Passive and active network measurement: 8th international conference, PAM 2007, Louvain-la-Neuve, Belgium, April 5-6, 2007: proceedings

Free Download

Authors:

Series: Lecture Notes ... Networks and Telecommunications

ISBN: 9783540716167, 3540716165

Size: 10 MB (9967854 bytes)

Pages: 284/284

File format:

Language:

Publishing Year:

Category:

Steve Uhlig, Konstantina Papagiannaki, Olivier Bonaventure9783540716167, 3540716165

This book constitutes the refereed proceedings of the 8th International Conference on Passive and Active Measurement, PAM 2007, held in Louvain-la-Neuve, Belgium, in April 2007.

The 21 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 80 submissions. The papers focus on research and practical applications of network measurement and analysis techniques and are organized in topical sections on interdomain routing, P2P, wireless 802.11, wireless 3G/CDMA/Bluetooth, infrastructure and services, traffic, and measurement principles.


Table of contents :
Title……Page 2
Preface……Page 5
Organization……Page 6
Table of Contents……Page 8
Introduction……Page 11
Methodology……Page 12
Measurement Results……Page 13
Time Distribution of BGP Updates……Page 15
Validation Cache Simulations……Page 16
References……Page 20
Introduction……Page 21
BGP in Neighboring ASes……Page 22
Inter-connectivity……Page 23
Classification of BGP Changes……Page 24
Correlating BGP Routing Changes……Page 25
Worst-Case Time Propagation……Page 26
Classification of Propagated Routes……Page 27
Propagation Time……Page 28
Conclusion……Page 30
Introduction……Page 32
Collecting the Traffic and Routing Measurement……Page 33
Aggregating the Traffic into a Link Matrix……Page 34
General Observations……Page 35
Impact of Sampling and Detection Threshold……Page 37
Impact of Anonymization……Page 39
Conclusion and Future Work……Page 40
Introduction……Page 42
Data and Availability Messages……Page 43
Attracting Traffic……Page 44
Performing Measurements……Page 45
Rate of Connections……Page 46
Rate of Capacity Measurements……Page 47
Capacity Distribution……Page 48
Capacity as a Performance Predictor in BitTorrent……Page 49
Conclusion……Page 50
Introduction……Page 52
Protocol v0.6……Page 53
Methodology……Page 54
Summary of Data……Page 55
Message TTL Analysis……Page 56
Bandwidth Analysis……Page 57
Query Traffic Analysis……Page 59
Conclusion……Page 60
Introduction……Page 62
Underlying Model……Page 63
Wireless Trace Analysis……Page 64
Validation……Page 65
Wavelet Analysis……Page 66
Semi-experiments Method……Page 68
Impact of Traffic Entities Properties……Page 69
Conclusion……Page 71
Introduction……Page 73
Collision Probability and Packet Timing Measurement……Page 74
Validation……Page 75
Collision Probability vs Backoff Stage……Page 77
Saturated Network Relationships……Page 79
Conclusion……Page 81
Introduction……Page 83
Network Deployments……Page 85
Route Computation……Page 86
Route Prevalence and Persistence……Page 87
Route Flapping……Page 89
Can Routing Stability be Improved?……Page 90
Conclusion……Page 91
Introduction……Page 93
Background and Previous Work……Page 94
Experimental Setup……Page 95
Achievable Performance Gains……Page 97
Three Types of Interference Behavior……Page 98
Use of RTS/CTS in Indoor Environments……Page 101
Conclusion……Page 102
Introduction……Page 104
The CDMA2000 1xRTT System……Page 105
Experiments and Data Sets……Page 106
Wireless Scheduler Characterization……Page 107
TCP in CDMA2000 Networks……Page 109
TCP Window Size and Time-Stamp Option……Page 110
Sector Load, User Mobility and User Location……Page 111
Conclusions……Page 113
Introduction……Page 115
The PF Algorithm and Starvation……Page 116
Experimental Setup……Page 117
UDP-Based Applications……Page 119
Effect on TCP Flows……Page 120
Discussion……Page 122
Conclusions and Future Work……Page 124
Introduction……Page 125
Related Work……Page 126
Methodology……Page 127
Metrics of Interest……Page 129
Commonality……Page 132
Discussion and Conclusions……Page 133
Background……Page 135
Data……Page 136
Diurnal Pattern……Page 137
Traffic Load……Page 138
Client Geographic Distribution……Page 139
Topological Coverage……Page 141
Conclusion……Page 143
Introduction……Page 145
Measuring Port Blocking……Page 146
Functional Overview……Page 147
Probabilistic Inference……Page 148
Full Methodology Design……Page 149
Efficacy of Methodology……Page 150
Observed Port Blocking……Page 151
Measurement Bias……Page 152
Discussion, Future Research and Conclusion……Page 153
Introduction……Page 155
Dataset……Page 156
Connection-Level Root Cause Analysis……Page 157
Client-Level Root Cause Analysis……Page 158
Throughput Limitations Causes Experienced by Major Applications……Page 160
Impact of the Root Causes on Access Link Utilization……Page 161
Comparison with Other RCA Work……Page 162
Conclusions……Page 163
Introduction……Page 165
An Online Framework for Identifying the Elephants……Page 166
Estimating the Density of Elephants Flows……Page 168
Identifying the Elephants……Page 169
Traffic Distribution: Elephants and Mice……Page 170
Entropy Distribution: Elephants and Mice……Page 171
Conclusions……Page 173
Introduction……Page 175
Packet Traces with Encrypted Traffic……Page 176
Identifying SSL Connections……Page 177
Description of SSL Traffic……Page 178
Classification Mechanism……Page 179
Detection of the First Data Packet……Page 180
Application Identification……Page 181
Recognition of SSL Traffic……Page 182
Recognition of Encrypted Applications……Page 183
Conclusion……Page 184
Introduction……Page 186
Congestion Responsiveness……Page 188
Definitions and Methodology……Page 189
Robustness of Estimation Methodology……Page 192
Results……Page 193
Discussion and Future Work……Page 194
Introduction……Page 196
Capturing Host Activity Via Graphs……Page 198
The Advantages of $graphlet$ Profiling……Page 200
Building Profiles……Page 201
Properties of the End-System Profiles……Page 202
Conclusions–Discussion……Page 205
Introduction……Page 207
Timestamp Accuracy……Page 208
Method……Page 209
Setup……Page 211
Results……Page 213
Conclusions……Page 215
Introduction……Page 217
Challenges That Hinder Data Capture at High Rates……Page 218
Setup……Page 220
Methodology……Page 221
Workload……Page 222
Results……Page 223
Summary……Page 226
Introduction……Page 228
Neuro-fuzzy Cross-Traffic Estimator……Page 229
Numerical Results and Conclusions……Page 231
References……Page 232
Introduction……Page 233
Mobile Data Traffic Characteristics……Page 234
Retransmission Analysis……Page 235
References……Page 236
Data Collection……Page 238
Spacial Classification……Page 239
Modifications to IPv4 Headers……Page 240
Conclusion……Page 241
Introduction……Page 243
Connections Durations and Sizes……Page 244
References……Page 246
Introduction……Page 247
Geographic Span of IP Addresses Blocks……Page 248
Optimal Location of Blocks of IP Addresses……Page 249
Conclusion……Page 250
Methodology……Page 251
Simulation Results……Page 252
Practical Results……Page 253
References……Page 254
Estimation Procedure……Page 255
Dealing with Bit Errors……Page 256
Performance Evaluation……Page 257
Conclusions……Page 259
Measurement Informed Route Selection……Page 260
Methodology……Page 261
Evaluation……Page 262
Monitoring Real-Time/Bulk Traffic and It Preliminary Analysis……Page 265
Real-Time Traffic Identification Method……Page 266
Range Check of Headpoints by BPF……Page 267
Identification Results……Page 268
Conclusion……Page 269
Introduction……Page 270
Impact of Alias Resolution on Degree Characteristics……Page 271
Impact of Alias Resolution on Graph Characteristics……Page 273
Introduction……Page 275
N-TAP: A Platform for Large-Scale Distributed Measurement……Page 276
Discussion……Page 277
Conclusion……Page 278
Findings……Page 279
Conclusions and Future Work……Page 282
Author Index……Page 283

Reviews

There are no reviews yet.

Be the first to review “Passive and active network measurement: 8th international conference, PAM 2007, Louvain-la-Neuve, Belgium, April 5-6, 2007: proceedings”
Shopping Cart
Scroll to Top