LiTGen, a lightweight traffic generator: application to mail and P2P wireless traffic Chloé Rolland*, Julien Ridoux + and Bruno Baynat* * Laboratoire LIP6.

Slides:



Advertisements
Similar presentations
OPC Koustenis, Breiter. General Comments Surrogate for Control Group Benchmark for Minimally Acceptable Values Not a Control Group Driven by Historical.
Advertisements

Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Modeling User Activities in a Large IPTV System Tongqing Qiu, Jun (Jim) Xu (Georgia Tech) Zihui Ge, Seungjoon Lee, Jia Wang, Qi Zhao (AT&T Lab – Research)
Speaker: Yu-Fu Huang Advisor: Dr. Kai-Wei Ke Date : 2014, Mar. 17 A page-oriented WWW traffic model for wireless system simulations.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Network and Service Assurance Laboratory Analysis of self-similar Traffic Using Multiplexer & Demultiplexer Loaded with Heterogeneous ON/OFF Sources Huai.
REDUNDANCY IN NETWORK TRAFFIC: FINDINGS AND IMPLICATIONS Ashok Anand Ramachandran Ramjee Chitra Muthukrishnan Microsoft Research Lab, India Aditya Akella.
Accurate & scalable models for wireless traffic workload Assistant Professor Department of Computer Science, University of Crete & Institute of Computer.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
1 Self-Similar Ethernet LAN Traffic Carey Williamson University of Calgary.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
Multi-level Application-based Traffic Characterization in a Large-scale Wireless Network Maria Papadopouli 1,2 Joint Research with Thomas Karagianis 3.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Before start… Earlier work single-path routing in sensor networks
Variance of Aggregated Web Traffic Robert Morris MIT Laboratory for Computer Science IEEE INFOCOM 2000’
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
Estimating Congestion in TCP Traffic Stephan Bohacek and Boris Rozovskii University of Southern California Objective: Develop stochastic model of TCP Necessary.
1 An Information-theoretic Approach to Network Measurement and Monitoring Yong Liu, Don Towsley, Tao Ye, Jean Bolot.
Self-Similar through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level Walter Willinger, Murad S. Taqqu, Robert Sherman,
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
Network Traffic Modeling Punit Shah CSE581 Internet Technologies OGI, OHSU 2002, March 6.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
Investigating Depth-Fanout Trade-Off in WiMAX Mesh Networks Salim Nahle Luigi Iannone Benoit Donnet Timur Friedman Laboratoire LIP6 – CNRS Université Pierre.
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
Topology information component Thomas Bourgeau Laboratoire LIP6 – CNRS Université Pierre et Marie Curie – Paris 6 1st July - OneLab.
Estimating Bandwidth of Mobile Users Sept 2003 Rohit Kapoor CSD, UCLA.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Spatio-Temporal Modeling of Traffic Workload in a Campus WLAN Felix Hernandez-Campos 3 Merkouris Karaliopoulos 2 Maria Papadopouli 1,2,3 Haipeng Shen 2.
NETW 707 Modeling and Simulation Amr El Mougy Maggie Mashaly.
Huirong Fu and Edward W. Knightly Rice Networks Group Aggregation and Scalable QoS: A Performance Study.
IMPACT OF MOBILITY IN DENSE LTE-A NETWORKS WITH SMALL CELLS M. Bruno Baynat (Université Pierre et Marie Curie – LIP6) Mme. Raluca-Maria Indre (Orange Labs)
Measuring the Congestion Responsiveness of Internet Traffic Ravi Prasad & Constantine Dovrolis Networking and Telecommunications Group College of Computing.
Microsoft Research1 Characterizing Alert and Browse Services for Mobile Clients Atul Adya, Victor Bahl, Lili Qiu Microsoft Research USENIX Annual Technical.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
CS551: End-to-End Packet Dynamics Paxon’99 Christos Papadopoulos (
Ó 1998 Menascé & Almeida. All Rights Reserved.1 Part V Workload Characterization for the Web (Book, chap. 6)
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows Nabil Schear David M. Nicol University of Illinois at Urbana-Champaign Department.
School of Engineering and Design Creative Industries Business Aspects and Activities Network Planning of Future Internet.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
June 10, 1999 Discrete Event Simulation - 3 What other subsystems do we need to simulate? Although Packets are responsible for the largest amount of events,
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Unconstrained Endpoint Profiling Googling the Internet Ionut Trestian, Supranamaya Ranjan, Alekandar Kuzmanovic, Antonio Nucci Reviewed by Lee Young Soo.
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Injecting Realistic Burstiness to.
Ó 1998 Menascé & Almeida. All Rights Reserved.1 Part V Workload Characterization for the Web.
1 Capacity Dimensioning Based on Traffic Measurement in the Internet Kazumine Osaka University Shingo Ata (Osaka City Univ.)
Burst Metric In packet-based networks Initial Considerations for IPPM burst metric Tuesday, March 21, 2006.
Doc.: IEEE /1317r0 Submission December 2009 Vinko Erceg, BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Presenter: Kuei-Yu Hsu Advisor: Dr. Kai-Wei Ke 2013/4/29 Detecting Skype flows Hidden in Web Traffic.
Multiplicative Cascade Modeling of Computer Network Traffic Patricia H. Carter B10, NSWCCDD Interface 2002 April 19,2002.
ASTUTE: Detecting a Different Class of Traffic Anomalies Fernando Silveira 1,2, Christophe Diot 1, Nina Taft 3, Ramesh Govindan 4 1 Technicolor 2 UPMC.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
MODELING THE SELF-SIMILAR BEHAVIOR OF PACKETIZED MPEG-4 VIDEO USING WAVELET-BASED METHODS Dogu Arifler and Brian L. Evans The University of Texas at Austin.
1 An Analytical Model for the Dimensioning of a GPRS/EDGE Network with a Capacity Constraint on a Group of Cells r , r , r Nogueira,
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
User Mobility Modeling and Characterization of Mobility Patterns Mahmood M. Zonoozi and Prem Dassanayake IEEE Journal on Selected Areas in Communications.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
Asymptotic Analysis for Large Scale Dynamic Stochastic Games Sachin Adlakha, Ramesh Johari, Gabriel Weintraub and Andrea Goldsmith DARPA ITMANET Meeting.
#16 Application Measurement Presentation by Bobin John.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
Impact of Packet Sampling on Anomaly Detection Metrics
CPSC 641: LAN Measurement Carey Williamson
Monkey See, Monkey Do A Tool for TCP Tracing and Replaying
Realistic and Responsive Network Traffic Generation
Carey Williamson Department of Computer Science University of Calgary
pathChirp Efficient Available Bandwidth Estimation
pathChirp Efficient Available Bandwidth Estimation
Presentation transcript:

LiTGen, a lightweight traffic generator: application to mail and P2P wireless traffic Chloé Rolland*, Julien Ridoux + and Bruno Baynat* * Laboratoire LIP6 – CNRS Université Pierre et Marie Curie – Paris 6 + ARC Special Research Center for Ultra-Broadband Communications (CUBIN), The University of Melbourne

1 Generating IP traffic with accurate timescales properties  General framework: multiple applications  LiTGen, a lightweight traffic generator – Semantically meaningful structure – Does not rely on a network and/or TCP emulator – Fast computation  Measurement based validation  Application to mail and P2P wireless traffic Web Mail P2P Etc.

2 LiTGen’s underlying model  Focus on the download path  Do not consider up/down interactions  Focus on TCP traffic  Approach – Application oriented & User oriented – Semantically meaningful hierarchical model

3 LiTGen’s underlying model SESSION IS OBJECT PACKETS: T IS IA OBJ N SESSION N OBJ IA PKT

4 Basic vs. Extended LiTGen  Basic LiTGen Renewal processes Successive random variables (R.V.) i.i.d. No dependency between different R.V.  Extended LiTGen Renewal processes Dependency introduced, the average packets inter-arrival depends on the objects size: IA pkt = f(N obj )

5 Calibration by inspection of the wireless trace Download traffic Mail traffic Mail traffic to user 2 Mail traffic to user i Application filter src port select. User filter Mail traffic to user 1 Mail traffic to user i Sessions Session id. Objects id. Objects  Wireless trace: US ISP wireless network

6 Validation methodology  Wavelet analysis of the packets arrival times series (LDE) Captured trace Synthetic trace ? Energy spectrum comparison

7 Comparison of different kinds of traffics spectra (1/2) Web + Mail + P2P traffic

8 Comparison of different kinds of traffics spectra (2/2) Mail traffic P2P traffic

9 Further validation: semi-experiments (SE)  Does LiTGen reproduces the traffic internal structure?  Semi-experiments – Manipulation of internal parameters – Impact of the manipulation: importance of the parameters modified ?

10 Example of SE: P-Uni  Uniformly distributes packets arrival times within each object  Examine impact of in-objects packets burstiness Captured trace P-Uni Synthetic trace P-Uni 2. Similar reaction ? 1. Impact ?

11 SE results: mail traffic Captured trace Synthetic trace

12 SE results: P2P traffic Captured trace Synthetic trace

13 Traffic sensitivity with regards to the distributions  Random Variables (R.V.) distributions? – Heavy-tailed distributions important? – Source of correlation in traffic?  Investigation of each R.V. separately – Replace individually the empirical distribution of the studied R.V. by a memoryless distribution – Model the other R.V. by the empirical distributions – Impact on the spectra? – Conclusion on the importance of the R.V. distribution

14 Mail traffic sensitivity Insensitive distributions Sensitive distributions

15 P2P traffic sensitivity Insensitive distributions Sensitive distributions

16 Conclusion  Extended LiTGen reproduces accurately the traffic scaling properties  Investigation of the impact of the R.V. distributions – The in-objects organization is crucial – Heavy-tailed distribution correlation – Give insights for the development of accurate traffic models

17 Future works  Dependency introduced in Extended LiTGen  Realistic performance prediction? – Burstiness: strong implications on queuing & performance – Compare the performance of a model fed by The captured traffic The synthetic traffic from LiTGen Simpler renewal processes

18 Thank you !

19 Trace originating on the Sprint access network