Revealing Skype Traffic: When Randomness Plays with You

Size: px
Start display at page:

Download "Revealing Skype Traffic: When Randomness Plays with You"

Transcription

1 Revealing Skype Traffic: When Randomness Plays with You Dario Bonfiglio Marco Mellia Michela Meo Dario Rossi Paolo Tofanelli Our Goal Identify Skype traffic Motivations Operators need to know what is running in their network New business models, provisioning, TE, etc. Understand user behaviour Traffic characterization, security 2 1

2 Skype Overview State-of-the-Art No server No standard Skype offers voice, Encryption/Obfuscation No video, well-known chat and port data transfer services over No RFC Mechanisms IP Closed design, proprietary solutions P2P technology Proprietary protocols Encrypted communications Easy to use, difficult to reveal 3 Our Goal Identify Skype traffic Voice stream first: both E2E and SkypeOut/In streams Possible video/chat/file transfers/signaling Constraints Passive observation of traffic Protocol ignorance 4 2

3 Three Classifiers Payload Based Classifier Limited Traffic Flow Naïve Bayes Traditio a Classifier Chi Square Classifier EXCITING 5 Three Classifiers Payload Based Classifier Traffic Flow Naïve Bayes Classifier Chi Square Classifier A N D 6 3

4 Skype Source Model (What we understand about it) Skype as VoIP Application Skype selects the voice codec from a list Low bit rate: kbps Regular Inter-Packet-Gap (30 ms frames) Redundancy may be added to mitigate packet loss Framing may be modified from the original codec one Multiplexes different source into the same message (voice, video, chat, ) 8 4

5 Skype Source Model Skype Message TCP/UDP IP 9 Skype Header Formats (What we guess about it) Payload Based Classifier Limited 5

6 Possible Skype Messages Signaling and data messages Use TCP, with ciphered payload Login, lookup, signaling Data flow Use UDP whenever possible: payload is encrypted but some header MUST be exposed Source AES Unreliable Impossible to exploit. Everything is ciphered Receiver AES 11 Skype Source Model Skype Message TCP/UDP IP 12 6

7 SoM Format for E2E Messages ID FUNC Start of Message (SoM) of End2End messages carried by UDP has: ID: 16 bits long random identifier FUNC: 5 bits long function (multiplexing?), obfuscated in a Byte 13 Function Values 0x01 =??Query message 0x02 =??Query 0x0d = Data 0x07 = NAK Voice Video Chat File 14 7

8 PBC SoM can be used to identify Skype flows carried by UDP 5bits long signature Classic signature based classifier Identify Skype socket address at clients To make it more robust, look for Skype flows with the same UDP port It works with UDP only at edge node only Complex Cannot discriminate VOICE/VIDEO/CHAT/DATA 15 Skype Encrypts Traffic Chi Square Classifier EXCIT ING 8

9 Skype Source Model Skype Message TCP/UDP IP 17 Randomness Classifier Skype encrypts traffic payload looks like random Some headers are constant (FUNC) Apply randomness test to the payload bits Chi-Square test: statistic test for random sequences 2 χ 2 ( x E) = i E i 18 9

10 CSC Split the payload into groups Apply the test on the groups at the flow end: each message is a sample Some groups will contain Random bits Mixed bits Deterministic bits ID FUNC e Deterministic group Random group Mixed group CSC Set a threshold 2 χ e+006 n [pkt] 20 10

11 Skype is a VoIP Application Naïve Bayes Classifier Traditio a Skype Source Model Skype Message TCP/UDP IP 22 11

12 Sample Trace [Kbps] [ms] [Bytes] Average Throughput Bandwidth limit Framing Skype Message Size Time [s] Regular IPG Small/regular packets 23 NBC Simple classifier: based on the a-priori prob, evaluate the a-posteriori prob How similar is this flow to a Skype voice flow? What makes VoIP traffic different from other traffic? Packet size, i.e., small packets (packet NBC) Inter-Packet-Gap, i.e., small NBC) IPG (IPG 24 12

13 Skype Naive Bayes Classifier W (k) W (k+1) W (k+2) W (k+3) W (k+4) X Packet NBC Packet NBC Packet NBC max B s (k,j) AVG E[B s (,j) ] min B Y IPG NBC IPG NBC IPG NBC`` max AVG (k) B E[B τ ] τ 25 NBC over Time [Bytes] Belief Set a threshold E[PKT] = 90B E[PKT] = 210B E[PKT] = 252B Time 26 13

14 Results Three Classifiers Payload Based Classifier UDP benchmar k dataset Traffic Flow Naïve Bayes Classifier Chi Square Classifier A N D 28 14

15 Scenario Testbed traces: 100% accuracy Campus Simple scenario, no P2P, no VoIP Italian ISP Fastweb Stiff scenario: lot of P2P, tons of VoIP Results consider True positive (OK): Skype, and identified False positive (FP): Not Skype, but identified False negative (FN): Skype, but discarded 29 Performance Evaluation: UDP N OK FP FP% FN FN% PBC 65 Payload (50) Based Classifier NBC Naïve 50Based Classifier 73.73% % CSC 191 Chi 57 Square Classifier % % NBC+CSC 51 49NBC + CSC2 0.01% % TOT >

16 CSC Threshold Impact 1e+006 Deterministic group Random group Mixed group e+00 n [pkt] FP [%] FN [%] E2E CSC Threshold 31 Conclusions Revealed Skype traffic Two novel classifiers Excellent results NBC to detect voice flows CSC to detect randomness in traffic Work online, for both UDP and TCP NBC and CSC are nice tools NBC can be tuned for other services (e.g. video, data) CSC can be extended to other protocols (e.g., P2P) 32 16

A Skype Analyzer for the Bro IDS Implementation and results. Miguel Ibero Carreras

A Skype Analyzer for the Bro IDS Implementation and results. Miguel Ibero Carreras A Skype Analyzer for the Bro IDS Implementation and results Miguel Ibero Carreras Motivation de facto VoIP standard closed software and protocol firewall traversing possible security hole, need to detect

More information

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP UNIVERSITÀ DEGLI STUDI DI PARMA FACOLTÀ di INGEGNERIA Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

More information

Repositorio Institucional de la Universidad Autónoma de Madrid. https://repositorio.uam.es

Repositorio Institucional de la Universidad Autónoma de Madrid. https://repositorio.uam.es Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of

More information

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in

More information

Tracking Down Skype Traffic

Tracking Down Skype Traffic Tracking Down Skype Traffic Dario Bonfiglio, Marco Mellia, Michela Meo, Nicolò Ritacca Politecnico di Torino Dipartimento di Elettronica email: name.surname@polito.it Dario Rossi ENST ParisTech INFRES

More information

Keywords Machine learning, Traffic classification, feature extraction, signature generation, cluster aggregation.

Keywords Machine learning, Traffic classification, feature extraction, signature generation, cluster aggregation. Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

Detection and Tracking of Skype by exploiting Cross Layer Information in a live 3G Network

Detection and Tracking of Skype by exploiting Cross Layer Information in a live 3G Network Detection and Tracking of Skype by exploiting Cross Layer Information in a live 3G Network Philipp Svoboda, Esa Hyytiä, Fabio Ricciato, Markus Rupp, Martin Karner INTHFT Department, Vienna University of

More information

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 CSC 401 Data and Computer Communications Networks Protocol Layers, Security Sec:1.5-1.6 Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 Outline Computer Networks and the Internet (Ch 1) 1.1

More information

Skype Video Responsiveness to Bandwidth Variations

Skype Video Responsiveness to Bandwidth Variations Skype Video Responsiveness to Bandwidth Variations L. De Cicco,, V. Palmisano Dipartimento di Elettronica ed Elettrotecnica Politecnico di Bari Italy -1- Motivation 1/2 Multimedia real-time applications

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

SkyTracer: Towards Fine-Grained Identification for Skype Traffic via Sequence Signatures

SkyTracer: Towards Fine-Grained Identification for Skype Traffic via Sequence Signatures SkyTracer: Towards Fine-Grained Identification for Skype Traffic via Sequence Signatures Zhenlong Yuan, Cuilan Du, Xiaoxian Chen, Dawei Wang and Yibo Xue Department of Automation, Tsinghua University,

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Traffic Classification in Networking Applications to Traffic Monitoring and Analysis

Traffic Classification in Networking Applications to Traffic Monitoring and Analysis Pedro Casas Telecommunications Research Center Vienna FTW Traffic Classification in Networking Applications to Traffic Monitoring and Analysis IIE FING ARTES 1 5 September 2014 Thanks giving to many colleagues

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability

More information

The Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia

The Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia Measuring the Internet: challenges and applications Telecommunication Group presentation Speaker: Marco Mellia Politecnico di Torino 7/12/2011 The Internet today 2 A very complex scenario many eterogeneous

More information

Quantifying Skype User Satisfaction

Quantifying Skype User Satisfaction EECS443: Skype satisfaction presentation p. 1/14 Quantifying Skype User Satisfaction Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei SIGCOMM 06, Sep 2006, Pisa, Italy. EECS443: Skype satisfaction

More information

Quality of Service. Options. Options, page 1

Quality of Service. Options. Options, page 1 Options, page 1 Supported Codecs, page 2 Define a Port Range on the SIP Profile, page 3 Define a Port Range in Jabber-config.xml, page 3 Set DSCP Values, page 3 Options Use the following options to configure

More information

Performance Analysis of Voice Call using Skype

Performance Analysis of Voice Call using Skype Abstract Performance Analysis of Voice Call using Skype L. Liu and L. Sun Centre for Security, Communications and Network Research Plymouth University, United Kingdom e-mail: info@cscan.org The purpose

More information

LTE system performance optimization by RED based PDCP buffer management

LTE system performance optimization by RED based PDCP buffer management LTE system performance optimization by RED based PDCP buffer management Umar Toseef 1,2, Thushara Weerawardane 2, Andreas Timm-Giel 2, Carmelita Görg 1 1, University of Bremen, Bremen, Germany 2, TUHH,

More information

Content distribution networks

Content distribution networks Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

Using a VMware Network Infrastructure to Collect Traffic Traces for Intrusion Detection Evaluation

Using a VMware Network Infrastructure to Collect Traffic Traces for Intrusion Detection Evaluation Using a VMware Network Infrastructure to Collect Traffic Traces for Intrusion Detection Evaluation by Frederic Massicotte, Mathieu Couture and Annie De Montigny Leboeuf http://www.crc.ca/networksystems_security/

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

Introduction Skype analysis Enforcing anti-skype policies. Skype uncovered. Security study of Skype. Desclaux Fabrice 1 EADS CCR/STI/C

Introduction Skype analysis Enforcing anti-skype policies. Skype uncovered. Security study of Skype. Desclaux Fabrice 1 EADS CCR/STI/C Security study of Skype 1 1 EADS CCR/STI/C Should we be afraid of Skype? 1 Introduction Should we be afraid of Skype? 2 3 Skype detection Quick overview of Skype Should we be afraid of Skype? End-user

More information

Polygraph: Automatically Generating Signatures for Polymorphic Worms

Polygraph: Automatically Generating Signatures for Polymorphic Worms Polygraph: Automatically Generating Signatures for Polymorphic Worms James Newsome Brad Karp Dawn Song Presented by: Jeffrey Kirby Overview Motivation Polygraph Signature Generation Algorithm Evaluation

More information

ECE 435 Network Engineering Lecture 15

ECE 435 Network Engineering Lecture 15 ECE 435 Network Engineering Lecture 15 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 October 2016 Announcements HW#5 due HW#6 posted Broadcasts on the MBONE 1 The Transport

More information

ndpi & Machine Learning A future concrete idea

ndpi & Machine Learning A future concrete idea ndpi & Machine Learning A future concrete idea 1. Conjunction between DPI & ML 2. Introduction to Tensorflow and ConvNet project Traffic classification approaches Category Classification methodology Attribute(s)

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Transport Layer. Chapter 3: Transport Layer

Transport Layer. Chapter 3: Transport Layer Transport Layer EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 3: Transport Layer our goals: understand principles behind layer services: multiplexing,

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

RPT: Re-architecting Loss Protection for Content-Aware Networks

RPT: Re-architecting Loss Protection for Content-Aware Networks RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University ǂ University of Wisconsin-Madison Motivation:

More information

CSC358 Week 4. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

CSC358 Week 4. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved CSC358 Week 4 Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Logistics Assignment 1 due this Friday Office hour on Feb

More information

Lecture 11. Transport Layer (cont d) Transport Layer 1

Lecture 11. Transport Layer (cont d) Transport Layer 1 Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the

More information

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017 Integrated and Differentiated Services Christos Papadopoulos (Remixed by Lorenzo De Carli) CSU CS557, Fall 2017 1 Preliminary concepts: token buffer 2 Characterizing Traffic: Token Bucket Filter Parsimonious

More information

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in Applicable Computing University of Bedfordshire

More information

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Transport Layer Intro, Mutliplexing/Demultiplexing, UDP Sec 3.1 3.4 Prof. Lina Battestilli Fall 2017 Chapter 3: Transport Layer our goals: understand principles

More information

Traffic Classification Using Visual Motifs: An Empirical Evaluation

Traffic Classification Using Visual Motifs: An Empirical Evaluation Traffic Classification Using Visual Motifs: An Empirical Evaluation Wilson Lian 1 Fabian Monrose 1 John McHugh 1,2 1 University of North Carolina at Chapel Hill 2 RedJack, LLC VizSec 2010 Overview Background

More information

Configuring Class-Based RTP and TCP Header Compression

Configuring Class-Based RTP and TCP Header Compression Configuring Class-Based RTP and TCP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead

More information

P2P Optimized Traffic Control Riad Hartani & Joe Neil Caspian Networks

P2P Optimized Traffic Control Riad Hartani & Joe Neil Caspian Networks P2P Optimized Traffic Control Riad Hartani & Joe Neil Caspian Networks 2004 Caspian Networks, Inc. P2P Applications WINNY 2 Rapid evolution of P2P applications, significant impact on network architectures

More information

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Experimental Study of Skype. Skype Peer-to-Peer VoIP System An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion

More information

Introduction to the Application Layer. Computer Networks Term B14

Introduction to the Application Layer. Computer Networks Term B14 Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

Page 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11

Page 1. Goals for Today Discussion Example: Reliable File Transfer CS162 Operating Systems and Systems Programming Lecture 11 Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 7

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 7 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 7 1 Lab2 and Homework questions Available on course website 2 Chapter 3 outline 3.1 transport-layer

More information

Multimedia Networking

Multimedia Networking Multimedia Networking #2 Multimedia Networking Semester Ganjil 2012 PTIIK Universitas Brawijaya #2 Multimedia Applications 1 Schedule of Class Meeting 1. Introduction 2. Applications of MN 3. Requirements

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Announcement. Homework 1 due last night, how is that? Will discuss some problems in the lecture next week

Announcement. Homework 1 due last night, how is that? Will discuss some problems in the lecture next week Announcement Homework 1 due last night, how is that? Will discuss some problems in the lecture next week Should have completed at least part II of project 1 Homework 2 will be out next week Review of Previous

More information

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy

More information

Internet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented

Internet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented Transport services and protocols Internet -layer protocols logical communication between processes protocols run in end systems send side: breaks app messages into segments, passes to layer rcv side: reassembles

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors

More information

Computer Science 461 Midterm Exam March 14, :00-10:50am

Computer Science 461 Midterm Exam March 14, :00-10:50am NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap

The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It

More information

CS 4390 Computer Networks. Transport Services and Protocols

CS 4390 Computer Networks. Transport Services and Protocols CS 4390 Computer Networks UT D data Session 07 Transport Layer Overview and UDP Adapted from Computer Networking a Top-Down Approach 1996-2012 by J.F Kurose and K.W. Ross, All Rights Reserved Transport

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Technical Goals Scalability Availability Performance Security Manageability

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

A Study of Cache-Based IP Flow Switching

A Study of Cache-Based IP Flow Switching University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania

More information

Lecture 9: Transpor Layer Overview and UDP

Lecture 9: Transpor Layer Overview and UDP Lecture 9: Transpor Layer Overview and UDP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose

More information

BLINC: Multilevel Traffic Classification in the Dark

BLINC: Multilevel Traffic Classification in the Dark BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Transport services and protocols

More information

CSC 4900 Computer Networks: Transport Layer

CSC 4900 Computer Networks: Transport Layer CSC 4900 Computer Networks: Transport Layer Professor Henry Carter Fall 2017 Last Time... Sockets programming API TCP and UDP look different. Remember, there is no connect() in UDP - just start sending

More information

Understanding QoS measurements: Experience from the mplane European Project

Understanding QoS measurements: Experience from the mplane European Project Understanding QoS measurements: Experience from the mplane European Project Marco Mellia Politecnico di Torino ITU Regional Workshop for Europe New Issues in QoS Measuring and Monitoring 25-26 November

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

AV-friendly networking. Cambridge, England

AV-friendly networking. Cambridge, England AV-friendly networking Cambridge, England www.ninetiles.com Benefits of networks for AV Live and file transfer on the same infrastructure Few high-capacity links vs many single-signal Easier to reconfigure

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Background: IP Protocol Stack

Background: IP Protocol Stack Networking and protocols for real-time signal transmissions by Hans-Peter Schwefel & Søren Vang Andersen Mm1 Introduction & simple performance models (HPS) Mm2 Real-time Support in Wireless Technologies

More information

The Transport Layer Multiplexing, Error Detection, & UDP

The Transport Layer Multiplexing, Error Detection, & UDP CPSC 852 Internetworking The Transport Layer Multiplexing, Error Detection, & UDP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc852

More information

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Application Note How to use Quality of Service

Application Note How to use Quality of Service Application Note How to use Quality of Service This application note describes how to use Quality of Service. The document consists of standard instructions that may not fit your particular solution. Please

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Chapter 3: Transport Layer

Chapter 3: Transport Layer Chapter 3: Transport Layer Chapter goals: understand principles behind transport layer services: multiplexing/demultiplex ing reliable data transfer flow control congestion control instantiation and implementation

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Last Time. Internet in a Day Day 2 of 1. Today: TCP and Apps

Last Time. Internet in a Day Day 2 of 1. Today: TCP and Apps Internet in a Day Day 2 of 1 Carnegie Mellon University 15-440, Distributed Systems Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports

More information

BitTorrent Traffic Classification

BitTorrent Traffic Classification BitTorrent Traffic Classification Atwin O. Calchand, Van T. Dinh, Philip Branch, Jason But Centre for Advanced Internet Architectures, Technical Report 090227A Swinburne University of Technology Melbourne,

More information

Chapter 3: Transport Layer Part A

Chapter 3: Transport Layer Part A Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Tuning Skype s Redundancy Control Algorithm for User Satisfaction

Tuning Skype s Redundancy Control Algorithm for User Satisfaction 1 Tuning Skype s Redundancy Control Algorithm for User Satisfaction Te-Yuan Huang, Kuan-Ta Chen, and Polly Huang Department of Electrical Engineering, National Taiwan University Institute of Information

More information

Background Traffic to Network /8

Background Traffic to Network /8 Background Traffic to Network 39.0.0.0/8 March 2010 Geoff Huston George Michaelson APNIC R&D research@apnic.net APNIC is now regularly examining the unused state of IPv4 address blocks before they are

More information

Illegitimate Source IP Addresses At Internet Exchange Points

Illegitimate Source IP Addresses At Internet Exchange Points Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin

More information

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?

More information

Sai Praveen Sadhu George Mason University Fall 2014, ECE 646

Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 VoIP - > Voice over IP Technology to send voice and mul9media over Internet Protocol. Skype is a good example of VoIP. Skype was developed in

More information

1. Arista 7124s Switch Report

1. Arista 7124s Switch Report 1. Arista 7124s Switch Report Test Results for Arista 7124s Switch Report 2 2. Synopsis Lab Real Session Stress Session Rate Stress Sessions 64: 100.00 1518: 100.00 Count: 100.00 Rate: 100.00 IP: pass

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

Configuring Class-Based RTP and TCP Header Compression

Configuring Class-Based RTP and TCP Header Compression Configuring Class-Based RTP and TCP Header Compression Last Updated: December 5, 2011 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header

More information