Silent TCP Connection Closure for Cellular Networks
|
|
|
- Susanna Harper
- 10 years ago
- Views:
Transcription
1 Silent TCP Connection Closure for Cellular Networks Feng Qian, Subhabrata Sen, and Oliver Spatscheck AT&T Labs Research, Bedminster, New Jersey, USA ABSTRACT FIN and RST packets that close TCP connections are often delayed by timeout. In cellular networks, delayed FIN/RST packets often incur significant energy consumption overhead for handsets. On the other hand, closing TCP connection immediately after its last data transfer avoids the energy overhead, but can cause performance degradation as doing so makes reusing TCP connections difficult. To resolve such a dilemma, we propose a novel TCP extension called STC (Silent TCP connection Closure) using which both endpoints close a TCP connection silently without exchanging FIN or RST packets after timeout. Our solution is lightweight, backward-compatible, and incrementally deployable. It requires modifications to smartphone operation systems, but, if supported by cellular middleboxes, no change to remote servers. We evaluate the benefits of STC using a 1-day real trace consisting of.6 million LTE user sessions. When fully deployed, STC can save the overall handset radio energy consumption by up to 11.3% and reduce the network-wide signaling load by up to 6.%. Categories and Subject Descriptors C.2.2 [Computer-Communication Networks]: Network Protocols; C.2.1 [Computer-Communication Networks]: Network Architecture and Design Wireless communication Keywords TCP Connection Closure; TCP FIN; Connection Reuse; TCP Options; HTTP Keep-alive; Cellular Networks 1. INTRODUCTION In many applications such as web browsing, it is difficult to predict when exactly data transfers of a TCP connection will finish, since a client may initiate a new request at any time after receiving the previous response. Thus a common practice is to employ an application-layer timeout to close a TCP connection. For example, HTTP keep-alive timers, which are usually statically configured, are used by almost all of today s HTTP clients and servers. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. CoNEXT 13, December 9-12, 213, Santa Barbara, California, USA. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM /13/12...$ TCP connections are usually closed by exchanging FIN packets between two endpoints. The aforementioned timeout can cause FIN packets to be delayed by seconds to minutes after the transfer of the last user data packet. In wired networks, such delayed FIN packets are completely inconsequential in terms of resource impact. However, in 3G/LTE networks, they may incur significant energy overhead consumed by the radio interface, as well as potentially high signaling load [11, 1], due to the interaction with the radiolayer timer that turns off the radio interface after a certain period of inactivity. Delayed FIN packets can keep the radio interface on for longer time by resetting the radio-layer timer, and even trigger an additional radio state switch by turning on the radio ( 2). The purpose of delayed closure is to increase the possibility of connection reuse, which reduces overheads such as TCP handshake, slow start, and SSL/TLS handshake especially in cellular networks with high latency. On the other hand, closing a TCP connection immediately after data transfers avoids the radio energy and signaling overhead but makes reusing the connection impossible. This paper proposes a mechanism called STC (Silent TCP connection Closure), the first proposal that fully addresses the above dilemma. It enables mobile applications to reuse TCP connections without incurring any resource overhead. The high-level idea of STC is straightforward and practical: given that both endpoints usually know their own timeout for closing a TCP connection, they exchange the timeout information during the data transfer phase so both can then close the connection silently without sending any FIN packet. Often TCP RST packets can also be triggered by timeout and they can be eliminated by STC in the identical way. In STC, each endpoint sends to its peer the timeout information embedded in a TCP option, which is always piggybacked with user data payload to ensure reliable and in-order delivery. Henceforth each side knows the timeout set by itself and the one set by its peer, and chooses the smaller one as the negotiated timeout for the TCP connection. To address the challenge of unsynchronized clocks, STC introduces an additional protection period after which the connection is finally torn down ( 3). STC is lightweight, backward-compatible, incrementally deployable. It exposes simple interfaces to minimize its incurred complexity at the application layer. Given that the vast majority of today s mobile apps use HTTP [13], those apps do not need to undergo any change since HTTP keep-alive is transparently handled by the underlying library, which only needs to be slightly modified to incorporate STC. In addition, by upgrading middleboxes deployed in 3G/LTE networks [1], STC can be completely transparent to servers too, thus making all changes be confined within cellular networks ( 4.3). We evaluate the benefits of STC using a 1-day trace of.6 million user sessions from a commercial LTE network. When fully 211
2 Byte Offset STC-permit STC-set 1 Kind=34 Len=2 Kind=35 Len=4 or TCP Connection Timeout in 1ms Figure 2: The TCP options introduced bystc. Figure 1: Waterfall diagram of loading on LTE. =TCP Handshake =Object Transfer =FIN handshake. deployed, STC can reduce the network-wide handset radio energy consumption by up to 11.3% and the overall signaling load by up to 6.% ( 5). STC can be applied to other access technologies using resource control mechanisms similar to those in cellular networks. 2. MOTIVATION Our proposal is motivated by three facts described below. Observation 1: Delayed FIN/RST consume radio energy and incur signaling load in cellular networks. It is well known that in 3G and LTE networks, there exists a radio-layer timeout for turning off the radio interface after a period of network inactivity [11, 9]. Such a timeout, called tail time, prevents frequent radio state switches (i.e., the signaling overhead). The tail timer is reset to a fixed value by any incoming or outgoing packet. When the timer ticks down to zero, the radio interface is turned off. Note that the cellular radio power contributes to as high as 1/3 to 1/2 of the total handset power usage for 3G and LTE [11]. A delayed FIN or RST lengthens the radio-on time by resetting the tail timer. Figure 1 shows a real example of loading on a Samsung Galaxy S III smartphone over LTE. The waterfall diagram indicates that the three TCP connections involved are closed at 5. sec, while the page loading finishes at 1.2 sec. Given that the tail timer is measured to be 11. sec, the overall radio-on time is =16. sec. If all connections are closed right after data transfers, the radio-on time will be reduced by 22.5% only =12.4 sec (closing the connection takes.2 sec). But doing so prevents TCP connections from being reused for future transfers, leading to performance degradation especially in cellular networks with high latency. If a FIN/RST delay is longer than the tail time and no other concurrent data transfer exists, the delayed FIN/RST will trigger an additional radio state switch by turning on the radio. In 3G/LTE, turning on the radio incurs up to 3 messages over control channel, causing signaling overhead [5]. Observation 2: Delayed FINs are usually controlled by application-layer keep-alive timers. Almost all web servers have configurable keep-alive timeout settings i.e., the fixed amount of time the server will wait for for a subsequent request before closing the connection. For example, Apache 2.4 uses 5 seconds and Microsoft IIS 7 uses 12 seconds by default. Many servers also explicitly inform clients about their timeout using the Keep-Alive:timeout response header. The client should attempt to retain a connection for at least as long as indicated [3]. Mobile clients also use timers to close TCP connections. For example, the popular org.apache.http.client library allows developers to explicitly set the keep-alive timer for each connection. We also examined the implementation of the idle TCP connection cache (sun.net. used by Java HTTP libraries. By default, each (remote host, remote port) pair can have at most five idle connections. Their timeout value is determined by the Keep-Alive:timeout response header, or a statically configured parameter (5 seconds by default) if the header is not provided. When the client needs to fetch a new URL, it tries to reuse an unexpired connection in the cache. For every 5 seconds, a daemon thread scans the whole cache and closes idle connections that are timed-out. The above implementations are extensively used by Android applications. Note the above application-layer keep-alive should not be confused with TCP keep-alive, which probes whether a TCP connection is still alive after a long period of idle time (e.g., 1 hour) if neither side closes it. Observation 3: Delayed FIN/RST are widespread. Based on studying a 1-day LTE trace consisting of.6 million user sessions, we found 51% of all TCP connections (72% of connections carrying HTTP) have FIN/RST delays of at least 1 second. We detail the measurement in SILENT TCP CONNECTION CLOSURE The current FIN-based scheme for closing TCP connections poses a dilemma: using delayed FINs often wastes radio energy and incurs signaling load, while prematurely tearing down connections makes reusing them impossible. STC addresses this by enabling mobile applications to reuse TCP connections without incurring any resource overhead. Specifically, given that both a mobile app and the server usually know when they will close a TCP connection ( 2), in STC, both sides exchange connection timeout information during the data transfer phase so both can then close the connection silently without sending any FIN packet. Often TCP RST packets can also be triggered by timeout and they can be eliminated by STC in the same way. We next describe how key challenges are addressed by STC in detail. Challenge 1: Reliable and in-order delivery of the timeout information. To achieve this, the timeout information is encapsulated into TCP options that are always piggybacked with TCP user data (or SYN/SYN-ACK), thus providing automatic guarantee of reliability and ordering. As shown in Figure 2, STC introduces two TCP options. The STC-permit option is used to negotiate during a TCP handshake whether STC will be used. STC is only used if supported by both sides i.e., the client sends STC-permit in SYN and the server includes it in SYN-ACK, making STC incrementally deployable. The STC-set option can be sent within an STC-enabled TCP connection by either side. It contains a value x, which notifies the receiver that the sender has chosen a connection timeout of x 1 milliseconds. x usually takes two bytes, supporting a timeout period of up to seconds, beyond which a four-byte value can be used. Note that most TCP packets do not carry STC-set, which is only used when the timeout is changed or set for the first time. As mentioned before, STC-set messages must be piggybacked with data packets (or SYN/SYN-ACK) so that they can be retransmitted when lost, and be delivered in the same order as they are sent. Doing so also guarantees that STC-set does not reset the radio-layer tail timer by itself ( 2) since STC-set never causes any additional packet transfer, making STC not incur any additional resource overhead. STC disallows updating the connection timeout without sending user data. Supporting such an uncommon use case requires more complex changes to the TCP protocol e.g., STC-set messages may need sequence numbers to ensure their delivery order. To update 212
3 Client Π t 1 t t 2 t 3 t 4 Server Π Protection Period, Ω Figure 3: An example illustrating the protection period. Timer Π Expires Active Protection Period Timer Ω Expires Closed Recv any Data Figure 4: STC state transitions. the timeout, an app can wait until the next data transfer, or establish a new connection. Challenge 2: Lightweight protocol. For the ease of presentation, we focus on the client-side logic. The server-side logic is identical as STC does not distinguish between a client and a server. For an STC-enabled TCP connection, the client s TCP stack maintains two variables T client and T server corresponding to the connection timeout specified by the client (itself) and the server, respectively, using STC-set. The client s TCP also maintains an inactivity timer Π, which is reset by any network activity of the connection. WhenΠticks down to zero, the connection is about to be closed silently. The detailed logic is as follows. 1. Initially, botht client andt server are set to. Π is also set to (i.e., never expires). 2. When the client successfully receives an STC-set with timeout x, it sets T server to x. Here successfully receive means the expected sequence number matches the sequence number of the associated data packet, which is then delivered to the upper layer. Similarly, when the client successfully sends an STC-set with timeoutx, it setst client tox. Here successfully send implies that the client receives an ACK packet that acknowledges the reception of the data packet associated with STC-set. The above mechanisms ensure that an endpoint applies its peer s timers in the same order in which its peer sets them, since their associated data packets are delivered in order. 3. Usually both SYN and SYN-ACK containstc-set. So at the client side, botht client andt server are initialized when SYN-ACK is received. At the server side, T client (maintained by the server) is initialized when SYN is received, andt server is initialized when the last ACK in the TCP three-way handshake is received. 4. The inactivity timer Π is reset to min{t client,t server} when the connection sends or receives any packet associated with it. Resetting Π indicates the network activity of the connection. Step 4 always happens after Step 2 and 3 if the packet contains an STC-set message. 5. WhenΠexpires, the TCP connection is closed silently after a short duration (described next). Challenge 3: Unsynchronized timers. Due to the network latency and its variability, the inactivity timer Π at both sides are not strictly synchronized, leading to potential inconsistency that Π at one side has expired but Π at the other side has not. In order to prevent an undesired situation where an endpoint sends data to its remote peer who has already closed the connection silently (we call this undesired silent closure ), on either side, when Π expires, the connection is not closed immediately. Instead, it will enter a protection period during which the connection can only receive incoming data but not send any data. However, upon the reception of any data, the connection immediately exits the protection period and becomes fully active by resetting the Π timer to min{t client,t server}. The protection period has small impact on applications, as will be described shortly. The connection will finally be closed when the protection period ends with no incoming packet. The duration of the protection period is controlled by another inactivity timer Ω. To determine how to set this timer, consider an example shown in Figure 3. The client and server reset theirπtimers att 1 andt respectively. Right before the client s Π timer expires at t 3, the client sends a data packet, which arrives the server at t 4. However, the server s Π timer has already expired att 2. Therefore, in order to eliminate the possibility of receiving data after silently closing a connection (i.e., an undesired silent closure), the server s protection period should be at leastt 4 t 2 = (t 4 t 3)+(t 1 t ) = RTT. In practice, the Ω timer can be statically or dynamically set to be far greater than a normal RTT. Figure 4 summarizes the state transitions in STC. When experiencing packet losses, the Π timer difference between two endpoints can be larger. We therefore add extra rules to prevent an undesired silent closure due to poor network condition. In Figure 4, even if the Π timer expires, the transition from an active connection to the protection period will not happen if any of the following conditions holds: (i) there are unacknowledged packets, (ii) there are unreceived packets (i.e., receiving packet(s) with higher sequence number(s) than expected), (iii) either the TCP sending buffer or the receiving buffer is not empty. This can happen when the end-host s CPU is busy. The protection period ensures that STC does not cause data packet loss at the end of a TCP connection due to a lack of explicit FIN. However, if the protection period is not long enough, an undesired silent closure can happen. In that case, the endpoint that observes the incoming data will reply with a TCP RST without acknowledging the data, so the remote peer s TCP stack will close the corresponding connection and notify the application about the failed delivery, and the application will establish a new connection so the correctness of the application logic is not affected. However, we expect this will happen extremely rarely given the aforementioned measures against an undesired silent closure. 4. DISCUSSIONS We discuss implementation and deployment issues of STC. 4.1 Minimize Changes to Applications STC provides two interfaces to applications: Socket options for enabling STC and setting connection timeout to be piggybacked with the next user data. Interface for applications to query the state of a connection (Figure 4) and its remaining lifetime (i.e., the Π timer). The above interfaces can be achieved by setsockopt() and getsockopt() system calls. Other socket APIs such as send() and recv() are not changed. Also, traditional FIN and RST can still be used at any time (e.g., by explicitly calling close()), and they override the STC mechanism. Using delayed FIN is discouraged, but RST is still useful in case of an error. We next provide examples to illustrate how existing applications can be easily adapted to STC when it is enabled. (i) A web server usingstc does not explicitly close a connection by calling close(). Instead, when a connection is silently closed by TCP, the server performs clean-up as if the connection is explicitly closed. A connection in the protection period is treated the same as an active connection since a web server does not initiate an HTTP transaction so it naturally only receives data during the protection period. (ii) A client HTTP library will be changed in a similar way except that a connection in the protection period should not be used to send a request. (iii) Most smartphone apps use HTTP [13]. 213
4 They will remain untouched if the underlying libraries manage TCP connections transparently. Almost all popular HTTP libraries satisfy such a requirement. 4.2 The TIME_WAIT State In TCP, an active closer who initiates the connection close will eventually enter a state called TIME_WAIT before closing the connection. In TIME_WAIT, the endpoint waits for a fixed amount of time (twice the maximum lifetime of a packet) during which the four-tuple (src IP/port, dst IP/port) defining the connection cannot be reused. This eliminates an undesired situation where a packet belonging to the old connection is delivered later to a newly created connection with the same four-tuple. There is no need for the other endpoint to stay in TIME_WAIT. If both sides send FIN simultaneously, then both will hold TIME_WAIT. In STC, since it is impossible to tell which side is the active closer, a new rule can be applied: in a silent closure, the endpoint that sends SYN will hold TIME_WAIT while the other endpoint will directly move to the final CLOSED state. If both send SYN simultaneously, then both will holdtime_wait. 4.3 Interaction with Middleboxes A legacy NAT box not recognizing STC does not affect the functionality of STC. But when silently closed, a connection will not be removed from the connection table of the NAT. Instead, it will be eventually removed by timeout at the NAT, ranging from less than 5 mins to more than 3 mins in today s cellular networks [12]. This is largely not an issue since NAT scales well with the number of entries. It uses efficient hash-based lookup [7], and for a commodity Cisco NAT box, 1K entries consume only 3 MB of RAM [2]. Note even if a connection is closed by FIN, its NAT entry will also be removed by a timeout (e.g., 1 minute [2]). Next, we show that if NAT boxes are aware of STC, additional benefits can be achieved even for long-lived connections. Carriers often configure their NAT boxes to have short TCP connection timeout. This affects long-lived connections used by, for example, chat apps and push notifications, which must send application-level keep-alive messages to prevent the connections from being closed by NAT timeout. Such keep-alive messages, if frequently sent, can cause significant handset energy waste due to the tail time [12]. NAT boxes use timeout because they do not know when connections will close. STC instead provides a way to explicitly inform NAT of the lifetime of a connection, thus making it unnecessary for applications to send frequent keep-alive messages. Proxies. Cellular carriers also deploy general-purpose proxies for purposes such as caching and compression [1]. From the perspective of TCP connection management, they could be classified into two types: split proxies (SP) and non-split proxies (NSP). The former splits an end-to-end TCP connection into two, one between the handset and the proxy and the other between the proxy and the remote server. An SP makes the split transparent to handsets by spoofing its IP address to be the server s IP address. In contrast, an NSP is less intrusive. It does not split TCP connections traversing it but can modify packets on the fly. Carriers have strong incentives to make their proxies STCcapable: regardless of its type, as long as a proxy supports STC, there is no need to modify remote servers (or any network element on the upstream path of the proxy). Therefore all changes can be confined within cellular networks. But a server can still choose to support STC for customized control over the connection timeout. Specifically, when a split-proxy (SP) is present, it must recognize STC otherwise only traditional FIN/RST can be used even if both the handset and the server support STC. Adding STC support to an SP is the same as upgrading a server, as described before. For a non-split-proxy (NSP), STC can function if both endpoints support it but the NSP does not (similar to the case of NAT). Making an NSP STC-capable is also easy. Assume a handset sends a SYN with STC-permit and usually STC-set. If the original server sends a SYN-ACK with STC-permit, the NSP can then let the server handle STC. Otherwise, since the server does not support STC, the NSP modifies the original SYN-ACK from the server by adding STC-permit and STC-set. Also, in the data transfer phase, the NSP attaches STC-set to data packets from the server based on its own policy (setting T server to be longer than T client is recommended). When the connection is closed silently, the NSP sends a RST to the STC-unaware server on behalf of the handset but there is no packet exchange between the NSP and the handset Security To our knowledge, STC does not bring in new security issues. Also, firewalls can be easily configured to disable STC by removing thestc-permit TCP option (e.g., just one line of command on Cisco firewalls [1]). This makes the use of STC fully controllable. 4.5 Alternative Solutions STC reduces the resource overhead of delayed FIN/RST by eliminating them at TCP layer using a lightweight protocol. The overhead can also be potentially reduced at other layers. We next discuss a few alternative approaches and their limitations. Reducing the tail timer or the HTTP keep-alive timer mitigates the resource overhead issue. In particular, setting the keepalive timer to be smaller than the radio-layer tail timer helps avoid the signaling overhead caused by delayed FIN/RST. However, there are side effects. Reducing the tail timer leads to higher signaling load and worse user experiences [9], and having a smaller HTTP keep-alive timer can make reusing TCP connections more difficult. Using fewer connections by multiplexing multiple HTTP transactions into one connection can mitigate the delayed FIN issue. A well-known realization of this approach is the Google SPDY protocol that opens one connection per domain [8]. However, it is quite common that a website contains multiple domains, thus delayed FIN handshakes in SPDY can still cause resource overhead. Regarding to performance, a recent study [8] reveals that compared to HTTP, SPDY is more likely to incur head-of-line blocking due to its unexpected interaction with TCP. Piggyback FIN with delay-sensitive transfers. At the application layer, various traffic shaping and scheduling techniques have been proposed to make cellular data transfers more resourceefficient. For example, delay-tolerant transfers can be delayed [6], and predictable transfers (e.g., checking s) can be prefetched so that those transfers can be piggybacked with delay-sensitive transfers or be batched in fewer data bursts, thus reducing the radioon time. Delayed FINs are to some extent delay-tolerant, and their piggyback or batching can be achieved at the application layer by calling close() intelligently. However, piggybacking FIN with other transfers or batching multiple FIN handshakes together is not always possible, and doing so can increase the complexity of the application logic. Fast Dormancy is a feature included in 3GPP since Release 7 [4]. It allows a handset to send a control message to the RAN to immediately turn the radio state to idle without experiencing the tail time. The handset can therefore invoke fast dormancy right after a 1 If a remote server sends data to the proxy (either SP or NSP) that is in the protection period, the proxy drops the data and sends RST to the server. This does not happen for a web server and is expected to be very rare for other types of servers if a long timeout is used. 214
5 Table 1: TCP connection termination status (across all connections). Method Initiator Proxy Flows Non-proxy Flows FIN Handset 77.% 59.% Server/Proxy 15.% 19.4% RST Handset 5.6% 2.8% Server/Proxy.4% 2.6% Not closed within 1 hour 2.1% 16.2% data transfer to save radio energy. However, a key limitation of this approach is that the incurred signaling load caused by frequently switching on the radio may be too high to be handled by the radio access network [5]. 5. TRACE-DRIVEN EVALUATION We evaluate the benefits ofstc using real LTE traces, which are large packet header data collected from a commercial LTE carrier. The data covers a fixed set of 22 enbs at a large metropolitan area in the U.S. The data collection was between Oct 12 and Oct 21, 212. For each packet, we recorded its IP and transport-layer headers and a 64-bit timestamp. During the 1 days, we obtained 3.8 billion packets, corresponding to 2.9 TB of LTE traffic. The data collection point is between the LTE radio access network (RAN) and the core network gateway (SGW/PGW). TCP traffic from or to server port 8 or 88 will traverse a split proxy ( 4.3). Therefore, the network path of an 8/88 packet is: handset RAN data collector SGW/PGW Split Proxy NAT/ Firewall Internet. The path for all other packets is the same except that the proxy is skipped. To protect the privacy and anonymity of network users, we did not collect or use any personally identifiable information. Instead, we used hashed private IP addresses as approximated subscriber IDs since the mappings from subscribers to private IPs of the studied carrier are very stable (a handset changes its private IP at the interval of several hours). We therefore separate the trace into user sessions each consisting of packets sent to and received from a particular private IP address. We use an idle period of 1 hour to determine the end of a user session. Changing this threshold to 3 minutes or 2 hours has very small impact on the results to be described. Within a user session, individual TCP flows are identified based on the four-tuple of src/dst IPs and src/dst port numbers. Overall we obtained.59 million user sessions and 51 million TCP flows during the 1-day data collection period. TCP contributes to 97% (95%) of the total bytes (flows). Within TCP, 77% (5%) of its bytes (flows) traverse the proxy. 5.1 Characterizing TCP Connection Closure Table 1 shows how TCP connections (flows) in the dataset are closed. Recall that the two endpoints of a non-proxy flow are a handset and the remote server, while a captured proxy flow with server port 8/88 is between a handset and the split proxy whose HTTP keep-live timer overrides the one of the original web server. Table 1 indicates that connections are usually terminated by FINs (92.% of proxy flows and 78.4% of non-proxy flows). Regarding to the initiator, most connections (82.6% of proxy flows and 61.8% of non-proxy flows) are closed by the handset. About 16.2% of non-proxy flows are not closed after being idle for at least one hour, the threshold for separating user sessions. Such flows mostly consist of HTTPS (port 443, 65.9%), IMAP (port 993, 1.7%), and XMPP messaging (port 5223, 7.4%). Figure 5(a) and (b) plot the distributions of closure delays across non-proxy and proxy flows, respectively. The closure delay is defined to be the timestamp difference between the last data packet CDF 1 (a).8.6 CDF 1 (b).8.4 Handset FIN Server/Proxy FIN.4.2 Handset RST.2 Server/Proxy RST ^2 1^ ^2 1^3 Delay (second) Delay (second) Figure 5: (a) FIN/RST delays across non-proxy flows (b) FIN/RST delays across proxy flows. Both subfigures have the same legends. and the first FIN/RST packet in a flow 2. We have the following observations. (i) Within proxy flows, 72.8% (76.5%) of handset- FIN-terminated (proxy-fin-terminated) flows have delays longer than 1 second. For non-proxy flows, the corresponding percentages are only 27.7% for handset-fin-terminated flows and 22.% for server-fin terminated flows. Given that non-proxy flows are dominated by HTTPS (port 443, 82.7%) and IMAP (port 993, 7.%), this indicates that unlikely HTTP clients/servers that usually employ delayed FINs, HTTPS and IMAP clients/servers tend to close TCP connections immediately after data transfers. (ii) In Figure 5(b), the value of about 1 minute dominates the connection timeout maintained by the split proxy, while for server-initiated FINs in Figure 5(a), we observe a cluster of 4-minute timeout. In addition to the radio energy waste, such long FIN-delays also incur signaling overhead as they are much longer than the radio-layer tail time. (iii) TCP RST is also often delayed. In particular, within proxy flows, 56% of handset-issued RST packets are delayed by at least 1 second. We also observe clusters of RST delays of 1, 2, and 5 minutes in both figures, implying that a large fraction of RST packets are also triggered by timeout instead of unexpected errors. Overall, delayed FIN/RST are widespread. 51% of all TCP flows (72% of proxy flows carrying HTTP) have FIN/RST delays of at least 1 second. The Protection Period should be set to be at least one RTT (Figure 3). The 99.8-percentile of non-proxy flow RTTs and the 99.9-percentile of proxy flow RTTs are measured to be 4. sec and 3.8 sec, respectively. Therefore setting the protection period duration (i.e., the Ω timer) to be 5 sec is robust enough to prevent from receiving data after closing the connection. An end-host can also dynamically set the Ω timer based on its RTT estimation. 5.2 Quantifying Benefits of STC Next, we quantitatively study the network-wide benefits of STC by comparing the resource consumption of the original trace and the modified trace with FIN packets removed, as if STC is used between handsets and proxy/servers. The analysis is performed as follows. (i) For each user session u, we feed it into an LTE power model, which computes the radio energy consumption E(u), the radio-on time R(u), and the signaling load S(u) by simulating the LTE Radio Resource Control (RRC) state machine [9]. S(u) is defined as the number of radio state transitions from the idle to the connected state. The handset parameters are configured for a state-of-the-art LTE smartphone (HTC Thunderbolt), and the radio access network parameters correspond to those used by the studied carrier, whose tail timer is measured to be 11 seconds. Applying a 3G UMTS/HSPA power model [11] yields slightly more savings. (ii) We remove all FIN packets from u and get the resultant trace u. The power model then takes u as input and computes E(u ), R(u ), and S(u ). (iii) The radio energy 2 For flows without user data, the closure delay is the timestamp difference between the first FIN/RST and its previous packet
6 CDF 1 Savings 2%.8 15% 1% Signaling Energy.6 1%.4 Signaling Load 5% Signaling Load 5% Radio Energy.2 Radio Energy Radio on Time 2% 4% 6% Saving per User Session Median User Session Size (Bytes) % of user sessions using STC Figure 6: Savings across user sessions. Figure 7: Savings vs. user session size. Figure 8: Incremental deployment. saving is quantified as (E(u) E(u ))/E(u). The savings of the radio-on time and the signaling load are calculated in similar ways. We conservatively do not remove any RST packets although many of them, which are also triggered by timeout, can be eliminated by STC in practice. Also, a user session often includes multiple concurrent TCP connections within which one may keep the radio on, thus reducing the benefits of STC applied to other connections. This scenario is captured based on the real trace in our evaluation. Savings per User Session. Figure 6 plots the distributions of savings across all user sessions. For the radio energy and the radioon time, which follow very similar distributions, the savings range from to 8%. On one hand, about 38% of user sessions have little radio energy savings (less than 1%), either because they have few TCP connections with delayed FINs, or because delayed FINs are overlapped with other concurrent TCP/UDP data transfers. In the latter case, removing the delayed FINs brings no reduction in any of the three metrics. On the other hand, for some user sessions, the savings are non-trivial or even very significant. The 5, 6, 7, 8, and 9 percentiles of radio energy (or radio-on time) savings are 6%, 1%, 15%, 22%, and 34%, respectively. The reduction of the signaling overhead follows a similar distribution but the overall saving is less. Savings vs. User Session Size. Figure 7 studies the correlation between savings brought by STC and the user session size. We separate all.59 million user sessions sorted by their total bytes into 1 groups each having 59K sessions. We then compute the savings for all sessions in each group whose median session size is shown on the X axis in Figure 7. Statistically, small user sessions tend to have higher savings, especially for the signaling overhead. For large sessions that are more likely to have long-lived TCP connections, their long flow duration often diminishes the savings brought by silent connection closure. Incremental Deployment. Figure 8 examines the benefits of deploying STC incrementally by eliminating FINs for only x% {, 2%,..., 1%} of randomly chosen user sessions. Figure 8 indicates the savings increase linearly as x increases. When fully deployed, the network-wide handset radio energy consumption and signaling load can be reduced by 11.3% and 6.%, respectively. For most non-heavy users not belonging to the long tail of the user session size distribution, their average savings will be higher as indicated in Figure 7. In Figure 8, opt on the X axis corresponds to a scenario where in addition to FINs, all RSTs are also removed. In that case, the overall radio energy and signaling load savings increase to 11.9% and 6.5%, respectively. Performance Improvement. For TCP flows carrying HTTPS traffic, more than 7% of them are observed to be closed prematurely right after the last data transfer. STC can let those connections be more efficiently reused without incurring any resource overhead. Connection reuse benefits in particular SSL/TLS over TCP where the high SSL/TLS handshake overhead can be significantly reduced. We will quantify the performance benefits of STC in future work..3k 2K 7K 17K 38K 88K.2M.7M 2.3M 14.8M Overall Savings 2% 4% 6% 8% 1% 6. RELATED WORK AND CONCLUSION The adverse impact of delayed FIN/RST on cellular resource utilization was first pinpointed by the ARO tool on individual mobile apps [11]. A recent study [1] measures the timing gap between the last data packet and the last packet of TCP flows, using the same dataset studied in this paper. Both works qualitatively or quantitatively indicate the importance of the delayed FIN/RST problem, but neither proposed a concrete and effective solution as we did in this paper. In 4.5, we discussed a few alternative approaches that can potentially reduce the resource overhead of delayed FIN/RST, such as using fewer connections [8], piggyback/batching [6], and fast dormancy [4, 5]. All of them exhibit some limitations that are avoided in our STC design. To conclude, STC is the first proposal fully addressing the delayed FIN/RST problem in cellular networks. It is lightweight, backward-compatible, and incrementally deployable. It enables mobile apps to reuse TCP connections without incurring any resource overhead while prior to STC it was difficult to achieve both advantages at the same time. We are currently working on a prototype implementation of STC. 7. ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers and especially Marco Mellia for shepherding the paper. 8. REFERENCES [1] Cisco ASA 55 Series Configuration Guide. configuration/guide/conns_connlimits.html. [2] Cisco NAT FAQ. technologies_q_and_a_item9186a8e523b.shtml. [3] HTTP Keep-Alive Header. draft-thomson-hybi-http-timeout-1.html. [4] UE Fast Dormancy behavior. 3GPP discussion and decision notes R , 27. [5] P. K. Athivarapu, R. Bhagwan, S. Guha, V. Navda, R. Ramjee, D. Arora, V. N. Padmanabhan, and G. Varghese. RadioJockey: Mining Program Execution to Optimize Cellular Radio Usage. In Mobicom, 212. [6] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications. In IMC, 29. [7] S. S. Chugh. Impact of Network Address Translation on Router Performance. Master s thesis, Virginia Polytechnic Institute and State University, 23. [8] J. Erman, V. Gopalakrishnan, R. Jana, and K. Ramakrishnan. Towards a SPDY ier Mobile Web. In CoNEXT, 213. [9] J. Huang, F. Qian, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck. A Close Examination of Performance and Power Characteristics of 4G LTE Networks. In Mobisys, 212. [1] J. Huang, F. Qian, Y. Guo, Y. Zhou, Q. Xu, Z. M. Mao, S. Sen, and O. Spatscheck. An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance. In SIGCOMM, 213. [11] F. Qian, Z. Wang, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck. Profiling Resource Usage for Mobile Applications: a Cross-layer Approach. In Mobisys, 211. [12] Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Story of Middleboxes in Cellular Networks. In SIGCOMM, 211. [13] Q. Xu, J. Erman, A. Gerber, Z. M. Mao, J. Pang, and S. Venkataraman. Identifying Diverse Usage Behaviors of Smartphone Apps. In IMC, 211. opt 216
An Untold Story of Middleboxes in Cellular Networks
An Untold Story of Middleboxes in Cellular Networks Zhaoguang Wang 1 Zhiyun Qian 1, Qiang Xu 1, Z. Morley Mao 1, Ming Zhang 2 1 University of Michigan 2 Microsoft Research Background on cellular network
Optimizing Background Email Sync on Smartphones
Optimizing Background Email Sync on Smartphones Fengyuan Xu 1,3, Yunxin Liu 1, Thomas Moscibroda 1, Ranveer Chandra 2, Long Jin 1,4, Yongguang Zhang 1, Qun Li 3 1 Microsoft Research Asia, Beijing, China
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
Improving DNS performance using Stateless TCP in FreeBSD 9
Improving DNS performance using Stateless TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Configuring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Characterizing Resource Usage for Mobile Web Browsing
Characterizing Resource Usage for Mobile Web Browsing Feng Qian, Subhabrata Sen, and Oliver Spatscheck AT&T Labs Research, Bedminster, New Jersey, USA {fengqian,sen,spatsch}@research.att.com ABSTRACT Multiple
B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Application Delivery Networking
Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 8-1 Overview
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
1 An application in BPC: a Web-Server
1 An application in BPC: a Web-Server We briefly describe our web-server case-study, dwelling in particular on some of the more advanced features of the BPC framework, such as timeouts, parametrized events,
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
Recent advances in transport protocols
Recent advances in transport protocols April 12, 2013 Abstract Transport protocols play a critical role in today s Internet. This chapter first looks at the evolution of the Internet s Transport Layer
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Can you GET Me Now? Estimating the Time-to-First-Byte of HTTP Transactions with Passive Measurements
Can you GET Me Now? Estimating the Time-to-First-Byte of HTTP Transactions with Passive Measurements Emir Halepovic, Jeffrey Pang, Oliver Spatscheck AT&T Labs - Research 180 Park Avenue Florham Park, NJ,
An Overview of Multipath TCP
An Overview of Multipath TCP Olivier Bonaventure, Mark Handley, and Costin Raiciu Olivier Bonaventure is a Professor at Catholic University of Louvain, Belgium. His research focus is primarily on Internet
How To. Instreamer to Exstreamer connection. Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection. How To 1.
Instreamer to Exstreamer connection Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection 1.11 Date: 06.03.2013 2013 Barix AG, all rights reserved. All information is subject
Case Study: F5 Load Balancer and TCP Idle Timer / fastl4 Profile
Case Study: F5 Load Balancer and TCP Idle Timer / fastl4 Profile This describes a problem whereby a client connects to a server then waits for a report to complete before retrieving it. The report took
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
Chapter 7. Address Translation
Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Digi Cellular Application Guide Using Digi Surelink
Introduction Digi s SureLink is a mechanism to help maintain persistent wireless connections. It contains four main components: 1. Mobile Link Rx Inactivity Timer 2. SureLink Settings - Hardware Reset
NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University
NAT Traversal for VoIP Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University 1 What is NAT NAT - Network Address Translation RFC 3022
Communication Protocol
Analysis of the NXT Bluetooth Communication Protocol By Sivan Toledo September 2006 The NXT supports Bluetooth communication between a program running on the NXT and a program running on some other Bluetooth
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
How Voice Calls Affect Data in Operational LTE Networks
How Voice Calls Affect Data in Operational LTE Networks Guan-Hua Tu*, Chunyi Peng+, Hongyi Wang*, Chi-Yu Li*, Songwu Lu* *University of California, Los Angeles, US +Ohio State University, Columbus, US
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Introducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
Content Delivery Networks
Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT [email protected] Terena 2000 1 Agenda What are Content Delivery Networks?
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
Towards a SPDY ier Mobile Web?
Towards a ier Mobile Web? Jeffrey Erman, Vijay Gopalakrishnan, Rittwik Jana, K.K. Ramakrishnan AT&T Labs Research One AT&T Way, Bedminster, NJ, 7921 {erman,gvijay,rjana,kkrama}@research.att.com ABSTRACT
bbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS
TECHNICAL ARTICLE Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO Adobe LiveCycle Enterprise Suite CONTENTS Introduction................................. 1 Edge server architecture......................
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
QUIC. Quick UDP Internet Connections. Multiplexed Stream Transport over UDP. IETF-88 TSV Area Presentation 2013-11-7
QUIC Quick UDP Internet Connections Multiplexed Stream Transport over UDP Presentation by Jim Roskind Google Corp IETF-88 TSV Area Presentation 2013-11-7 What is QUIC? Effectively replaces TLS and
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
Deployment Guide. AX Series with Microsoft Office SharePoint Server
Deployment Guide AX Series with Microsoft Office SharePoint Server Table of Contents DEPLOYMENT GUIDE AX Series with Microsoft Office SharePoint Server Introduction... 1 Prerequisites & Assumptions...
Computer Networks Practicum 2015
Computer Networks Practicum 2015 Vrije Universiteit Amsterdam, The Netherlands http://acropolis.cs.vu.nl/ spyros/cnp/ 1 Overview This practicum consists of two parts. The first is to build a TCP implementation
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
