Rethinking The Building Block: A Profiling Methodology for UDP Flows

Size: px
Start display at page:

Download "Rethinking The Building Block: A Profiling Methodology for UDP Flows"

Transcription

1 Rethinking The Building Block: A Profiling Methodology for UDP Flows 123 Jing Cai 13 Zhibin Zhang 13 Peng Zhang 13 Xinbo Song 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China 2 Graduate University of Chinese Academy of Sciences, Beijing, China 3 National Engineering Laboratory for Information Security, Beijing, China caijing@software.ict.ac.cn Abstract With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on realtime considerations, these new applications mostly use UDP as transport layer protocol, which directly increase UDP traffic. However, traditional studies believe that TCP dominates the Internet traffic and previous traffic measurements were generally based on it while UDP was ignored. In view of this, we mainly discuss the profiling methodology of UDP flows in this paper. First, from the view of the network layer, we present a profiling methodology on the basis of the Claffy s parameter flow model. Next, due to the significant differences among the different applications, we found that using a unified methodology and ignoring the information of application layer is not appropriate for UDP flows. At last, we get the conclusion that for different applications, such as dns, qq[16], we must use corresponding profiling methodology based on their specific characteristics. I. INTRODUCTION The main purpose of the network traffic measurement is to enhance people s awareness about traffic characteristics. The traffic measurement that works based on the network layer started from the 198s. Earlier studies took the packet as the Building Block. But due to its small granularity, it could not meet the needs in many ways. According to the locality of network traffic in time and space, Claffy et al.[1][2] firstly proposed a parameters flow model. Since then, the traffic measurement based on flow had gradually become a hot issue in the field of network measurement. However, in the past, during the process of network traffic measurement, people generally believed that TCP traffic occupied the main body of the network traffic, and UDP traffic is negligible, and therefore ignored the measurements of the UDP flow. However, the situation has undergone tremendous changes at present. With the increase of network bandwidth, the traditional networking services based on images and text could no longer satisfy people s needs. More and more audio, video, and online games, have gradually become the main body of the network traffic. These applications mostly use UDP as their transport layer protocol[3], which directly results in the increase of UDP traffic. The organization of CAIDA[4] analyzed the trace collected in the period on several backbone links located in the US and Sweden, found the ratio between the UDP and TCP in packets, bytes, and flows have increased greatly. In China, as shown in Fig.1, after statistical analysis on the 24-hour data we collected from a backbone router, we found that the proportion of the UDP packets is around 4%. It could sometimes reach 8% at most. From the view of the proportion of UDP bytes, we also found that the proportion of the UDP bytes fluctuated greatly, but generally exceeded 4%, and sometimes was even above 8%. Since the increase of UDP traffic, more and more people have started to pay attention to the traffic of UDP. However, compared with the TCP, we found there at least exist two big differences. Firstly, TCP is a connection-oriented protocol, it has controlling flags such as FIN and RST to explicitly identify the end of flow. But for UDP, it is a connectionless protocol. In essence, there is no concept of flow in udp. At present, people commonly refer to UDP flows as a series of packets which are required to complete a data transfer from the view of the application layer. Therefore, Claffy s flow model is still applicable for UDP. But in this case, the parameters setting is not the same as before. The second, compared with TCP, the composition of UDP is more complicated. In the past, in measurement of TCP flows and from the view of the network layer, people do not care about the specific application services, so the parameters of flow model are generally identical. However in UDP, the characteristics of different applications often demonstrate significant differences. Using uniformed parameters to profile flow without considering the assumption on application layer is feasible for TCP flows, but will bring many uncertainties to the connectionless UDP flows. Due to these two great differences, earlier network measurement based on flows mostly focus the TCP flows, while UDP flows was ignored. The study on the UDP flows is nearly in the blank stage. In view of these, we mainly discuss the profiling methodology of UDP flow in this paper. To the best of our knowledge, we are the first to do so. There are two main contributions in our paper. Through our comprehensive considerations on each evaluation criteria, we built the appropriate profiling methodology on the basis of Claffy s parameter flow model from the view of the network layer. Taking the complexity of UDP into account, due to the significant differences between the application protocols, we want to know whether it is enough to use a unified

2 the ratio between the udp and ip The proportion of the udp s packets and bytes UDP pkt / IP pkt UDP byte / IP byte TABLE I: The basic information of the trace Id Begin time End time Bytes Packets I ,14: ,:3 275G 285(million) However, earlier studies believe that TCP dominates the Internet traffic, thus their study generally based on TCP flows while UDP flows was ignored. Therefore, we will present our profiling methodology of UDP flows on the basis of Claffy s parameter flow model in this paper..1 :5:57 4:25:57 11:15:57 14:35:58 18:5:58 21:35:58 time Fig. 1: The proportion of the UDP s packets and bytes profiling methodology to measure the characteristics of different applications. After our statistics and analysis, we found there indeed exist significant differences between the profiling methodologies of different applications. We were unable to use a unified methodology to process UDP flow as a whole. In contrast, we must use corresponding profiling methodology based on the characteristics of applications. The remainder of this paper is organized as follows: Section 2 presents some related work on the profiling methodologies of flows. In section 3, we discuss the profiling methodology from the view of the network layer. In section 4, from the view of the application layer, considering the great differences between the different applications, we want to know whether exists a unified profiling methodology to process UDP flows. At last, we conclude this paper and give some suggestions in Section 5. II. RELATED WORKS The studies of earlier traffic measurement took the packets as the Building Block. But as D.Clark[5]pointed out that, the traffic measurements based on packets can not reflect the relation between the packets and the higher-level information. Thus, it can not meet the need for understanding network traffic in many ways. Jain[6] proposed a model named Packet Train. In this model, a series of packets which have the same source and destination address will be identified as a packet train. If the interval between two packets exceeds a specified fixed timeout value, then these packets are said to belong to separate train. Claffy et al.[1][2] first propose a parameters flow model, in which flow was taken as a series of packets that was consistent with a specific flow specification and timeout constraint. By analyzing the common characteristics of the packets which belong to the specific flow, we can better understand and analyze network behavior from a higher layer, and also provide enough information support for network application designing. From then on, the network measurement based on flow had became more and more popular. III. PROFILING METHODOLOGY FROM THE VIEW OF THE NETWORK LAYER A. Date set We collected the data trace from a backbone router in China. The basic information of this trace is in Table I. The reason for not using the data set of CAIDA is that its payload information has been encrypted. And in this paper, we must use the payload information to classify the different applications. B. profiling methodology During the measurement based on flows, how to decide the boundary of flow is critical. There exist two main approaches. The first, controlling flags(etc., FIN and RST) are used to terminate the flow[7]. The second is the timeout strategy. If a flow become inactive beyond a given timeout, it is deemed to be ended and should be removed from memory. The timeoutbased method does not rely on the explicit protocol labels in packet header, thus it can deal with the TCP flows and UDP flows. In this case, although UDP is a connectionless protocol, Claffy s parameter flow model is still applicable. What we need to do is to find out the most appropriate parameters. We formally define UDP flows as a series of continuous arriving UDP packets which have the same five-tuple(source address, destination address, source port, destination port, transport protocol), and their packets inter-arrival do not exceed a specified fixed timeout. In this paper, we assume our scenario is located in a backbone router. Among the above six parameters, the selection of timeout is most difficult and important. The timeout determines the boundary of the flow, so it directly impact on the accuracy of flow measurement. If a smaller timeout value is selected, it can cause more long flows to be segmented into multiple short flows. If a larger timeout is selected, it may result in more unnecessary measurement overhead. For TCP, because it has controlling flags which can make up the impact of setting a inappropriate timeout. But for UDP, the selection of the timeout is critical. Claffy[1][2] proposed a method to solve the problem of selecting the fixed timeout value. The method was, on the same trace, under a fixed flow specification, using different timeout between 2-248s to profile flow, the differences between the flow set can entirely be determined by the timeout. Through experiments, Claffy[1][2] pointed out that for the host pair flows of the backbone network, at the timeout value of 64s, it seems reaching a optimal outcome because it performs well

3 in each indicators. Iannaccone s work[8] also shows that the timeout value in range of 6-12s will provide a reasonable estimation of flow numbers. Claffy s experiments result are widely recognized and referenced by a large number of subsequent papers. However, the network environment and the network bandwidth have undergone great changes since then. As we said earlier, the traffic of UDP has increased greatly. Therefore, is Claffy s result still fit for today s circumstances? In the next section, we try to answer this question. In order to better evaluate the flow set profiled by fixed timeout, we establish some evaluation criteria based on the considerations of various aspects. Through the comprehensive considerations of its performances on each evaluation criteria, we select the optimal timeout value. The evaluation criteria and their corresponding experiment results are as follows: C. Active avg and New avg We present two indicators Active avg, New avg. Active avg presents the average number of active flows staying in the measurement system per second. While New avg presents the average number of new flows staying in the measurement system per second. The measurement system are dynamic termination and recreation of UDP flows. Therefore, if the New avg is larger, it means that the measurement system must establish and destruct flows more frequently, which will consume a lot of computing resources and lead to the thrashing. While the Active avg is larger, it means that it needs much memory resources to maintain the flows information and bring the time used to find flow record increase. Therefore, for the application based on flows, its ideal state is that the Active avg and New avg are both small. If it is not possible to achieve, we should choose the timeout which makes the Active avg and New avg achieving a equilibrium state. Fig.2(a) reveals the relationship that the average(new avg ) and the 95th percentile number of new flows versus the timeout value per second. Fig.2(b) shows the relationship that the max and average(active avg ) number of active flows versus the timeout value per second. The New avg is a decreasing function of timeout value, while the Active avg is an increasing function of timeout value. Therefore, we can only choose a timeout value which makes the Active avg and New avg achieve the equilibrium state. Suppose the cost for a router to handle a new flow and a active flow are N and A respectively. In per second, the New avg and Active avg for a router to deal with are n and a respectively. Therefore, we get the total consumption: cost = N n + A a. (1) Define F = N/A. Fig.3 shows the relationship between the cost and the timeout value under several different F value. As Fig.3 shows, when timeout value is smaller than 64s, its total cost is a decreasing function of the timeout value. Conversely, when timeout value is larger than 64s, it turns to a increasing function of the timeout value. Therefore, its total cost get its minimum when the timeout value equal 64s. new flows active flows 1 5 (a)median and 95th percentile of new flows per second % new flows median new flows (b)median and Maximum of active flows per second max active flows median active flows tiemout(sec) Fig. 2: As a function of timeout value(a)average and 95th percentile of new flows per second(b)average and maximum of active flows per second Total cost versus the timeout value F = 2 F = 3 F = 4 flow Fig. 3: Total cost versus timeout value for various values of the ratio of flow setup cost to maintenance cost(f) D. Recreated avg We present this indication Recreated avg based on the consideration of the computing consumption. It presents the average number of recreated for one flow. Many studies based on flow information such as load-sensitive routing require larger proportion of the large flows (the packets in flow should be greater than 1 packets). Low Recreated avg is desirable to ensure no truncation in the long original flows. This indicator represent the burden of the computing consumption. Fig.4 shows the experiment results versus the timeout value. The Recreated avg is a decreasing function of timeout value. At the timeout value of two, each unique flow is set up and tore down almost three times on average. The smaller the timeout value, the higher the Recreated avg. This phenomenon is similar with our expectation that flows are more likely to be cut into multiple short flows when the timeout value is small.

4 ratio(recreated/unique) The average number of recreated versus the timeout value TABLE II: The classification of the UDP flows Category Representative Protocol SERVICE {dns,ntp,messengerservice} IM {qq,msn} DOWNLOAD {bittorrent,edonkey,xunlei,guntella,kazaa} STREAMING MEDIA {pplive,ppstream,sopcast,qqlive} OTHER {unknown}.5 Fig. 4: The average number of recreated versus the timeout value fhold factor The Fhold factor veruse the timeout value 1 Fig. 5: The F hold factor versus the timeout value E. F hold factor We introduced a F hold indicator presented by Ryu[9] based on the consideration of the memory consumption. Define F hold = D hold /D act, D hold represents the sum of the flow duration and the flow timeout, D act represents the flow duration. The key notion behind this indicator is that for each flow, it can not immediately end after processing the last packet, and it must wait for a specified timeout. Only after that, the flow was determined to the end and removed from memory. The smaller ratio between the time wasted in memory(the flow timeout) and the useful time (the flow duration) reveals that the measurement system is more efficient. And this is exactly what we look forward to. For router, F hold represents the burden of memory resource. For the flow set formed by N flows. The average F hold [9] is calculated as: F hold =( 1 N 1 N n= Fhold (n)) 1 (2) We use the inverse of F hold (n) and then take another inverse of the final result to take care of single-packet flows for which F hold (n) becomes infinite. In common sense, Fhold > 1., its ideal state is F hold =1. Fig.5 shows the F hold factor value versus the timeout value. As Fig.5 shows, at the timeout value of 16s, the F hold factor gets its minimum. The F hold factor for timeout 64s is 16.96, 5% higher than the minimum F hold factor, and ranking sixth. F. implication Through our comprehensive considerations, for UDP flows, we finally present its most appropriate profiling methodology in which the timeout value was set as 64s. The reason for selecting 64s as its timeout value is that its total cost spending on the maintenance,termination and creation of flow record is minimum, and its corresponding value of Recreated avg and the F hold factor are both minor. IV. PROFILING METHODOLOGY FROM THE VIEW OF THE APPLICATION LAYER A. Classification of the UDP Compared with TCP, the composition of UDP is more complicated, it contains many different data elements. In UDP, there not only exists some streaming media protocols such as ppstream[1], pplive which seem to be appropriate to profile flows, but also exists protocols such as dns which only involves question-answer and seems not to be suitable to profile flows. Due to this great differences among the applications, it is difficult to deal with it as a whole. Therefore, we divided the whole UDP flows into five categories according to its different characteristics. Table II shows the basic information of the classification. The whole UDP flows have been divided into five categories named {SERVICE, IM, DOWNLOAD, STREAMING ME- DIA, OTHER}. For common UDP flows(especially for some peer-to-peer applications), the traditional traffic identification method based on well known ports will lead to inaccurate judgement. Fortunately, some open source software such as L7-filter[12], OpenDPI provides features information of some popular application protocols. We draw this information to analyze the traffic of these most important applications in UDP. B. Profiling methodology for different applications 1) Active avg and New avg for different applications: As Table II shows, we divide UDP protocols into five categories. Among the five categories, we select xunlei[11], qq, dns, ppstream these four protocols as the representation protocols of their corresponding categories. We conducted experiments on these representation protocols respectively to find out their most suitable profiling methodologies and examine the difference between them. Fig.6 shows their optimal profiling methodologies from the view of the Active avg and New avg. It evidently shows that differences indeed exist among the different applications. For xunlei flows and ppstream flows, their suitable timeout value are almost the same as the timeout value drawn from the view

5 the average number of recreated versue tiemout value dns flows qq flows ppstream flows xunlei flows 1 2 the F(hold) factor versue the tiemout value dns flows ppstream flows qq flows xunlei flows ratio(recreated/unique) 1 F(hold) factor Fig. 7: The average number of recreated versus the timeout value for different applications 1 Fig. 8: The F hold factor versus the timeout value for different applications of the network layer, which is also set as 64s. But for qq flows and dns flows, their situations are completely different, and their suitable timeout vary widely. For dns flows, its most suitable timeout value is smaller than the timeout value drawn from the view of the network layer. As Fig.6(a) shows, its total cost stabilized when timeout between 2s and 32s. Once the timeout value is larger than 32s, its total cost increases greatly. Therefore, for dns flows, the timeout value between 2s-32s is a more reasonable result. For qq flows, its most suitable timeout value is larger than the timeout value drawn from the view of the network. As Fig.6(b) shows, when timeout value is smaller than 128s, its total cost decrease greatly with the increase of the timeout value. However, its total cost increases slightly when the timeout value is larger than 128s. Therefore, we get the conclusion that its total cost reaches its minimum when the timeout value between 128s-256s. 2) Recreated avg for different applications: Fig.7 shows the results of the Recreated avg over different applications, which is drawn in a log scale. Fig.7 reveals that for different applications, their Recreated avg is also a decreasing function of the timeout value. For dns flows, compared with other applications, its corresponding Recreated avg is always minimum. In most cases, its Recreated avg does not exceed.5, and its maximum of Recreated avg does not exceed.65. For ppstream flows and xunlei flows, their Recreated avg decrease rapidly when the timeout value is smaller than 64s. Their Recreated avg firstly fall below 1 at the timeout value of 64s. But for qq flows, its corresponding timeout value is 256s. At that timeout value, its Recreated avg firstly fall below 1. 3) Fhold factor for different applications: Fig.8 shows the results of F hold factor over different applications, which is also drawn in a log scale. For dns flows, its F hold factor is always greater than other application whatever the timeout is. In most cases, its F hold factor is around 55, and sometimes it even exceeds 8. For ppstream flows, its corresponding F hold factor is always minimum. In most case, its F hold does not exceed 3, and its maximum does not exceed 4. While for the qq flows and xunlei flows, their F hold factor value lies between the dns flows and the ppstream flows whatever the timeout value is. For ppstream, qq, xunlei flows, their F hold factor get theirs minimum at the timeout value of 64s, 128s, 32s separately. But for dns flows, the situation is completely different. When the timeout value is less than 64s, its F hold factor get its minimum at the timeout value of 8s. But to our surprise, the F hold factor is a decreasing function of timeout value when the timeout is larger than 64s. At the timeout value of 248s, its F hold reaches its minimum. We think this may determined by the nature characteristic of the dns protocol. C. implication From above experiment results, we get the following conclusions: The first, for dns flows, in most cases, it only involves one request packet and one response packet in one request and seems to be independent between many requests. Due to this characteristic, the majority of dns flows are short flows. Generally speaking, the phenomenon of thrashing caused by excessively frequent termination and creation of flows is evident for large flows and not obvious for short flows. This is the reason why the Recreated avg is always minimum and the F hold factor is always maximum. Therefore, its corresponding timeout value should be smaller. We get its optimal profiling methodology in which its timeout value is set as 8s. The second, for qq flows, due to its larger packets interarrival caused by intermittent chat, its corresponding timeout value should be larger. The unified profiling methodology is not appropriate for qq flows. We present its optimal profiling methodology in which its timeout is set as 256s. The third, for other applications, the profiling methodology of setting timeout value at 64s is appropriate. It can accurately measure the flows characteristics and not bring excessive overload to the measurement system. From above analysis, we get the conclusion that there indeed exists significant differences between the profiling methodology of different applications. Therefore, we can not use a unified profiling methodology to process UDP flows.

6 (a)dns protocol F = 2 F = 3 F = (b)qq protocol F = 2 F = 3 F = (c) xunlei protocol F = 2 F = 3 F = (d) ppstream protocol F = 2 F = 3 F = Fig. 6: Total cost versus timeout value for various values of the ratio of flow setup cost to maintenance cost(f) for different applications (a)dns protocol(b)qq protocol (c)xunlei protocol (d)ppstream protocol V. CONCLUSION In this paper, we mainly discussed the profiling methodologies of UDP flows. First, we give the definition of UDP flows on the basis of Claffy s parameter flow model. Among the many parameters, we mainly discuss the selection of the timeout value. From the view of the network layer, through the comprehensive considerations of related evaluation criteria such as Active avg, New avg, Recreated avg and F hold, we find out the most appropriate profiling methodology in which the timeout value was set as 64s. Secondly, when taking the complexity of UDP into account, due to the great differences between the different applications, we validate that using a unified profiling methodology is not enough for accurately measuring the different applications such as dns, qq. Therefore, we get the conclusion that we can not use a unified profiling methodology to process UDP flows. In contrast, we must establish appropriate profiling methodology based on the characteristics of applications. ACKNOWLEDGMENT Our work is supported in part by the National Basic Research Program 973 of China(Grant No.27CB3111) and the National Science Foundation of China(Grant No ). REFERENCES [1] K.C. Claffy, Internet traffic characterization. [Ph.D. Thesis],San Diego: University of California, [2] K.C. Claffy, H.W. Braun, and G.C. Polyzos, A Parameterizable Methodology for Internet Traffic Flow Profiling[J]. IEEE Journal on Selected Area in Communications, 1995,13(8): [3] K. Sripanidkulchai, B. Maggs, and H. Zhang, Analysis of Live Streaming Workloads on the Internet. In Proc. of IMC 4, October, 24, pp [4] CAIDA. [5] D.D. Clark, The design philosphy of the Darpa Internet protocols. In Proc. of ACM SICCOMM 88, Aug. 1988, pp [6] R. Jain and S.A. Routhier, Packet Trains-Measurements and a New Model for Computer Network Traffic. IEEE Journal on Selected Area in Communications, Vol. SAC-4, No. 6, Sep, 1986, pp [7] N. Hohn and D. Veitch, Inverting sampled traffic. In Proc. of the 3rd ACM SIGCOMM Conf. on Internet Measurement [8] G. Iannaccone, C. Diot, and I. Graham, Monitoring very high speed links. In Proc. of the First ACM SIGCOMM Workshop on Internet Measurement Workshop 21, San Francisco, California, USA, November 21, pp [9] B. Ryu, D. Cheney, and H.W. Braun, Internet flow characterization: adaptive timeout strategy and statistical modeling. In: Workshop on Passive and Active Measurement (PAM), 21. [1] ppstream. [11] xunlei. [12] l7-filter. [13] TRFC. [14] M. Rey, Transmission control protocol. RFC793,1981. [15] J. Mahdavi, and S. Floyd, TCP-Friendly Unicast Rate-Based Flow Control. Note sent to end2end-interest mailing list, Jan [16] qq.

An Analysis of UDP Traffic Classification

An Analysis of UDP Traffic Classification An Analysis of UDP Traffic Classification 123 Jing Cai 13 Zhibin Zhang 13 Xinbo Song 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China 2 Graduate University of Chinese Academy

More information

Assessing the Nature of Internet traffic: Methods and Pitfalls

Assessing the Nature of Internet traffic: Methods and Pitfalls Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing Jiaotong University, China Maurizio Dusi Università

More information

A Method and System for Thunder Traffic Online Identification

A Method and System for Thunder Traffic Online Identification 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information

More information

Security Enhancement by Detecting Network Address Translation Based on Instant Messaging

Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Jun Bi, Miao Zhang, and Lei Zhao Network Research Center Tsinghua University Beijing, P.R.China, 100084 junbi@tsinghua.edu.cn

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Some Observations of Internet Stream Lifetimes

Some Observations of Internet Stream Lifetimes Some Observations of Internet Stream Lifetimes Nevil Brownlee CAIDA, UC San Diego, and The University of Auckland, New Zealand nevil@auckland.ac.nz Abstract. We present measurements of stream lifetimes

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Osama Ahmed Bashir Md Asri Ngadi Universiti Teknology Malaysia (UTM) Yahia Abdalla Mohamed Mohamed Awad ABSTRACT This paper proposed

More information

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319 COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

More information

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me

More information

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Promoting the Use of End-to-End Congestion Control in the Internet

Promoting the Use of End-to-End Congestion Control in the Internet Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE/ACM Transactions on Networking May 1999 ACN: TCP Friendly 1 Outline The problem of Unresponsive Flows

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Bittorrent traffic classification

Bittorrent traffic classification Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-

More information

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli COMPUTER NETWORKS PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents of the

More information

Adaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems

Adaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems Adaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems Rosa Vilardi, Luigi Alfredo Grieco, Gennaro Boggia DEE - Politecnico di Bari - Italy Email: {r.vilardi, a.grieco, g.boggia}@poliba.it

More information

Network Delay Model for Overlay Network Application

Network Delay Model for Overlay Network Application , 2009, 5, 400-406 doi:10.4236/ijcns.2009.25045 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Network Delay Model for Overlay Network Application Tian JIN, Haiyan JIN School of Electronics

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

NET0183 Networks and Communications

NET0183 Networks and Communications Lectures 7 and 8 Measured performance of an Ethernet Ethernet is a CSMA/CD network. Carrier Sense Multiple Access with Collision Detection 1 Historical Case Study http://portal.acm.org/beta/citation.cfm?id=359044

More information

Reliable Multicast in Mobile Networks

Reliable Multicast in Mobile Networks Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Chapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO)

Chapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) CHAPTER - 5 A BANDWIDTH-SENSITIVE ROUTING FOR NETWORK MOBILITY He profits most who serves best. -Arthur F. Sheldon 5.1 Background It is very

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Click Here for Type Bulletin

Click Here for Type Bulletin Click Here for Type Bulletin No: H-080102 Category: VersaMax To: 1/5, 2, 3, 4 Summary VersaMax CPUE05 Ethernet Loading Considerations Guidelines on how to determine if you are overloading the CPUE05's

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Configuring Application Visibility and Control for Cisco Flexible Netflow

Configuring Application Visibility and Control for Cisco Flexible Netflow Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Game Traffic Analysis: An MMORPG Perspective

Game Traffic Analysis: An MMORPG Perspective Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Announcements Computer Networking. What was hard. Midterm. Lecture 16 Transport Protocols. Avg: 62 Med: 67 STD: 13.

Announcements Computer Networking. What was hard. Midterm. Lecture 16 Transport Protocols. Avg: 62 Med: 67 STD: 13. Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on (ckpt 1 & ckpt2) + midterm + HW1 + HW2 NOTE: GRADES DO NOT REFLECT LATE PENALTIES! 25.4% of class If

More information

The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap

The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It

More information

BitTorrent Traffic Classification

BitTorrent Traffic Classification BitTorrent Traffic Classification Atwin O. Calchand, Van T. Dinh, Philip Branch, Jason But Centre for Advanced Internet Architectures, Technical Report 090227A Swinburne University of Technology Melbourne,

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Computer Science 461 Midterm Exam March 14, :00-10:50am

Computer Science 461 Midterm Exam March 14, :00-10:50am NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor

More information

A Hybrid Approach for Accurate Application Traffic Identification

A Hybrid Approach for Accurate Application Traffic Identification A Hybrid Approach for Accurate Application Traffic Identification Thesis Defence December 21, 2005 Young J. Won yjwon@postech.ac.kr Distributed Processing & Network Management Lab. Dept. of Computer Science

More information

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010 Traffic in Network 1.0.0.0/8 Geoff Huston George Michaelson APNIC R&D April 2010 Background The address plan for IPv4 has a reservation for Private Use address space. This reservation, comprising of 3

More information

MaVIS: Media-aware Video Streaming Mechanism

MaVIS: Media-aware Video Streaming Mechanism MaVIS: Media-aware Video Streaming Mechanism Sunhun Lee and Kwangsue Chung School of Electronics Engineering, Kwangwoon University, Korea sunlee@adamskwackr and kchung@kwackr Abstract Existing streaming

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Lab Exercise UDP & TCP

Lab Exercise UDP & TCP Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Worldwide Detection of Denial of Service (DoS) Attacks

Worldwide Detection of Denial of Service (DoS) Attacks Worldwide Detection of Denial of Service (DoS) Attacks David Moore, Geoff Voelker and Stefan Savage August 15, 2001 dmoore @ caida.org www.caida.org Outline The Backscatter Analysis Technique Observations

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Internet Protocol version 6

Internet Protocol version 6 Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The

More information

VoIP transmission mechanism based on TCP

VoIP transmission mechanism based on TCP December 2016, 23(6): 90 96 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.bupt.edu.cn VoIP transmission mechanism based on

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Design and Implementation of Advanced Internet Management System

Design and Implementation of Advanced Internet Management System Design and Implementation of Advanced Internet Management System Chia-Sheng Tsai 1*, and Cheng-Wei Lin Abstract With the rapidly growing on Internet and variety applications through Internet, user reliabilities

More information

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)

More information

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

Micro-Communication Element System

Micro-Communication Element System Micro-Communication Element System Peng Zheng, Zeng Jiazhi, Zhang Ming, and Zhao Jidong School of Computer Science and Engineering, UESTC, Chengdu, 610054, China peppeng@hotamil.com, jzzeng@uestc.edu.cn,

More information

A Minimum Cost Handover Algorithm for Mobile Satellite Networks

A Minimum Cost Handover Algorithm for Mobile Satellite Networks Chinese Journal of Aeronautics 21(2008) 269-274 Chinese Journal of Aeronautics www.elsevier.com/locate/cja A Minimum Cost Handover Algorithm for Mobile Satellite Networks Zhang Tao*, Zhang Jun School of

More information

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

A Study of Cache-Based IP Flow Switching

A Study of Cache-Based IP Flow Switching University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

Application Presence Fingerprinting for NAT-Aware Router

Application Presence Fingerprinting for NAT-Aware Router Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware

More information

Characterizing Smartphone Usage Patterns from Millions of Android Users

Characterizing Smartphone Usage Patterns from Millions of Android Users Characterizing Smartphone Usage Patterns from Millions of Android Users Huoran Li, Xuan Lu, Xuanzhe Liu Peking University Tao Xie UIUC Kaigui Bian Peking University Felix Xiaozhu Lin Purdue University

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

BLINC: Multilevel Traffic Classification in the Dark

BLINC: Multilevel Traffic Classification in the Dark BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?

More information

AccWeb Improving Web Performance via Prefetching

AccWeb Improving Web Performance via Prefetching AccWeb Improving Web Performance via Prefetching Qizhe Cai Wei Hu Yueyang Qiu {qizhec,huwei,yqiu}@cs.princeton.edu Abstract We present AccWeb (Accelerated Web), a web service that improves user experience

More information

Shim6: Reference Implementation and Optimization

Shim6: Reference Implementation and Optimization Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Transport Protocols. Raj Jain. Washington University in St. Louis

Transport Protocols. Raj Jain. Washington University in St. Louis Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features

More information