1 Long-Range Dependence in a Changing Internet Traffic Mix STATISTICAL and APPLIED MATHEMATICAL SCIENCES INSTITUTE Félix Hernández-Campos Don Smith Department.

Slides:



Advertisements
Similar presentations
Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
Advertisements

Research Directions Mark Crovella Boston University Computer Science.
Estimation and identification of long-range dependence in Internet traffic Thomas Karagiannis University of California,
SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, :30 pm –
Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similarity in WAN Traffic A subsequent paper established the presence of network.
Bandwidth Estimation Workshop 2003 Evaluating pathrate and pathload with realistic cross-traffic Ravi Prasad Manish Jain Constantinos Dovrolis (ravi, jain,
Network Performance Measurement
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
2014 Examples of Traffic. Video Video Traffic (High Definition) –30 frames per second –Frame format: 1920x1080 pixels –24 bits per pixel  Required rate:
1 “Tracking the Evolution of Web Traffic: Felix Hernandez-Campos, Kevin Jeffay, F. Donelson Smith IEEE/ACM International Symposium on Modeling,
IEEE PIMRC A Comparative Measurement Study of the Workload of Wireless Access Points in Campus Networks Maria Papadopouli Assistant Professor Department.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Tcpdump Traceroute Ping. A packet tracing tool  Works on various host platforms  Captures packets going through a certain network interface  Shows.
1 LAN Traffic Measurements Carey Williamson Department of Computer Science University of Calgary.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
1 Self-Similar Ethernet LAN Traffic Carey Williamson University of Calgary.
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
A simulation-based comparative evaluation of transport protocols for SIP Authors: M.Lulling*, J.Vaughan Department of Computer science, University college.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Network Monitoring: A Practical Approach Philip Smith/IT Services University of Windsor March 21, 2003.
Available bandwidth measurement as simple as running wget D. Antoniades, M. Athanatos, A. Papadogiannakis, P. Markatos Institute of Computer Science (ICS),
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
Network Analyzer Example
Tracking the Evolution of Web Traffic: Felix Hernandez-Campos, Kevin Jeffay F. Donelson Smith IEEE/ACM International Symposium on Modeling, Analysis.
1 Using A Multiscale Approach to Characterize Workload Dynamics Characterize Workload Dynamics Tao Li June 4, 2005 Dept. of Electrical.
Variance of Aggregated Web Traffic Robert Morris MIT Laboratory for Computer Science IEEE INFOCOM 2000’
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
Copyright © 2005 Department of Computer Science CPSC 641 Winter LAN Traffic Measurements Some of the first network traffic measurement papers were.
1 TCP Traffic Analysis in cooperation with Motorola Todd DeSantis and David Loose Advisor: Professor Mark Claypool Co-Advisor: Professor Robert Kinicki.
A Signal Analysis of Network Traffic Anomalies Paul Barford, Jeffrey Kline, David Plonka, and Amos Ron.
Confidence Intervals for Proportions
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Junxian Huang 1 Feng Qian 2 Yihua Guo 1 Yuanyuan Zhou 1 Qiang Xu 1 Z. Morley Mao 1 Subhabrata Sen 2 Oliver Spatscheck 2 1 University of Michigan 2 AT&T.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Traffic Modeling.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
12a. Regression Analysis, Part 1 CSCI N207 Data Analysis Using Spreadsheet Lingma Acheson Department of Computer and Information Science,
CS 447 Networks and Data Communication
TFRC: TCP Friendly Rate Control using TCP Equation Based Congestion Model CS 218 W 2003 Oct 29, 2003.
Time Series Data Analysis - I Yaji Sripada. Dept. of Computing Science, University of Aberdeen2 In this lecture you learn What are Time Series? How to.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
Spatio-Temporal Modeling of Traffic Workload in a Campus WLAN Felix Hernandez-Campos 3 Merkouris Karaliopoulos 2 Maria Papadopouli 1,2,3 Haipeng Shen 2.
Analysis of Internet Backbone Traffic and Header Anomalies Observed Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers.
The Joint Distribution of Internet Flow Sizes and Durations C HEOLWOO P ARK J. S TEPHEN M ARRON The University of North Carolina at Chapel Hill.
AP Statistics Chapter 15 Notes. Inference for a Regression Line Goal: To determine if there is a relationship between two quantitative variables. –i.e.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Bandwidth Estimation Workshop 2003 Evaluating pathrate and pathload with realistic cross-traffic Ravi Prasad Manish Jain Constantinos Dovrolis (ravi, jain,
A Nonstationary Poisson View of Internet Traffic Thomas Karagiannis joint work with Mart Molle, Michalis Faloutsos, Andre Broido.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
1 Hailuoto Workshop A Statistician ’ s Adventures in Internetland J. S. Marron Department of Statistics and Operations Research University of North Carolina.
Investigating the Prefix-level Characteristics A Case Study in an IPv6 Network Department of Computer Science and Information Engineering, National Cheng.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Could SP-NAT Save the Internet?
CPSC 641: LAN Measurement Carey Williamson
Linear Regression.
CPSC 641: WAN Measurement Carey Williamson
Mark E. Crovella and Azer Bestavros Computer Science Dept,
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Carey Williamson Department of Computer Science University of Calgary
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Carey Williamson Department of Computer Science University of Calgary
CPSC 641: Network Traffic Self-Similarity
Presentation transcript:

1 Long-Range Dependence in a Changing Internet Traffic Mix STATISTICAL and APPLIED MATHEMATICAL SCIENCES INSTITUTE Félix Hernández-Campos Don Smith Department of Computer Science, UNC-Chapel Hill J. S. Marron Department of Statistics and Operations Research, UNC-Chapel Hill Cheolwoo Park SAMSI David Rolls Department of Mathematics and Statistics, UNC-Wilmington

2 Measurements UNC Internet Capture TCP/IP packet headers on Gigabit Ethernet link (inbound from Internet) Monitor (tcpdump) 1 Gbps Ethernet ~35,000 Internet Users

3 Summary data 2002 Traces2002 Traces ~ 5 billion packets ~ 1.6 terabytes of network traffic ~ 95% TCP packets ~ 5% UDP packets ~ 93% TCP bytes ~ 7% UDP bytes 10% max 2-hr. mean link utilization 0.01%-0.16% packets dropped by monitor Two-hour traces, 2 nd week in April of 2002 and 2003Two-hour traces, 2 nd week in April of 2002 and 2003 –5:00 AM, 10:00 AM, 3:00 PM, 9:30 PM on each of 7 days –28 traces (56 hours) per year 2003 Traces2003 Traces ~ 10 billion packets ~ 2.9 terabytes of network traffic ~ 75% TCP packets ~ 25% UDP packets ~ 86% TCP bytes ~ 14% UDP bytes 18% max 2-hr. mean link utilization 0 packets dropped by monitor

4 Hurst parameter (H) estimates and confidence intervals H estimated from wavelet analysis tools (“logscale diagrams” of D. Veitch)H estimated from wavelet analysis tools (“logscale diagrams” of D. Veitch) H estimates for 2003 packet counts were significantly lower than for 2002 (not true for byte counts).H estimates for 2003 packet counts were significantly lower than for 2002 (not true for byte counts). Several traces had H > 1 or very wide confidence intervals.Several traces had H > 1 or very wide confidence intervals. H estimates were independent of time of day or day of week (both packets and bytes) in both years.H estimates were independent of time of day or day of week (both packets and bytes) in both years.

5 H not related to link utilization or active TCP connections

6 Extreme examples of H > 1 or wide confidence intervals

7 Dependent SiZer analysis of wide CI example Test for statistically significant differences from FGN process with parameters estimated from data, H=0.8Test for statistically significant differences from FGN process with parameters estimated from data, H=0.8 Top: local linear smoothing of data with different window widthsTop: local linear smoothing of data with different window widths Bottom: statistical inference on trends of smoothed curve at each window widthBottom: statistical inference on trends of smoothed curve at each window width

8 Dependent SiZer analysis of H > 1 example Analysis shows both non-linear trends and greater variability than FGN process at many time scalesAnalysis shows both non-linear trends and greater variability than FGN process at many time scales

9 Logscale diagram of typical 2002 and 2003 traces Protocol dependent analysis suggested by increase in UDPProtocol dependent analysis suggested by increase in UDP Filtered traces to create new traces: TCP only and UDP onlyFiltered traces to create new traces: TCP only and UDP only TCP is dominant influence in all cases except 2003 packet counts where UDP dominates.TCP is dominant influence in all cases except 2003 packet counts where UDP dominates. Sharp increase at middle scales shapes H estimate (less slope so lower H).Sharp increase at middle scales shapes H estimate (less slope so lower H).

10 Same conclusion for all traces. Why?

11 The Blubster effect (2003’s hot new peer-to-peer file sharing application) Recall that UDP packets increased to 25% of 2003 packets (but only 14% of bytes).Recall that UDP packets increased to 25% of 2003 packets (but only 14% of bytes). Analysis of UDP packets found 70% from application (Blubster) in 2003 that was negligible in 2002.Analysis of UDP packets found 70% from application (Blubster) in 2003 that was negligible in Second filtering: make Blubster-only and “Rest (TCP + other UDP) traces.Second filtering: make Blubster-only and “Rest (TCP + other UDP) traces. Blubster alone dominated H estimate for packets, not bytesBlubster alone dominated H estimate for packets, not bytes

12 Why? Blubster’s packet traffic is periodic SiZer analysis of Blubster trace looking for structure beyond white noiseSiZer analysis of Blubster trace looking for structure beyond white noise Found high-frequency variability with periods in 1-5 second range (caused by update and search queries among peers)Found high-frequency variability with periods in 1-5 second range (caused by update and search queries among peers) These correspond to the time-scales in logscale diagram where UDP dominates the wavelet coefficients.These correspond to the time-scales in logscale diagram where UDP dominates the wavelet coefficients.

13 Results summary We presented results from a study of traffic on the UNC Internet link from two years, 2002 and 2003.We presented results from a study of traffic on the UNC Internet link from two years, 2002 and A single application generating about 18% of packets and < 10% of bytes in traces can strongly influence the H estimate (in this case, because of periodic behavior).A single application generating about 18% of packets and < 10% of bytes in traces can strongly influence the H estimate (in this case, because of periodic behavior). A significant number of traces produced H estimates >1 or wide confidence intervals.A significant number of traces produced H estimates >1 or wide confidence intervals. Dependent Sizer is an effective tool for augmenting wavelet analysis and understanding structure in Internet data.Dependent Sizer is an effective tool for augmenting wavelet analysis and understanding structure in Internet data. H was not related to time-of-day, day-of-week, link utilization, or number of active TCP connections.H was not related to time-of-day, day-of-week, link utilization, or number of active TCP connections.