Treatment-Based Traffic Signatures Mark Claypool Robert Kinicki Craig Wills Computer Science Department Worcester Polytechnic Institute

Slides:



Advertisements
Similar presentations
CAPANINA Multimedia Applications Demo Specifications for Trial 1 Milan Lalovic Wireless Networks, BT Exact.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Comparison and Analysis of FIFO, PQ, and WFQ Disciplines on multimedia
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network Passive & Active Measurement Workshop 05 Boston, MA,
CCNA 1 v3.1 Module 11 Review.
A Credit-based Home Access Point (CHAP) to Improve Application Performance on IEEE Networks Choong-Soo Lee, Mark Claypool and Robert Kinicki Worcester.
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
1 Application Layer. 2 Writing Networked Applications TCP UDP IP LL PL TCP UDP IP LL PL TCP UDP IP LL PL Web Browser Web Server Ftp Server Ftp Client.
Traffic Sensitive Active Queue Management - Mark Claypool, Robert Kinicki, Abhishek Kumar Dept. of Computer Science Worcester Polytechnic Institute Presenter.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
Advanced Web 2012 Lecture 2 Sean Costain How the Web Works - Refresh Sean Costain 2012 The web is a matrix of servers that handle client requests.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
February 7, 2003BU Computer Science Colloquium Crimson - Traffic Aware Active Queue Management Mark Claypool CS Department Worcester Polytechnic Institute.
The Effects of Latency on Player Performance in Cloud-based Games Mark Claypool and David Finkel Computer Science and Interactive.
Introduction 1 Lecture 5 Application Layer slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
The internet and the WWW
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
A Credit-based Home Access Point (CHAP) to Improve Application Performance on IEEE Networks Choong-Soo Lee, Mark Claypool and Robert Kinicki In.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
2000/3/9QoS Introduction1 References: 1.Paul Ferguson and Geoff Huston, Quality of Service, John Wiley & Sons, Xipeng Xiao and Lionel M. Ni, “Internet.
Sockets process sends/receives messages to/from its socket
6/1/991 Internetworking connectionless and connection-oriented networks Malathi Veeraraghavan Mark Karol Polytechnic UniversityBell Laboratories
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
Making the Best of the Best-Effort Service (2) Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot.
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
Chapter 1 Communication Networks and Services Network Architecture and Services.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Thin to Win? Network Performance Analysis of the OnLive Thin Client Game System Mark Claypool, David Finkel, Alexander Grant and Michael Solano Computer.
Worcester Polytechnic Insitute, Worcester, MA, USA1 Traffic Sensitive Active Queue Management for Improved Multimedia Streaming Authors: Vishal Phirke,
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
A Credit-based Home Access Point (CHAP) to Improve Application Quality on IEEE Networks Choong-Soo Lee Ph.D. Dissertation Defense Worcester Polytechnic.
Review: – Why layer architecture? – peer entities – Protocol and service interface – Connection-oriented/connectionless service – Reliable/unreliable service.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Multimedia Streaming I. Fatimah Alzahrani. Introduction We can divide audio and video services into three broad categories: streaming stored audio/video,
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
1.2 The Network Edge Beginning at the edge of a network we are looking at the components with which we are most familiar - namely, the computers that we.
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
I. Basic Network Concepts
Internet Applications & Programming
Networking for Home and Small Businesses – Chapter 6
Computer Networks Protocols
Presentation transcript:

Treatment-Based Traffic Signatures Mark Claypool Robert Kinicki Craig Wills Computer Science Department Worcester Polytechnic Institute

October 2007 IMRG WACI, Cambridge, MA, USA2 Diversity of Internet Applications in the Home Web Browsing Network Games Video Streaming Voice over IP Remote Login Instant Messaging Sensors Delay Insensitive Delay Sensitive P2P File Sharing Loss Sensitive Loss Insensitive Jitter Insensitive Jitter Sensitive

October 2007 IMRG WACI, Cambridge, MA, USA3 Proliferation of Network Devices in the Home Wireless Access Point Hand Held Game Devices Personal Computers Printers and Faxes Mobile Phones Streaming Video Servers Game Consoles IP Phone (to Internet) Opportunity…  “Smart” AP Automatically improves performance Interoperable, easy-to- use But first…  Need to classify applications Then can apply treatment to improve QoS

October 2007 IMRG WACI, Cambridge, MA, USA4 Outline Introduction(done) Goals +(next) Classification Preliminary Results Ongoing Work

October 2007 IMRG WACI, Cambridge, MA, USA5 Goals Classification for purpose of QoS treatments (versus DoS prevention or billing or measurement or …) –Want match between signatures and potential treatments Not classifying applications  instead concentrate on nature of traffic for specific applications and devices –Different applications with same QoS requirements should get equal network treatments e.g. VoIP and network game –Not all instances of a particular application yield the same signature, nor is that needed e.g. Web for browsing, Web for download

October 2007 IMRG WACI, Cambridge, MA, USA6 Related Approaches Port classification alone does not work –Applications can share ports e.g. Non Web apps use port 80 around firewalls e.g. scp and ssh both over port 22 –Users run applications on non-standard ports e.g. Web server on different port since 80 restricted –New applications not officially defined for ports Payload examination alone does not work –Increased encryption at application layer –Can be computationally expensive –New applications cannot be identified this way Machine learning alone does not work –Takes too long in real-time, so must be done offline first –Needs external validation, so does not work with new apps

October 2007 IMRG WACI, Cambridge, MA, USA7 Domain Provide classification in wireless Access Point (AP), the same point that provides QoS treatment Home environment –Both directions of a flow travel through AP –Users are not trying to avoid classification –Can be customized and flexible per-flow treatments Home APs carry few flows compared to core router Needs to be real-time –Quick, so as to apply treatment to improve QoS

October 2007 IMRG WACI, Cambridge, MA, USA8 Outline Introduction(done) Goals +(done) Classification(next) Preliminary Results Ongoing Work

October 2007 IMRG WACI, Cambridge, MA, USA9 Treatment-Based Classification Nature of Reverse Traffic Response-basedNon-response-based Packet Size Tendency Full Non-full Transmission Spacing As available Paced Drop Packets Space Packets ftp p2p web telnet ssh games streaming voip sensors Push Packets Delay Packets

October 2007 IMRG WACI, Cambridge, MA, USA10 Outline Introduction(done) Goals +(done) Classification(done) Preliminary Results(next) Ongoing Work

October 2007 IMRG WACI, Cambridge, MA, USA11 Preliminary Results Captured 20-second traces from some representative applications Nature of reverse traffic –Response based or Non-response based Packet size tendency –Full or Non-full Transmission spacing –Paced or As-available

October 2007 IMRG WACI, Cambridge, MA, USA12 Nature of Reverse Traffic TCP automatically makes it response-based UDP is trickier - is a downstream packet sent in response to one upstream (or vice versa)? First, try simple up/down count: ApplicationDownUp Streaming video Network game VoIP More work needed …

October 2007 IMRG WACI, Cambridge, MA, USA13 Packet Size Tendency http – browsing cnn wsm – video ssh – reading ftp – large file

October 2007 IMRG WACI, Cambridge, MA, USA14 Transmission Spacing (1 of 2) wsm – videossh – reading ftp – large file http – browsing cnn

October 2007 IMRG WACI, Cambridge, MA, USA15 Transmission Spacing (2 of 2) http – browsing http – download http – streaming

October 2007 IMRG WACI, Cambridge, MA, USA16 Data for Some Other Applications voip – packet sizegame – packet size game – transmission spacingvoip – transmission spacing

October 2007 IMRG WACI, Cambridge, MA, USA17 Ongoing Work Differentiation of “paced” and “as available” Identification of “responsed-based” UDP –e.g. DNS or VoIP over DCCP Definition of “full” packets –e.g. Streaming video packets of 1400 bytes “Memory” of classification –e.g. in Second Life, interact on estate then teleport –Statistics: continuous, weighted, or windowed –Across flows for the same device e.g. Game console (Xbox) versus PC Need for more traces of applications in the home

Treatment-Based Traffic Signatures Mark Claypool Robert Kinicki Craig Wills Computer Science Department Worcester Polytechnic Institute