Charles Shen and Henning Schulzrinne Department of Computer Science Columbia University IRT Group 06/10/04 NSIS – an overview and its interaction with.

Slides:



Advertisements
Similar presentations
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Advertisements

1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Part IV: BGP Routing Instability. March 8, BGP routing updates  Route updates at prefix level  No activity in “steady state”  Routing messages.
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol –Datagram format.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
End-to-End Routing Behavior in the Internet Vern Paxson Presented by Zhichun Li.
Network Layer Packet Forwarding IS250 Spring 2010
Next Step In Signaling (NSIS) and Internet Routing Dynamics Charles Shen and Henning Columbia University in the City of New York Internet.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
Internet Routing Instability Labovitz et al. Sigcomm 1997 Largely adopted from Ion Stoica’s slide at UCB.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
E2E Routing Behavior in the Internet Vern Paxson Sigcomm 1996 Slides are adopted from Ion Stoica’s lecture at UCB.
Multicast Communication
Routing.
Trade-offs and open issues with path discovery and transport or not all requirements are orthogonal… Henning Schulzrinne Columbia University
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
1 MPLS Architecture. 2 MPLS Network Model MPLS LSR = Label Switched Router LER = Label Edge Router LER LSR LER LSR IP MPLS IP Internet LSR.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Guide to TCP/IP, Third Edition
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
Internet Routing Dynamics and NSIS Related Considerations draft-shen-nsis-routing-00.txt Charles Shen, Henning Schulzrinne, Sung-Hyuck Lee IETF#61 – Washington.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
RSC Part II: Network Layer 6. Routing in the Internet (2 nd Part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
10/8/2015CST Computer Networks1 IP Routing CST 415.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
NSIS Transport Layer draft-ietf-nsis-ntlp-01.txt Slides:
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
1 Version 3.1 Module 6 Routed & Routing Protocols.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
IP. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts Even.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
K. Salah1 Security Protocols in the Internet IPSec.
Multi-protocol Label Switching
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
NAT – Network Address Translation
ICMP ICMP – Internet Control Message Protocol
Chapter 5 Network and Transport Layers
Routing.
Network Core and QoS.
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
CS4470 Computer Networking Protocols
Advanced Computer Networks
Routing.
Computer Networks Protocols
Network Core and QoS.
Presentation transcript:

Charles Shen and Henning Schulzrinne Department of Computer Science Columbia University IRT Group 06/10/04 NSIS – an overview and its interaction with Route Change

IRT Group 06/10/04 Why signaling? NSIS stands for Next Step in Signaling NSIS stands for Next Step in Signaling Signaling is about manipulating state in network nodes Signaling is about manipulating state in network nodes State Management examples: State Management examples: –QoS resource allocations –NAT and firewall configuration –state used in active networking State Monitoring examples: State Monitoring examples: –instantaneous path property discovery (available bandwidth, queuing delay etc.) Need for a general purpose signaling protocol Need for a general purpose signaling protocol

IRT Group 06/10/04 How about RSVP? Original Resource reSerVation Protocol: Original Resource reSerVation Protocol: –Standardized in 1997 –designed for en-to-end resource reservations based on the Integrated Service architecture. RSVP extensions: RSVP extensions: –RSVP refresh reduction extensions –RSVP operation over IP tunnels –RSVP-Traffic Engineering over MPLS networks –RSVP-Aggregation –RSVP for NAT and Firewall traversal –RSVP mobility

IRT Group 06/10/04 Why not RSVP? Not designed to be a generic signaling protocol from the first place Not designed to be a generic signaling protocol from the first place Unclear whether independently designed RSVP extensions would collaborate in a single implementation Unclear whether independently designed RSVP extensions would collaborate in a single implementation There are also criticisms for using RSVP in QoS - the built-in multicast support adds considerable overhead, but very often may be unnecessary There are also criticisms for using RSVP in QoS - the built-in multicast support adds considerable overhead, but very often may be unnecessary

IRT Group 06/10/04 Here Comes NSIS … Working group chartered in Nov to investigate the architecture and protocol design of the next (generic) signaling protocol for the Internet based on existing experiences Working group chartered in Nov to investigate the architecture and protocol design of the next (generic) signaling protocol for the Internet based on existing experiences Creating requirements, frameworks, and specifications for a signaling protocol envisioned to support various signaling applications that need to install and/or manipulate state in the network Creating requirements, frameworks, and specifications for a signaling protocol envisioned to support various signaling applications that need to install and/or manipulate state in the network

IRT Group 06/10/04 Current NSIS Assumptions - Path-coupled and Unicast Signaling messages are routed, flow state is installed and maintained, only through NSIS Entities (NEs) that are in the data path Signaling messages are routed, flow state is installed and maintained, only through NSIS Entities (NEs) that are in the data path Not every node along the path has to be NEs. There could be proxies distinct from the sender and receiver, or intermediate signaling-unaware nodes Not every node along the path has to be NEs. There could be proxies distinct from the sender and receiver, or intermediate signaling-unaware nodes Only unicast flows are considered Only unicast flows are considered

IRT Group 06/10/04 NSIS Two-layered Model Several aspects of protocol support to exchange messages along the data path are common to all or a large number of applications, and hence should be developed as a common protocol Several aspects of protocol support to exchange messages along the data path are common to all or a large number of applications, and hence should be developed as a common protocol –a 'signaling transport' layer moving signaling messages around –independent of any particular signaling application –NSIS Transport Layer Protocol (NTLP) a 'signaling application' layer a set of state management rules a 'signaling application' layer a set of state management rules –message formats and sequences, specific to a particular signaling application. –NSIS Signaling Layer Protocol (NSLP)

IRT Group 06/10/04 More about NTLP - GIMPS Based on existing transport and security protocols under a common messaging layer, the General Internet Messaging Protocol for Signaling (GIMPS) Based on existing transport and security protocols under a common messaging layer, the General Internet Messaging Protocol for Signaling (GIMPS) Different signaling applications make use of different GIMPS services, but GIMPS does not keep state specific to signaling applications. Different signaling applications make use of different GIMPS services, but GIMPS does not keep state specific to signaling applications. GIMPS manages its own internal state and configures underlying transport and security protocols to deliver signaling messages on behalf of signaling applications in both directions along the flow path GIMPS manages its own internal state and configures underlying transport and security protocols to deliver signaling messages on behalf of signaling applications in both directions along the flow path

IRT Group 06/10/04 GIMPS Operations “Routing” - Determine how to reach the adjacent GIMPS peer along the data path “Routing” - Determine how to reach the adjacent GIMPS peer along the data path –Downstream signaling: either use explicit local state information to determine the GIMPS peer, or just send the signaling towards the flow destination address and rely on the peer to intercept it. –Upstream signaling: has to rely on explicit local state information. “Transport” - Deliver signaling information to the Peer “Transport” - Deliver signaling information to the Peer –Datagram mode and Connection Mode

IRT Group 06/10/04 GIMPS Datagram Mode A mode of sending GIMPS messages between nodes without using any transport layer state or security protection A mode of sending GIMPS messages between nodes without using any transport layer state or security protection For small, infrequent messages with modest delay constraints For small, infrequent messages with modest delay constraints UDP as the initial choice UDP as the initial choice Upstream messages: UDP encapsulated and sent directly to the signaling destination Upstream messages: UDP encapsulated and sent directly to the signaling destination Downstream messages: set up router alert option and sent towards the flow receiver Downstream messages: set up router alert option and sent towards the flow receiver

IRT Group 06/10/04 GIMPS Connection Mode A mode of sending GIMPS messages directly between nodes using point to point "messaging associations“ i.e. transport protocols and security associations A mode of sending GIMPS messages directly between nodes using point to point "messaging associations“ i.e. transport protocols and security associations For larger data objects or where fast setup in the face of packet loss is desirable, or where channel security is required For larger data objects or where fast setup in the face of packet loss is desirable, or where channel security is required May use any stream or message-oriented transport protocol May use any stream or message-oriented transport protocol May employ specific network layer security associations (e.g. IPsec), or an internal transport layer security association (e.g. TLS) May employ specific network layer security associations (e.g. IPsec), or an internal transport layer security association (e.g. TLS)

IRT Group 06/10/04 Route Change Problem In a connectionless network each packet is routed independently In a connectionless network each packet is routed independently –packet route may change in the middle of a session. Route change can happen due to various reasons: Route change can happen due to various reasons: –Load sharing or load balancing –Policy based routing –Network reconfiguration –Routing protocol adaptation Route changes cause a divergence between the data path and the path on which signaling state has been installed Route changes cause a divergence between the data path and the path on which signaling state has been installed

IRT Group 06/10/04 NSIS and Route Change GIMPS (NTLP) and signaling application (NSLP) state needs to be updated GIMPS (NTLP) and signaling application (NSLP) state needs to be updated –Local repair if possible –Not simply moving state from the old to the new path. Application dependent. E.g. QoS path characteristics. GIMPS is responsible for: GIMPS is responsible for: –Detecting the route change –Update its own routing state –Inform relevant signaling applications at affected nodes A core issue is Route Change Detection A core issue is Route Change Detection –NTLP and NSLP soft-state mechanism is not sufficient especially when NSLP refresh times are extended to reduce signaling load

IRT Group 06/10/04 Route Change Detection - Summary of Methods Routing Monitoring: Routing Monitoring: –Local Trigger delivered by the local routing table –Extended Trigger by checking a link-state routing table (OSPF, BGP with AS_PATH) Packet Monitoring: Packet Monitoring: –GIMPS C-mode Monitoring: TTL/Interface change –Data Plane Monitoring: TTL/Interface change or loss of flow all-together GIMPS D-mode Probing GIMPS D-mode Probing –Each GIMPS node periodically repeats the discovery operation –Depending on the likely stability of routes, the discovery period can be set to a large value

IRT Group 06/10/04 Route Change Detectability Upstream and Downstream Path For a single node, route change may happen in its upstream path or downstream path For a single node, route change may happen in its upstream path or downstream path A change in downstream path at a node means a change in upstream path for its downstream peer. A change in downstream path at a node means a change in upstream path for its downstream peer. Data Packet Monitoring may only be used to detect route change in the upstream path Data Packet Monitoring may only be used to detect route change in the upstream path Routing Monitoring is usually used to detect route change in the downstream path Routing Monitoring is usually used to detect route change in the downstream path C-mode signaling monitoring can be used to detect route change in both directions C-mode signaling monitoring can be used to detect route change in both directions

IRT Group 06/10/04 Route Change Detectability Case Study Old Path New Path C F G BE D OSPF Area A B G CD E F Square: NEcircle: none – NE B: Divergence Node E: Convergence Node Upstream: F (data packet TTL monitoring) D (Data absence) Downstream: A (extended trigger) Data flow direction

IRT Group 06/10/04 Route Change Detectability - Some Recommendations By similarly studying other OSPF Intra- area/Inter-area, RIP Intra-AS, BGP Inter-AS route change cases, we found that: By similarly studying other OSPF Intra- area/Inter-area, RIP Intra-AS, BGP Inter-AS route change cases, we found that: To increase the chance of Route Change Detection, it is recommended to implement NE at least in all “special” routers, e.g., AS border routers, OSPF area border routers, OSPF backbone area routers To increase the chance of Route Change Detection, it is recommended to implement NE at least in all “special” routers, e.g., AS border routers, OSPF area border routers, OSPF backbone area routers

IRT Group 06/10/04 Route Change in Real World ? We want to know – statistically, We want to know – statistically, How frequently does a route change occur? How frequently does a route change occur? How long does it last? How long does it last? How many hops does it affect? How many hops does it affect? How is it associated with TTL change? Or AS change? How is it associated with TTL change? Or AS change? …

IRT Group 06/10/04 Network Measurement with Traceroute Traceroute to record the path between two sites Traceroute to record the path between two sites Traceroute creates ICMP 'probes' datagrams with incrementing Time To Live (TTL) values. It continues to send out probes until it reaches the final destination. Traceroute creates ICMP 'probes' datagrams with incrementing Time To Live (TTL) values. It continues to send out probes until it reaches the final destination. Internet routes may change between two successive probe packets, there is no guarantee that probes of different hops take the same route as pervious hops Internet routes may change between two successive probe packets, there is no guarantee that probes of different hops take the same route as pervious hops If self-consistent and shows no multiple routing for any of its hops, treat as a valid measurement. If self-consistent and shows no multiple routing for any of its hops, treat as a valid measurement.

IRT Group 06/10/04 Traceroute Example traceroute to lava.net ( ), 30 hops max, 40 byte packets 1 fe0-0r0.ffm1.de.carpe.net ( ) ms ms ms 2 w1-0r0.ffm0.de.carpe.net ( ) ms ms ms 3 ge fra20.ip.tiscali.net ( ) ms ms 5.33 ms 4 so was21.ip.tiscali.net ( ) ms ms ms 5 so edge2.Washington1.Level3.net ( ) ms ms ms 6 so bbr2.Washington1.Level3.net ( ) ms ms ms 7 ge mpls1.Honolulu2.Level3.net ( ) ms ms ms 8 so-7-0.hsa1.Honolulu2.Level3.net ( ) ms ms ms 9 s1.lavanet.bbnplanet.net ( ) ms ms ms 10 malasada.lava.net ( ) ms ms ms Location: --to-- lava.net Status: ok Time: Fri Apr 09 07:12:23 EDT to-- Fri Apr 09 07:12:29 EDT 2004

IRT Group 06/10/04 Measurement Methodology Obtained permission from 39 public traceroute servers located in US, Canada, Iceland, Netherlands, Finland, Austria, France, UK, Germany, Switzerland, Ireland, Bulgaria, Sweden, South Africa, New Zealand, Taiwan, Australia, Japan, Thailand Obtained permission from 39 public traceroute servers located in US, Canada, Iceland, Netherlands, Finland, Austria, France, UK, Germany, Switzerland, Ireland, Bulgaria, Sweden, South Africa, New Zealand, Taiwan, Australia, Japan, Thailand Data collection program written in Tcl. Data collection program written in Tcl. At an exponentially distributed interval, the program: At an exponentially distributed interval, the program: –Randomly selects two sites as source and destination and spawns a thread for each of them –Each thread sends a request to the selected source or destination and invokes a traceroute to the other party

IRT Group 06/10/04 Two Data Sets Data Set I is among 12 of these 39 sites with an measurement interval of 15 min, collected from Apr 09 – Apr. 24. Contains about 15,000 traceroute records Data Set I is among 12 of these 39 sites with an measurement interval of 15 min, collected from Apr 09 – Apr. 24. Contains about 15,000 traceroute records Data Set II is among all 39 sites but with a relatively long interval of 2 hours. It was started on Apr. 22 – May. 18. Data Set II is among all 39 sites but with a relatively long interval of 2 hours. It was started on Apr. 22 – May. 18.

IRT Group 06/10/04 More on Data Set I 12 sites that allowed the 15 minutes interval 12 sites that allowed the 15 minutes interval – CA) – (Stanford, CA) –lava.net(Honolulu, HI) – (Frieberg, Germany) – –swiCE2.switch.ch(Geneva, Switzerland) –Backbone.acad.bg(Sofia, Bulgaria) –Stockholm1.sunet.se (Stockholm, Sweden) –Traceroute.teragen.com.au(Melbourne, Australia) – Australia) – Australia) – (Frankfurt, Germany)

IRT Group 06/10/04 AS Mapping on Data Set I We mapped each IP to its corresponding AS number by looking up RADB (Routing Assets Database) and its mirrored databases We mapped each IP to its corresponding AS number by looking up RADB (Routing Assets Database) and its mirrored databases For IPs that does not have a mapping entry: we check For IPs that does not have a mapping entry: we check –If it has a hostname which identifies it as part of a site with a known AS –If no hostname found, we looked at the IP range and hops before and after in the same record, and make a best guess.

IRT Group 06/10/04 Preliminary Processing on Data Set I We abstracted from Data Set I the following records: We abstracted from Data Set I the following records: One IP address appears in multiple hops in the same record One IP address appears in multiple hops in the same record A single hop in a record contains multiple different IP address A single hop in a record contains multiple different IP address

IRT Group 06/10/04 Route Change Dynamics - One IP appears in multiple hops Captured the middle of a routing change Captured the middle of a routing change –E.g., based on the preceding and subsequent records, we can tell that one specific IP appears in two successive hops because one extra router has just been added upstream –Others more complicated, but usually a route change can be found. The duration of the dynamics varies from less than half an hour to several hours Lost of connectivity to the repeating router’s following hop. (Last several hours?) Lost of connectivity to the repeating router’s following hop. (Last several hours?) Skipping: packets originated from Switch.ch (Swiss Education and Research Network) seem to occasionally skip the first outgoing router within this site. (reason unknown) Skipping: packets originated from Switch.ch (Swiss Education and Research Network) seem to occasionally skip the first outgoing router within this site. (reason unknown)

IRT Group 06/10/04 Route Change Dynamics - Multiple IPs in a single hop 1194 instances 1194 instances 1 unique triple – Caused by route change 1 unique triple – Caused by route change 20 unique router pairs, among them: 20 unique router pairs, among them: –3 pairs (19 instances) due to Switch.ch skipping –7 pairs (7 instances) during the middle of route changes –2 pairs (2 instances) during a temporary network outage The rest 8 pairs share the remaining 1165 instances The rest 8 pairs share the remaining 1165 instances

IRT Group 06/10/04 Route Change Dynamics - Fluttering Behavior The rapidly-variable routing exhibited by a few routers are called “Fluttering” by Vern Paxson in his 1997 thesis The rapidly-variable routing exhibited by a few routers are called “Fluttering” by Vern Paxson in his 1997 thesis This occurs on a very small time scale, essentially the time between successive traceroute probes This occurs on a very small time scale, essentially the time between successive traceroute probes One possible mechanism that could cause this: A router alternates between multiple next-hop routers in order to split load among the links to those routers One possible mechanism that could cause this: A router alternates between multiple next-hop routers in order to split load among the links to those routers As pointed out by Vern, such behavior is explicitly allowed in RFC 1812 “Requirements for IP Version 4 Routers” p.79. as load splitting, though the same document cautions that there are situations for which it is inappropriate. So it should at most be a configurable option for a router As pointed out by Vern, such behavior is explicitly allowed in RFC 1812 “Requirements for IP Version 4 Routers” p.79. as load splitting, though the same document cautions that there are situations for which it is inappropriate. So it should at most be a configurable option for a router

IRT Group 06/10/04 Ongoing Work Statistical analysis of Statistical analysis of –More routing pathologies –Types of route changes –Route change durations –AS changes –TTL changes –Route symmetry Route change detection algorithms Route change detection algorithms

IRT Group 06/10/04 Main References: H. Schulzrinne, R. Hancock, GIMPS: General Internet Messaging Protocol for Signaling IETF Internet Draft, 2004 H. Schulzrinne, R. Hancock, GIMPS: General Internet Messaging Protocol for Signaling IETF Internet Draft, 2004GIMPS: General Internet Messaging Protocol for Signaling GIMPS: General Internet Messaging Protocol for Signaling R. Hancock et. al., Next Steps in Signaling: Framework IETF Internet Draft, 2003 R. Hancock et. al., Next Steps in Signaling: Framework IETF Internet Draft, 2003Next Steps in Signaling: Framework Next Steps in Signaling: Framework H. Schulzrinne et. al., Design of CASP – a Technology Independent Lightweight Signaling Protocol, 2003 V. Paxson, Measurement and Analysis of End-to- end Internet Dynamics, Ph.D. thesis, UC Berkeley, 1997 V. Paxson, Measurement and Analysis of End-to- end Internet Dynamics, Ph.D. thesis, UC Berkeley, 1997

IRT Group 06/10/04 The End