MITATE: Mobile Internet Testbed for Application Traffic Experimentation

Similar documents
MITATE: Mobile Internet Testbed for Application Traffic Experimentation

Quality Assurance of a Mobile Network Measurement Testbed Through Systematic Software Testing

MOBILE (cellular) network applications deliver interactive

NaaS Network-as-a-Service in the Cloud

Part I: Future Internet Foundations: Architectural Issues

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Active Measurement of Data-Path Quality in a Non-cooperative Internet

CE Advanced Network Security Anonymity II

Understanding the Evolving Internet

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

Broadband Internet Access Disclosure

Connectivity to Cloud-First Applications

SEVONE END USER EXPERIENCE

In-Band Flow Establishment for End-to-End QoS in RDRN. Saravanan Radhakrishnan

Abstract of the Book

Presented by: Fabián E. Bustamante

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

xpeeriences in the World of Online Gaming

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Naresh Soni CTO, InterDigital

Running A Highly Scaled Registry DNS Platform. ICANN 55 Tech Day Anycast Panel Chris Griffiths -

Internet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010

Wireless 20/20. Business Case for MulteFire Technology. February 27, 2018

Network infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider

Developing Enterprise Cloud Solutions with Azure

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

Carrier SDN for Multilayer Control

Pulseway Security White Paper

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

Mobile Edge Computing:

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Practical Guide to Platform as a Service.

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged

Automated Assessment of Security Risks for Mobile Applications

The UCSD Network Telescope

ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Data Centers and Cloud Computing

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Reliable Stream Analysis on the Internet of Things

Cisco Borderless Networks Value Proposition

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

Data Centers and Cloud Computing. Data Centers

Radon: Network QoS. Andrew Shewmaker Carlos Maltzahn Katia Obraczka Scott Brandt Ivo Jimenez. UC Santa Cruz Graduate Studies in Computer Science

Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski

Joint Server Selection and Routing for Geo-Replicated Services

SOMETIME1 SOftware defined network-based Available Bandwidth MEasuremenT In MONROE

CS268: Beyond TCP Congestion Control

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015

PRISM: Platform for Remote Sensing using Smartphones

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform

Telecommunication Services Engineering Lab. Roch H. Glitho

Overview. CPS Architecture Overview. Operations, Administration and Management (OAM) CPS Architecture Overview, page 1 Geographic Redundancy, page 5

SEVONE DATA APPLIANCE FOR EUE

IXP economic aspect and benefits

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations

Transport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti

Credit based Flow Control PAR, 5 Criteria & Objectives

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Odin: Microsoft s Scalable Fault-

Over-The-Top (OTT) Aggregation Solutions

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Mobile QoE and Service Composition

Azure Certification BootCamp for Exam (Developer)

Connected Mobile Experiences (CMX) Aligning Use Cases and Technology

AT&T SD-WAN Network Based service quick start guide

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Episode 5. Scheduling and Traffic Management

A Global Operating System «from the Things to the Clouds»

Citrix Tech Zone Citrix Product Documentation docs.citrix.com November 13, 2018

The Growing Problem of Mobile Adware

A Software Defined Approach to Unified IPv6 Transition

Like it or not: Stefan Schmid (TU Berlin & T-Labs)

UC Assessor A cloud-based UC network assessment solution. Getting Started Guide

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang

Datacenter Wide- area Enterprise

Table of Contents HOL-1703-SDC-4

SEEM3450 Engineering Innovation and Entrepreneurship

China Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Security Guide Zoom Video Communications Inc.

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -

E-companion. Quiz for IT-knowledge

ONAP 5G Blueprint Overview. ONAP Promises to Automate 5G Deployments. ONAP 5G Blueprint Overview 1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

A software defined approach To Unified IPv6 Transition

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point

Introduction to Distributed Computing Systems

VITP: An Information Transfer Protocol for Vehicular Computing

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

NetCarrier Telecom, Inc. NetCarrier ncloud PBX. Channel Driven, Customer Focused

Introduction to IoT. Jianwei Liu Clemson University

Pioneer Communications Internet Services Disclosure

Mobile Network Congestion Management

Maintaining a competitive advantage in the era of Network Neutrality

A Holistic View of Telco Clouds

Scott Jordan University of California, Irvine. Intersections between Information Technology Research and Public Policy

Transcription:

MITATE: Mobile Internet Testbed for Application Traffic Experimentation Utkarsh Goel, Ajay Miyyapuram, Mike P. Wittie, Qing Yang Montana State University - Bozeman November 25 th, 2013 Computer Science Monday Seminar 1

Societal problem In many ways the causes of end-to-end network delay are not technological, but economic in nature. Reductions to end-to-end delays are unlikely to come from improvements of network mechanisms alone. Application communication protocols must be smart enough to adapt to changing network performance to keep communication delay low. To design and validate adaptive communication protocols, developers need to prototype their implementations in production networks. 2

Contd. Measure end-to-end delays Evaluate new network mechanisms USER APP SERVER DEVELOPER RESEARCHER 3

MITATE A new platform for mobile application prototyping in live mobile networks. Allows experimentation with custom mobile application traffic between mobile devices and cloud infrastructure endpoints. A collaborative framework, in which participants contribute their mobile network resources and are allowed, in turn, to run their traffic experiments on others devices. Open to the public and being deployed on Google s Measurement Lab (M-Lab). 4

Developers without MITATE Application Implementation Mobile Devices Back-end Servers Want to measure traffic delays. Have to deploy code to do so. //app code int main() App Traffic //srvr code int main() //app code int main() App Traffic //srvr code int main() Small number of volunteered devices Downsides of code deployment Security concerns over mobile code Restrictive APIs 5

How does MITATE help developers? MITATE separates traffic generation from application logic Application Implementation Mobile Devices Back-end Servers XML: App Traffic //app code int main() App Traffic //srvr code int main() MITATE App Traffic MITATE 6

MITATE s traffic definition Generate traffic definitions in a form of well structured XML by defining what the traffic looks like? where the traffic is going? when the traffic is to be sent? which mobile device should execute the experiment? 7

Defining a transfer <transfer> <id>transfer1</id> <src>client</src> <dst>1.2.3.4</dst> <protocol>udp</protocol> <dstport>5060</dstport> <bytes>32</bytes> <response>0</response> </transfer> other parameters include: Transmission delay No. of packets Explicit content 8

Defining a packet content <content> <contentid>content1</contentid> <protocol>skype</protocol> <data> <![CDATA[0x0100be07de55...]]> </data> <contenttype>hex</contenttype> </content> 9

Defining a criteria <criteria> <id>criteria1</id> <latlong>"45.666-111.046"</latlong> <radius>5000</radius> <networktype>cellular</networktype> <starttime>12:00</starttime> <endtime>13:30</endtime> </criteria> other parameters include: Network carrier Minimum battery power Minimum signal strength Device model name 10

Summing up all the definitions <transaction count= 10 > <criteria> <criteriaid>criteria1</criteriaid> </criteria> <transfers> <transferid delay= 10 repeat= 1 >transfer1</transferid> <transferid delay= 20 repeat= 2 >transfer2</transferid> <transferid delay= 10 repeat= 1 >transfer1</transferid> </transfers> </transaction> 11

How does MITATE help developers? MITATE separates traffic generation from application logic Application Implementation Mobile Devices Back-end Servers XML: App Traffic //app code int main() App Traffic //srvr code int main() MITATE App Traffic MITATE where performance of intermediate solutions are the reported metrics in each experiment round Large number of volunteered devices Upsides of using MITATE No mobile code only traffic description shipped to mobiles Flexibility in traffic generation logic 12

Researchers without MITATE Call your friends Measure network performance Latency Loss Bandwidth line up a few volunteered devices configure network simulators Low device and setting diversity Configured simulations do not reflect traffic shaping mechanisms 13

Challenges in deploying large scale testbed Assure sufficient resource capacity for scheduled experiments. (Limiting resource is mobile data, subject to monthly caps) Entice users to contribute resources Protect contributed resources from abuse. MITATE jointly addresses both problems using a data credit exchange system inspired by BitTorrent tit-for-tat mechanisms 14

Security & privacy concerns Personal mobile devices have the potential for violations of privacy if a device owner s activity and personally identifiable information were to become public. MITATE s security design protects user privacy, the volunteered devices, and non-mitate Internet resources. That was a very interesting cell phone conversation. Thanks for sharing it with me 15

Protecting user privacy & user device Only active traffic experiments and cannot monitor non-mitate traffic. User can set usage limits for mobile data, Wi-Fi data, and battery level on their devices. We separate all data collected on devices from personally identifiable user account information 16

Protecting Non-MITATE resources Avoid DDoS attacks configured as MITATE experiments. Limit traffic by placing a credit limit. A MITATE user may request that multiple devices send data simultaneously, the user s credit will be rapidly depleted. So even if the transmissions are malicious, they will be short-lived. 17

Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 18

Message delay vs. message size at 10AM on CSP 1 to a CA datacenter Asymmetric network provisioning 19

Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 20

Downlink message delay vs. transmission interval on CSP1 and CSP2 Network allocation timeouts causes delay 21

Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 22

Effect of payload on CSP1 MITATE can detect content based traffic shaping 23

Effect of choice of transport protocols Packet loss due to traffic policing, rather than traffic shaping 24

Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 25

Measurement based CDN selection CDN2 provides the best combination of performance 26

Conclusions MITATE is the first public testbed that supports prototyping of application communications between mobiles and cloud datacenters. MITATE separates application logic from traffic generation, which simplifies security and resource sharing mechanisms. We have presented data collected with MITATE experiments that affects mobile application message delay. 27

Where can you find MITATE Our preliminary design and limited validation of MITATE s measurement techniques will be published at Mobiquitous 13 in December of this year. (NEW) MITATE s approach has been announced through a - poster at USENIX NSDI 13 - presentation at ACM IMC 13. 28

Learn more Web URL: http://mitate.cs.montana.edu Email: mitate@cs.montana.edu Code Repo: https://github.com/msu-netlab/mitate Utkarsh Goel utkarsh.goel@cs.montana.edu http://www.cs.montana.edu/~utkarsh.goel 29