Experiences of Internet Traffic Monitoring with Tstat
|
|
|
- Esmond Daniels
- 10 years ago
- Views:
Transcription
1 1 Experiences of Internet Traffic Monitoring with Tstat A. Finamore M. Mellia M. Meo M. M. Munafò D. Rossi 1 Politecnico di Torino 2 TELECOM ParisTech {[email protected]} [email protected] Abstract Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users activities. In this paper, we present our experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten years. Started as a scalable tool to continuously monitor packets that flow on a link, Tstat has evolved into a complex application that gives to network researchers and operators the possibility to derive extended and complex measurements thanks to advanced traffic classifiers. After discussing Tstat capabilities and internal design, we present some examples of measurements collected deploying Tstat at the edge of several ISP networks in the past years. While other works report a continuous decline of P2P traffic with Streaming and File Hosting services rapidly increasing in popularity, the results presented in this paper picture a different scenario. First, P2P decline has stopped and in the last months of 21 there is a counter tendency to increase P2P traffic over UDP, so that the common belief that UDP traffic is negligible is not true anymore. Furthermore, Streaming and File Hosting applications have either stabilized or are decreasing their traffic share. We then discuss the scalability issues that software based tools have to cope with when deployed in real networks, showing the importance of properly identifying bottlenecks. I. INTRODUCTION Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users activities. Nowadays, with the increased complexity of the Internet infrastructure, the applications and the services, this role has become more crucial than ever. Over the years, a number of methodologies and tools have been engineered to assist the daily routines of traffic monitoring and diagnosis and to understand the network performance and users behavior [1]. To analyze a system, researchers can follow experimental science principles and devise controlled experiments to induce and measure cause-effect relationships, or, observational science principles and to study the unperturbed system. In the specific field of network traffic measurement, the above two disciplines are referred to as active and passive measurements, respectively. The active approach aims at interfering with the network to induce a measurable effect, which is the goal of the measurement itself. Active approaches generate traffic, e.g, by injecting specifically crafted probe packets or alter the network state, e.g., by enforcing artificial packet loss. A number of This work has been supported by the European Commission through NAPA- WINE Project (Network-Aware P2P-TV Application over Wise Network), ICT Call 1 FP7-ICT Internet monitoring tools are based on active probing, ranging from simple operation management or network tomography via ping or traceroute, to more complex delay and capacity estimation via capprobe or pathchar. Finally, large and controlled testbeds can be easily setup using tools like netem or dummynet. For the passive approach pure observations are performed by means of dedicated tools, named sniffers by the Internet metrology community, that simply observe and analyze the traffic that flows on links. Several passive measurement tools are available. Some tools, such as tcpdump or Wireshark, are designed to let researchers interactively analyze the captured packets. Other tools are instead automated, so that the human interaction is minimized; examples are the flowlevel monitoring tool NetFlow, intrusion detection system like Snort or Bro, and the traffic classification tool CoralReef. A comprehensive list of both active and passive tools can be found in [1]. Tstat is an example of automated tool for passive monitoring. It has been developed by the networking research group at Politecnico di Torino since 2 [2]. Tstat offers live and scalable traffic monitoring up to Gb/s using off-theshelf hardware. It implements traffic classification capabilities, including advanced behavioral classifiers [3], while offering at the same time performance characterization capabilities of both network usage and users activities [4]. After more than ten years of development, Tstat has become a versatile and scalable application, used by several researchers and network operators worldwide. In this paper, we report our experience with Tstat development and use. We illustrate as a case study the traffic evolution as observed during the last year at different vantage points in Europe, and discuss some issues about the feasibility of Internet traffic monitoring with common PCs that can help researchers to avoid common pitfalls that we have faced in the past. II. TSTAT OVERVIEW Tstat started as evolution of tcptrace[5], which was developed to track and analyze individual TCP flows, offering detailed statistics. Tstat initial design objective was to automate the collection of TCP statistics of traffic aggregate, adding real time traffic monitoring features. Over the years, Tstat evolved into a more complex tool offering rich statistics and functionalities. Developed in ANSI C for efficiency purposes, Tstat is today an Open Source tool that allows sophisticated multi-gigabit per second traffic analysis to be run live using common hardware. Tstat design is highly flexible, with
2 2 Network to monitor Fig. 1. (a) L7 L4 L3 Behavioural FSM DPI Pure DPI TCP/UDP Tstat monitoring probe setup (a) and analysis workflow (b). several plugin modules offering different capabilities that are briefly described in the following. In addition, plugins can be activated and deactivated on the fly, without interrupting the monitoring. Being a passive tool, live monitoring of Internet links, in which all flowing packets are observed, is the typical usage scenario. Fig. 1(a) sketches the common setup for a probe running Tstat: on the left there is the network to monitor, e.g., a campus network. It is connected to the Internet through an access link that carries all packets originated from and destined to terminals inside the monitored network. The Tstat probe observes the packets and extracts the desired information. Note that this scenario is common to a wide set of passive monitoring tools: therefore, the problems faced when designing Tstat are common to other tools as well. A. Monitored objects The basic objects that passive monitoring tools considers are the IP packets that are transmitted on the monitored link. Flows are then typically defined according to some rules to group all packets identified by the same flow ID and that have been observed in a given time interval. A common choice is to consider flow ID = (ipp rotot ype, ipsrcaddr, srcp ort, ipdstaddr, dstp ort), so that TCP and UDP flows are considered. For example, in case of TCP, the start of a new flow is commonly identified when the TCP three-way handshake is observed; similarly, its end is triggered when either the proper TCP connection tear-down is seen, or no packets have been observed for some time. Similarly, in case of UDP, a new flow is identified when the first packet is observed, and it is ended after an idle time. As Internet conversations are generally bidirectional, the two opposite unidirectional flows (i.e., having symmetric source and destination addresses and ports) are then typically grouped and tracked as connections. This allows to gather separate statistics forclient-to-server and server-to-client flow, e.g., the size of HTTP client requests and server replies. Furthermore, the origin of information can be distinguished, so that it is possible to separate local hosts from remote hosts in the big Internet. As depicted in Fig. 1(a), traffic is then organized in four classes: incoming traffic: the source is remote and the destination is local; outgoing traffic: the source is local and the destination is remote; (b) IP local traffic: both source and destination are local; external traffic: both source and destination are remote. This classification allows to separately collect statistics about incoming and outgoing traffic; for example, one could be interested in knowing how much incoming traffic is due to YouTube, and how many users access Facebook from the monitored network. The local and external cases should normally not be considered but can be present in some scenarios. At packet, flow and application layers, a large set of statistics can be defined and possibly customized at the user s will. In case of Tstat, several statistics are already available, and they can be easily customized and improved being Tstat Open Source. A detailed description of all available measurement indexes can be found in [2] and [7]. B. Workflow analysis As far as the analysis process is concerned, each observed packet is handed over to each active plugin, as illustrated in Fig. 1(b). Following the Internet naming standard and going up in the protocol stack, layer-2 (L2) frame decapsulation is first done. Then, the network-layer (L3) header is processed. Given the datagram service offered by IP networks, at L3 only perpacket statistics, such as bitrate, packet length, are possible. Going up to the transport-layer (L4) analysis, a set of common statistics for both TCP and UDP flows are maintained, e.g., packet and byte counters, round trip time (RTT) and throughput of the data download. At the application-layer (L7), the main goal of a monitoring tool is to perform traffic classification task, that is to identify the application that generated the traffic. As traffic classification is known to be prone to fallacies, several approaches have been studied in the literature [6], [8]. Each tool has its peculiarities. In the case of Tstat, three different engines are available, each relying on different technologies. They are designed to work even when the complete packet payload is not available, that is a common situation in live networks monitoring, since, usually, only a limited portion of each packet is exposed to the sniffer due to privacy reasons. Tstat implements a DPI technology similar to the one adopted in tools like l7filter and OpenDPI. In addition to what done in those tools, Tstat offers a richer set of statistics that complement the pure classification purpose making it more flexible than pure classification tools as the ones earlier mentioned. Other commercial tools like ntop and peakflow offer not only classification capabilities but complete solutions for traffic monitoring, anomaly detection and security. Designed to work on operative networks, they rely on NetFlow/sFlow technology as input, i.e., they do not analyze packet traces, but data records with flow level statistics. Typically, their deployment is highly invasive, i.e., several analyzers have to be deployed in strategic points of the network. Tstat instead is an Open Source software designed to be installed on common hardware at the edge of the network where packet level traces are analyzed. In particular, the simplest classification engine offered by Tstat is Pure Deep Packet Inspection (PDPI). It uniquely identifies applications by matching a signature in the application payload. All the application signatures are collected in
3 3 a dictionary, defining a set of classification rules, and are then checked against the current packet payload until either a match is found, or all the signatures have been tested. In the first case, the packet/flow is associated to the matching application, while in the second case it is labeled as unknown. Signatures cover a large set of applications, ranging from standard protocols to Peer-to-Peer applications, like BitTorrent, emule, Gnutella, PPLive, and Sopcast. Extending and updating the signatures is a key issue with PDPI, as we will discuss later. The second engine, named Finite State Machine Deep Packet Inspection (FSMDPI), inspects more than one packet of a flow. Finite State Machines (FSM) are used to verify that message exchanges are conform to the protocol standard; a specific sequence of matching rules have to be triggered to have a positive match. For example, if the first packet contains GET and the response carries HTTP/1. OK, the flow can be considered as HTTP. Using this approach, more complex signatures can be defined, allowing to identify web based applications like YouTube, Vimeo, Facebook, Flickr, or chat services like MSN, XMPP/Jabber, Yahoo. Finally, Voice over IP phone (VoIP) calls based on RTP/RTCP are identified using FSMDPI as well. To cope with applications that leverage on encryption mechanisms which make any DPI classifier useless, Tstat implements a Behavioral classifier (BC) engine that exploits statistical properties of traffic to distinguish among applications. For example, packet size or inter arrival time in flows carry information about the application generating the content, so that VoIP flows exhibits different characteristics with respect to data download flows. Using this approach, Tstat identifies encrypted traffic like the one generated by Skype and Obfuscated P2P-file-sharing of BitTorrent and emule [3]. In Section III we present some results that exploit the traffic classification capabilities of Tstat. While the performance and accuracy of the classifier are out of the scope of this paper, overall, they have been found to outperform [other] signature based tools used in the literature when compared by independent researchers [9]. C. Input data Software-based monitoring tools like Tstat are designed to work in real-time when installed in operational networks. The software tool runs on a probe, i.e., a dedicated PC that sniffs traffic flowing on an operative link, as shown in Fig. 1(a). The libpcap library is the de-facto standard Application Programming Interface (API) to capture packets from standard Ethernet linecards under several Operating Systems. Dedicated hi-end capture devices such as Endace DAG or AITIA S1GED cards are also available on the market 1. They offer hardware packet monitoring solutions that offload the CPU guaranteeing higher performance than software based solutions. Tstat supports both standard sniffing based on libpcap, and hardware solutions as the ones mentioned earlier. Furthermore, Tstat can be also compiled as a library to allow an easy integration with already existing tools such as those typically deployed by an ISP which already has a monitoring solution. In the latter case, the ISP is free to decide what packets should be processed by Tstatto cope with privacy and anonymization issues. In our experience, this approach has been very successful to facilitate the integration of Tstat with the monitoring tools of several ISPs around Europe and with other traffic analysis tools developed by the research community. Besides live traffic analysis, monitoring tools are also commonly adopted to process packet-level traces that have been previously collected. In this case, the tool can be used to inspect specific traffic for post-mortem analysis, or to develop more complex statistical analysis for advanced performance evaluation, or to double check the accuracy of any new index that is being developed. Since several trace file formats are available on the market, a variety of file formats should be supported, such as pcap, erf, etherpeek, snoop to name a few. Besides supporting already a large set of trace input file format, Tstat allows to easy integrate new formats thanks to its open and flexible design. D. Output statistics Each monitoring tool offers a set of output statistics that are strictly bound to the goal of the tool itself. For example, intrusion detection systems like Snort or Bro output the list of triggered alarms and violations, while traffic classification tools like Tie or CoralReef report statistics about application traffic shares. Considering Tstat, statistics are available with different granularities: per-packet, per-flow, and aggregated. At the finest level of granularity, packet traces can be dumped into trace files for further offline processing. This output format is extremely valuable when coupled with Tstat classification capabilities: indeed, packets generated by different applications can be dumped to different files. For example, it is possible to instruct Tstat to only dump packets generated by Skype and BitTorrent applications. At an intermediate level of granularity, Flow-level logs are text files providing detailed information for each monitored flow. A log file is arranged as a simple table where each column is associated to a specific information and each line reports the two unidirectional flows of a connection. Several flow-level logs are available, e.g., the log of all UDP flows, or the log of all VoIP calls. The log information is a summary of the connection properties. For example, the starting time of the VoIP call, its duration, the number of suffered packet losses, the jitter are all valuable metrics that allow to monitor the VoIP quality of service. Flow-level logs use much less space than the original packet-level traces, and can be collected for much longer periods of time. At an even higher level of granularity, Tstat gathers statistics about flows aggregates. Two formats are available in this case. Histograms are empirical frequency distributions of collected statistics over a set of flows. For example, the distribution of the VoIP call duration is automatically computed by considering all VoIP flows that were observed during each 5 minute time interval. To overcome the problem of storage space explosion of packet-traces, flow-level logs and histograms over time, the second available format is represented by Round
4 4 TABLE I PROBES CHARACTERISTICS Location Users Technology Type Polish ISP 1k ADSL Home Hungarian ISP 4k ADSL Home Italian ISP 5k ADSL Home Italian ISP 15k FTTH Home Italian Campus 1k LAN and WLAN Campus TABLE II AVERAGE TRENDS OF THE TWO SEMESTER IN 21. P2P HTTP Stream. File Hosting Localtion Jan/Jun Jul/Dec Jan/Jun Jul/Dec Jan/Jun Jul/Dec Pol. ISP Hun. ISP Ita. ISP ADSL Ita. ISP FTTP Robin Database (RRD) [1] It allows to build a database that spans over several years by limiting the amount of disk space. RRD handles historical data with different granularities: newer samples are stored with higher frequencies, while older data are averaged in coarser time scales. This dramatically reduces the requirements in terms of disk space (a priori configurable) and, thanks to the tools provided by the RRD technology, it is possible to visually inspect the results. For example, RRD data collected by a Tstat probe can be queried in real time using a simple web interface [2]. Results presented in Sec.III are obtained from the corresponding RRD data. III. TRAFFIC TRENDS FROM DIFFERENT VANTAGE POINTS After having presented the main Tstat features and characteristics, we now show Tstat capabilities through a few results and discuss some conclusions we drawn from our long experience in using it. We have been collecting measurement data since 25 in collaboration with several ISPs. A Linux-based Tstat probe has been installed and properly configured in different Pointsof-Presence (PoPs). The results presented in this work refer to five European PoPs and characterize 2 months of traffic collected from May 29 to Dec 21. A. Probe description The main characteristics of the 5 probes are summarized in Tab. I, which reports the PoP location, the approximate number of aggregated users, the access technology and the type of customers distinguishing between Home or Campus users. As it can be observed, the set of probes is very heterogeneous: it includes Home users in three different countries, with ADSL or LAN and WLAN access technologies. Depending on the type of contract with the ISP and on the quality of the physical medium, ADSL technology offers users different bitrates, ranging from 2 to 2 Mb/s downstream and up to 124 kb/s upstream. Fiber to the Home (FTTH) customers are offered 1Mb/s full duplex Ethernet connectivity, while Campus users are connected to a 1Gb/s based Campus network using either Mb/s Ethernet, or IEEE 82.11a/b/g WiFi access points. The Campus network is connected to the Internet via a single 1 Gb/s link and a firewall is present to enforce strict policies, to block P2P traffic (unless obfuscated), and to grant access to only official servers inside the campus. Probes were upgraded several times to update the Tstat version and to include advanced features, so as to enhance traffic classification accuracy and augment the number of protocol signatures. All probes are configured to continuously collect RRD information. B. Traffic share and trends We first present results covering from May 1st, 29 to Dec 22nd, 21 period. Figure 2 shows the traffic breakdown for incoming traffic, i.e., traffic received by customers. The applications generating the largest amount of traffic are highlighted using different colors. Gaps in the figures correspond to outage periods of the probes. Over time, we enhanced the classification portfolio of Tstat by adding both PDPI/FSMDPI and Behavioural rules. For example, since June 29 we have been collecting statistics about both Streaming Applications, such as YouTube, Vimeo, Google video and other flash-based streaming services, and File Hosting Web based services like RapidShare or MegaUpload that allow users to share large files. Light and dark pink colors highlight them in the plots. Double checked in the Campus network first, we then deployed these capabilities into other probes. Similarly, since December 29 the BitTorrent obfuscated traffic (plotted in light green) is correctly identified by Tstat, and the more recent BitTorrent UDP based data transport protocol named utp [11] is correctly classified since July 21 (dark red). This latter classifier was developed while investigating the cause of the sudden increase of UDP traffic share that is clearly visible in the Hungarian vantage points during February 21. This is an example of the usage of Tstat to effectively support traffic monitoring. Several considerations can be derived from the presented results. Before the utp protocol was adopted by BitTorrent, the volume of UDP traffic was marginal in all vantage points but in the Italian ISP. This is due to this ISP offering Video on Demand (VoD) services over UDP that makes the volume of VoD UDP traffic in this network about 1% of the total. Customers of the same operator are offered native VoIP service using standard RTP/RTCP protocols over UDP. Still, the volume of traffic due to VoIP is almost negligible, accounting for less than 2% of total traffic (in dark purple color in the figure). Nowadays, UDP traffic can top 3% of total volume, depending on the popularity of BitTorrent-uTP or VoD applications. Therefore, the widely popular statement that UDP traffic is negligible does not hold anymore. Applications usage is very different at different places. For example, in Poland the fraction of HTTP traffic is predominant, with more than 6% of traffic due to several applications adopting HTTP protocol. In both the Italian ISP PoPs, instead, Peer-to-Peer (P2P) applications amount to more than 5% of traffic, with emule clearly being preferred over BitTorrent. In Hungary, on the contrary, BitTorrent is more popular (with a traffic share above 2%), while an almost negligible amount of traffic that is due to emule. Finally, note that in the Italian Campus network the fraction of P2P traffic is marginal being
5 5 Polish ISP May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1 Hungarian ISP May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1 Italian ISP - ADSL May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1 Italian ISP - FTTH May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1 Italian Campus May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1 HTTP TCP Others HTTP (SSL/TLS, Chat,...) Streaming (YouTube, Vimeo,...) FileHosting (RapidShare,...) P2P Emule Emule Obfuscated BitTorrent BitTorrent Obfuscated Other FTP, , Unknown UDP Other P2P DNS, VoD, Unknown RTP/RTCP BitTorrent BitTorrent utp Fig. 2. Comparison of traffic as observed on 5 different traffic probes. Gaps in the data were due to temporary outages of the probes. the firewall very effective in blocking such traffic. Some long-term trends are clearly visible. For example, until July 21, P2P traffic share is generally decreasing, while Streaming and File Hosting applications are gaining popularity. More precisely, Tab. II reports the average per month variation of the traffic share. Specifically, we compute the linear increase/decrease of traffic during each month, and then we average the results over the first and second six months of 21 separately. We do not report results for the Campus network since P2P traffic is blocked, and this biases results. Interestingly, in the first semester data confirm the trends reported in [12] where a decrease of P2P traffic was noticed, while both File Hosting and Video Streaming usage were increasing. During the second semester, we observe an unexpected change in this trend: from June 21, P2P traffic starts increasing while File Hosting traffic is either stable or decreasing. Further investigations revealed that this might be related to changes in the policies of RapidShare [14], the most popular File Hosting service in these countries. In particular, RapidShare started enforcing more limitation to not-paying customer to incentive them to subscribe to their service. This caused users to switch back to P2P content download. The Italian probes instead are not affected by this change since RapidShare is not popular in Italy. Overall, these indexes are a clear indication of very fertile and dynamic scenarios that call for continuous and persistent traffic monitoring and classification. While the above mentioned changes in traffic shares are typically slow, sudden changes are possible due to changes in the application. For example, as already mentioned, the popular µtorrent, the official BitTorrent client application, was updated during February 21 to use by default the utp transport protocol instead of TCP. Correspondingly, there is an increase of UDP traffic clearly visible in some probes. Residential probes have stable shares over time, even if trends are present. Instead, in the Campus network the traffic share changes over time, so that a weekly pattern is clearly visible (see also the figure and related comments in the next section). Indeed, during the weekend, few users are present in the campus and little traffic flows on the link. Obfuscated traffic for P2P applications is not very common in the monitored probes. We double checked that this
6 6 Traffic load Traffic load Max CPU load Tot. bitrate [Mb/s] Flows tracked [kflows/s] Mon Tue Wed Thu Fri Sat Sun Mon (a) Italian ISP FTTH probe. Max CPU load Tot. bitrate [Mb/s] Flows tracked [kflows/s] Mon Tue Wed Thu Fri Sat Sun Mon (b) Italian Campus probe. Fig. 3. Total link bitrate, number of flows and maximum CPU utilization during a typical week. is not a Tstat classification problem (i.e., Tstat not correctly identifying obfuscated P2P traffic). Consider a host a with IP address IP a running BitTorrent on Port a. Since the application uses the same Port a to receive both plain and obfuscated connections, we count the number of connections going to (IP a,port a ) and see how many of those are not labeled as BitTorrent, i.e., neither plain BitTorrent, nor obfuscated BitTorrent. Those are possibly BitTorrent connections not correctly classified by Tstat. We consider all hosts that are running BitTorrent in a 2 hour long trace on January 21st of 21 in Poland. Results show that less than.5% of flows/bytes are not classified as BitTorrent (those are called false negatives using classification terminology). Similarly, we computed the percentage of flows that are classified as BitTorrent obfuscated, but going to some host which is not likely to run BitTorrent on that port. They account for less than.1% of flows/bytes (those are called false positives using classification terminology). Similar results are obtained considering emule. This shows that Tstat obfuscated classification engine is very reliable. In conclusion, the presented results highlight the importance of constantly monitoring the network with a flexible tool that has to be constantly upgraded and enhanced to follow its changes. IV. SCALABILITY ISSUE OF SOFTWARE BASED MONITORING TOOLS When implementing a live monitoring tool, the knowledge of the maximum sustainable load that the probe can handle CPU load [%] CPU load [%] is one the most critical issues that must be faced. Indeed, as seen in the previous section, Internet traffic changes widely over both time and space. In a finer timescale, traffic is known to exhibit even larger variability considering both the packet and flow levels. For example, packet-level burstiness can stress the sniffing hardware so that packet bursts can arrive at very high speed. Packet capturing, filtering and timestamping are then critical, especially if implemented in software. Similarly, bursts of new flows can stress the per-flow operations, so that memory management becomes typically a bottleneck. While Tstat is as an example of advanced traffic monitoring tool, most of the operations it handles are common to any flow-level sniffer and monitoring tool. Indeed, similar data structures must be used to store basic per-flow information such as flow identifier, packets and bytes counters, timestamp and the classification status. Notice that flow structures must be accessed and updated for each packet: hence, efficient data structures like hash-tables must be considered, where collisions are minimized and eventually handled using chaining. Further optimizations of memory management are also needed; freed structures should be manually handled as reuse lists by a garbage collector, so as to avoid generic and expensive garbage collection routines to kick-in and slow down the main analysis operations. In [13] we extensively analyzed the computational complexity of the Tstat analysis workflow, showing that even with off-the-shelf hardware it is possible to run advanced analysis techniques on several Gb/s worth of traffic in real-time. To provide some examples of the typical workload that Tstat has to support, and to highlight some critical points in the design of a flow-sniffer, Fig.3 shows the evolution a one week long period of time of the total link bitrate (gray line), number of tracked flows (black line) and maximum CPU utilization (dotted line), i.e., the total time spent by the CPU in running Tstat, including both kernel and user space CPU time. Measurements refer to a time window of 5 minutes. Results for the Italian ISP FTTH and Italian Campus probes are reported on the top and bottom plots, respectively; results from other probes are not reported for the sake of brevity. Considering the total link bitrate, the two probes handle approximately the same amount of traffic, which tops to nearly 5Mb/s at the peaks. Notice that the peak-hour occurs at different times, reflecting the different user habits of Home and Campus users. The number of active flows is also very different, with the Campus probe having to handle a per-flow load which is about two times higher. This is due to the different traffic mix generated by Campus users, as previously shown in Fig. 2. Therefore, hash table sizes must be correctly tuned to support the various values of the load. Consider now CPU load curves. We observe a very different behavior: the Italian ISP probe shows a very low CPU utilization, which is not correlated with the traffic load pattern. On the contrary, the Campus maximum CPU utilization is always above 3%, and it tops % during sustained traffic load. Investigating further, we pinpointed this to be due to the packet capturing input module, which is based on a common Gigabit Ethernet linecard in the Campus probe, while the Italian ISP probe relies on a dedicated Endace linecard. Based
7 7 on our experience indeed, the major bottleneck is due to the linecard-to-memory communications, which can overload CPU by generating a large number of Interrupt Requests (IRQ) per second, i.e., one for each received packet. Dedicated traffic capturing devices solve this problem by implementing timestamping functionalities and Direct Memory Access (DMA) based transfers of packet batches. The CPU utilization figures of the other probes, not shown in the paper due to lack of space, confirm this. All ISP probes are indeed equipped by dedicated hardware capturing linecards so that the maximum CPU utilization remains very limited even if they have to handle a large volume of traffic, topping to about 1.5Gb/s. To sum up, with common hardware it is possible to monitor several Gb/s volumes of traffic in real time, provided the packet capturing is performed with efficient hardware that offload the CPU from the per-packet memory copy and timestamping operations. Similarly, efficient memory management algorithms must be adopted to perform per flow operations, which optimize both the flow lookup performed for every packet, and the garbage collection mechanisms required to avoid memory starvation. [11] S. Shalunov, G. Hazel, J. Iyengar, Low extra delay background transport (LEDBAT), IETF Draft, October 21. [12] C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F. Jahanian, Internet inter-domain traffic, ACM SIGCOMM, New Delhi, India, August 21. [13] D. Rossi and M. Mellia, Real-Time TCP/IP Analysis with Common Hardware, IEEE International Conference of Communication (ICC 6), Istanbul, Turkey, June 26. [14] Reward programme: RapidPoints and RapidDonations to be discontinued, news, June 21. PLACE PHOTO HERE Alessandro Finamore (S 9) received the M.Sc. in computer engineering in 28 at Politecnico di Torino. Between he has been research assistant at Politecnico di Torino, while from 29 he joint the Telecommunication Network Group at Politecnico di Torino as Ph.D. student. His research interests are traffic classification and computer programming. V. CONCLUSIONS In this paper, we described our experience in engineering and using Tstat, a software based Internet traffic monitoring tool that we have being developing for the past 1 years. Presenting measurements collected from several ISP networks, we have shown that Internet traffic widely changes over both time and space: application shares are different at different networks even if common trends are visible due to slow changes in applications popularity; however, sudden changes are observed after the deployment of disruptive technologies made by applications themselves. This call for the development of automatic mechanisms that continuously update the classification capabilities of a tool, a challenging goal that the research community is currently facing. PLACE PHOTO HERE applications and energy aware network design. Marco Mellia (SM 8) received his Ph.D. degree in Telecommunications Engineering in 21 from Politecnico di Torino. In 1999, he was with the CS Department at Carnegie Mellon University, Pittsburgh (PA) and since April 21 he is with EE Department of Politecnico di Torino. He has coauthored over 14 papers published in international journals and conferences, and he participated in the program committees of several conferences including IEEE Infocom and ACM Sigcomm. His research interests are in the fields of traffic measurement, P2P REFERENCES [1] L. Cottrell, Network Monitoring Tools Collection, stanford.edu/xorg/nmtf/nmtf-tools.html. [2] Tstat Homepage, [3] A. Finamore, M. Mellia, M. Meo, D. Rossi, KISS: Stochastic Packet Inspection Classifier for UDP Traffic IEEE/ACM Transactions on Networking,, Vol.18, No.5, pp , Oct. 21. [4] M. Mellia, R. Lo Cigno, F. Neri, Measuring IP and TCP behavior on edge nodes with Tstat, Computer Networks, Vol.47, No.1, pp.1-21, Jan. 25. [5] TCPTrace Homepage, [6] T. Nguyen, G. Armitage, A survey of techniques for internet traffic classification using machine learning, Communications Surveys & Tutorials, IEEE, vol.1, no.4, pp.56-76, 28. [7] A. Finamore, M. Mellia, M. Meo, M. Munafò, D. Rossi, Live Traffic Monitoring with Tstat: Capabilities and Experiences, 8th International Conference on Wired/Wireless Internet Communication, WWIC 21, Lulea, Sweden, ISBN: , 1-3 June, 21 (ISSN , LNCS 674). [8] H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee, Internet Traffic Classification Demystied: Myths, Caveats, and the Best Practices, ACM CoNEXT 28, p.12, Madrid, Spain, Dec. 28. [9] M. Pietrzyk, J. Costeux, G. Urvoy-Keller, and T. En-Najjary, Challenging Statistical Classification for Operational Usage : the ADSL Case, ACM Internet Measurement Conference, Chicago, IL, Nov. 29. [1] RRDtool Homepage PLACE PHOTO HERE Michela Meo (M 2) received the Laurea degree in electronic engineering in 1993 and the Ph.D. degree in electronic and telecommunication engineering in 1997, both from Politecnico di Torino, Italy. Since November 1999, she is an Assistant Professor at Politecnico di Torino. She co-authored more than papers, about 4 of which are in international journals. She edited six special issues of international journals, including ACM Monet, Performance Evaluation Journal and Computer Networks. Her research interests are in the field of performance evaluation and modeling, traffic classification and characterization, peer-topeer, green networking. Dr. Meo was program co-chair of two editions of ACM MSWiM, general chair of another edition of ACM MSWiM, program co-chair of IEEE QoS-IP, IEEE MoVeNet 27, IEEE ISCC 29 and she was in the program committee of about 5 international conferences, including Sigmetrics, Infocom, ICC, and Globecom.
8 8 Maurizio M. Munafò (M 98) received the Dr. Ing. degree in electronic engineering and the Ph.D. degree in telecommunications engineering from Politecnico di Torino, Italy, in 1991 and 1994, respectively. He is an Assistant Professor in the Electronics Department of Politecnico di Torino. He has coauthored about 6 journal and conference papers in the area of communication networks and systems. His current research interests are in simulation and performance analysis of communication systems, and in traffic modeling, measurement and and classification. PLACE PHOTO HERE PLACE PHOTO HERE Dario Rossi Dario Rossi (S 2) is an Associate Professor at the Computer Science and Networking department of Telecom ParisTech, in Paris, France. He received his MSc and PhD degrees from Politecnico di Torino in 21 and 25 respectively, and held during a visiting researcher position in the Computer Science division at University of California, Berkeley. At Telecom ParisTech, he is responsible for several European research projects, such as FP7 NAPA-WINE, Celtic TIGER, TIGER2 and TRANS, ANR Connect. He has coauthored over 7 papers in leading conferences and journals, holds 4 patents and he participated in the program committees of several conferences including IEEE INFOCOM, ICC, IPCCC and GLOBECOM. His research interests include green networking, peer-2-peer networks, Internet traffic measurement and traffic engineering.
9 Network to monitor 9
10 1 Behavioural L7 FSM DPI Pure DPI L4 TCP/UDP L3 IP
11 11 Polish ISP May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1
12 12 Hungarian ISP May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1
13 13 Italian ISP - ADSL May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1
14 14 Italian ISP - FTTH May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1
15 15 Italian Campus May9 Jul9 Sep9 Nov9 Jan1 Mar1 May1 Jul1 Sep1 Nov1
16 16 HTTP P2P TCP Others HTTP (SSL/TLS, Chat,...) Streaming (YouTube, Vimeo,...) FileHosting (RapidShare,...) Emule Emule Obfuscated BitTorrent BitTorrent Obfuscated Other P2P UDP DNS, VoD, Unknown RTP/RTCP BitTorrent BitTorrent utp Other FTP, , Unknown
17 17 Traffic load Max CPU load Tot. bitrate [Mb/s] Flows tracked [kflows/s] Mon Tue Wed Thu Fri Sat Sun Mon CPU load [%]
18 18 Traffic load Max CPU load Tot. bitrate [Mb/s] Flows tracked [kflows/s] Mon Tue Wed Thu Fri Sat Sun Mon CPU load [%]
Live Traffic Monitoring with Tstat: Capabilities and Experiences
Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
Broadband Quality Test Plan
Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Non-intrusive, complete network protocol decoding with plain mnemonics in English
The Triple Play Analysis Suite - DATA The Triple Play Analysis Suite - Data are meant for emulating the client s application such as FTP downloading or Web Browser testing at the termination point of DSL
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Personal Cloud Storage: Usage, Performance and Impact of Terminals
Personal Cloud Storage: Usage, Performance and Impact of Terminals Enrico Bocchi, Idilio Drago, Marco Mellia Politecnico di Torino [email protected] Abstract Personal cloud storage services such as
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis
Application Note Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis Introduction This application note is one in a series of local area network (LAN) troubleshooting papers from JDSU
Uncovering the Big Players of the Web
Uncovering the Big Players of the Web 3 rd TMA Workshop Vienna March 12 Vinicius Gehlen Alessandro Finamore Marco Mellia Maurizio M. Munafò TMA COST Action Introduction 2 Nowadays Internet traffic volume
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Application Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
TamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Wireshark Tutorial. Figure 1: Packet sniffer structure
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette
SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
LOAD BALANCING IN WEB SERVER
LOAD BALANCING IN WEB SERVER Renu Tyagi 1, Shaily Chaudhary 2, Sweta Payala 3 UG, 1,2,3 Department of Information & Technology, Raj Kumar Goel Institute of Technology for Women, Gautam Buddh Technical
Introduction to Performance Measurements and Monitoring. Vinayak Hegde [email protected] @vinayakh
Introduction to Performance Measurements and Monitoring Vinayak Hegde [email protected] @vinayakh 1 Structure Part 1 Basics of Measurement (40 min) Part 2 Basic Statistics primer (40 min) Part 3 Measurement
Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent
IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh
IP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France [email protected] 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Performance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
Programming Assignments for Graduate Students using GENI
Programming Assignments for Graduate Students using GENI 1 Copyright c 2011 Purdue University Please direct comments regarding this document to [email protected]. 1 OVERVIEW 2 1 Overview This document
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
C-GEP 100 Monitoring application user manual
C-GEP 100 Monitoring application user manual 1 Introduction: C-GEP is a very versatile platform for network monitoring applications. The ever growing need for network bandwith like HD video streaming and
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
What is LOG Storm and what is it useful for?
What is LOG Storm and what is it useful for? LOG Storm is a high-speed digital data logger used for recording and analyzing the activity from embedded electronic systems digital bus and data lines. It
EAGLE EYE Wi-Fi. 1. Introduction
1. Introduction Internet access has become very popular by the emergence of broadband services, and busy yet unregulated Internet traffic causes challenges to administration and management. When it comes
High-Speed Network Traffic Monitoring Using ntopng. Luca Deri @lucaderi
High-Speed Network Traffic Monitoring Using ntopng Luca Deri @lucaderi Some History In 1998, the original ntop has been created. It was a C-based app embedding a web server able to capture traffic and
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:
Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
itvsense Probe M-301/M-304
implementing next generation IT and communications solutions Service Assurance for Digital Video and IP-based Multiplay Networks itvsense Probe M-301/M-304 telecommunication networks it networks research
A Performance Study of VoIP Applications: MSN vs. Skype
This full text paper was peer reviewed by subject matter experts for publication in the MULTICOMM 2006 proceedings. A Performance Study of VoIP Applications: MSN vs. Skype Wen-Hui Chiang, Wei-Cheng Xiao,
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
3. Dataset size reduction. 4. BGP-4 patterns. Detection of inter-domain routing problems using BGP-4 protocol patterns P.A.
Newsletter Inter-domain QoS, Issue 8, March 2004 Online monthly journal of INTERMON consortia Dynamic information concerning research, standardisation and practical issues of inter-domain QoS --------------------------------------------------------------------
Multi Stage Filtering
Multi Stage Filtering Technical Brief With the increasing traffic volume in modern data centers, largely driven by e-business and mobile devices, network and application performance monitoring has become
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
Bandwidth Measurement in xdsl Networks
Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu
