Critical Path Analysis of TCP Transactions Authors:Paul Barford (University of Wisconsin-Madison) Mark Crovella (University of Boston) Member, IEEE Source:IEEE/ACM.

Slides:



Advertisements
Similar presentations
Introduction 1 Lecture 13 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
Advertisements

SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic CS740 Project Presentation by N. Gupta, S. Kumar, R. Rajamani.
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Internet Performance Dynamics Boston University Computer Science Department Fall, 2000 Paul Barford.
SPDY - Clean Slate HTTP About SPDY o What is SPDY o Goals o Features About HTTP o Simple HTTP o Pipelining for cuncurrency o Pipelining doesn’t help SPDY.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
1 CS492B Project #2 TCP Tutorial # Jin Hyun Ju.
6-May-154/598N: Computer Networks End-to-End Protocols Underlying best-effort network –drop messages –re-orders messages –delivers duplicate copies of.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
1 Web Server Performance in a WAN Environment Vincent W. Freeh Computer Science North Carolina State Vsevolod V. Panteleenko Computer Science & Engineering.
Multi-Layer Analysis of Web Browsing Performance for Wireless PDAs Adesola Omotayo & Carey Williamson June 1, 2015.
1 Network Measurements of a Wireless Classroom Network Carey Williamson Nuha Kamaluddeen Department of Computer Science University of Calgary.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
Modeling of Web/TCP Transfer Latency Yujian Peter Li January 22, 2004 M. Sc. Committee: Dr. Carey Williamson Dr. Wayne Eberly Dr. Elena Braverman Department.
Introduction Future wireless systems will be characterized by their heterogeneity - availability of multiple access systems in the same physical space.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
CSEE W4140 Networking Laboratory Lecture 7: TCP flow control and congestion control Jong Yul Kim
Tracking the Evolution of Web Traffic: Felix Hernandez-Campos, Kevin Jeffay F. Donelson Smith IEEE/ACM International Symposium on Modeling, Analysis.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Performance Comparison of Congested HTTP/2 Links Brian Card, CS /7/
UCB TCP Jean Walrand U.C. Berkeley
Web Transfer Latency Study Presented by Ye Xia WebTP Presentation, Aug. 28, 2000 Paper Presented: Paul Barford and Mark Crovella, “Critical Path Analysis.
5/12/05CS118/Spring051 A Day in the Life of an HTTP Query 1.HTTP Brower application Socket interface 3.TCP 4.IP 5.Ethernet 2.DNS query 6.IP router 7.Running.
Spring 2002CS 4611 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
 Zhichun Li  The Robust and Secure Systems group at NEC Research Labs  Northwestern University  Tsinghua University 2.
1 Transport Layer Computer Networks. 2 Where are we?
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Modeling TCP Throughput: A Simple Model and its Empirical Validation Ross Rosemark Penn State University.
Transport Layer3-1 TCP sender (simplified) NextSeqNum = InitialSeqNum SendBase = InitialSeqNum loop (forever) { switch(event) event: data received from.
Protocol(TCP/IP, HTTP) 송준화 조경민 2001/03/13. Network Computing Lab.2 Layering of TCP/IP-based protocols.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_b Transport Protocols - TCP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
Section 5: The Transport Layer. 5.2 CS Computer Networks John Mc Donald, Dept. of Computer Science, NUI Maynooth. Introduction In the previous section.
Transport Layer: UDP, TCP
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Performance of HTTP Application in Mobile Ad Hoc Networks Asifuddin Mohammad.
Chapter 12 Transmission Control Protocol (TCP)
1 Introduction to Computer Networks University of ilam Dr. Mozafar Bag-Mohammadi Transport Layer.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
3 June Paris Seminar Modelling and Analysis of TCP’s Connection Management Procedures Jonathan Billington and Bing Han Computer Systems Engineering.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
81 Sidevõrgud IRT 0020 loeng okt Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
TCP Behavior Inference Tool Jitendra Padhye, Sally Floyd Presented by Songjie Wei.
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
Chapter 9: Transport Layer
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
Advance Computer Networks Lecture#09 & 10 Instructor: Engr. Muhammad Mateen Yaqoob.
Connection Establishment and Termination. Tcpdump tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept.
CS 6401 The World Wide Web Outline Background Structure Protocols.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
CIS679: TCP and Multimedia r Review of last lecture r TCP and Multimedia.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Internet Networking recitation #9
5. End-to-end protocols (part 1)
Chapter 6 The Transport Layer.
Internet Networking recitation #10
The War Between Mice & Elephants by, Matt Hartling & Sumit Kumbhar
Chapter 5 TCP Control Flow
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Critical Path Analysis of TCP Transactions Authors:Paul Barford (University of Wisconsin-Madison) Mark Crovella (University of Boston) Member, IEEE Source:IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9,NO. 3, JUNE 2001 Presented by Chin-Yi Tsai

2 Outline Introduction Mechanics of Critical Path Analysis Experiment Conclusions and Future Work

3 Introduction Motivation Identifying root causes of response time Critical Path Definition

4 Introduction(cont.) Motivation What are the root causes of delay in TCP transactions? Server Network Server/Network interaction

5 Introduction(cont.) Identify root causes of response time Delays can occur in many points along end-to-end path simultaneously Pinpointing where delays occur and which delays matter is difficult Identify precisely the determiners of response time in TCP transaction ClientServer router1 router3 router2

6 Introduction(cont.) Critical Path Definition The longest path in the tree starting from the root A weighted chain of dependence relations running from the connection ’ s first data packet to its last data packet sent reducing the execution times of activities on the critical path will certainly reduce overall response time, while this is not necessarily true for activities off the critical path Events on the critical path are the “ right ” ones for examining the sources of delay (rather than all events during the entire transfer)

7 Mechanics of Critical Path Analysis Critical Path for a Unidirectional TCP Flow Discovering the Critical Path for an HTTP Transaction Critical Path Discovery and profile Algorithm Limitations

8 Critical Path for Unidirectional TCP Flow Packet Dependence Graph (PDG) Possible Nodes Possible Arcs

9 Packet Dependence Graph (PDG) Client 1 or more data packets ACK packet ClientServer D D D D D D D D D D A A A D A A DD DD System Time line Graph D D A A DD AAA D D DD D DD D D D Server D

10 Possible Nodes Server side a. arrival of an ACK packet b. departure of a data packet Client side c. arrival of an data packet d. departure of an ACK packet ClientServer D D D D D D D D D D A A A D D D D D a b c d

11 Possible Node(cont.) ClientServer D D D D D D D D D D A A A D D D D D a b c d D A A DD DD A A DD AAA D D DD D DD D PDGTime line

12 Possible Arcs Type1 from the arrival of that data packet to the departure of that ACK packet (at client side) Type2 its departure at one endpoint to its arrival at the other endpoint (server-to-client, client-to-server) Type3 from the arrival of the ACK to the departure of each liberated data packets (at server side) Type4 from the departure of the dropped packet to the departure of the earliest subsequent retransmission (at server side)

13 Possible Arcs (cont.) Client Server type1 type2 type3 type4 D D D D A A A drop Network delay Client delay Server delay Packet loss delay

14 Discovering the Critical Path for an HTTP Transaction Four stages for HTTP/ connection establishments (SYN, SYN-ACK, ACK) 2. packets sequence delivering HTTP GET 3. data transfer in response to GET (file size dependent) 4. connection tear-down (FIN, ACK, FIN, ACK)

15 Discovering the Critical Path for an HTTP Transaction FIN x HTTP GET Ack k+1 SYN k,Ack j+1 SYN j Ack y+1 FIN y Ack x+1 Connection Establishment Application Protocol Bulk Transfer Connection Tear Down ClientServerProfile Network delay Server delay Client delay

16 Critical Path Discovery and profile Algorithm Capture of packet traces Analysis of rounds Construction of critical path Profiling of the critical path

ClientServer Original Data Flow 1461: : :13141 drop : : : : :29201 ack 2921 ack 7301 ack ack ack ack Number Rounds Bytes Liberated 1: : : : : : : ClientServer Critical Path 1461: : :13141 drop : : :29201 ack 2921 ack 7301 ack ack ack Profile Network Delay Server Delay Client Delay Drop Delay

18 Limitations Details of the web transactions Example: DNS Delay in the browser Browser parse time

19 Experiment Experimental Setup Experimental Results

20 Experimental Setup Apache server on Linux or FreeBSD Server load controlled by SURGE Web load generator: high or low load One PC collect TCP packet traces One PC measures network conditions Boston University Harvard University Denver University (Server) (client2) (client1)

21 Experimental Results Effect of File Size Effect of Network Load

22 CPA results for 1KB(small) file Seconds LN, LSLN, HSHN, LSHN, HS Net Variance Propagation Server Time Out Client Fast Retrans Latency is dominated by server load

23 CP time line diagrams for 1KB file Low Server Load High Server Load Server delay

24 CPA results for 20KB(medium) file Seconds LN, LSLN, HSHN, LSHN, HS Net Variance Propagation Server Time Out Client Fast Retrans Both server load and network effects are significant

25 CPA results for 500KB(large) file Seconds LN, LSLN, HSHN, LSHN, HS Net Variance Propagation Server Time Out Client Fast Retrans Seconds LN, LSLN, HSHN, LSHN, HS Net Variance Propagation Server Time Out Client Fast Retrans Latency is dominated by network effects

26 Effect of File Size Small files: high server load: server delays can dominate low server load: network delay can dominate Medium files: high server load: propagation delay and server delay are comparable low server load: network delay can dominate Large files: network delay dominates overall transaction delay regardless of server load

27 Effect of Network For small and medium files, propagation delay is independent of network load or server load For large files, propagation delay are higher under high network load. There are more round-trips in the critical path due to more coarse-grained timeouts. Network queueing delay is less important than propagation delay.

28 Conclusions and Future Work Complex interactions between clients, the network and servers Complex packet transactions can be effectively understood using CPA CP profiling allowed precise assignment of delays Latency for small files is dominated by server load Latency for large files is dominated by network effects

29 Conclusions and Future Work(cont.) Future work Collect and analyze data from more client systems To consider the delay due to DNS Server/network integrated effects