Analysis of traffic demographics in Broadband networks
|
|
|
- Nathan Gray
- 9 years ago
- Views:
Transcription
1 White paper Analysis of traffic demographics in Broadband networks
2 Table of Contents Background...1 Aggregate Traffic Trends...1 Upstream Traffic Trends...2 Downstream Traffic Trends...3 Summary...4
3 Background Sandvine conducted a survey of broadband traffic trends across several leading North America service providers during March This study spanned both cable and DSL networks and assessed usage trends for broadband consumers. A period of one month was chosen to ensure that statistics accurately represented North America consumer Internet usage without being unduly affected by temporary application usage or network conditions. All data was specifically measured at the access network so that all subscriber traffic could be categorized regardless whether the traffic was local to the service provider network or exited to the broader Internet via transit and peering links. This study analyzes service provider traffic by looking at aggregate traffic trends, then separating upstream and downstream traffic. Each is its own section followed by a summary. Aggregate Traffic Trends When combining upstream and downstream consumption rates for a broad indicator of network activity, P2P now accounts for 42% of the traffic, while Web Browsing and Video Streaming (video playback AND video streaming) represent 26% and 15% of network traffic respectively. Tunneling protocols for VPN applications account for 7% of traffic while Newsgroup file downloads (NNTP) are 4%. We observed that the NNTP traffic was generated by less than 0.1% of users implying that a small number of users are consuming a very disproportionate amount of network resources with respect to this protocol. 1
4 % of Traffic Peer to Peer Web Brow sing Streaming Protocols Tunneling New s Groups Other Online Games VoIP Outside Top 10 Figure 1: Aggregate Bandwidth by Categories These findings are broadly consistent with industry analyst forecasts, yet they mask the significant impact of bandwidth intensive applications on the network and ultimately upon the Quality of Experience across the subscriber base. This impact is more clearly shown by examining the upstream and downstream separately to highlight how bandwidth usage varies by direction for each application. Upstream Traffic Trends The primary use of upstream traffic is P2P at 72%; the single largest category of applications by a very wide margin. Gnutella and BitTorrent account for approximately 45% of upstream traffic. The remaining upstream traffic is a mix of other minor peer to peer protocols. This includes UDP and encrypted versions. Next to Peer to peer the largest category is Tunneling at 9% followed by Upstream Web applications at 8% for both HTTP and SSL. Peer-To-Peer continues to have a very significant impact on the network performance and quality of experience for subscribers on the shared infrastructure. 2
5 % of Traffic Peer to Peer Tunneling Web Brow sing Other Streaming Protocols VoIP Online Games Outside Top 10 Figure 2: Upstream Bandwidth by Protocol Downstream Traffic Trends Like upstream, the primary use of downstream traffic is peer to peer. Peer to peer accounts for 35% of the network traffic. Web browsing (not streaming) is very close to peer to peer accounting for 31% of downstream use. Streaming protocols (you Tube, Flash, Joost etc.) are as expected the next largest category of traffic use at 17%. The separation of streaming protocols from standard web browsing is important. Often streaming protocols are delivered over HTTP and as a result are often inaccurately be categorized as "HTTP" by DPI platforms. 3
6 % of Traffic Peer to Peer Web Brow sing Streaming Protocols New s Groups Tunneling Other Online Games VoIP Outside Top 10 Figure 3: Downstream Bandwidth by Protocol Summary North America broadband usage remains dominated by Peer-To-Peer applications, particularly in the upstream where it exceeds 72% traffic. Traffic in the downstream is more balanced with Peer- To-Peer being followed closely by web browsing and video (streaming & playback) applications. 4
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.
Network Management, Performance Characteristics, and Commercial Terms Policy Consistent with FCC regulations 1, Agri-Valley Broadband, Inc., d/b/a mispot (mispot) provides this information about our broadband
Controlling which applications can access network resources and the Internet
Controlling which applications can access network resources and the Internet In this example, you will learn how to use Application Control to monitor traffic and determine if there are any applications
ATTACHMENT A: COMCAST CORPORATION DESCRIPTION OF CURRENT NETWORK MANAGEMENT PRACTICES
ATTACHMENT A: COMCAST CORPORATION DESCRIPTION OF CURRENT NETWORK MANAGEMENT PRACTICES COMCAST CORPORATION DESCRIPTION OF CURRENT NETWORK MANAGEMENT PRACTICES Pursuant to Paragraphs 54 and 59 of the Commission
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES. Updated October 2012
NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES Updated October 2012 Consistent with FCC regulations, 1 NewWave Communications provides this information about our broadband Internet access
State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center
State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality
FortiGate UTM. Daily Activity Report. Nov 11, 2015 00:02:21. FortiGate Host Name: FG300C3913600056. FortiGate Serial Number: FG300C3913600056
FortiGate UTM Daily Activity Report Nov 11, 2015 00:02:21 FortiGate Host Name: FG300C3913600056 FortiGate Serial Number: FG300C3913600056 10-Nov-2015 00:00 To 10-Nov-2015 23:59 2 Table of Contents Bandwidth
POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011
POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES Updated November 19, 2011 Consistent with FCC regulations, 1 Pottawatomie Telephone Company provides this information about our broadband
3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.
THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
Peer-to-Peer (P2P) applications, including both P2P streaming and P2P
Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce
NIELSEN'S LAW VS. NIELSEN TV VIEWERSHIP FOR NETWORK CAPACITY PLANNING Michael J. Emmendorfer and Thomas J. Cloonan ARRIS
NIELSEN'S LAW VS. NIELSEN TV VIEWERSHIP FOR NETWORK CAPACITY PLANNING Michael J. Emmendorfer and Thomas J. Cloonan ARRIS Abstract Our industry is fully aware of Nielsen s Law of the maximum Internet service
Enterprise Broadband Customer Service Description
BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
NEW HOPE TELEPHONE COOPERATIVE
NEW HOPE TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES FCC regulations 1 require persons providing broadband Internet services to publicly disclose various pieces of information. New Hope
CDN and Traffic-structure
CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
YUKON-WALTZ TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES
Updated November 2012 YUKON-WALTZ TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, we provide this information about our broadband Internet access services. Our
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
Global Internet Phenomena Spotlight: Encrypted Internet Traffic
Global Internet Phenomena Spotlight: Encrypted Internet Traffic Introduction There is a growing trend on the Internet, with more and more applications beginning to encrypt their traffic in order to protect
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
The Application Usage and Threat Report
The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto
Ensuring Real-Time Traffic Quality
Ensuring Real-Time Traffic Quality Summary Voice and video calls are traffic that must arrive without delay at the receiving end for its content to be intelligible. This real-time traffic is different
Honolulu, Hawaii January 17, 2012
The Opportunities and Threats From Next Generation Television A Presentation at the 34 th Annual Pacific Telecommunications Council Conference Honolulu, Hawaii January 17, 2012 Rob Frieden, Pioneers Chair
The Broadband Service Optimization Handbook Chapter 7
Intelligent IP service optimization tools are essential for long-term planning to determine what kind of services your network will be offering, to how many subscribers, and how much bandwidth will be
NORTHLAND COMMUNICATIONS BROADBAND INTERNET SERVICES NETWORK MANAGEMENT POLICY
NORTHLAND COMMUNICATIONS BROADBAND INTERNET SERVICES NETWORK MANAGEMENT POLICY Northland is dedicated to providing high-quality Internet access services consistent with FCC regulations 1. Northland s Broadband
Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011
W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
Step into the Future: HTML5 and its Impact on SSL VPNs
Step into the Future: HTML5 and its Impact on SSL VPNs Aidan Gogarty HOB, Inc. Session ID: SPO - 302 Session Classification: General Interest What this is all about. All about HTML5 3 useful components
RESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES
Updated January 2012 RESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 Reservation Telephone Cooperative ( RTC ) provides this information about
COMMUNITY COMMUNICATIONS COMPANY (CCC CABLE) BROADBAND INTERNET SERVICE DISCLOSURES
COMMUNITY COMMUNICATIONS COMPANY (CCC CABLE) BROADBAND INTERNET SERVICE DISCLOSURES Update April 1, 2015 Consistent with FCC regulations,[1] CCC CABLE provides this information about our broadband Internet
IPDR vs. DPI: The Battle for Big Data
IPDR vs. DPI: The Battle for Big Data An Incognito White Paper January 2016 2016 Incognito Software Systems Inc. All rights reserved. Contents Summary... 2 IPDR vs. DPI... 3 Overview of IPDR... 3 Overview
Eastlink Acceptable Use Policy
Eastlink Acceptable Use Policy Introduction The provisions of this Acceptable Use Policy (the Policy or AUP ) apply to Eastlink Consumer and Business Customers. References to "Customer" and "You/your"
Overview of recent changes in the IP interconnection ecosystem
Presentation for Broadband for America Overview of recent changes in the IP interconnection ecosystem Michael Kende June 7 th, 2011 Ref: Introduction 2 Last year marked the 15 th anniversary of the commercialization
LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013
LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES Updated September, 2013 Consistent with FCC regulations, 1 Lake Region Electric Cooperative, Inc. provides this information
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011
SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Updated November 20, 2011 Consistent with FCC regulations, 1 Shidler Telephone Company provides this information about our broadband Internet
Getting an Interim Basic Broadband Service Guide
Getting an Interim Basic Broadband Service Guide Satellite Broadband Subsidy Scheme What is basic broadband? Basic broadband is described as being a service that is capable of download speeds of greater
US Business Services 2015
US Business Services 2015 Executive Summary CMR Market Research May 2015 Reproduction without permission 1 The contents of this report represent CMR s analysis of the information available to the public
Three short case studies
Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.
Cisco Visual Networking Index: Forecast and Methodology, 2011 2016
White Paper Cisco Visual Networking Index: Forecast and Methodology, May 30, 2012 This forecast is part of the Cisco Visual Networking Index (VNI), an ongoing initiative to track and forecast the impact
US Data Services 2014-2019
US Data Services 2014-2019 Executive Summary CMR Market Research April 2015 Reproduction without permission 1 The contents of this report represent CMR s analysis of the information available to the public
Site2Site VPN Optimization Solutions
XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads
2013 Measuring Broadband America February Report
2013 Measuring Broadband America February Report A Report on Consumer Wireline Broadband Performance in the U.S. FCC s Office of Engineering and Technology and Consumer and Governmental Affairs Bureau
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
How To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
Peer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
Trends of Interactive TV & Triple Play
Trends of Interactive TV & Triple Play 1 Technology trends 4C s convergence Improvement and standardization of the encoding technology The enhancement and cost effective of IP video streaming network components
Bandwidth Trends on the Internet A Cable Data Vendor s Perspective. Tom Cloonan, Chief Strategy Officer, ARRIS
Bandwidth Trends on the Internet A Cable Data Vendor s Perspective Tom Cloonan, Chief Strategy Officer, ARRIS Agenda Introduction Observed Bandwidth Trends (& Predictions for the Future) Networking Equipment
Mesh VPN Link Sharing (MVLS) Solutions
XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads
E-Mail: [email protected] Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
GIGASTREAM BASIC BROADBAND Bristol and Bath Science Park
GIGASTREAM BASIC BROADBAND The ideal broadband solution for start-ups and small businesses Gigastream Basic Broadband is an internet service provided by Bridge Partners for tenants of SPark One. Excellent
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 -
WebEx Network Bandwidth White Paper WebEx Communications Inc. - 1 - Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior
Understanding Your Broadband Quality of Service
Understanding Your Broadband Quality of Service November 2004 PO Box 13112 Law Courts MELBOURNE VIC 8010 Telephone (03) 9963 6800 Facsimile (03) 9963 6899 TTY (03) 9963 6948 www.aca.gov.au ABN 78334953951
Fast Forward» How the speed of the internet will develop between now and 2020. Commissioned by: NLkabel & Cable Europe. Project: 2013.
Fast Forward» How the speed of the internet will develop between now and 2020 Commissioned by: NLkabel & Cable Europe Project: 2013.048 Publication number: 2013.048-1262 Published: Utrecht, June 2014 Authors:
2014 Measuring Broadband America Fixed Broadband Report
2014 Measuring Broadband America Fixed Broadband Report A Report on Consumer Fixed Broadband Performance in the U.S. FCC s Office of Engineering and Technology and Consumer and Governmental Affairs Bureau
Elfiq Networks Vital for Hospitality
Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...
http://www.wallwisher.com/wall/tslacld
GETTING UP TO SPEED: Understanding and Sustaining Your Broadband Christine Peterson WALLWISHER http://www.wallwisher.com/wall/tslacld 2 February 2011 1 SERIES SUMMARY Do your patrons complain about sluggish
Bandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES
Updated April 2015 COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 commzomm provides this information about our broadband Internet access services. We call our broadband
Load Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
ISPA Guidelines and Recommendations on Broadband Terminology
ISPA Guidelines and Recommendations on Broadband Terminology Version: 1.01 Date: 2011-06-27 1. Introduction The Internet Service Providers' Association (ISPA) has identified a need to develop a set of
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
Hospitality matters Bandwidth on-demand: Enhancing the guest experience with affordable high-speed Internet
Hospitality matters Bandwidth on-demand: Enhancing the guest experience with affordable high-speed Internet A leadership perspectives white paper Recommended next steps for business and industry executives
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
