firstly, TCP is a connection-oriented protocol, it has controlling flags such as FIN and RST to explicitly identify the end of flow. But for UDP, it is a connectionless protocol. In essence, there is no concept of flow in udp. At present, people commonly refer to UDP flows as a series of packets which are required to complete a data transfer from the view of the application layer. Therefore, Claffy s flow model is still applicable for UDP. But in this case, the parameters setting is not the same as before. The second, compared with TCP, the composition of UDP is more complicated. In the past, in measurement of TCP flows and from the view of the network layer, people do not care about the specific application services, so the parameters of flow model are generally identical. However in UDP, the characteristics of different applications often demonstrate significant differences. Using uniformed parameters to profile flow without considering the assumption on application layer is feasible for TCP flows, but will bring many uncertainties to the connectionless UDP flows. Due to these two great differences, earlier network measurement based on flows mostly focus the TCP flows, while UDP flows was ignored. The study on the UDP flows is nearly in the blank stage. In view of these, we mainly discuss the profiling methodology of UDP flow in this paper. To the best of our knowledge, we are the first to do so. There are two main contributions in our paper. Through our comprehensive considerations on each evaluation criteria, we built the appropriate profiling methodology on the basis of Claffy s parameter flow model from the view of the network layer. Taking the complexity of UDP into account, due to the significant differences between the application protocols, we want to know whether it is enough to use a unified
2 the ratio between the udp and ip The proportion of the udp s packets and bytes UDP pkt / IP pkt UDP byte / IP byte TABLE I: The basic information of the trace Id Begin time End time Bytes Packets I ,14: ,:3 275G 285(million) However, earlier studies believe that TCP dominates the Internet traffic, thus their study generally based on TCP flows while UDP flows was ignored. Therefore, we will present our profiling methodology of UDP flows on the basis of Claffy s parameter flow model in this paper..1 :5:57 4:25:57 11:15:57 14:35:58 18:5:58 21:35:58 time Fig. 1: The proportion of the UDP s packets and bytes profiling methodology to measure the characteristics of different applications. After our statistics and analysis, we found there indeed exist significant differences between the profiling methodologies of different applications. We were unable to use a unified methodology to process UDP flow as a whole. In contrast, we must use corresponding profiling methodology based on the characteristics of applications. The remainder of this paper is organized as follows: Section 2 presents some related work on the profiling methodologies of flows. In section 3, we discuss the profiling methodology from the view of the network layer. In section 4, from the view of the application layer, considering the great differences between the different applications, we want to know whether exists a unified profiling methodology to process UDP flows. At last, we conclude this paper and give some suggestions in Section 5. II. RELATED WORKS The studies of earlier traffic measurement took the packets as the Building Block. But as D.Clark[5]pointed out that, the traffic measurements based on packets can not reflect the relation between the packets and the higher-level information. Thus, it can not meet the need for understanding network traffic in many ways. Jain[6] proposed a model named Packet Train. In this model, a series of packets which have the same source and destination address will be identified as a packet train. If the interval between two packets exceeds a specified fixed timeout value, then these packets are said to belong to separate train. Claffy et al.[1][2] first propose a parameters flow model, in which flow was taken as a series of packets that was consistent with a specific flow specification and timeout constraint. By analyzing the common characteristics of the packets which belong to the specific flow, we can better understand and analyze network behavior from a higher layer, and also provide enough information support for network application designing. From then on, the network measurement based on flow had became more and more popular. III. PROFILING METHODOLOGY FROM THE VIEW OF THE NETWORK LAYER A. Date set We collected the data trace from a backbone router in China. The basic information of this trace is in Table I. The reason for not using the data set of CAIDA is that its payload information has been encrypted. And in this paper, we must use the payload information to classify the different applications. B. profiling methodology During the measurement based on flows, how to decide the boundary of flow is critical. There exist two main approaches. The first, controlling flags(etc., FIN and RST) are used to terminate the flow[7]. The second is the timeout strategy. If a flow become inactive beyond a given timeout, it is deemed to be ended and should be removed from memory. The timeoutbased method does not rely on the explicit protocol labels in packet header, thus it can deal with the TCP flows and UDP flows. In this case, although UDP is a connectionless protocol, Claffy s parameter flow model is still applicable. What we need to do is to find out the most appropriate parameters. We formally define UDP flows as a series of continuous arriving UDP packets which have the same five-tuple(source address, destination address, source port, destination port, transport protocol), and their packets inter-arrival do not exceed a specified fixed timeout. In this paper, we assume our scenario is located in a backbone router. Among the above six parameters, the selection of timeout is most difficult and important. The timeout determines the boundary of the flow, so it directly impact on the accuracy of flow measurement. If a smaller timeout value is selected, it can cause more long flows to be segmented into multiple short flows. If a larger timeout is selected, it may result in more unnecessary measurement overhead. For TCP, because it has controlling flags which can make up the impact of setting a inappropriate timeout. But for UDP, the selection of the timeout is critical. Claffy[1][2] proposed a method to solve the problem of selecting the fixed timeout value. The method was, on the same trace, under a fixed flow specification, using different timeout between 2-248s to profile flow, the differences between the flow set can entirely be determined by the timeout. Through experiments, Claffy[1][2] pointed out that for the host pair flows of the backbone network, at the timeout value of 64s, it seems reaching a optimal outcome because it performs well
3 in each indicators. Iannaccone s work[8] also shows that the timeout value in range of 6-12s will provide a reasonable estimation of flow numbers. Claffy s experiments result are widely recognized and referenced by a large number of subsequent papers. However, the network environment and the network bandwidth have undergone great changes since then. As we said earlier, the traffic of UDP has increased greatly. Therefore, is Claffy s result still fit for today s circumstances? In the next section, we try to answer this question. In order to better evaluate the flow set profiled by fixed timeout, we establish some evaluation criteria based on the considerations of various aspects. Through the comprehensive considerations of its performances on each evaluation criteria, we select the optimal timeout value. The evaluation criteria and their corresponding experiment results are as follows: C. Active avg and New avg We present two indicators Active avg, New avg. Active avg presents the average number of active flows staying in the measurement system per second. While New avg presents the average number of new flows staying in the measurement system per second. The measurement system are dynamic termination and recreation of UDP flows. Therefore, if the New avg is larger, it means that the measurement system must establish and destruct flows more frequently, which will consume a lot of computing resources and lead to the thrashing. While the Active avg is larger, it means that it needs much memory resources to maintain the flows information and bring the time used to find flow record increase. Therefore, for the application based on flows, its ideal state is that the Active avg and New avg are both small. If it is not possible to achieve, we should choose the timeout which makes the Active avg and New avg achieving a equilibrium state. Fig.2(a) reveals the relationship that the average(new avg ) and the 95th percentile number of new flows versus the timeout value per second. Fig.2(b) shows the relationship that the max and average(active avg ) number of active flows versus the timeout value per second. The New avg is a decreasing function of timeout value, while the Active avg is an increasing function of timeout value. Therefore, we can only choose a timeout value which makes the Active avg and New avg achieve the equilibrium state. Suppose the cost for a router to handle a new flow and a active flow are N and A respectively. In per second, the New avg and Active avg for a router to deal with are n and a respectively. Therefore, we get the total consumption: cost = N n + A a. (1) Define F = N/A. Fig.3 shows the relationship between the cost and the timeout value under several different F value. As Fig.3 shows, when timeout value is smaller than 64s, its total cost is a decreasing function of the timeout value. Conversely, when timeout value is larger than 64s, it turns to a increasing function of the timeout value. Therefore, its total cost get its minimum when the timeout value equal 64s. new flows active flows 1 5 (a)median and 95th percentile of new flows per second % new flows median new flows (b)median and Maximum of active flows per second max active flows median active flows tiemout(sec) Fig. 2: As a function of timeout value(a)average and 95th percentile of new flows per second(b)average and maximum of active flows per second Total cost versus the timeout value F = 2 F = 3 F = 4 flow Fig. 3: Total cost versus timeout value for various values of the ratio of flow setup cost to maintenance cost(f) D. Recreated avg We present this indication Recreated avg based on the consideration of the computing consumption. It presents the average number of recreated for one flow. Many studies based on flow information such as load-sensitive routing require larger proportion of the large flows (the packets in flow should be greater than 1 packets). Low Recreated avg is desirable to ensure no truncation in the long original flows. This indicator represent the burden of the computing consumption. Fig.4 shows the experiment results versus the timeout value. The Recreated avg is a decreasing function of timeout value. At the timeout value of two, each unique flow is set up and tore down almost three times on average. The smaller the timeout value, the higher the Recreated avg. This phenomenon is similar with our expectation that flows are more likely to be cut into multiple short flows when the timeout value is small.
4 ratio(recreated/unique) The average number of recreated versus the timeout value TABLE II: The classification of the UDP flows Category Representative Protocol SERVICE {dns,ntp,messengerservice} IM {qq,msn} DOWNLOAD {bittorrent,edonkey,xunlei,guntella,kazaa} STREAMING MEDIA {pplive,ppstream,sopcast,qqlive} OTHER {unknown}.5 Fig. 4: The average number of recreated versus the timeout value fhold factor The Fhold factor veruse the timeout value 1 Fig. 5: The F hold factor versus the timeout value E. F hold factor We introduced a F hold indicator presented by Ryu[9] based on the consideration of the memory consumption. Define F hold = D hold /D act, D hold represents the sum of the flow duration and the flow timeout, D act represents the flow duration. The key notion behind this indicator is that for each flow, it can not immediately end after processing the last packet, and it must wait for a specified timeout. Only after that, the flow was determined to the end and removed from memory. The smaller ratio between the time wasted in memory(the flow timeout) and the useful time (the flow duration) reveals that the measurement system is more efficient. And this is exactly what we look forward to. For router, F hold represents the burden of memory resource. For the flow set formed by N flows. The average F hold [9] is calculated as: F hold =( 1 N 1 N n= Fhold (n)) 1 (2) We use the inverse of F hold (n) and then take another inverse of the final result to take care of single-packet flows for which F hold (n) becomes infinite. In common sense, Fhold > 1., its ideal state is F hold =1. Fig.5 shows the F hold factor value versus the timeout value. As Fig.5 shows, at the timeout value of 16s, the F hold factor gets its minimum. The F hold factor for timeout 64s is 16.96, 5% higher than the minimum F hold factor, and ranking sixth. F. implication Through our comprehensive considerations, for UDP flows, we finally present its most appropriate profiling methodology in which the timeout value was set as 64s. The reason for selecting 64s as its timeout value is that its total cost spending on the maintenance,termination and creation of flow record is minimum, and its corresponding value of Recreated avg and the F hold factor are both minor. IV. PROFILING METHODOLOGY FROM THE VIEW OF THE APPLICATION LAYER A. Classification of the UDP Compared with TCP, the composition of UDP is more complicated, it contains many different data elements. In UDP, there not only exists some streaming media protocols such as ppstream[1], pplive which seem to be appropriate to profile flows, but also exists protocols such as dns which only involves question-answer and seems not to be suitable to profile flows. Due to this great differences among the applications, it is difficult to deal with it as a whole. Therefore, we divided the whole UDP flows into five categories according to its different characteristics. Table II shows the basic information of the classification. The whole UDP flows have been divided into five categories named {SERVICE, IM, DOWNLOAD, STREAMING ME- DIA, OTHER}. For common UDP flows(especially for some peer-to-peer applications), the traditional traffic identification method based on well known ports will lead to inaccurate judgement. Fortunately, some open source software such as L7-filter[12], OpenDPI provides features information of some popular application protocols. We draw this information to analyze the traffic of these most important applications in UDP. B. Profiling methodology for different applications 1) Active avg and New avg for different applications: As Table II shows, we divide UDP protocols into five categories. Among the five categories, we select xunlei[11], qq, dns, ppstream these four protocols as the representation protocols of their corresponding categories. We conducted experiments on these representation protocols respectively to find out their most suitable profiling methodologies and examine the difference between them. Fig.6 shows their optimal profiling methodologies from the view of the Active avg and New avg. It evidently shows that differences indeed exist among the different applications. For xunlei flows and ppstream flows, their suitable timeout value are almost the same as the timeout value drawn from the view
5 the average number of recreated versue tiemout value dns flows qq flows ppstream flows xunlei flows 1 2 the F(hold) factor versue the tiemout value dns flows ppstream flows qq flows xunlei flows ratio(recreated/unique) 1 F(hold) factor Fig. 7: The average number of recreated versus the timeout value for different applications 1 Fig. 8: The F hold factor versus the timeout value for different applications of the network layer, which is also set as 64s. But for qq flows and dns flows, their situations are completely different, and their suitable timeout vary widely. For dns flows, its most suitable timeout value is smaller than the timeout value drawn from the view of the network layer. As Fig.6(a) shows, its total cost stabilized when timeout between 2s and 32s. Once the timeout value is larger than 32s, its total cost increases greatly. Therefore, for dns flows, the timeout value between 2s-32s is a more reasonable result. For qq flows, its most suitable timeout value is larger than the timeout value drawn from the view of the network. As Fig.6(b) shows, when timeout value is smaller than 128s, its total cost decrease greatly with the increase of the timeout value. However, its total cost increases slightly when the timeout value is larger than 128s. Therefore, we get the conclusion that its total cost reaches its minimum when the timeout value between 128s-256s. 2) Recreated avg for different applications: Fig.7 shows the results of the Recreated avg over different applications, which is drawn in a log scale. Fig.7 reveals that for different applications, their Recreated avg is also a decreasing function of the timeout value. For dns flows, compared with other applications, its corresponding Recreated avg is always minimum. In most cases, its Recreated avg does not exceed.5, and its maximum of Recreated avg does not exceed.65. For ppstream flows and xunlei flows, their Recreated avg decrease rapidly when the timeout value is smaller than 64s. Their Recreated avg firstly fall below 1 at the timeout value of 64s. But for qq flows, its corresponding timeout value is 256s. At that timeout value, its Recreated avg firstly fall below 1. 3) Fhold factor for different applications: Fig.8 shows the results of F hold factor over different applications, which is also drawn in a log scale. For dns flows, its F hold factor is always greater than other application whatever the timeout is. In most cases, its F hold factor is around 55, and sometimes it even exceeds 8. For ppstream flows, its corresponding F hold factor is always minimum. In most case, its F hold does not exceed 3, and its maximum does not exceed 4. While for the qq flows and xunlei flows, their F hold factor value lies between the dns flows and the ppstream flows whatever the timeout value is. For ppstream, qq, xunlei flows, their F hold factor get theirs minimum at the timeout value of 64s, 128s, 32s separately. But for dns flows, the situation is completely different. When the timeout value is less than 64s, its F hold factor get its minimum at the timeout value of 8s. But to our surprise, the F hold factor is a decreasing function of timeout value when the timeout is larger than 64s. At the timeout value of 248s, its F hold reaches its minimum. We think this may determined by the nature characteristic of the dns protocol. C. implication From above experiment results, we get the following conclusions: The first, for dns flows, in most cases, it only involves one request packet and one response packet in one request and seems to be independent between many requests. Due to this characteristic, the majority of dns flows are short flows. Generally speaking, the phenomenon of thrashing caused by excessively frequent termination and creation of flows is evident for large flows and not obvious for short flows. This is the reason why the Recreated avg is always minimum and the F hold factor is always maximum. Therefore, its corresponding timeout value should be smaller. We get its optimal profiling methodology in which its timeout value is set as 8s. The second, for qq flows, due to its larger packets interarrival caused by intermittent chat, its corresponding timeout value should be larger. The unified profiling methodology is not appropriate for qq flows. We present its optimal profiling methodology in which its timeout is set as 256s. The third, for other applications, the profiling methodology of setting timeout value at 64s is appropriate. It can accurately measure the flows characteristics and not bring excessive overload to the measurement system. From above analysis, we get the conclusion that there indeed exists significant differences between the profiling methodology of different applications. Therefore, we can not use a unified profiling methodology to process UDP flows.
6 (a)dns protocol F = 2 F = 3 F = (b)qq protocol F = 2 F = 3 F = (c) xunlei protocol F = 2 F = 3 F = (d) ppstream protocol F = 2 F = 3 F = Fig. 6: Total cost versus timeout value for various values of the ratio of flow setup cost to maintenance cost(f) for different applications (a)dns protocol(b)qq protocol (c)xunlei protocol (d)ppstream protocol V. CONCLUSION In this paper, we mainly discussed the profiling methodologies of UDP flows. First, we give the definition of UDP flows on the basis of Claffy s parameter flow model. Among the many parameters, we mainly discuss the selection of the timeout value. From the view of the network layer, through the comprehensive considerations of related evaluation criteria such as Active avg, New avg, Recreated avg and F hold, we find out the most appropriate profiling methodology in which the timeout value was set as 64s. Secondly, when taking the complexity of UDP into account, due to the great differences between the different applications, we validate that using a unified profiling methodology is not enough for accurately measuring the different applications such as dns, qq. Therefore, we get the conclusion that we can not use a unified profiling methodology to process UDP flows. In contrast, we must establish appropriate profiling methodology based on the characteristics of applications. ACKNOWLEDGMENT Our work is supported in part by the National Basic Research Program 973 of China(Grant No.27CB3111) and the National Science Foundation of China(Grant No ). REFERENCES [1] K.C. Claffy, Internet traffic characterization. [Ph.D. Thesis],San Diego: University of California, [2] K.C. Claffy, H.W. Braun, and G.C. Polyzos, A Parameterizable Methodology for Internet Traffic Flow Profiling[J]. IEEE Journal on Selected Area in Communications, 1995,13(8): [3] K. Sripanidkulchai, B. Maggs, and H. Zhang, Analysis of Live Streaming Workloads on the Internet. In Proc. of IMC 4, October, 24, pp [4] CAIDA. [5] D.D. Clark, The design philosphy of the Darpa Internet protocols. In Proc. of ACM SICCOMM 88, Aug. 1988, pp [6] R. Jain and S.A. Routhier, Packet Trains-Measurements and a New Model for Computer Network Traffic. IEEE Journal on Selected Area in Communications, Vol. SAC-4, No. 6, Sep, 1986, pp [7] N. Hohn and D. Veitch, Inverting sampled traffic. In Proc. of the 3rd ACM SIGCOMM Conf. on Internet Measurement [8] G. Iannaccone, C. Diot, and I. Graham, Monitoring very high speed links. In Proc. of the First ACM SIGCOMM Workshop on Internet Measurement Workshop 21, San Francisco, California, USA, November 21, pp [9] B. Ryu, D. Cheney, and H.W. Braun, Internet flow characterization: adaptive timeout strategy and statistical modeling. In: Workshop on Passive and Active Measurement (PAM), 21. [1] ppstream. [11] xunlei. [12] l7-filter. [13] TRFC. [14] M. Rey, Transmission control protocol. RFC793,1981. [15] J. Mahdavi, and S. Floyd, TCP-Friendly Unicast Rate-Based Flow Control. Note sent to end2end-interest mailing list, Jan [16] qq.
An Analysis of UDP Traffic Classification
An Analysis of UDP Traffic Classification 123 Jing Cai 13 Zhibin Zhang 13 Xinbo Song 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China 2 Graduate University of Chinese Academy
More informationAssessing the Nature of Internet traffic: Methods and Pitfalls
Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing Jiaotong University, China Maurizio Dusi Università
More informationA Method and System for Thunder Traffic Online Identification
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information
More informationSecurity Enhancement by Detecting Network Address Translation Based on Instant Messaging
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Jun Bi, Miao Zhang, and Lei Zhao Network Research Center Tsinghua University Beijing, P.R.China, 100084 junbi@tsinghua.edu.cn
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationImpact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes
Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy
More informationSome Observations of Internet Stream Lifetimes
Some Observations of Internet Stream Lifetimes Nevil Brownlee CAIDA, UC San Diego, and The University of Auckland, New Zealand nevil@auckland.ac.nz Abstract. We present measurements of stream lifetimes
More informationVisualization of Internet Traffic Features
Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,
More informationPerformance Evaluation of Controlling High Bandwidth Flows by RED-PD
Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Osama Ahmed Bashir Md Asri Ngadi Universiti Teknology Malaysia (UTM) Yahia Abdalla Mohamed Mohamed Awad ABSTRACT This paper proposed
More informationCOMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319
COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationMEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST
International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST
More informationAnnouncements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me
More informationTOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE
TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China
More informationSequence Number. Acknowledgment Number. Data
CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make
More informationPromoting the Use of End-to-End Congestion Control in the Internet
Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE/ACM Transactions on Networking May 1999 ACN: TCP Friendly 1 Outline The problem of Unresponsive Flows
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationBittorrent traffic classification
Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-
More informationCOMPUTER NETWORKS PERFORMANCE. Gaia Maselli
COMPUTER NETWORKS PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents of the
More informationAdaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems
Adaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems Rosa Vilardi, Luigi Alfredo Grieco, Gennaro Boggia DEE - Politecnico di Bari - Italy Email: {r.vilardi, a.grieco, g.boggia}@poliba.it
More informationNetwork Delay Model for Overlay Network Application
, 2009, 5, 400-406 doi:10.4236/ijcns.2009.25045 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Network Delay Model for Overlay Network Application Tian JIN, Haiyan JIN School of Electronics
More informationCCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer
CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the
More informationModelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:
More informationNetwork Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM
Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers
More informationCSC 4900 Computer Networks: End-to-End Design
CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking
More informationCN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.
More informationNET0183 Networks and Communications
Lectures 7 and 8 Measured performance of an Ethernet Ethernet is a CSMA/CD network. Carrier Sense Multiple Access with Collision Detection 1 Historical Case Study http://portal.acm.org/beta/citation.cfm?id=359044
More informationReliable Multicast in Mobile Networks
Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:
More informationSELECTION OF METRICS (CONT) Gaia Maselli
SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual
More informationA Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationChapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO)
A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) CHAPTER - 5 A BANDWIDTH-SENSITIVE ROUTING FOR NETWORK MOBILITY He profits most who serves best. -Arthur F. Sheldon 5.1 Background It is very
More informationRECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,
More informationKey words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationClick Here for Type Bulletin
Click Here for Type Bulletin No: H-080102 Category: VersaMax To: 1/5, 2, 3, 4 Summary VersaMax CPUE05 Ethernet Loading Considerations Guidelines on how to determine if you are overloading the CPUE05's
More informationYunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction
More informationRD-TCP: Reorder Detecting TCP
RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies
More informationANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS
ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,
More informationConfiguring Application Visibility and Control for Cisco Flexible Netflow
Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationGame Traffic Analysis: An MMORPG Perspective
Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationETSF05/ETSF10 Internet Protocols Transport Layer Protocols
ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser
More informationA Large Scale Simulation Study: Impact of Unresponsive Malicious Flows
A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationR (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.
R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:
More informationAnnouncements Computer Networking. What was hard. Midterm. Lecture 16 Transport Protocols. Avg: 62 Med: 67 STD: 13.
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on (ckpt 1 & ckpt2) + midterm + HW1 + HW2 NOTE: GRADES DO NOT REFLECT LATE PENALTIES! 25.4% of class If
More informationThe trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap
Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It
More informationBitTorrent Traffic Classification
BitTorrent Traffic Classification Atwin O. Calchand, Van T. Dinh, Philip Branch, Jason But Centre for Advanced Internet Architectures, Technical Report 090227A Swinburne University of Technology Melbourne,
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationA Hybrid Approach for Accurate Application Traffic Identification
A Hybrid Approach for Accurate Application Traffic Identification Thesis Defence December 21, 2005 Young J. Won yjwon@postech.ac.kr Distributed Processing & Network Management Lab. Dept. of Computer Science
More informationTraffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010
Traffic in Network 1.0.0.0/8 Geoff Huston George Michaelson APNIC R&D April 2010 Background The address plan for IPv4 has a reservation for Private Use address space. This reservation, comprising of 3
More informationMaVIS: Media-aware Video Streaming Mechanism
MaVIS: Media-aware Video Streaming Mechanism Sunhun Lee and Kwangsue Chung School of Electronics Engineering, Kwangwoon University, Korea sunlee@adamskwackr and kchung@kwackr Abstract Existing streaming
More informationPeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs
PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary
More informationUnicasts, Multicasts and Broadcasts
Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationLab Exercise UDP & TCP
Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
More informationImproved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,
More informationWorldwide Detection of Denial of Service (DoS) Attacks
Worldwide Detection of Denial of Service (DoS) Attacks David Moore, Geoff Voelker and Stefan Savage August 15, 2001 dmoore @ caida.org www.caida.org Outline The Backscatter Analysis Technique Observations
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationInternet Protocol version 6
Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The
More informationVoIP transmission mechanism based on TCP
December 2016, 23(6): 90 96 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.bupt.edu.cn VoIP transmission mechanism based on
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationRED behavior with different packet sizes
RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,
More informationDesign and Implementation of Advanced Internet Management System
Design and Implementation of Advanced Internet Management System Chia-Sheng Tsai 1*, and Cheng-Wei Lin Abstract With the rapidly growing on Internet and variety applications through Internet, user reliabilities
More informationCPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary
CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)
More informationDESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES
DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall
More informationCMSC 322 Computer Networks Applications and End-To- End
CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework
More informationMicro-Communication Element System
Micro-Communication Element System Peng Zheng, Zeng Jiazhi, Zhang Ming, and Zhao Jidong School of Computer Science and Engineering, UESTC, Chengdu, 610054, China peppeng@hotamil.com, jzzeng@uestc.edu.cn,
More informationA Minimum Cost Handover Algorithm for Mobile Satellite Networks
Chinese Journal of Aeronautics 21(2008) 269-274 Chinese Journal of Aeronautics www.elsevier.com/locate/cja A Minimum Cost Handover Algorithm for Mobile Satellite Networks Zhang Tao*, Zhang Jun School of
More informationAvailable Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing
Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationStatistical based Approach for Packet Classification
Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,
More informationA Study of Cache-Based IP Flow Switching
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationAssignment 7: TCP and Congestion Control Due the week of October 29/30, 2015
Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for
More informationCS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko
More informationApplication Presence Fingerprinting for NAT-Aware Router
Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware
More informationCharacterizing Smartphone Usage Patterns from Millions of Android Users
Characterizing Smartphone Usage Patterns from Millions of Android Users Huoran Li, Xuan Lu, Xuanzhe Liu Peking University Tao Xie UIUC Kaigui Bian Peking University Felix Xiaozhu Lin Purdue University
More informationOn the Relationship of Server Disk Workloads and Client File Requests
On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationResearch Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network
Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March
More informationBLINC: Multilevel Traffic Classification in the Dark
BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPower of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan
Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?
More informationAccWeb Improving Web Performance via Prefetching
AccWeb Improving Web Performance via Prefetching Qizhe Cai Wei Hu Yueyang Qiu {qizhec,huwei,yqiu}@cs.princeton.edu Abstract We present AccWeb (Accelerated Web), a web service that improves user experience
More informationShim6: Reference Implementation and Optimization
Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationLixia Zhang M. I. T. Laboratory for Computer Science December 1985
Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationTransport Protocols. Raj Jain. Washington University in St. Louis
Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features
More information