53 research outputs found

    Study of Negative effects of Traffic Localization

    Get PDF
    Català: Les xarxes P2P s'han convertit en una important xarxa per usuaris i ISP. Els usuaris volen compartir i aprofitar aquestes noves xarxes. D'altra banda, els ISP no volen que els usuaris utilitzin de manera tan intensa les seves connexions a Internet. Això causa que els seus beneficis es redueixin. La localització de tràfic ha estat anunciat com una solució per als inconvenients del P2P. Redueix el tràfic intercanviat entre els usuaris fent clúster. Només uns pocs usuaris d'un cluster intercanviaren dades amb altres xarxes. Hi ha diversos estudis que mostren els beneficis d'aquesta mesura, però no hi ha massa estudis sobre els efectes negatius. En el nostre treball hem tractat de simular una xarxa BitTorrent. Un cop tinguem aquesta xarxa preparada simularem una xarxa que utilitzi tècniques de localització de trànsit. Fent diverses simulacions volem demostrar com la localització de trànsit afecta l'experiència dels usuaris.Castellano: Las redes P2P se han convertido en una importante red para usuarios e ISP. Los usuarios quieren compartir y aprovechar estas nuevas redes. Por otra parte, los ISP no les interesa que los usuarios utilicen de manera tan intensa sus conexiones. Esto es debido a que sus beneficios se ven reducidos. La localización de tráfico ha sido anunciada como una de las mejores soluciones para los inconvenientes del P2P. Reduce el tráfico intercambiado entre los usuarios lejanos o de diferentes redes haciendo clúster. Sólo unos pocos usuarios de un clúster van a intercambiar datos con otros usuarios de otras redes. Hay varios estudios que indican los beneficios de esta medida, pero no hay demasiados estudios acerca de los efectos negativos. En nuestro trabajo hemos tratado de simular una red BitTorrent. Una vez que tengamos esta red lista simularemos una red P2P con alguna técnica de localización de tráfico. Haciendo varias simulaciones queremos demostrar cómo la localización de tráfico afecta a la experiencia de los usuarios.English: P2P networks has become one important network for users and ISP. Users wants to share and take profit of this new networks. On the other hand, ISP don not want users' to use so intensively their internet connections because their profits are being reduced. Traffic Localization has been announced as a solution for P2P disadvantages. It reduces the traffic exchanged between users making cluster. Only a few users from one cluster are going to change data to other networks. There are several studies that indicates the benefits of this measure but there are not too much studies about negative effects. In our work we tried to simulate a BitTorrent network. Once we have this network ready we constructed it making clusters simulating some Traffic Localization technique. Making several simulations we want to prove how traffic localization affects users' experience

    Application acceleration for wireless and mobile data networks

    Get PDF
    This work studies application acceleration for wireless and mobile data networks. The problem of accelerating application can be addressed along multiple dimensions. The first dimension is advanced network protocol design, i.e., optimizing underlying network protocols, particulary transport layer protocol and link layer protocol. Despite advanced network protocol design, in this work we observe that certain application behaviors can fundamentally limit the performance achievable when operating over wireless and mobile data networks. The performance difference is caused by the complex application behaviors of these non-FTP applications. Explicitly dealing with application behaviors can improve application performance for new environments. Along this overcoming application behavior dimension, we accelerate applications by studying specific types of applications including Client-server, Peer-to-peer and Location-based applications. In exploring along this dimension, we identify a set of application behaviors that significantly affect application performance. To accommodate these application behaviors, we firstly extract general design principles that can apply to any applications whenever possible. These design principles can also be integrated into new application designs. We also consider specific applications by applying these design principles and build prototypes to demonstrate the effectiveness of the solutions. In the context of application acceleration, even though all the challenges belong to the two aforementioned dimensions of advanced network protocol design and overcoming application behavior are addressed, application performance can still be limited by the underlying network capability, particularly physical bandwidth. In this work, we study the possibility of speeding up data delivery by eliminating traffic redundancy present in application traffics. Specifically, we first study the traffic redundancy along multiple dimensions using traces obtained from multiple real wireless network deployments. Based on the insights obtained from the analysis, we propose Wireless Memory (WM), a two-ended AP-client solution to effectively exploit traffic redundancy in wireless and mobile environments. Application acceleration can be achieved along two other dimensions: network provision ing and quality of service (QoS). Network provisioning allocates network resources such as physical bandwidth or wireless spectrum, while QoS provides different priority to different applications, users, or data flows. These two dimensions have their respective limitations in the context of application acceleration. In this work, we focus on the two dimensions of overcoming application behavior and Eliminating traffic redundancy to improve application performance. The contribution of this work is as follows. First, we study the problem of application acceleration for wireless and mobile data networks, and we characterize the dimensions along which to address the problem. Second, we identify that application behaviors can significantly affect application performance, and we propose a set of design principles to deal with the behaviors. We also build prototypes to conduct system research. Third, we consider traffic redundancy elimination and propose a wireless memory approach.Ph.D.Committee Chair: Sivakumar, Raghupathy; Committee Member: Ammar, Mostafa; Committee Member: Fekri, Faramarz; Committee Member: Ji, Chuanyi; Committee Member: Ramachandran, Umakishor

    Study of Negative Effects of Traffic Localization

    Get PDF
    P2P networks has become one important network for users and ISP. Users wants to share and take profit of this new networks. On the other hand, ISP don not want users to use so intensively their internet connections because their profits are being reduced. Traffic Localization has been announced as a solution for P2P disadvantages. It reduces the traffic exchanged between users making cluster. Only a few users from one cluster are going to change data to other networks. There are several studies that indicates the benefits of this measure but there are not too much studies about negative effects. In our work we tried to simulate a BitTorrent network. Once we have this network ready we constructed it making clusters simulating some Traffic Localization technique. Making several simulations we want to prove how traffic localization affects users experience. /Kir1

    Study of Negative effects of Traffic Localization

    Get PDF
    Català: Les xarxes P2P s'han convertit en una important xarxa per usuaris i ISP. Els usuaris volen compartir i aprofitar aquestes noves xarxes. D'altra banda, els ISP no volen que els usuaris utilitzin de manera tan intensa les seves connexions a Internet. Això causa que els seus beneficis es redueixin. La localització de tràfic ha estat anunciat com una solució per als inconvenients del P2P. Redueix el tràfic intercanviat entre els usuaris fent clúster. Només uns pocs usuaris d'un cluster intercanviaren dades amb altres xarxes. Hi ha diversos estudis que mostren els beneficis d'aquesta mesura, però no hi ha massa estudis sobre els efectes negatius. En el nostre treball hem tractat de simular una xarxa BitTorrent. Un cop tinguem aquesta xarxa preparada simularem una xarxa que utilitzi tècniques de localització de trànsit. Fent diverses simulacions volem demostrar com la localització de trànsit afecta l'experiència dels usuaris.Castellano: Las redes P2P se han convertido en una importante red para usuarios e ISP. Los usuarios quieren compartir y aprovechar estas nuevas redes. Por otra parte, los ISP no les interesa que los usuarios utilicen de manera tan intensa sus conexiones. Esto es debido a que sus beneficios se ven reducidos. La localización de tráfico ha sido anunciada como una de las mejores soluciones para los inconvenientes del P2P. Reduce el tráfico intercambiado entre los usuarios lejanos o de diferentes redes haciendo clúster. Sólo unos pocos usuarios de un clúster van a intercambiar datos con otros usuarios de otras redes. Hay varios estudios que indican los beneficios de esta medida, pero no hay demasiados estudios acerca de los efectos negativos. En nuestro trabajo hemos tratado de simular una red BitTorrent. Una vez que tengamos esta red lista simularemos una red P2P con alguna técnica de localización de tráfico. Haciendo varias simulaciones queremos demostrar cómo la localización de tráfico afecta a la experiencia de los usuarios.English: P2P networks has become one important network for users and ISP. Users wants to share and take profit of this new networks. On the other hand, ISP don not want users' to use so intensively their internet connections because their profits are being reduced. Traffic Localization has been announced as a solution for P2P disadvantages. It reduces the traffic exchanged between users making cluster. Only a few users from one cluster are going to change data to other networks. There are several studies that indicates the benefits of this measure but there are not too much studies about negative effects. In our work we tried to simulate a BitTorrent network. Once we have this network ready we constructed it making clusters simulating some Traffic Localization technique. Making several simulations we want to prove how traffic localization affects users' experience

    Walkabout : an asynchronous messaging architecture for mobile devices

    Get PDF
    Modern mobile devices are prolific producers and consumers of digital data, and wireless networking capabilities enable them to transfer their data over the Internet while moving. Applications running on these devices may perform transfers to upload data for backup or distribution, or to download new content on demand. Unfortunately, the limited connectivity that mobile devices experience can make these transfers slow and impractical as the amount of data increases. This thesis argues that asynchronous messaging supported by local proxies can improve the transfer capabilities of mobile devices, making it practical for them to participate in large Internet transfers. The design of the Walkabout architecture follows this approach: proxies form store-and-forward overlay networks to deliver messages asynchronously across the Internet on behalf of devices. A mobile device uploads a message to a local proxy at rapid speed, and the overlay delivers it to one or more destination devices, caching the message until each one is able to retrieve it from a local proxy. A device is able to partially upload or download a message whenever it has network connectivity, and can resume this transfer at any proxy if interrupted through disconnection. Simulation results show that Walkabout provides better throughput for mobile devices than is possible under existing methods, for a range of movement patterns. Upload and end-to-end to transfer speeds are always high when the device sending the message is mobile. In the basic Walkabout model, a message sent to a mobile device that is repeatedly moving between a small selection of connection points experiences high download and end-to-end transfer speeds, but these speeds fall as the number of connection points grows. Pre-emptive message delivery extensions improve this situation, making fast end-to-end transfers and device downloads possible under any pattern of movement. This thesis describes the design and evaluation of Walkabout, with both practical implementation and extensive simulation under real-world scenarios

    Making broadband access networks transparent to researchers, developers, and users

    Get PDF
    Broadband networks are used by hundreds of millions of users to connect to the Internet today. However, most ISPs are hesitant to reveal details about their network deployments,and as a result the characteristics of broadband networks are often not known to users,developers, and researchers. In this thesis, we make progress towards mitigating this lack of transparency in broadband access networks in two ways. First, using novel measurement tools we performed the first large-scale study of thecharacteristics of broadband networks. We found that broadband networks have very different characteristics than academic networks. We also developed Glasnost, a system that enables users to test their Internet access links for traffic differentiation. Glasnost has been used by more than 350,000 users worldwide and allowed us to study ISPs' traffic management practices. We found that ISPs increasingly throttle or even block traffic from popular applications such as BitTorrent. Second, we developed two new approaches to enable realistic evaluation of networked systems in broadband networks. We developed Monarch, a tool that enables researchers to study and compare the performance of new and existing transport protocols at large scale in broadband environments. Furthermore, we designed SatelliteLab, a novel testbed that can easily add arbitrary end nodes, including broadband nodes and even smartphones, to existing testbeds like PlanetLab.Breitbandanschlüsse werden heute von hunderten Millionen Nutzern als Internetzugang verwendet. Jedoch geben die meisten ISPs nur ungern über Details ihrer Netze Auskunft und infolgedessen sind Nutzern, Anwendungsentwicklern und Forschern oft deren Eigenheiten nicht bekannt. Ziel dieser Dissertation ist es daher Breitbandnetze transparenter zu machen. Mit Hilfe neuartiger Messwerkzeuge konnte ich die erste groß angelegte Studie über die Besonderheiten von Breitbandnetzen durchführen. Dabei stellte sich heraus, dass Breitbandnetze und Forschungsnetze sehr unterschiedlich sind. Mit Glasnost habe ich ein System entwickelt, das mehr als 350.000 Nutzern weltweit ermöglichte ihren Internetanschluss auf den Einsatz von Verkehrsmanagement zu testen. Ich konnte dabei zeigen, dass ISPs zunehmend BitTorrent Verkehr drosseln oder gar blockieren. Meine Studien zeigten dar überhinaus, dass existierende Verfahren zum Testen von Internetsystemen nicht die typischen Eigenschaften von Breitbandnetzen berücksichtigen. Ich ging dieses Problem auf zwei Arten an: Zum einen entwickelte ich Monarch, ein Werkzeug mit dem das Verhalten von Transport-Protokollen über eine große Anzahl von Breitbandanschlüssen untersucht und verglichen werden kann. Zum anderen habe ich SatelliteLab entworfen, eine neuartige Testumgebung, die, anders als zuvor, beliebige Internetknoten, einschließlich Breitbandknoten und sogar Handys, in bestehende Testumgebungen wie PlanetLab einbinden kann

    Systems-compatible Incentives

    Get PDF
    Originally, the Internet was a technological playground, a collaborative endeavor among researchers who shared the common goal of achieving communication. Self-interest used not to be a concern, but the motivations of the Internet's participants have broadened. Today, the Internet consists of millions of commercial entities and nearly 2 billion users, who often have conflicting goals. For example, while Facebook gives users the illusion of access control, users do not have the ability to control how the personal data they upload is shared or sold by Facebook. Even in BitTorrent, where all users seemingly have the same motivation of downloading a file as quickly as possible, users can subvert the protocol to download more quickly without giving their fair share. These examples demonstrate that protocols that are merely technologically proficient are not enough. Successful networked systems must account for potentially competing interests. In this dissertation, I demonstrate how to build systems that give users incentives to follow the systems' protocols. To achieve incentive-compatible systems, I apply mechanisms from game theory and auction theory to protocol design. This approach has been considered in prior literature, but unfortunately has resulted in few real, deployed systems with incentives to cooperate. I identify the primary challenge in applying mechanism design and game theory to large-scale systems: the goals and assumptions of economic mechanisms often do not match those of networked systems. For example, while auction theory may assume a centralized clearing house, there is no analog in a decentralized system seeking to avoid single points of failure or centralized policies. Similarly, game theory often assumes that each player is able to observe everyone else's actions, or at the very least know how many other players there are, but maintaining perfect system-wide information is impossible in most systems. In other words, not all incentive mechanisms are systems-compatible. The main contribution of this dissertation is the design, implementation, and evaluation of various systems-compatible incentive mechanisms and their application to a wide range of deployable systems. These systems include BitTorrent, which is used to distribute a large file to a large number of downloaders, PeerWise, which leverages user cooperation to achieve lower latencies in Internet routing, and Hoodnets, a new system I present that allows users to share their cellular data access to obtain greater bandwidth on their mobile devices. Each of these systems represents a different point in the design space of systems-compatible incentives. Taken together, along with their implementations and evaluations, these systems demonstrate that systems-compatibility is crucial in achieving practical incentives in real systems. I present design principles outlining how to achieve systems-compatible incentives, which may serve an even broader range of systems than considered herein. I conclude this dissertation with what I consider to be the most important open problems in aligning the competing interests of the Internet's participants

    Exploiting the power of multiplicity: a holistic survey of network-layer multipath

    Get PDF
    The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive assumption of a single working path between a source and a destination. The lack of native multipath support constrains network performance even as the underlying network is richly connected and has redundant multiple paths. Computer networks can exploit the power of multiplicity, through which a diverse collection of paths is resource pooled as a single resource, to unlock the inherent redundancy of the Internet. This opens up a new vista of opportunities, promising increased throughput (through concurrent usage of multiple paths) and increased reliability and fault tolerance (through the use of multiple paths in backup/redundant arrangements). There are many emerging trends in networking that signify that the Internet's future will be multipath, including the use of multipath technology in data center computing; the ready availability of multiple heterogeneous radio interfaces in wireless (such as Wi-Fi and cellular) in wireless devices; ubiquity of mobile devices that are multihomed with heterogeneous access networks; and the development and standardization of multipath transport protocols such as multipath TCP. The aim of this paper is to provide a comprehensive survey of the literature on network-layer multipath solutions. We will present a detailed investigation of two important design issues, namely, the control plane problem of how to compute and select the routes and the data plane problem of how to split the flow on the computed paths. The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing. We also highlight open issues and identify directions for future work

    Environmental impact assessment of online advertising

    Get PDF
    There are no commonly agreed ways to assess the total energy consumption of the Internet. Estimating the Internet's energy footprint is challenging because of the interconnectedness associated with even seemingly simple aspects of energy consumption. The first contribution of this paper is a common modular and layered framework, which allows researchers to assess both energy consumption and CO2e emissions of any Internet service. The framework allows assessing the energy consumption depending on the research scope and specific system boundaries. Further, the proposed framework allows researchers without domain expertise to make such an assessment by using intermediate results as data sources, while analyzing the related uncertainties. The second contribution is an estimate of the energy consumption and CO2e emissions of online advertising by utilizing our proposed framework. The third contribution is an assessment of the energy consumption of invalid traffic associated with online advertising. The second and third contributions are used to validate the first. The online advertising ecosystem resides in the core of the Internet, and it is the sole source of funding for many online services. Therefore, it is an essential factor in the analysis of the Internet's energy footprint. As a result, in 2016, online advertising consumed 20–282 TWh of energy. In the same year, the total infrastructure consumption ranged from 791 to 1334 TWh. With extrapolated 2016 input factor values without uncertainties, online advertising consumed 106 TWh of energy and the infrastructure 1059 TWh. With the emission factor of 0.5656 kg CO2e/kWh, we calculated the carbon emissions of online advertising, and found it produces 60 Mt CO2e (between 12 and 159 Mt of CO2e when considering uncertainty). The share of fraudulent online advertising traffic was 13.87 Mt of CO2e emissions (between 2.65 and 36.78 Mt of CO2e when considering uncertainty). The global impact of online advertising is multidimensional. Online advertising affects the environment by consuming significant amounts of energy, leading to the production CO2e emissions. Hundreds of billions of ad dollars are exchanged yearly, placing online advertising in a significant role economically. It has become an important and acknowledged component of the online-bound society, largely due to its integration with the Internet and the amount of revenue generated through it
    corecore