Uncovering the Big Players of the Web

Size: px
Start display at page:

Download "Uncovering the Big Players of the Web"

Transcription

1 Uncovering the Big Players of the Web 3 rd TMA Workshop Vienna March 12 Vinicius Gehlen Alessandro Finamore Marco Mellia Maurizio M. Munafò TMA COST Action

2 Introduction 2 Nowadays Internet traffic volume is mainly HTTP + P2P Breakdown of downstream traffic of residential customers Mainly SSH, VoIP, DNS, , etc. + A plethora of services!

3 Methodology 3 Focus only on HTTP traffic Rely on to generate flow-level HTTP logs L4: #bytes, #pkts, RTT, etc. L7: service type and meta-data (e.g. video) Rely on organization data base Each server IP is associated to its owner n à AKAMAI TECHNOLOGIES

4 Dataset 4 3 vantage points (VPx) of an ISP in Italy Residential customers ADSL (VP2, VP3) + Fiber-To-The-Home (VP1) 1 week of traffic (20-24 June 2011)

5 5 OVERVIEW Which organizations? Volumes? Popularity?

6 Top10 (+ 1) organizations 6 Rank Org. Name % B % F 1 Google Akamai Leaseweb Megaupload Level Limelight PSINet Webzilla Choopa OVH Facebook Total % Google handles 2x the Akamai volume Besides Google and Akamai, many others known (Level3, Limelight, Leaseweb, Megaupload) less known (PSINet, Webzilla, Choopa) >10k organizations but 65% of volume is due to only 11 big players

7 Organizations popularity 7 % IP clients that have contacted the organization at least one time Organization % Client Video Content SW Update Adv. & Others Google 97.1 YouTube - Google services Akamai 97.2 Vimeo Microsoft, Apple Facebook static content, ebay Leaseweb 64.3 Megavideo - publicbt.com Megaupload 15.6 Megavideo - FileHosting Level YouPorn - Limelight 72.5 Pornhub, Veoh Avast quantserve, tinypic, Photobucket betclick, wdig, trafficjunky PSINet 44.6 Megavideo Kaspersky Imageshack Webzilla 13.2 Adult Video - Filesonic, Depositfiles 97% of clients contact Google and Akamai 63% of client clients contact OVH Advertisement 90.6% of clients contact Facebook!??!!? Choopa zshare OVH 63.1 Auditude - Telaxo, m2cai Facebook 90.6 Facebook - Facebook dynamic content

8 Why FB sees 90% of clients? 8 You visit nutella.com Slurp! There is an embedded object pointing to the FB fan page This generates a connection to FB So FB knows that you like nutella Privacy anyone?!?!

9 Why FB sees 90% of clients? 9 GET /plugins/like.php?href=http%3a%2f%2fwww.facebook.com %2FNutella.Italy&layout=box_count&show_faces=false&width=120&action=like&colorscheme =light&height=65 HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/ (KHTML, like Gecko) Version/5.1.3 Safari/ Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Referer: Accept-Language: en-us Accept-Encoding: gzip, deflate Cookie: presence=em euserfa a2estatefdsb2f0et2f_5b_5delm2fnulleuct2f BEtrFnullEtwF G H0EblcF0EsndF1CEchFDsubF_5b0_5dEp_5f F2CC; p=6; c_user= ; datr=fokptf9njodb9oshmlkp5e_ong..; lu=ggojzj70pxz6grarmpcnirxw; xs=1%3a889419cc0700aee88497c71b1015fa45%3a0%3a ; locale=en_us

10 10 CONTENT SERVED VIDEO? SSL/TLS?

11 Which content is served? 11 Video content is highly predominant

12 Which type of content is served? 12 Video content is highly predominant 90% of Google is YouTube video download

13 Which type of content is served? 13 Video content is highly predominant 90% of Google is YouTube video download The majority of FileHosting is actually video content

14 Which type of content is served? 14 20% of Akamai is Facebook

15 Which type of content is served? 15 20% of Akamai is Facebook Google, Akamai e Facebook have some HTTPS traffic

16 Evolution of HTTPS 16 Compare HTTPS traffic from June 11 and October 11 % Bytes % Flows Organization Jun Oct Jun Oct Google Akamai Leaseweb Level Limelight Megaupload Facebook No. of HTTPS connections are increasing for all the organizations 25% of Facebook connections were HTTPS in October 11 +7% of HTTPS volume for Akamai and Google in < 6 months

17 17

18 Flow size 18 The majority of the flows are small >50% of connection have < 10kB File Hosting organizations are serving a lot of short flows

19 Bulk download rate (1/2) 19 Focusing on connections with > 1MB, what is the download rate?

20 ORGANIZATIONS INFRASTRUCTURE BEHIND THE SCENES 20

21 RTT Latency towards the Internet 21 Minimum RTT is measured by Tstat on per-flow base Facebook has 2 locations (100ms e 170ms) Akamai and Limelight are the closest to the ISP (5ms) 3 Google datacenters are preferred Only <30% of request are served by the closest one (12ms)

22 Number of IPs 22 Organization No. % No. Top5 %bytes Google Akamai Leaseweb Level Limelight Megaupload Facebook Total IP addresses serve 65% of HTTP traffic Google handles 2x the Akamai volume with 1/3 of IPs Most of the traffic is served by few preferred IPs within an organization

23 Volume served by %IP 23

24 Bulk download rate (2/2) 24 Considering connection with > 1MB 1 2 All organizations but Akamai (and Facebook) have >90% connection >500kb/s Caching policies may have an impact: 1 Content already available à high bitrate 2 Content retrieved from backend à low bitrate

25 Conclusions 25 We investigated how the web looks like these days Some clear trends are visible Majority of traffic is handled by few big players HTTPS is becoming very popular Lot of datacenters to manage demand It is very difficult to understand Who owns and who serves the content Which policies are used How much data leaks to these players This makes a tangled web which is very hard to discern

26 26 RTT variation during the day

27 Breakdown del traffico HTTP Traffico HTTP su PDF: La frazione di traffico gestita da ciascuna organizzazione è costante nel tempo 27

28 Comparing days & locations 28 Short-term stability with marginal differences with respect to Days of the week Locations of the users

DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011]

DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011] DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011] Alessandro Finamore Marco Mellia Maurizio Munafò Ruben Torres Sanjay Rao 2nd TMA PhD School Objectives 1 YouTube is the most popular

More information

The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies

The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies A. Finamore, V. Gehlen, M. Mellia, M. M. Munafò Politecnico di Torino, Italy Email: lastname@tlc.polito.it S. Nicolini

More information

How To Write A Blog Post On Dropbox

How To Write A Blog Post On Dropbox Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage

More information

HTTP/2: Operable and Performant. Mark Nottingham @mnot (@akamai)

HTTP/2: Operable and Performant. Mark Nottingham @mnot (@akamai) HTTP/2: Operable and Performant Mark Nottingham @mnot (@akamai) This talk may be disappointing. As we know, there are known knowns; there are things we know we know. We also know there are known unknowns;

More information

YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience

YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 5-2-2 YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience A. Finamore Politecnico

More information

YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience

YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience Alessandro Finamore Politecnico di Torino finamore@tlc.polito.it Ruben Torres Purdue University rtorresg@purdue.edu

More information

Live Traffic Monitoring with Tstat: Capabilities and Experiences

Live Traffic Monitoring with Tstat: Capabilities and Experiences Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic

More information

Personal Cloud Storage: Usage, Performance and Impact of Terminals

Personal Cloud Storage: Usage, Performance and Impact of Terminals Personal Cloud Storage: Usage, Performance and Impact of Terminals Enrico Bocchi, Idilio Drago, Marco Mellia Politecnico di Torino name.surname@polito.it Abstract Personal cloud storage services such as

More information

Getting More Information On Your Network Performance

Getting More Information On Your Network Performance Getting More Information On Your Network Performance Luca Deri Network Traffic is a Moving Target For years network administrators have identified traffic protocols and services using IP

More information

YouTube All Around: Characterizing YouTube from Mobile and Fixed-line Network Vantage Points

YouTube All Around: Characterizing YouTube from Mobile and Fixed-line Network Vantage Points YouTube All Around: Characterizing YouTube from Mobile and Fixed-line Network Vantage Points Pedro Casas, Pierdomenico Fiadino, Arian Bär, Alessandro D Alconzo FTW - Telecommunications Research Center

More information

Exploring the Cloud from Passive Measurements: the Amazon AWS Case

Exploring the Cloud from Passive Measurements: the Amazon AWS Case Exploring the Cloud from Passive Measurements: the Amazon AWS Case Ignacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio Munafò DET, Politecnico di Torino, Italy {lastname}@tlc.polito.it Abstract

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,

More information

Towards Web Service Classification using Addresses and DNS

Towards Web Service Classification using Addresses and DNS Towards Web Service Classification using Addresses and DNS Martino Trevisan, Idilio Drago, Marco Mellia, Maurizio M. Munafò Politecnico di Torino, Italy (firstname.lastname@polito.it) Abstract The identification

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

CDN and Traffic-structure

CDN and Traffic-structure CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones

More information

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between

More information

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Dissecting Video Server Selection Strategies in the YouTube CDN Original Citation: Ruben Torres,Alessandro Finamore,Jin Ryong Kim,Marco

More information

Arnaud Becart ip- label 11/9/11

Arnaud Becart ip- label 11/9/11 Arnaud Becart ip- label 11/9/11 RUM Synthe2c Tests You should measure HTML and RIA (Flash ) Page Rendering Onload + Full Page Load InteracBons in your page Third Party content How Synthe2c / Real browsers

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Hypertext for Hyper Techs

Hypertext for Hyper Techs Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently

More information

An Overview of Amazon Silk Amazon s new cloud-powered browser

An Overview of Amazon Silk Amazon s new cloud-powered browser An Overview of Amazon Silk Amazon s new cloud-powered browser Jon Jenkins Twitter - @jonjenk jjenkin@amazon.com O Reilly Velocity EU November 8, 2011 Web Page Complexity is Steadily Increasing Amazon s

More information

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

Application Latency Monitoring using nprobe

Application Latency Monitoring using nprobe Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always

More information

Internet Traffic Evolution 2007-2011

Internet Traffic Evolution 2007-2011 Internet Traffic Evolution 2007-2011 Craig Labovitz April 6, 2011 Talk Outline Four-year ongoing inter-domain traffic study Review of 2010 results (NANOG / IETF / SIGCOMM) Methodology Changing carrier

More information

Software Product Information. Faba5 Website

Software Product Information. Faba5 Website Software Product Information Faba5 Website Valid from 09th March 2013 Copyright Faba5 GmbH, A-4020 Linz, 2013. All rights reserved. All hardware and software names used are registered trade names and/or

More information

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP Table of Contents Section Page Definitions 2 Terms of Service and Network Management Practices 2 Devices & Software that may be

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

Analyzing the Impact of YouTube Delivery Policies on User Experience

Analyzing the Impact of YouTube Delivery Policies on User Experience Analyzing the Impact of YouTube Delivery Policies on User Experience Louis Plissonneau Orange Labs France louis.plissonneau@orange.com Ernst Biersack Eurecom France erbi@eurecom.fr Parikshit Juluri University

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino

More information

The Application Usage and Threat Report

The Application Usage and Threat Report The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino

More information

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008 PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Analysing the impact of CDN based service delivery on traffic engineering

Analysing the impact of CDN based service delivery on traffic engineering Analysing the impact of CDN based service delivery on traffic engineering Gerd Windisch Chair for Communication Networks Technische Universität Chemnitz Gerd Windisch - Chair for Communication Networks

More information

Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers

Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers By Deral (PercX) Heiland and Michael (omi) Belton Over the past year, one focus of the Foofus.NET

More information

Cyber Security Workshop Ethical Web Hacking

Cyber Security Workshop Ethical Web Hacking Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp

More information

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino

More information

Where Do You Tube? Uncovering YouTube Server Selection Strategy

Where Do You Tube? Uncovering YouTube Server Selection Strategy Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing

More information

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each

More information

LBL Application Availability Infrastructure Unified Secure Reverse Proxy

LBL Application Availability Infrastructure Unified Secure Reverse Proxy LBL Application Availability Infrastructure Unified Secure Reverse Proxy Valerio Mezzalira TCOGROUP Company Outline Mission: Development of Software Tools Aimed at Enhancing High Availability (HA) of IT

More information

Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website

Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu

More information

HTTP Response Splitting

HTTP Response Splitting The Attack HTTP Response Splitting is a protocol manipulation attack, similar to Parameter Tampering The attack is valid only for applications that use HTTP to exchange data Works just as well with HTTPS

More information

No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1. Ethereal Lab: HTTP 1. The Basic HTTP GET/response interaction 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.1 GET /ethereal-labs/http-ethereal-file1.html

More information

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common

More information

IxLoad TM : Data HTTP, SSL, and FTP

IxLoad TM : Data HTTP, SSL, and FTP IxLoad TM : Data HTTP, SSL, and FTP IxLoad tests the scalability and performance of content-aware networks and devices by emulating HTTP(S), SSL, and FTP clients and servers. IxLoad can be used to: Test

More information

Manual. Traffic Exchange

Manual. Traffic Exchange Updated on 21-Oct-2010 Page 1 of 10 Manual Traffic Exchange Updated on 21-Oct-2010 Page 2 of 10 Index Pages 1. To access the Traffic Exchange 3 2. Checking User Log 5 3. Change Password 7 4. Troubleshooting

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009 PLATO Learning Environment 2.0 System and Configuration Requirements Dec 1, 2009 Table of Contents About this document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation

More information

The Effect of Caches for Mobile Broadband Internet Access

The Effect of Caches for Mobile Broadband Internet Access The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access

More information

The Other 50% of Internet Traffic. Craig Labovitz labovit@deepfield.net

The Other 50% of Internet Traffic. Craig Labovitz labovit@deepfield.net The Other 50% of Internet Traffic Craig Labovitz labovit@deepfield.net 1 Earlier In previous work, focused on HyperGiants 50% of Internet traffic due to 150 companies i.e. Google, MSFT, CDNs, large consumer

More information

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative 2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,

More information

Exploring YouTube s Content Distribution Network Through Distributed Application-Layer Measurements: A First View

Exploring YouTube s Content Distribution Network Through Distributed Application-Layer Measurements: A First View Exploring YouTube s Content Distribution Network Through Distributed Application-Layer Measurements: A First View Albert Rafetseder, Florian Metzger, David Stezenbach, and Kurt Tutschku {albert.rafetseder,

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

Front-End Performance Testing and Optimization

Front-End Performance Testing and Optimization Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations. Step 2- Computer Check Before you attempt to login to University resources it is important to make sure your computer will support an online course, or an accelerated course with an online component. It

More information

Network Performance of Smart Mobile Handhelds in a University Campus WiFi Network

Network Performance of Smart Mobile Handhelds in a University Campus WiFi Network Network Performance of Smart Mobile Handhelds in a University Campus WiFi Network Xian Chen, Ruofan Jin University of Connecticut Kyoungwon Suh Illinois State University Bing Wang, Wei Wei University of

More information

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai

More information

How Do You Tube? Reverse Engineering the YouTube Video Delivery Cloud

How Do You Tube? Reverse Engineering the YouTube Video Delivery Cloud How Do You Tube? Reverse Engineering the YouTube Video Delivery Cloud Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi Li Zhang Department of Computer Science & Engineering, University of Minnesota

More information

Mobile Performance Testing

Mobile Performance Testing Businesses are increasingly realizing the need for wide-ranging functional testing of mobile apps, as well as per formance, load and user experience testing, although most enterprises do not test a l l

More information

Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer

Indirection. science can be solved by adding another level of indirection -- Butler Lampson. Every problem in computer Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer

More information

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com

More information

All You Can Eat Realtime

All You Can Eat Realtime HTML5 WebSocket: All You Can Eat Realtime By Peter Lubbers, Kaazing May 14, 2010 1 About Peter Lubbers Director of Documentation and Training, Kaazing Co-Founder San Francisco HTML5 User Group http://www.sfhtml5.org/

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Benchmarking Broadband Internet with Bismark

Benchmarking Broadband Internet with Bismark Benchmarking Broadband Internet with Bismark Srikanth Sundaresan, Nick Feamster Georgia Tech, Atlanta, USA Walter de Donato, Antonio Pescapé University of Napoli Federico II, Napoli, Italy Renata Teixeira

More information

Large scale observation and analysis of Amazon AWS traffic

Large scale observation and analysis of Amazon AWS traffic Large scale observation and analysis of Amazon AWS traffic Ignacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio Munafò DET, Politecnico di Torino, Italy {lastname}@tlc.polito.it Abstract Cloud Providers

More information

Test Methodology White Paper. Author: SamKnows Limited

Test Methodology White Paper. Author: SamKnows Limited Test Methodology White Paper Author: SamKnows Limited Contents 1 INTRODUCTION 3 2 THE ARCHITECTURE 4 2.1 Whiteboxes 4 2.2 Firmware Integration 4 2.3 Deployment 4 2.4 Operation 5 2.5 Communications 5 2.6

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Access the GV-IP Camera through a broadband modem

Access the GV-IP Camera through a broadband modem Access the GV-IP Camera through a broadband modem Applied to All GV-IP Cameras Article ID: GV15-12-03-26 Release Date: 03/26/2012 Introduction The document introduces how to connect your GV-IP Camera to

More information

Frequently Asked Questions for the USA TODAY e-newspaper

Frequently Asked Questions for the USA TODAY e-newspaper Frequently Asked Questions for the USA TODAY e-newspaper Navigating the USA TODAY e-newspaper A look at the toolbar Toolbar Functions, Buttons, and Descriptions The tab marked Contents will take the e-reader

More information

How To Login To Webex Online

How To Login To Webex Online Getting Prepared for Your Online Course! This document will let you know what to expect and walk you through a Test Login One of our top priorities is to meet your demand for high quality, easy to use,

More information

MySciLEARN System Requirements. For educators and providers using the Fast ForWord and Reading Assistant programs

MySciLEARN System Requirements. For educators and providers using the Fast ForWord and Reading Assistant programs MySciLEARN System Requirements For educators and providers using the Fast ForWord and programs December 2014 Copyright 1996 through 2014 Scientific Learning Corporation. All rights reserved. This document

More information

TP-LINK TD-W8901G. Wireless Modem Router. Advanced Troubleshooting Guide

TP-LINK TD-W8901G. Wireless Modem Router. Advanced Troubleshooting Guide TP-LINK TD-W8901G Wireless Modem Router Advanced Troubleshooting Guide Released on 2009.09.25 Version 1.0 Content Summary... 3 Troubleshooting Flow Chart and Resolutions... 3 Check 1... 3 Check 2... 4

More information

A Look at the Consequences of Internet Censorship through an ISP Lens

A Look at the Consequences of Internet Censorship through an ISP Lens A Look at the Consequences of Internet Censorship through an ISP Lens Sheharbano Khattak (University of Cambridge)! Mobin Javed (UC Berkeley) Syed Ali Khayam (PLUMgrid) Zartash Afzal Uzmi (LUMS SBASSE,

More information

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

SSL Enforcer Documentation

SSL Enforcer Documentation SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,

More information

Website Analysis. foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) North America with 4 IPv4.

Website Analysis. foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) North America with 4 IPv4. Website Analysis Hanieh Hajighasemi Dehaghi Computer Networks : Information transfert (LINGI2141) Ecole Polytechnique de Louvain (EPL) Université Catholique de Louvain Abstract The candidate website(foxnews.com)

More information

Networks and the Internet A Primer for Prosecutors and Investigators

Networks and the Internet A Primer for Prosecutors and Investigators Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()

More information

MySciLEARN System Requirements. For educators and providers using the Fast ForWord and Reading Assistant programs

MySciLEARN System Requirements. For educators and providers using the Fast ForWord and Reading Assistant programs MySciLEARN System Requirements For educators and providers using the Fast ForWord and Reading Assistant programs August 2015 Copyright 1996 through 2015 Scientific Learning Corporation. All rights reserved.

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

Our My first DDoS attack. Velocity Europe 2011 Berlin Cosimo Streppone Operations Lead

Our My first DDoS attack. Velocity Europe 2011 Berlin Cosimo Streppone Operations Lead Our My first DDoS attack Velocity Europe 2011 Berlin Cosimo Streppone Operations Lead

More information

REVERSE ENGINEERING THE YOUTUBE VIDEO DELIVERY CLOUD. Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi-Li Zhang

REVERSE ENGINEERING THE YOUTUBE VIDEO DELIVERY CLOUD. Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi-Li Zhang REVERSE ENGINEERING THE YOUTUBE VIDEO DELIVERY CLOUD Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi-Li Zhang Department of Computer Science & Engineering, University of Minnesota - Twin Cities

More information

Combating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions dmoore@novetta.com

Combating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions dmoore@novetta.com Combating Web Fraud with Predictive Analytics Dave Moore Novetta Solutions dmoore@novetta.com Novetta Solutions Formerly, International Biometric Group (IBG) Consulting DoD, DHS, DRDC IR&D Identity Cyber

More information

Bit-Rate and Application Performance in Ultra BroadBand Networks

Bit-Rate and Application Performance in Ultra BroadBand Networks Bit-Rate and Application Performance in Ultra BroadBand Networks Gianfranco Ciccarella - Telecom Italia Vice President Global Advisory Services 4ºFocus: Gianfranco Ciccarella - Telecom Index QoE platforms:

More information

600-152 People Data and the Web Forms and CGI. HTML forms. A user interface to CGI applications

600-152 People Data and the Web Forms and CGI. HTML forms. A user interface to CGI applications HTML forms A user interface to CGI applications Outline A simple example form. GET versus POST. cgi.escape(). Input controls. A very simple form a simple form

More information

Initial Access and Basic IPv4 Internet Configuration

Initial Access and Basic IPv4 Internet Configuration Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N

More information

UMETER Quality of Service (QoS) measurement system for Internet access.

UMETER Quality of Service (QoS) measurement system for Internet access. UMETER Quality of Service (QoS) measurement system for Internet access. Flávio da Silva Pereira Software Developer Ubiwhere Lda Aveiro, Portugal fspereira@ubiwhere.com Nuno Ribeiro Chief Operating Officier

More information

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks

QoE-Aware Multimedia Content Delivery Over Next-Generation Networks QoE-Aware Multimedia Content Delivery Over Next-Generation Networks M. Oğuz Sunay July 9, 2013 Second Romeo Workshop PAGE: 1 M. Oğuz Sunay, Özyeğin University Istanbul, July 9, 2013 Romeo High-quality

More information

Hiding Tracks on the Net

Hiding Tracks on the Net Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information