Catálogo de publicaciones - libros

Compartir en
redes sociales


Passive and Active Network Measurement: 6th International Workshop, PAM 2005, Boston, MA, USA, March 31: April 1, 2005, Proceedings

Constantinos Dovrolis (eds.)

En conferencia: 6º International Workshop on Passive and Active Network Measurement (PAM) . Boston, MA, USA . March 31, 2005 - April 1, 2005

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-25520-8

ISBN electrónico

978-3-540-31966-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2005

Tabla de contenidos

Detecting Duplex Mismatch on Ethernet

Stanislav Shalunov; Richard Carlson

IEEE 802.3 Ethernet networks, a standard LAN environment, provide a way to auto-negotiate the settings of capacity (10, 100, or 1000 Mb/s) and duplex (full- or half-). Under certain conditions described below, the auto-negotiation protocol fails to work properly. The resultant configuration problem, , appears to be common; when this problem occurs, the connectivity is impaired, but not completely removed. This can result in performance problems that are hard to locate.

This paper describes a work in progress aimed at (i) studying the condition of duplex mismatch in IEEE 802.3 Ethernet networks, (ii) producing an analytical model of duplex mismatch, (iii) validating the model, (iv) studying the effects of duplex mismatch on TCP throughput, (v) designing an algorithm for duplex mismatch detection using data from active testing, and (vi) incorporating the detection algorithm into an existing open-source network troubleshooting tool (NDT).

- Section 3: Network Inference and Problem Diagnosis | Pp. 135-148

Improved Algorithms for Network Topology Discovery

Benoit Donnet; Timur Friedman; Mark Crovella

Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. However, little consideration has been given as to how to perform large-scale topology discovery efficiently and in a network-friendly manner. In prior work, we have described how large numbers of traceroute monitors can coordinate their efforts to map the network while reducing their impact on routers and end-systems. The key is for them to share information regarding the paths they have explored. However, such sharing introduces considerable communication overhead. Here, we show how to improve the communication scaling properties through the use of Bloom filters to encode a probing stop set. Also, any system in which every monitor traces routes towards every destination has inherent scaling problems. We propose capping the number of monitors per destination, and dividing the monitors into clusters, each cluster focusing on a different destination list.

- Section 4: Topology Measurements | Pp. 149-162

Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology

Shane Alcock; Anthony McGregor; Richard Nelson

At present, link layer topology discovery methodologies rely on protocols that are not universally available, such as SNMP. Such methodologies can only be applied to a subset of all possible networks. Our goal is to work towards a generic link layer topology discovery method that does not rely on SNMP. In this paper, we will present a new link layer topology discovery methodology based on variable packet size capacity estimation. We will also discuss the problems that arose from preliminary testing where different brands of network cards affected the capacity estimates used to detect serializations. As a result, topologically equivalent links fail to be classified as such by the capacity estimation tool. To circumvent this issue, non-VPS methods of capacity estimation that utilise back to back packet pairs have been investigated as a calibration technique.

- Section 4: Topology Measurements | Pp. 163-176

Revisiting Internet AS-Level Topology Discovery

Xenofontas A. Dimitropoulos; Dmitri V. Krioukov; George F. Riley

The development of veracious models of the Internet topology has received a lot of attention in the last few years. Many proposed models are based on topologies derived from RouteViews [1] BGP table dumps (BTDs). However, BTDs do not capture all AS–links of the Internet topology and most importantly the number of the hidden AS–links is unknown, resulting in AS–graphs of questionable quality. As a first step to address this problem, we introduce a new AS–topology discovery methodology that results in more complete and accurate graphs. Moreover, we use data available from existing measurement facilities, circumventing the burden of additional measurement infrastructure. We deploy our methodology and construct an AS–topology that has at least 61.5% more AS–links than BTD–derived AS–topologies we examined. Finally, we analyze the temporal and topological properties of the augmented graph and pinpoint the differences from BTD–derived AS–topologies.

- Section 4: Topology Measurements | Pp. 177-188

Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network

Feng Li; Jae Chung; Mingzhe Li; Huahui Wu; Mark Claypool; Robert Kinicki

The growth of wireless LANs has brought the expectation for high-bitrate streaming video to wireless PCs. However, it remains unknown how to best adapt video to wireless channel characteristics as they degrade. This paper presents results from experiments that stream commercial video over a wireless campus network and analyze performance across application, network and wireless link layers. Some of the key findings include: 1) Wireless LANs make it difficult for streaming video to gracefully degrade as network performance decreases; 2) Video streams with multiple encoding levels can more readily adapt to degraded wireless network conditions than can clips with a single encoding level; 3) Under degraded wireless network conditions, TCP streaming can provide higher video frame rates than can UDP streaming, but TCP streaming will often result in significantly longer playout durations than will UDP streaming; 4) Current techniques used by streaming media systems to determine effective capacity over wireless LAN are inadequate, resulting in streaming target bitrates significantly higher than can be effectively supported by the wireless network.

- Section 5: Wireless Network Measurements | Pp. 189-202

Measurement Based Analysis of the Handover in a WLAN MIPv6 Scenario

Albert Cabellos-Aparicio; René Serral-Gracià; Loránd Jakab; Jordi Domingo-Pascual

This paper studies the problems related to mobile connectivity on a wireless environment with Mobile IPv6, specially the handover, which is the most critical part. The main goal of this paper is to develop a structured methodology for analyzing 802.11/IPv6/MIPv6 handovers and their impact on application’s level. This is accomplished by capturing traffic on a testbed and analyzing it with two applications developed for this purpose. The analysis covers passive and active measurements. This methodology is applicable for measuring improvements on handover (such as Fast Handovers for Mobile IPv6, Hierarchical Mobile IPv6 or 802.11 handover).

- Section 5: Wireless Network Measurements | Pp. 203-214

A Distributed Passive Measurement Infrastructure

Patrik Arlos; Markus Fiedler; Arne A. Nilsson

In this paper we describe a distributed passive measurement infrastructure. Its goals are to reduce the cost and configuration effort per measurement. The infrastructure is scalable with regards to link speeds and measurement locations. A prototype is currently deployed at our university and a demo is online at http://inga.its.bth.se/projects/dpmi. The infrastructure differentiates between measurements and the analysis of measurements, this way the actual measurement equipment can focus on the practical issues of packet measurements. By using a modular approach the infrastructure can handle many different capturing devices. The infrastructure can also deal with the security and privacy aspects that might arise during measurements.

- Section 6: Monitoring Facilities | Pp. 215-227

lambdaMON – A Passive Monitoring Facility for DWDM Optical Networks

Jörg B. Micheel

This paper presents lambdaMON – a novel approach to passive monitoring of very high performance optical networks based on dense wavelength division multiplexing (DWDM). The approach offers very attractive cost/benefit scaling properties, which are further refined by introducing state-of-the-art transparent fiber switching equipment. The rapid pace at which we intend to implement lambdaMONs opens new opportunities to apply passive monitoring facilities for debugging, troubleshooting and performance analysis of novel protocols and applications. To the best of our knowledge, this is the first attempt at designing a passive monitoring facility for optical networks. We report detailed architectural parameters, measurements and experience from laboratory tests and initial field deployment.

- Section 6: Monitoring Facilities | Pp. 228-235

Internet Routing Policies and Round-Trip-Times

Han Zheng; Eng Keong Lua; Marcelo Pias; Timothy G. Griffin

Round trip times (RTTs) play an important role in Internet measurements. In this paper, we explore some of the ways in which routing policies impact RTTs. In particular, we investigate how routing policies for both intra- and inter-domain routing can naturally give rise to violations of the triangle inequality with respect to RTTs. Triangle Inequality Violations (TIVs) might be exploited by overlay routing if an end-to-end forwarding path can be stitched together with paths routed at layer 3. However, TIVs pose a problem for Internet Coordinate Systems that attempt to associate Internet hosts with points in Euclidean space so that RTTs between hosts are accurately captured by distances between their associated points. Three points having RTTs that violate the triangle inequality cannot be embedded into Euclidean space without some level of inaccuracy. We argue that TIVs should not be treated as measurement artifacts, but rather as natural features of the Internet’s structure. In addition to explaining routing policies that give rise to TIVs, we present illustrating examples from the current Internet.

- Section 7: Routing and Traffic Engineering Measurements | Pp. 236-250

Traffic Matrix Reloaded: Impact of Routing Changes

Renata Teixeira; Nick Duffield; Jennifer Rexford; Matthew Roughan

A represents the load from each ingress point to each egress point in an IP network. Although networks are engineered to tolerate some variation in the traffic matrix, large changes can lead to congested links and poor performance. The variations in the traffic matrix are caused by statistical fluctuations in the traffic the network and shifts in where the traffic the network. For an accurate view of how the traffic matrix evolves over time, we combine fine-grained traffic measurements with a continuous view of routing, including changes in the egress points. Our approach is in sharp contrast to previous work that either inferred the traffic matrix from link-load statistics or computed it using periodic snapshots of routing tables. Analyzing seven months of data from eight vantage points in a large Internet Service Provider (ISP) network, we show that routing changes are responsible for the majority of the large traffic variations. In addition, we identify the shifts caused by routing changes and show that these events are responsible for the largest traffic shifts. We discuss the implications of our findings on the accuracy of previous work on traffic matrix estimation and analysis.

- Section 7: Routing and Traffic Engineering Measurements | Pp. 251-264