Evaluation of Compression of Remote Network Monitoring Data Streams
|
|
|
- Thomasine Webster
- 10 years ago
- Views:
Transcription
1 Evaluation of Compression of Remote Network Monitoring Data Streams Peter I. Politopoulos, Evangelos P. Markatos, Sotiris Ioannidis Institute of Computer Science Foundation for Research & Technology Hellas Abstract Network monitoring and measurement is an invaluable tool for comprehending, analyzing, managing, and optimizing performance and security of networked systems. Network monitoring architectures can take the form of local or distributed deployments of sensors. Local deployments can be very precise and efficient because they benefit from fast links to the central monitoring station, but their scope can be limited to local or small-scale networks. Distributed monitoring infrastructures give a much broader view of the network state, but have the disadvantage that the amount of information they can push back to the central monitoring station is limited by the capacity of the links. In this paper we investigate the effects of compression on network monitoring data streams that are transmitted from distributed network sensors back to a central infrastructure. Our analysis shows that we can achieve very high compression rates, which means we remove much of the capacity overheads when transmitting sensor data back to the central monitors, while incurring only minimal delay in transmission of monitoring information. Our scheme also has the additional benefit of decreased CPU load at the monitoring sensor due to the aggregation of data which reduces the number of network messages. I. INTRODUCTION In our modern networks remote monitoring is of paramount importance. It can serve as a centralized security monitoring tool, as a way for network providers to monitor their service, or simply as a way to collect statistical data about network traffic. Existing monitoring infrastructures rely mostly on local network sensors but the need to track remote networks continues to grow. Where-ever there are remote sensors in place, accessing their data streams is limited by the amount of bandwidth available. That is, that in order to get an accurate picture of the remote network, the remote sensor will have to forward as much traffic as possible to our local monitoring station. This can happen either by using dedicated links for network monitoring (a solution that is not practical since it wastes expensive resources), or use the existing network infrastructure (in which case we end up using link capacity that is normally destined to be used by regular traffic). Let us consider for example that we want to monitor traffic at a remote DNS server. To have a complete picture of the traffic our remote monitor will have to capture and propagate every packet on the link, effectively reducing the capacity by up to 50%. A wide range of monitoring applications require packet payload inspection. Such applications include pattern matching for IDS purposes and peer-top-peer traffic classification over port 80. Our goal is to reduce the amount of bandwidth consumed by the remote network monitors, while at the same time capturing a complete picture of the network state. To accomplish this goal we used compression. The remote monitor compresses the captured traffic before pushing it to the monitoring station. The monitoring station on its end has to decompress it before using it. For our implementation we used the DiMAPI (Distributed Monitoring API) framework [1]. DiMAPI was specifically designed and built for remote packet capturing and uses the MAPI library [2]. The rest of the paper is organized as follows. In the next section we discuss related work in the areas of compression and remote network monitoring In Section III we present the design and implementation of our remote network traffic compression system. Section IV contains the evaluation of our system. Finally, in Section V we conclude and talk about future work. II. RELATED WORK Most of the existing work focuses on header compression, rather than stream or entire flow compression. The Internet Engineering Task Force (IETF) workgroup for robust header compression, established numerous standards applicable to nearly every major protocol such as IP, UDP, RTP, UDP Lite and IPsec [3]. Those standards are widely used by current VoIP and other multimedia streaming applications where headers are a large part of the total data transmitted. Header compression is also used PaMon [4], a system that has some similarities with DiMAPI. PaMon is a distributed infrastructure for passive monitoring that can be used to determine which segments of the network are the source of problems for an application data stream. This is achieved by retransmitting the entire data flow to the monitoring host, allowing inspection of the flow and eventually, identification of the problem. While PaMon uses some compression scheme, it has two important shortcomings. Firstly, it does not aggregate the captured packets so it ends up transmitting all of them. Secondly, the payload does not reduce in size, as PaMon implements only header compression. It is also worth noting that this compression scheme does not take advantage of the similarities between packets in different flows that present locality in time and space.
2 The IETF has proposed RFC 3173 [5] to address payload compression. This scheme is implemented and used in most SSH, VPN and similar tunneling applications [6] prior to encryption. Unfortunately, IPComp still retains the two important disadvantages mentioned before (packet aggregation and time/space localities are not taken advantage of). The approach discussed in this paper overcomes all these problems. Trace file compression algorithms, like VPC3 [7], cannot be used in real-time monitoring applications, since they are designed to exploit similarities that reside in great distances inside trace files. However, the properties of the traces, as shown by an information theoretic approach to network trace compression [8], allow them to be greatly compressed mostly due to recurring header patterns. Outside the area of monitoring, several systems have been proposed for end-to-end compression. Adaptive End-To-End Compression for Variable-Bandwidth Communication [9] describes such a system and so does ACE [10], in a later publication. These, admittedly complex systems, rely on information about the flows that are neither available nor useful for passive monitoring applications. Such information includes per-flow entropy and other characteristics. Packets exchanged between the monitor and the sensors typically contain many rapidly altering multiplexed flows with different attributes. Moreover, we seek to address the need for a simple, robust compressing architecture for our monitoring system, that can be applied to many similar systems, while still introducing the least possible number of modifications to existing infrastructures. III. ARCHITECTURE DiMAPI is a framework for distributed passive network monitoring. DiMAPI builds on top of MAPI, an API for local passive monitoring applications based on libpcap [11]. MAPI relies on a simple yet powerful abstraction, the network flow, but in a flexible and generalized way. In MAPI, a network flow is generally defined as a sequence of packets that satisfy a given set of conditions. These conditions can be extremely broad, ranging from simple header-based filters (e.g. source or destination address, protocol type, port numbers etc.), to sophisticated protocol analysis and content inspection functions (e.g. deep packet inspection). For example, a very simple flow can be specified to include all packets, or all packets directed to a particular web server (by specifying port 80 and the web servers IP address). A more complex flow may be composed of all TCP packets between a pair of subnets that contain the string User-agent: Mozilla/5 The architecture of DiMAPI is presented in Figure 1. MAPI permits users to express their complex monitoring needs by allowing them to define exactly the set of the network traffic they are interested in, and subsequently only collect data that meet those criteria. Despite its flexibility MAPI has a serious shortcoming. It is designed and built to work as a local network monitor. DiMAPI addresses this shortcoming. It extends MAPI from a single, isolated monitoring tool, to a distributed network monitoring framework. DiMAPI can be used to coordinate a plethora of distributed monitoring sensors Monitoring Sensor Communication Agent DiMAPI stub Monitoring Interface UNIX socket / shared memory Monitoring Agent (mapid) Captured Packets Fig. 1. TCP socket TCP socket DiMAPI Architecture User A Application 1 DiMAPI stub User B Application 2 DiMAPI stub in a flexible and efficient way, while at the same time it maintains the specification model of MAPI. Currently, MAPI and DiMAPI are utilised in tens of network monitors around the world as part of the LOBSTER project [12], [13]. IV. EVALUATION A. Testbed Setup We used two hosts in our experimental testbed, each one with an Intel Core2 Duo processor running at 2.4GHz, 2GB of memory, 7200RPM SATA drives, with 1Gbps network interfaces, and running a Linux kernel. The first one, called sensor, runs the monitoring software (MAPI) along with the remote monitoring interface (DiMAPI). On this same host, we also replay traffic on a private interface using a utility called tcpreplay [14]. The second one, called client, is located on the same subnet and switch. The client runs a loop requesting every packet seen on the private interface of the sensor. In addition to that, by utilising the MAPI library the client monitors and counts packets exchanged between itself and the sensor. The test setup is shown on Figure 2. B. Compressing Monitored Traffic 1) Compression Algorithms Comparison: We start our evaluation by comparing a set of compression algorithms. The tests we conducted on a typical, raw network traffic trace file. The results are presented in Table I. The numbers represent an approximation of the compression ratios we can expect by applying the same algorithm on live traffic. This comparison will allow us to estimate the best choice among them, in terms of compression ratio achieved in relation to the time elapsed to compress the data. In essence which compression algorithm gives us the best bang for our buck with respect to compression achieved while minimizing the time taken to achieve it. What we observe is that the best compression ratio to time, that is the best compression achieved per unit time, is achieved by the LZO Fast algorithm. Lempel-Ziv-Oberhumer (LZO) is a fast and efficient compression algorithm implemented by M. Oberhumer as an open-source, cross-platform library [15].
3 tcpreplay Private Interface Get_Next_Packet Sensor Captured Packets Client Bytes Buffer Size Comp. ratio Original N/A 0,00% LZO (fast) KB 12,17% BZip 2 (fast) KB 13,07% Gzip (fast) KB 13,15% LZO (best) KB 14,14% Gzip (best) KB 14,25% BZip 2 (best) KB 15,87% rar KB 22,04% rzip MB 24,26% TABLE II COMPARISON OF COMPRESSION ALGORITHMS ON THE SCHOOLMON TRACE-FILE Fig. 2. Testbed setup. On the left of the schematic we have the remote sensor that monitors network traffic. On the right, client that needs to monitor this remote traffic issues commands to the sensor, which in turn returns the captured packets. Bytes Buffer Size Comp. ratio Time Original N/A 0,00% N/A LZO (fast) KB 51,33% 13 sec BZip 2 (fast) KB 40,25% 203 sec Gzip (fast) KB 51,81% 32 sec LZO (best) KB 52,03% 96 sec Gzip (best) KB 52,05% 44 sec BZip 2 (best) KB 42,43% 214 sec rar KB 53,44% 137 sec rzip MB 55,28% 146 sec Percentage of total packets 55% 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Schoolmon UoC Other Size > 1 Kbyte Size < 100 Bytes TABLE I COMPARISON OF COMPRESSION ALGORITHMS ON THE UOC TRACE-FILE Fig. 3. Trace-file Packet Distribution The trace-file used, which was captured from the University of Crete (UoC), was composed of normal day-to-day traffic, typical for the institution. A more extensive breakdown of the protocols used can be found in the real-time graph offered by the application monitor [16] of the LOBSTER project [17]. The second trace-file we tested was one from the Crete School Network Monitor [18]. While the original size was almost the same, the majority of the packets in this trace were parts of already compressed file transfers. Thus, as shown in Table II, the compression ratio observed was significantly smaller, while the times were identical within 0.01% since in both cases we compressed same sized trace-files (1GB). Both trace-files contained a large percentage of peer-to-peer traffic (>70%) and small to moderate amount of HTTP traffic (6-10%). The rest was FTP, DNS and some other protocols with very low contribution. These two traces were selected among numerous others as an average case for compression (UoC trace) and worst case (SchoolMon). 2) Per-packet Compression Measurements: The next step in our testing was to compress each packet before sending it to the client. The API remained unchanged and the benefit we observe comes from two different factors. The first factor is the per-packet compression savings, which results in actually transmitting less data. The second gain comes from reducing the number of packets transmitted from the sensor to the client. Normally, when one does remote traffic monitoring, the monitored packets are encapsulated (to include metadata, in our case the MAPI header) before transmitted back to the central monitor. If this encapsulation results in packet sizes greater than MTU this can lead to the generation of more packets. Using compression we eliminated these redundant packets. C. Stream Compression Measurements The results seem very promising only for specific types of traffic. For example, when monitoring an uncompressed FTP file transfer, where all packets can be significantly compressed, and all of them are exactly as big as MTU, without the MAPI header needed for remote monitoring, we transmitted 33% fewer packets and achieved 68% compression on the data. When this method was used on real-life traffic the results were not as good. Using tcpreplay with the SchoolMon trace we achieve 4% compression on the data and eliminated transmission of 2% of the packets. This was expected, as per-
4 1.2002e e+06 Delay in microseconds Trace file Replay Speeds 50 Mbit 100 Mbit 200 Mbit 300 Mbit k 8K 16K 32K 64K 128K 256K 512K 1M 2M 4M 8M Buffer size in Bytes (log scale) Fig. 4. Buffer delay that the client experience when requesting remote traffic. The delay is due to the time it takes to fill the remote buffer with packets, compress it, and then send it to the client. Notice that the higher the traffic rate the quicker the packet buffer is filled and therefore the delay experienced by the client is smaller. packet compression does not take advantage of the similarity of consecutive packets in a stream, something that it was already pointed out in [19]. As already shown by the SchoolMon trace results, simply relying on data compression does not yield the optimum benefit under every possible traffic type. What we found to be common under nearly all the real-life traces we examined, is that a very high proportion of the packets inspected had a size of less than 100KB (see Figure 3). Older [20] and more recent [21] measurements show that this large number of small packets is an inherent characteristic of all internet traffic. These small packets can be control packets (SYN, ACK, RST), DNS requests, user inputs in terminal connections, HTTP GET requests, or even small UDP packets carrying voice or video fragments that need to be split up in order to maintain low delay levels. We can take advantage of this fact and transmit multiple packet data encapsulated inside a single monitoring packet. This greatly reduces the network load, while at the same time achieves better compression ratio. 1) Stream Compression: According to our measurement, a modern CPU (2.4GHz Core 2 or similar) is capable of compressing data at a rate exceeding 400MB per second. Such high rates of compression were not possible a few years ago when relevant research was conducted [22]. It is clear that there is middle ground between single packet compression and an entire traffic trace-file compression. Our approach is stream compression. Network packets are collected in a buffer on the sensor side. When the buffer fills up, we compress it and transmit it back to the client. On the client side, the MAPI library decompresses the buffer and delivers the now uncompressed packets locally. This approach also eliminates the need of repeatedly requesting individual packets from the remote buffer. The whole process is transparent to the user application that requests them. This permits monitoring applications to be portable, since we do not modify the API. Stream compression also exploits similarities of packets that have time locality (e.g. consecutive packets). Unfortunately this implementation can potentially add great packet delays in some rare cases, since we do not immediately transmit captured packets, but instead wait until the remote buffer fills up. Figure 4 presents the buffer delay experienced by the client, under varying buffer sizes. Measurements were carried out using various replay rates for the UoC trace-file on the sensor. It is important to note that average packet delay as experienced from the client does not differ significantly, if at all, from the average packet delay at the sensor whatever the buffer size may be (see Figure 5). The locally buffered packets are being pulled nearly instantly from the memory of the client, effectively negating the large buffer delays in the long run. As long as the transmission and compression process consume the monitored packets faster than they get produced, we induce no packet loss and thus the same amount of packets under the same time intervals can only give an equal packet rate. One should note that under rare conditions the individual packet delay can be a lot greater. For example, if the sensor uses a filter to track only a small amount of traffic that requires, let s say, 10 seconds to fill up an 64KB buffer, the delay we will perceive for 1 in (average packet size) / (buffer size) packets will be 10 seconds + 64KB transmission time! We explain how we address this shortcoming in Section IV-C3. Data compression is greatly increased due to the correlation of packets inside the stream. Also, the number of packets exchanged between the sensor and the client, using our compressed streaming were greatly reduced, since we can now
5 Delay in microseconds Trace file Replay Speeds 50 Mbit 100 Mbit 200 Mbit 300 Mbit K 8K 16K 32K 64K 128K 256K 512K 1M 2M 4M 6M 8M Buffer size in Bytes (log scale) Fig. 5. Average packet delay as experienced by the client encapsulate a significant number of individual packets inside a larger packet. Figure 6 shows the number of packets exchanged between the sensor and the client for a full monitoring session of the UoC trace-file. Without compression more than double the original 1,4 million packets are needed for monitoring. This happens because a get-next-packet request is sent for every packet monitored, effectively doubling the packet count. Additionally, some monitored packets that end up exceeding MTU due to the addition of the MAPI metadata, also need to be broken up into multiple packets. As the buffer sizes increases, the algorithm achieves more efficient compression and get-next-packet requests that need to be sent to the sensor are decreasing in number. For buffer sizes larger than 64KB, we observed no additional benefit in either number of packets transmitted or in data compression. This limit is an artifact of the algorithm we use, that compresses data in 64KB size blocks. The optimum buffer size for our experiments was determined to be 64KB + MTU + MAPI header size, since we stop collecting packets for compression the moment we cannot fit another maximumsized packet into our buffer. We should also not fill the buffer with more than 90% of its capacity, in case the data are incompressible. In such a case, we have the side effect that leads to small increase in data size. As far as overall data compression goes, we achieved the theoretical maximum achievable by lzop, when tested by the command line tool that uses the LZO algorithm on the same traces and with the optimum buffer size. It is worth noting that we observed that CPU usage was lower for compressionenabled DiMAPI. This might sound counterintuitive, since one has to account for the CPU usage due to compression. The explanation is that we make up for that extra CPU time from the huge drop in packets transmitted. This leads to a reduced number of system calls which, in turn, results in lower CPU usage. We also need to stress out that the compression and decompression process consume only a minimal amount of CPU cycles by using the fast LZO algorithm. Finally, we run an experiment where a dummy pull process (requesting a packets and getting a null response) was running in a tight loop. We measured the average packet delay at 98 microsecond over a 1Gb per second link. This is half the total average per-packet delay we experienced with 25Mb per second traffic. Thus, the fact that compression-enabled DiMAPI pulls packets a lot less frequently gives it a great efficiency advantage over previous systems. DiMAPI get-nextpacket (pull) requests are sent only when the local buffer at the client side is consumed. We pushed the system and increased traffic replay rates. We observed that we were able to do remote network monitoring to rates up to 310Mb per second. This rate represents an important improvement over the previous, non-compression-enabled implementation, that had a limit of just 27 Mbps. Any further increase of the replay rates above these limits introduces packet loss lzoat the client side. 2) Special Traffic Types: In modern monitoring applications the traffic transmitted or monitored is often of a special type (meaning either very small packets or very large packets). Most of these types of traffic are handled more efficiently by the stream compression than real-world, mixed-type, network traffic. Table III presents our experiments on special types of traffic. We present results from small, large, DNS packets, as well as packets replayed from the NLANR traces. NLANR is a trace file format developed by CAIDA for the National Laboratory for Applied Network Research (NLANR) Project [23] and contains the packet headers but not the actual payload. The compression row represents the percentage of the data transmitted from the monitor compared to the original data size, while the next row we present the same saving for
6 Number of packets exchanged between client and monitor (in thousands) K 8K 16K 32K 64K 128K 256K 512K 1M 2M 4M 6M 8M 10M12M Buffer size in Bytes (log scale) Fig. 6. Number of packets exchanged between the monitor and the client for a full trace-file monitoring session. Pkt len 100 Pkt len 1000 DNS NLANR Average Delay 30us 451us 37us 20us Compression 44,12% 55,79% 31,40% 44,33% % of original pkts transmitted 3,01% 83,02% 4,37% 3,17% TABLE III SPECIAL TRAFFIC TYPES AND STREAM COMPRESSION raw packet number. In all small-packet typed traffic we save more than 95% in packet number transmissions, while the larger packets tend to be more compressible. The difference in average packet delay is expected since the experiments were conducted under a constant replay rate of 25Mb per second. 3) Adjusting the Delay: The only apparent drawback of our remote monitoring system with compression is a possible delay observed when the remote packet buffer is filled at a slow rate (due to lack of remote traffic) and a fast response is needed. For example, if we define a filter for simply monitoring a very specific size of DNS requests (that we believe resemble an attack), and such packets arrive at a rate of a few packets per minute (or even less), we are faced with the possibility of large delays in getting this information from the remote sensor. To address this shortcoming we modified our system to transmit the remote packet buffer when any of the following conditions are met: The packet buffer has filled. A certain time threshold has been exceeded from the time the client has requested the remote packet buffer and the packet buffer contains at least one packet. The delay with this extension becomes very predictable if the packet inter-arrival rate and the average throughput is known. We can achieve any minimum delay between MAPI request time+ Buffer T ransmission time + Packet Interarrival rate and infinity, just by simply adjusting the time threshold and the buffer size. By setting the time threshold a little bit more than our average buffer delay, we can ensure a maximum limit of packet delays on low-throughput periods, without reducing the compression achieved while on normal traffic. For example, the value of 3 millisecond for the timeout did not alter the compression achieved for the sustained 25Mb per second experiments we conducted and presented in the previous sections. V. CONCLUSIONS Compressing the data stream from the sensor to the monitoring client reduces both the number of packets the sensor has to transmit back to the monitoring client and the size of the overall data stream transmitted. Fewer packets as well as less data, result in reduced network load, which makes it easier to use standard network links to perform remote network monitoring, instead of opting for expensive, dedicated links. Our study shows that is possible to achieve those goals using off-the-shelf, commodity hardware, with minimal overheads in CPU and memory use. More specifically, our tests show that we are able to perform remote network monitoring at speeds us to 310Mb per second without losing a single packet from the monitored network. Additionally, our system adds only minimal delay, as we can achieve such rates with just adding a couple of hundred microseconds of latency. We believe that using compression in remote network monitoring is a practical, viable solution.
7 ACKNOWLEDGMENTS This work was supported in part by the IST project LOB- STER funded by the European Union under contract and by the Marie Curie Actions - Reintegration Grants project PASS. We would also like to thank the anonymous reviewers for their comments which helped improve the quality of this paper. REFERENCES [1] P. Trimintzios, M. P. A. Papadogiannakis, M. Foukarakis, E. P. Markatos, and A. Øslebø, DiMAPI: An Application Programming Interface for Distributed Network Monitoring, in Proceedings of the 10th IFIP/IEEE Network Operations and Management Symposium (NOMS06), April [2] M. Polychronakis, K. G. Anagnostakis, E. P. Markatos, and A. Øslebø, Design of an Application Programming Interface for IP Network Monitoring, in Proceedings of the 9th IFIP/IEEE Network Operations and Management Symposium (NOMS04), April 2004, pp [3] IETF Robust Header Compression (rohc) workgroup charter and list of RFC. [Online]. Available: [4] D. Agarwal, J. M. Gonzalez, G. Jin, and B. Tierney, An infrastructure for passive network monitoring of application data streams, in Proceedings of the 2003 Passive and Active Measurement Workshop, San Diego, CA (US) (PAM 2003), March [5] A. Shacham and B. Monsour and R. Pereira and M. Thomas, IP Payload Compression Protocol (IPComp), Internet Engineering Task Force, RFC 3173, September [Online]. Available: [6] IETF IP Payload compression (IPComp) implementation report. [Online]. Available: Implementation.txt [7] M. Burtscher, Vpc3: a fast and effective trace-compression algorithm, SIGMETRICS Perform. Eval. Rev., vol. 32, no. 1, pp , [8] Y. Liu, D. Towsley, J. Weng, and D. Goeckel, An Information Theoretic Approach to Network Trace Compression, University of Massachusetts, Tech. Rep., November [9] B. Knutsson and M. Björkman, Adaptive end-to-end compression for variable-bandwidth communication, Comput. Networks, vol. 31, no. 7, pp , [10] C. Krintz and S. Sucu, Adaptive on-the-fly compression, IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 1, pp , [11] S. McCanne, C. Leres, and V. Jacobson, libpcap, lawrence Berkeley Laboratory, Berkeley, CA. (software available from [12] Lobster Project Homepage. [Online]. Available: [13] Appmon sensors around the globe. [Online]. Available: appmon [14] Tcpreplay. [Online]. Available: [15] LZO Real-Time Data Compression Library, oberhumer.com GmbH, Technical Report, Oct [Online]. Available: [16] D. Antoniades, M. Polychronakis, S. Antonatos, E. P. Markatos, S. Ubik, and A. Øslebø, Appmon: An Application for Accurate per Application Traffic Characterization, in Proceedings of IST Broadband Europe 2006 Conference, December [17] Appmon - University of Crete, anonymized traffic monitor and breakdown. [Online]. Available: appmon/public sensors.html [18] Appmon - Crete School Network Monitor, anonymized traffic monitor and breakdown. [Online]. Available: appmon/public sensors.html [19] S. Dorward and S. Quinlan, Robust Data Compression of Network Packets (Draft), 2000, submitted to Data Compression Conference. [20] C. C. Greg, Recent traffic measurements. [21] C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, and C. Diot, Packet-level traffic measurements from the sprint ip backbone, [22] B. Knutsson and M. Bjorkman, Adaptive End-To-End Compression for Variable-Bandwidth Communication, vol. 31, no. 7, pp , Apr [23] Nlanr project. [Online]. Available:
Design of an Application Programming Interface for IP Network Monitoring
Design of an Application Programming Interface for IP Network Monitoring Evangelos P. Markatos Kostas G. Anagnostakis Arne Øslebø Michalis Polychronakis Institute of Computer Science (ICS), Foundation
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Appmon: An Application for Accurate per Application Network Traffic Characterization
Appmon: An Application for Accurate per Application Network Traffic Characterization Demetres Antoniades 1, Michalis Polychronakis 1, Spiros Antonatos 1, Evangelos P. Markatos 1, Sven Ubik 2, Arne Øslebø
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
to-end Packet Loss Estimation for Grid Traffic Monitoring
Passive End-to to-end Packet Loss Estimation for Grid Traffic Monitoring Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science (ICS)
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
The Fundamentals of Intrusion Prevention System Testing
The Fundamentals of Intrusion Prevention System Testing New network-based Intrusion Prevention Systems (IPS) complement traditional security products to provide enterprises with unparalleled protection
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Improving the Performance of Passive Network Monitoring Applications with Memory Locality Enhancements
Improving the Performance of Passive Network Monitoring Applications with Memory Locality Enhancements Antonis Papadogiannakis a,, Giorgos Vasiliadis a, Demetres Antoniades a, Michalis Polychronakis b,
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Strategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Performance Measurement of TCP/IP Header Compression
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 4 (2011), pp. 399-404 International Research Publication House http://www.irphouse.com Performance Measurement
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Virtual Private Network Using Peer-to-Peer Techniques
Virtual Private Network Using Peer-to-Peer Techniques Peer-to-Peer VPN Daniel Kasza Massachusetts Academy of Math and Science Abstract The low performance of traditional, client-server model based, virtual
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
IxChariot Virtualization Performance Test Plan
WHITE PAPER IxChariot Virtualization Performance Test Plan Test Methodologies The following test plan gives a brief overview of the trend toward virtualization, and how IxChariot can be used to validate
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
WhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage Antonis Papadogiannakis, * Michalis Polychronakis, and Evangelos P. Markatos * * Institute of Computer Science, Foundation for
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck
Sockets vs. RDMA Interface over 1-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Pavan Balaji Hemal V. Shah D. K. Panda Network Based Computing Lab Computer Science and Engineering
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
HyperIP : VERITAS Replication Application Note
QuickTime and a Graphics decompressor are needed to see this picture. HyperIP : VERITAS Replication Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
White paper. Latency in live network video surveillance
White paper Latency in live network video surveillance Table of contents 1. Introduction 3 2. What is latency? 3 3. How do we measure latency? 3 4. What affects latency? 4 4.1 Latency in the camera 4 4.1.1
Performance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Classes of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications
