How Expensive are Free Smartphone Apps?
|
|
|
- Richard Garrison
- 10 years ago
- Views:
Transcription
1 How Expensive are Free Smartphone Apps? Li Zhang Dhruv Gupta Prasant Mohapatra Computer Science Department, University of California, Davis, CA, USA Proliferation of data-enabled mobile devices has fueled the popularity of smartphone applications (apps) at a rapid pace, and the trend is likely to continue for the foreseeable future. Along with the increase in popularity, the characteristics and concept of paid apps and free apps is also changing. In general, paid smartphone apps generate their revenue simply from the cost of downloading the app. On the other hand, free apps rely on advertisements, and/or virtual currencies, for their revenue generation. There are several variants of these generalized approaches. In this work, we focus on identifying the overhead traffic that is generated by the free apps with respect to the paid apps. The overhead traffic is not associated with the operation of the app itself and thus should not impact the usage experience of the apps. Specifically, we consider advertisements, and the transmission of analytic data, as the main components of overhead traffic. With the gradual disappearance of unlimited data plans, the overhead traffic does not come for free. The goal of this paper is quantify the cost of the overhead traffic of the popular free apps and compare it with the paid apps. We have developed an intricate methodology for identifying and measuring the bandwidth requirements of the overheads associated with the free apps. Through comprehensive measurements, we have shown that in most cases, the paid versions of the apps will indeed be a fraction of the cost to the end users when compared to the actual cost of the free versions. I. Introduction The past few years have witnessed a tremendous increase in mobile data usage. With the advent of smartphone devices, and availability of a variety of data usage plans from cellular carriers, mobile users have driven data usage to unprecedented levels [14]. According to [19], the average smartphone data usage increased by a factor of 89% from the year 2010 to In the latest mobile data traffic forecast by Cisco [14], it was noted that while smartphones accounted for only 12% of the total devices globally, their data usage accounted for about 82% of the global mobile data traffic. The increase in the popularity of smartphones has also led to the propulsion of smartphone applications, popularly knows as smartphone apps, and associated application (app) stores (Android Market, Apple App Store and others). These apps have replaced the traditional browser-based access to most of the common applications and services accessed by Internet users. The Android Market grew at a rate of one billion application downloads a month in the second half of 2011 [13], while the Apple App Store has passed twenty-five billion app downloads since its inception [8]. According to some reports! [24], users are now spending more time on smartphone apps than on smartphone browsing. These statistics clearly reflect the growing popularity of smartphone apps amongst mobile data users. Several previous studies have focussed on analyzing smartphone data traffic on cellular networks [15, 21, 22, 29]. These studies have led to some interesting findings regarding the behavior of mobile users in general, and smartphone apps in particular. However, a missing component from these studies has been the aspect of overhead traffic generated by these apps, and its impact on the end user. We define overheads in this context as the portion of smartphone app traffic that is not an integral part of the smartphone app data itself. As part of our study, we identify two primary classes of overhead traffic, i) advertisements or ads, and ii) analytics. Ad traffic pertains to the data that belongs to the text, image, audio, or video-based ads that are displayed or played when the smartphone app is being used (Figure 2). Analytics refers to the portion of smartphone app traffic that is transmitted to a third-party server specifically for the purpose of collecting data that can be used to analyze app popularity or user behavior. We contend that neither of these classes of traffic is absolutely required for the functioning or use of the associated smartphone app, and hence we classify this traffic as overhead. This overhead traffic will impact the mobile users by increasing their total monthly data usage. Unlimited data plans are no longer the norm, with most carriers moving towards tiered data plans [11], wherein mobile users are allowed a fixed amount of data usage. Given the high fees for overages, most users would Mobile Computing and Communications Review, Vol. 16, No. 3, July
2 want to avoid crossing their monthly data allowance. In fact, several apps are available for the very purpose of tracking mobile data usage on smartphones [23]. However, while the data usage caused by the applications is expected by the user, the associated overhead traffic may not be accounted for. Further, this overhead traffic will also consume network resources. Previous studies [28] have shown how the periodic transmission of ad or analytic traffic results in increased battery usage for the user, and increased control signaling over the network. Therefore, it is essential to quantify the amount of overhead traffic being generated by smartphone apps, both from the perspective of the end user, as well as the cellular network. As part of this work, we make the following contributions towards achieving this goal: We tested several smartphone apps and collected detailed packet traces. By analyzing this data, we were able to identify the actual app traffic and differentiate it from the overhead traffic. We tested various cases, such as when the app is being actively used, versus when the app is left running in the background. We compared different versions of smartphone apps (free versus paid) in terms of how much overhead traffic they generate. We further compared the overhead traffic across devices with different mobile operating systems (ios and Android). By analyzing the temporal nature of overhead traffic, we identify how ad and analytic traffic is transmitted over the network, to and from the mobile device. We also identify the major content providers that generate the ad traffic, and the primary web-sites that are collecting the analytics traffic. Finally, we quantify the cost of the additional traffic that is incurred by the free apps against the price of the paid version of the apps (which were observed to not generate much overhead traffic). Our detailed measurements show that the actual cost of some of the popular free apps is about 48% 1299% higher, given a limited use for a month, than their paid counterparts. The rest of the paper is organized as follows. The related work is discussed in Section II. We describe the data collection methodology in Section III. The Application Overhead Identifier (AOI) module is presented in Section IV. The measurement results and analysis are presented in Section V. We discuss the real cost of the free apps in Section VI, followed by the conclusion (Section VII). II. Related Work Prior works have investigated several related aspects such as usage behavior of smartphone apps, energy consumption, signaling overheads, and security and privacy concerns. According to [22], 77% of the top free apps were implanted with at least one third-party ad library that downloads real-time ads. In [17], the authors disassembled the byte code of the Android apps and identified 100 representative third-party ad libraries implanted in the free apps. It was shown that the top 5 most popular ad libraries among app developers are admob, google.ads, flurry, google.analytics and millennial media. While the library-level profiling reveals the existence of ads, these works did not quantify the amount of overheads generated by different apps, which may contain various number of ad and analytic libraries with different settings. Furthermore, from our experiments, we also found that some apps contain ads or analytic code not just from third-party libraries, but from app-developers themselves. For example, a portion of the overheads in Angry Birds(Rio) app comes from the developer (Rovio) web-site directly. Another recent work [20] analyzed the key features of mobile advertisement delivery by capturing all the traffic on a rooted Android phone. The authors designed an Advertisement Cache Manager component (CAMEO) that utilizes users context to predict and cache the advertisements that need to be downloaded.however, this work only proposed a design, without any implementation. Moreover, the effort was targeted on improving the ads delivery efficiency for free Android apps only, and hence the authors only profiled a set of specifically targeted third-party ad libraries, and excluded all other kinds of overhead (ads implanted without using third-party libraries and analytic overhead). Our study reveals that the ads analyzed in [20] are only a component of the overall overhead traffic. In addition, our experiments are not limited to rooted or jailbroken devices. Efforts in [25 28] focus on profiling the energy consumed by smartphone apps. Pathak et al. implemented eprof, a software tool that can estimate the power consumption of apps on Android and Window Mobile phones, by tracing the system calls. The authors revealed that 65% 75% of the energy of free apps was spent in third-party advertisement modules. 22 Mobile Computing and Communications Review, Vol. 16, No. 3, July 2012
3 Another study [28] applied a model for Radio Resource Control (RRC) state to estimate the power consumption on 3G radios of Android phones. The results showed that Google Mobile Ad, AdMob, and Mobclix, introduce 3 J/min, 5.7 J/min, and 23.2 J/min of extra energy consumption respectively, on radio transmission and receiving. In [29], a comprehensive overview of the app usage behavior is depicted at a national level by using anonymous network traces. The authors show how apps in the same genre share similar geographic coverage, access time, and set of users. It is also shown that each category of smartphone apps follows its own unique temporal pattern. For example, entertainment apps are used more frequently at night than at daytime. Some previous works have also focussed on privacy issues involved with smartphone app traffic, by analyzing the content of the data sent, instead of the amount of overheads generated. For example, Hornyack et al. [18] measured 110 Android applications and presented a series of statistical results on the violation of the Android permissions. According to their study, the top five most wanted information items by the ad/analytic hosts are the unique phone ID (IMEI number), location, contact list, camera information, and user s online accounts. In [17], authors identified the information sent by popular ad libraries. For example, google.ads collected users location data and the IMEI number of the smartphones. In our current work, we take a step back and try to answer the question as to what type of overheads are generated by smartphone apps, by providing a classification of overhead traffic. Furthermore, our study provides a methodology to accurately quantify the overhead traffic related to smartphone apps. Unlike previous works, we use our results to predict the true cost of free apps, as compared to paid apps. Lastly, our methodology is based on collecting passive measurements, and does not involve any software to be installed on the mobile devices, or rooting or jailbreaking them. III. Data Collection The primary goal of the proposed study is to measure and quantify the network traffic generated by the smartphone apps. These network traffic depends on the app program, the operating system, the content and the device characteristics. It will not depend on the access media. The amount of traffic that apps (with same operations and same dynamic contents) would generate would be independent of their connectivity to WiFi or cellular. Because of the proprietary nature of cellular connectivity, all of our measurements are based on WiFi connectivity. Without the loss of generality, the same trend would be observed in the cases with cellular connectivity. In this section, we first describe the smartphone apps that we tested, followed by our testing and data collection methodology. III.A. Application Selection We performed a comprehensive study of the statistics and popularity of the apps available on the ios and Android app stores. The statistics showed that the 5 most popular app categories are: entertainment, games, education, tools and lifestyle [9] [1]. We then selected a total of 10 popular apps from these 5 categories. All the selected apps have been downloaded over 250, 000 times and have a rating of 4 out of 5 as of January 2012 [2] [3]. The names of apps are listed in Table 1. To get a comprehensive view of the be- Categories Apps Icons Entertainment Pandora, Words With Friends, Games Angry Birds (Rio), Fruit Ninjia, Education Dictionary.com, Merriam-Webster, Tools Beat The Traffic, Instant Heart Rate, Lifestyle Allrecipes Dinner, Flight View, Table 1: List of selected apps havior of these apps, we selected both the free and the paid versions of the apps, except for the case where only one version of the app was available (for example, Pandora). Our goal was to identify if there exist any differences in the overheads generated by the paid apps versus their free versions. III.B. Experimental Setup Our experimental setup consists of an Apple iphone 4, a Samsung EXHIBIT II phone (Android device), a Dell E5400 laptop, and a Cisco WRT310N wireless router. The hardware and OS details for the smartphone devices are listed in Table 2. The laptop was equipped with an Intel Link 5100 Wi-Fi card, which supports a/g/n. The operating system on the laptop was Fedora 16 (Verne) with Linux kernel Figure 1 shows our network topology. The Cisco wireless router was configured in access point (AP) mode and also acted as the gateway to the Internet. The smartphones were configured as Wi-Fi clients Mobile Computing and Communications Review, Vol. 16, No. 3, July
4 that can attach to the Cisco AP. We created a network monitor by setting the Wi-Fi card of the laptop in monitor mode. We also had tcpdump running on the laptop (hereafter referred to as the monitor) in order to collect packet traces. Using tcpdump, we can capture all the packets on the wireless channel that are exchanged between the smartphone devices and the wireless AP. These packet traces are written to a file for later analysis. The whole network was set to be unencrypted, so that the captured packets can be decoded and analyzed on any machine even without the encryption keys. All our experiments were conducted leaving only the app to be tested. Secondly, we turned off all the background services by using the task management feature. On the iphone device, ios 5 has its own task manager for killing unwanted apps. For the Android device, we used a well-known task manager app called Advanced Task Killer, available on the Android market. Without any apps running, the monitor is tuned to listen to the smartphones traffic to record the data being transmitted to and from the smartphones. The protocol packets are put in a set P protocol. Figure 1: Network setup for smartphone data capture. (a) Active (b) Inactive using the Wi-Fi radio technology. In order to avoid any unexpected radio switching between Wi-Fi and cellular radio on the smartphone devices, we disabled cellular data access on the phones. iphone 4 Samsung EXHIBIT II OS ios Android CPU ARM Cortex-A8 Snapdragon 1GHz GPU PowerVR SGX 535 Areno 205 RAM 512M eddr 512M mddr WiFi b/g/n b/g/n Table 2: Hardware and OS details for test devices. III.C. Packet Capture We observed that both the iphone and Android device support multi-tasking, wherein multiple apps can run at the same time in the background and generate traffic. While testing the apps, we wanted to make sure that the packets we are capturing are being generated only from that app. We used the following steps to ensure that no traffic was being generated by these apps that may run in the background. First, we uninstalled as many apps as possible from each of the devices, Figure 2: Example of app states for Dictionary.com app Each selected app was tested in two modes: active and inactive. An app is considered to be in the active state when it is actually being used. On the other hand, if the app is not killed and is running in the background, it is termed as being inactive. An example of the active and the inactive states is shown in Fig. 2. To guarantee a fair comparison, we have the free and the paid versions of the apps perform the same tasks in these 10 minutes on both phones, although the paid versions usually have more functions than the free versions. For each run of the experiment, we capture the packets for 10 minutes using Tcpdump. The reason why a longer period (e.g. 1 hour) is not chosen for each run is that some apps will not function normally and will request to be re-activated if they have been in inactive statues for a certain buteriod of time. For example, we observe that Pandora stops playing music and pops up a window to ask Are you still listening? at about 796 seconds after becoming inactive. 24 Mobile Computing and Communications Review, Vol. 16, No. 3, July 2012
5 IV. Application Overhead Identification Figure 3: Flow Chart for Application Overhead Identifier (AOI) module Using the defined methodology, we tested all the selected apps and captured hundreds of packet traces. The most challenging part of our methodology was to quantify the overhead bytes for each application, since the overhead packets are integrated with the normal app data traffic, the protocol traffic, and other network traffic in the same capture file. In order to achieve this, we developed an Application Overhead Identifier (AOI) module in Python. Figure 3 shows the flow chart describing the functionality of the AOI module. Our AOI module first filters all the protocol packets such as IEEE probing packets, network broadcast packets, and DHCP packets, using the list created in Section III.C to populate P protocols. The protocol packets can be easily filtered from the capture files by matching the destination IP addresses, the MAC addresses of the hosts, and the protocol headers. Following this, the AOI module resolves the IP addresses of the remaining packets to their corresponding host names, such as amazon.com, google.com and others. Apart from the network name resolution feature in WireShark, AOI also uses the WHOIS [4] databse and the IP address lookup functionality provided by DNSstuff [5] to resolve the IP addresses. Since each web host may allocate multiple servers to better handle the service requests, we combine the counts of the packets if they have the same host names. For example, all the IP addresses in the range and belong to iadsdk.apple.com, which is Apple s mobile advertisement service [6]. So the traffic from/to * range is summed up and marked as from/to iadsdk.apple.com. After this step, we can already identify a portion of the overhead traffic from its host names if the packets are from/to the wellknown ad or analytic websites, e.g. Google s admob.com and doubleclick.com. However, the regular data and the ad content of an app may be stored on the same host server. For example, amazonaws.com is a popular cloud storage service which hosts any kinds of data. The final function of the AOI module is to distinguish the normal data traffic from the overhead traffic. Most applications have separate host names or IP address ranges to serve ad traffic or collect analytics data, which can be easily identified. However, there is still a possibility that the data traffic and the overhead traffic arrive from the same host server. To solve this problem, we compare the packets captured in the paid version and the free version of the same application. Since the paid apps are observed to communicate with a very limited number of IP addresses (e.g. 0 for Angry Birds (rio) (iphone) and 3 for Words With Friends (Android)), we are able to trace the content of the packets manually for all the paid apps. Suprisingly, we found the paid apps also include some elements of analytics, but the amount is almost negelectable. The manual measurment results are presented in the Fig. 4 and Fig. 5 in Sec. V together with other related results. By observing that the paid apps have little or no overhead, we assume that the traffic captured from the paid version of an app is absolutely required for the operation of the app. By filtering out these packets from the packet trace of the free app, we can completely and accurately identify all overhead traffic. V. Data Comparison And Analysis V.A. Assumptions and Invariances For the purpose of our analysis, we only consider the overheads generated by a smartphone app after the initialization part is over. Initialization refers to the initial period when the app is being started and loaded. For example, Apple s ios often actives its game center when the game apps are turned on. We ignore this time period since the overhead of initialization occurs only once and may also contain traffic that is required for the correct initialization of the app. Also, previous works have studied and commented on the differences in user behavior with regard to usage of smartphone Mobile Computing and Communications Review, Vol. 16, No. 3, July
6 apps [29]. In our study, we do not consider the impact of user behavior. The scope of our inferences will not be significantly impacted by user behavior as quantified in the next section. To investigate whether the run time of the experiments will affect our results, we tested each selected app multiple times, over different time periods across multiple days. Based on our analysis, we found the results are mostly invariant.we also wanted to study the impact of different devices, different OSs versions and a variety of personal settings related to the context of the apps. We also performed our experiments on a Nexus S Android phone with similar OS (Android 2.3.6). The results were merely agnostic to the types of devices and OSs. This is because of the fact that the overhead traffic was primarily due to the app contents. We did observe certain degree of variances related to the personal settings affecting the app contexts. However, the proportion of traffic variances were not large enough to impact the overall overhead. Such variances are depicted in our results. Further, as part of our analysis, we do not consider any potential impact that battery usage may have on the app traffic and overhead traffic. Our test devices were always connected to a power supply during the course of the experiments. Lastly, we did not install any traffic monitoring/policing/blocking apps on the smartphones. V.B. Analysis of Overhead Traffic As mentioned in Section IV, we consider the traffic generated by the paid apps as actual app traffic, while the additional traffic generated by the free apps is considered as overhead traffic. To verify this assumption, we first study the overhead comparison between paid and free apps. Figure 4 shows the total overhead bytes generated by each selected app for the case of iphone testing. We tested both the scenarios wherein the app was either actively being used (active), or it was left running in the background (inactive). For the active case, the free versions of the apps generated considerable amounts of overhead traffic, with some apps generating up to 1 MB of overhead traffic within the 10 minutes test duration. Figure 5 shows the same results for the Android test case. We also observed that several of the apps showed varying amounts of overhead traffic even when they were inactive. It was observed that even when the apps were left running in the background, they were still transmitting either analytics related traffic, or receiving ad traffic, potentially for displaying when the app becomes active. The overheads associated with the paid versions was seen to be almost negligible as compared to their free counterparts. (a) iphone (active for 10 minutes) (b) iphone (inactive for 10 minutes) Figure 4: Comparison of overhead traffic for iphone apps: free versus paid. (a) Android (active for 10 minutes) (b) Android (inactive for 10 minutes) Figure 5: Comparison of overhead traffic for Android apps: free versus paid. 26 Mobile Computing and Communications Review, Vol. 16, No. 3, July 2012
7 In Figure 6, we compare the overheads associated with the free iphone apps and the free Android apps, in both the active and inactive states. We did not observe a definite trend, with iphone generating more overheads than Android device for some apps, and less for others. For the inactive tests, the overheads were not negligible for some of the apps. For example, Pandora and Angry Birds apps seem to generate considerable amounts of overhead traffic even when they are inactive. These additional traffic are attributed to analytics and ad traffic for potential future displaying. The overhead traffic during the inactive periods are significantly higher for Android for Angry Birds and Fruit Ninja apps when compared to the iphone. However, in other applications, such as Dictionary, Beat The Traffic, and Flight View, the overhead traffic of iphone is noticeably higher. We believe that the apps may receive different ad content and analytic requirements from different sources for their iphone version and Android version. The overhead traffic for Pandora app was seen to be nearly similar across both the devices. any pattern over time or not. The apps could either download all the ad traffic at one time, and then display them over the course of using the app, or they could receive ad content in small chunks over a period of time. In Figure 7, we depict the cumulative amount of overhead traffic generated in one minute time increments, by the top five iphone apps in terms of overhead traffic. For the active case, while different apps show different rate of increase in overhead traffic, most of them seem to exhibit close to linear increase in overhead traffic volume over time. Some of the apps also seem to be slightly tapering off towards the end of the tests. For the inactive case, the characteristics were much more distinct. Most of the apps show minimal, if any, increase in overhead traffic. Only the Angry Birds app seems to be generating overhead traffic at periodic time intervals, resulting in a step-wise function. (a) iphone (active) (a) Active For 10 Minutes (b) iphone (inactive) (b) Inactive For 10 Minutes Figure 6: Comparison of overhead traffic for iphone versus Android. V.C. Temporal Analysis of Overhead Traffic We next analyzed our results to investigate whether the overhead traffic generated by the apps exhibits Figure 7: Overhead traffic vs Time for iphone apps. In Figure 8, we show the results for the time variation of overhead traffic for top five Android apps. All the apps do not behave in a similar manner as their iphone counterparts. The Angry Birds app shows aggressive overhead traffic growth over time, as opposed to the case of iphone test. The Fruit Ninja app seems to generate nearly similar amounts of traffic, but the pattern is very different. In the case of iphone, it exhibits close to a linear increase over time, while in the case of Android, the app seems to be download- Mobile Computing and Communications Review, Vol. 16, No. 3, July
8 ing majority of the overheads in the beginning, with slow growth over rest of the usage duration. Lastly, for the inactive case for Android testing, the results were different from the same case for iphones. For example, in the case of iphone, the Fruit Ninja app did not generate any traffic when inactive. However, in the case of Android, it showed similar pattern of overhead traffic over time as the active Android case, albeit with lower volume. (a) Android (active) (b) Android (inactive) Figure 8: Overhead traffic vs Time for Android apps. V.D. Source of Overhead Traffic Our AOI module resolves the IP addresses seen in the packet traces to their respective owner names. By visiting the homepage and reading the business scope of the IP owners, we build a database to identify which ones were sending and receiving overhead (both ad and analytic) traffic. In Figure 9, we plot the top sources of overhead traffic by combining the results of all our testing, from both the iphone and the Android devices. Our key observations from this analysis are as follows: The number of web hosts serving ad-related content is many more than those sending and receiving analytic traffic. As shown in Figure 9(a), when the apps are active, the overhead is mainly caused by the ads. For our experiments, ads contributed 87% of the total overhead traffic. In contrast, the analytic traffic is 12.4% more than the ad traffic when the apps are inactive, as shown in Figure 9(b). In both Apple Store and Android App Market, the term app developers usually refers to companies which developed the corresponding apps. By manually comparing the names of the app developers with the source domains of overhead traffic, we found that most of the overhead is from third-party content hosting sites, instead of the apps developers themselves. An interesting phenomenon is that the advertisement platforms belonging to the OS and device owning companies are not as popular as thirdparty mobile advertisements companies. For example, Google s doubleclick.net was ranked at the 4th position while the ranking of Apple s iadsdk.apple.com was 7. (a) Active (b) Inactive Figure 9: Top sources for overhead traffic for 10 selected apps for both iphone and Android. 28 Mobile Computing and Communications Review, Vol. 16, No. 3, July 2012
9 V.E. Dissecting Popular Apps: Case Studies In this section, we provide an in-depth view into the overheads generated by three of the selected apps. According to our measurements, Words With Friends and Angry Birds (rio) have the maximum number of ad and analytic sponsors among the 10 selected apps on iphone and Android respectively. Words With Friends is considered as a representative social game, while Angry Birds (rio) is a typical standalone game. The third app we selected was Pandora, since it is the only app among the selected ones that delivers audiobased ads. Words With Friends is a multi-player social game developed by Zynga. By comparing the overhead traffic generated by this app on both the iphone and the Android devices (Figure 10), we made the following observations: There is no obvious relation between the iphone and the Android versions of the same app in terms of the overheads they generate. The same app may have different implementations on different platforms. For example, the iphone version of Words With Friends turns off all the TCP connections for overhead once it becomes inactive, while overhead traffic generated by inactive Android version can be observed till the end of the experiment run. Some of the overhead traffic is closely related to the device OS. For example, Apple s ad platform (iadsdk.apple. com) only shows up for iphone, while Google s platform (1e100.net) only appears on Android. Some other ad platforms are not dependent on OSs. For example, doubleclick.com, which was purchased by Google in 2007, appears in both iphone and Android apps. In contrast to Words With Friends, Angry Birds (rio) is a typical standalone game which does not necessarily require network connection to function. It was launched in March 2011 by Rovio and has been downloaded more than 10 million times [2, 3]. Due to its popularity and modest price, it is also listed among the top 10 paid apps in terms of the number of downloads [3]. Without a paid version in Android App Market, the Android version of Angry Birds (rio) attracted many ad and analytic sponsors. As shown in Fig. 11, the Android version has 9 ad or analytic sponsors, while the iphone version has only 3. Pandora is an Internet radio app that is used for streaming music. A special feature of Pandora is (a) Words With Friends (iphone) (b) Words With Friends (Android) Figure 10: Case Study: Words With Friends (Free & Active) (a) Angry Birds rio (iphone) (b) Angry Birds rio (Android) Figure 11: Case Study: Angry Birds rio (Free & Active) that it has audio ads, while the other selected apps only have text and image based ads. The results for Mobile Computing and Communications Review, Vol. 16, No. 3, July
10 Pandora are shown in Figure 12. Pandora personalizes its ads by collecting and sending userś location information, which causes uplink overhead traffic. From our results (not shown in the figures), we found that the uplink overhead of Pandora contributes about 51% and 44% to the overall overhead traffic for its iphone and Android versions respectively. Furthermore, certain types of analytics traffic for Pandora (such as traffic collected by the mobile analytic site andomedia.com) seem to be generating heavily from the iphone version, but not from the Android version. used for about one hour per day. Note that the cost of 300Mbytes is $20.0 in AT&T and a few other service plans. As an example for Android users, one hour of play of Angry Bird (rio) per day would result in an additional bill of over $13.0 per month. That is much higher than the cost of the paid version of Angry Bird (rio) ($0.99). We also list the additional cost of the other three apps in Table 3. It is astonishing to note that the cost of these popular free apps are several hundreds of percentage higher than their counterpart paid versions, even with limited usage during a month. (a) Pandora (iphone) Figure 13: The Real Cost of The Free Apps VI. (b) Pandora (Android) Figure 12: Case Study: Pandora (Free & Active) Real Cost of Free Apps Free apps do not cost anything to download and install. However, the concept of free stops right there. As we have shown, the additional network bandwidths consumed by the free apps are substantial. To quantify the cost of the additional bandwidth, we provide some empirical estimation of the cost in terms of dollars. A simple and straightforward way to quantify the cost of the extra overheads is depicted in Figure 13. We have considered four apps which have both free and paid versions. The graph shows the cost of the monthly overhead generated by the free versions of these apps. We can observe that most of the apps generate over 50 Mbytes overhead per month if they are Apps iphone Android Dictionary.com 47.8% 102.9% Angry Birds (Rio) 129.3% % Fruit Ninja 353.9% 448.6% Flight View 940.9% 305.0% Table 3: How much more expensive are free versions (one month) than paid versions? We want to emphasize as well as clarify that the cost analysis shown above is empirical and should be considered in that spirit. The absolute values would depend on several factors including the usage patterns and the amount of usage per month. The radio access WiFi or cellular would obviously play a role in the cost. The providers service plans and the variations therein would have a significant impact on the overall cost. Unlimited service plans are certainly not within the scope of this study as they are agnostic to the bandwidth usage. Multiple free apps and variable usage of these apps in active and inactive modes would change the dollar figures significantly. Conservative usage in cellular access modes, or while nearing the bandwidth limit would be other factors that would influence the monthly cost. Newer free apps are evolving and their business models may increase or decrease these hidden costs. 30 Mobile Computing and Communications Review, Vol. 16, No. 3, July 2012
11 In addition to the cost in terms of increased monthly bill for limited data plan users, there are other implied costs involved in free apps for all users. A recent work [25] by Pathak et al. has shown the fine grain energy accounting for smartphone apps. Instead of getting into that level of details, we want to highlight the additional energy consumption by free apps due to the extra bandwidth usages. Balasubramanian et al. [10] showed that the transmission of 50KB data consumes 12.5J on 3G radio and 7.6J on WiFi radios, while the reception of 100KB data costs 15J on 3G and 3J on WiFi. As shown in Fig. 14, the overhead generated by most apps consumes over 200J per hour. It should be noted that in addition to these extra energy consumptions, there will be more consumptions related to additional processing and other operations, which can be derived using the methodology presented in [25]. Figure 14: The Extra Energy Consumption Caused by Overhead VII. Conclusion and Future Work Mobile data usage is increasing at a rapid pace, fueled by both the necessity for users to be always connected, and the advent of data-enabled devices. At present, most cellular companies follow a tiered pricing model wherein users have a fixed monthly quota of data usage, with high penalties for overages. With the growing popularity of smartphone devices, more people are spending more time using smartphone apps. As part of our current work, we analyze the traffic that is generated by these apps, and quantify as to how much of that traffic can be classified as overhead. We further classify this overhead traffic as ad traffic and analytic traffic, and identify the primary sources of such traffic. By comparing the overheads and the cost associated with the free and the paid versions of the apps, we analyze the true cost of using the free smartphone apps. The experimental platform we built for this work provides an external measurement approach to study the behavior of the smartphone apps. For example, it can be used as an alternative approach to analyze privacy concerns related to user data being shared by smartphone apps. Prior works that address privacy issues of smartphone apps, are primarily based on reverse engineering techniques that disassemble the binary code of the apps [12, 16, 17]. By parsing through the disassembled code, the researchers were able to identify the users privacy information collected by the ad/analytic related APIs. However, the authors commented that this process is extremely challenging and they were not able to cover 100% of the branches of the disassembled source code [12, 16], due to insufficient privileges and the fact that smartphone apps usually have multiple main entry points, as opposed to only one entry point in most PC applications [7, 12, 16, 17]. Therefore, it is possible that a portion of the app privacy violation actions remain unknown. We expect that the external packet capture approach will be an effective method in identifying privacy violations, since the users privacy information in the smartphones is mainly sent through the wireless radios. References [1] App Store Metrics, [2] Android Market, [3] Apple App Store, [4] Domain Based Research Service, [5] DNSstuff, [6] The iad mobile advertising network, [7] Android SDK, [8] Apple, [9] AppBrain. [10] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy consumption in mobile phones: a measurement study and implications for network applications. In Proceedings of Mobile Computing and Communications Review, Vol. 16, No. 3, July
12 the 9th ACM SIGCOMM conference on Internet measurement conference, IMC 09, pages , New York, NY, USA, ACM. [11] G. Bensinger [12] E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. MobiSys 11, pages , [13] E. Chu. 10 billion android market downloads and counting, [14] Cisco. Cisco visual network index: Global mobile data traffic forecast update, [15] H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. A first look at traffic on smartphones. In Proceedings of the 10th annual conference on Internet measurement, IMC 10, pages , New York, NY, USA, ACM. [16] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS 11, pages , New York, NY, USA, ACM. [17] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC 12, pages , New York, NY, USA, ACM. [18] P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren t the droids you re looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM conference on Computer and communications security, CCS 11, pages , New York, NY, USA, ACM. [19] D. Kellogg. Aaverage us smartphone data usage up as cost per mb goes down (neilsen reports), [20] A. J. Khan, V. Subbaraju, A. Misra, and S. Seshan. Mitigating the true cost of advertisementsupported free mobile applications. In Proceedings of the Twelfth Workshop on Mobile Computing Systems and Applications, HotMobile 12, pages 1:1 1:6, New York, NY, USA, ACM. [21] S.-W. Lee, J.-S. Park, H.-S. Lee, and M.-S. Kim. A study on smart-phone traffic analysis. In Network Operations and Management Symposium (APNOMS), th Asia-Pacific, pages 1 7, sept [22] I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo. Don t kill my ads!: balancing privacy in an ad-supported mobile application market. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile 12, pages 2:1 2:6, New York, NY, USA, ACM. [23] C. New. How to save on your smartphone bill: Track data usage, [24] C. Newark-French. Mobile app usage further dominates web, spurred by facebook, [25] A. Pathak, Y. C. Hu, and M. Zhang. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with eprof. In Proceedings of the 7th ACM european conference on Computer Systems, EuroSys 12, pages 29 42, New York, NY, USA, ACM. [26] A. Pathak, Y. C. Hu, M. Zhang, P. Bahl, and Y.-M. Wang. Fine-grained power modeling for smartphones using system call tracing. In Proceedings of the sixth conference on Computer systems, EuroSys 11, pages , New York, NY, USA, ACM. [27] G. Perrucci, F. Fitzek, and J. Widmer. Survey on energy consumption entities on the smartphone platform. In Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd, pages 1 6, may [28] F. Qian, Z. Wang, A. Gerber, Z. Mao, S. Sen, and O. Spatscheck. Profiling resource usage for mobile applications: a cross-layer approach. MobiSys 11, pages , [29] Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman. Identifying diverse usage behaviors of smartphone apps. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC 11, pages , New York, NY, USA, ACM. 32 Mobile Computing and Communications Review, Vol. 16, No. 3, July 2012
What is Eating Up Battery Life On My SmartPhone: A Case Study
What is Eating Up Battery Life On My SmartPhone: A Case Study Grace Metri *, Abhishek Agrawal *, Ramesh Peri *, and Weisong Shi Department of Computer Science, Wayne State University, Detroit, Michigan
Understanding Mobile App Usage Patterns Using In-App Advertisements
Understanding Mobile App Usage Patterns Using In-App Advertisements Alok Tongaonkar 1,ShuaifuDai 2,3, Antonio Nucci 1, and Dawn Song 3 1 Narus Inc, USA 2 Peking University, China 3 University of California,
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty
Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
Mobile Performance Testing Approaches and Challenges
NOUS INFOSYSTEMS LEVERAGING INTELLECT Mobile Performance Testing Approaches and Challenges ABSTRACT Mobile devices are playing a key role in daily business functions as mobile devices are adopted by most
Table of Contents. Living In A Mobile World. There s Always An App For That. The UX Challenge. The Facebook + Mobile Opportunity
1 Table of Contents Living In A Mobile World 3 There s Always An App For That 4 The UX Challenge 6 The Facebook + Mobile Opportunity 7 Getting Started With Facebook Mobile Ads 8 The Future Of Facebook
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania [email protected]
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN
PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN This report is submitted in partial fulfilment of the requirements for the Bachelor of Computer Science (Software
Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER
Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Dependability Issues of Android Games: A First Look via Software Analysis
Dependability Issues of Android Games: A First Look via Software Analysis Jiaojiao Fu Yangfan Zhou Yu Kang School of Computer Science, Fudan University Shenzhen Key Laboratory of Rich Media Big Data Analytics
Cost Effective Deployment of VoIP Recording
Cost Effective Deployment of VoIP Recording Purpose This white paper discusses and explains recording of Voice over IP (VoIP) telephony traffic. How can a company deploy VoIP recording with ease and at
3G smartphones. ericsson White paper Uen 284 23-3250 February 2015
ericsson White paper Uen 284 23-3250 February 2015 3G smartphones optimizing user experience and network efficiency Rapid global smartphone uptake is creating new mobile data traffic patterns. There is
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,[email protected] 2 Assistant Prof,
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled
NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
Android OS Mobile Dialer Application Manual. Make low cost Internet calls from Android Smartphone or Tablet
Android OS Mobile Dialer Application Manual Make low cost Internet calls from Android Smartphone or Tablet Android Mobile Dialer Application 1. Introduction... 2 2. Signup... 3 3. Download & Setup... 5
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring
AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring Chanmin Yoon*, Dongwon Kim, Wonwoo Jung, Chulkoo Kang, Hojung Cha Dept. of Computer Science Yonsei
Results from MyConnection SG Pilot (October 2014 March 2015)
Results from MyConnection SG Pilot (October 2014 March 2015) IDA launched the MyConnection SG mobile application in October 2014 to complement the IDA Quality of Service ( QoS ) framework to allow IDA
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab November 2012 Statement of test result confidence Aruba makes every attempt
Offloading file search operation for performance improvement of smart phones
Offloading file search operation for performance improvement of smart phones Ashutosh Jain [email protected] Vigya Sharma [email protected] Shehbaz Jaffer [email protected] Kolin Paul
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
LTE Test: EE 4G Network Performance
LTE Test: EE 4G Network Performance An Analysis of Coverage, Speed, Latency and related key performance indicators, from October 31 st to December 20 th, 2012. Disclaimer Epitiro has used its best endeavours
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Empowering Developers to Estimate App Energy Consumption. Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research
Empowering Developers to Estimate App Energy Consumption Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research Phone s battery life is critical performance and user experience metric
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
Energy Consumption in Android Phones when using Wireless Communication Technologies
Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
I3: Maximizing Packet Capture Performance. Andrew Brown
I3: Maximizing Packet Capture Performance Andrew Brown Agenda Why do captures drop packets, how can you tell? Software considerations Hardware considerations Potential hardware improvements Test configurations/parameters
Zenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
Client-aware Cloud Storage
Client-aware Cloud Storage Feng Chen Computer Science & Engineering Louisiana State University Michael Mesnier Circuits & Systems Research Intel Labs Scott Hahn Circuits & Systems Research Intel Labs Cloud
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Rethinking the Small Cell Business Model
CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Optimizing Background Email Sync on Smartphones
Optimizing Background Email Sync on Smartphones Fengyuan Xu 1,3, Yunxin Liu 1, Thomas Moscibroda 1, Ranveer Chandra 2, Long Jin 1,4, Yongguang Zhang 1, Qun Li 3 1 Microsoft Research Asia, Beijing, China
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
White Paper Three Simple Ways to Optimize Your Bandwidth Management in Video Surveillance
White Paper Three Simple Ways to Optimize Your Bandwidth Management in Video Surveillance Table of Contents Executive Summary 3 Getting the Most from Your Network Resources 4 Uncovering Common Methods
INTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
Trepn plug-in for Eclipse FAQ
Trepn plug-in for Eclipse FAQ Introduction and Technical Problem Q: What is Trepn plug-in for Eclipse? A: The Trepn plug-in for Eclipse is a power profiling tool created by Qualcomm Technologies Inc. for
Mobile Application Performance
Mobile Application Performance Tips & Tricks to Significantly Boost App Performance Ray Bennett Director, Microstrategy - Mobile Service Line 11km/s (7mps) Escape Velocity Performance Definition What is
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
Configuring Snort as a Firewall on Windows 7 Environment
Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National university of Malaysia UKM, Selengor, Malaysia. b Tafila Technical University, Electrical
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
EECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
TamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
Identifying Diverse Usage Behaviors of Smartphone Apps
Identifying Diverse Usage Behaviors of Smartphone Apps Qiang Xu University of Michigan Ann Arbor, MI [email protected] Jeffrey Erman AT&T Labs Research Florham Park, NJ [email protected] Alexandre
Measuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Configuring Snort as a Firewall on Windows 7 Environment
Journal of Ubiquitous Systems & Pervasive Networks Volume 3, No. 2 (2011) pp. 3- Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National University
Tablets in Data Acquisition
Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create
