By Topic

End-to-End Monitoring Techniques and Services, 2005. Workshop on

Date 15-15 May 2005

Filter Results

Displaying Results 1 - 21 of 21
  • 3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services (IEEE Cat. No. 05EX1107)

    Publication Year: 2005
    Save to Project icon | Request Permissions | PDF file iconPDF (524 KB)  
    Freely Available from IEEE
  • 3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services

    Publication Year: 2005 , Page(s): 0_2
    Save to Project icon | Request Permissions | PDF file iconPDF (189 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copyright page

    Publication Year: 2005 , Page(s): 0_3
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2005 , Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (191 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Workshop co-chairs

    Publication Year: 2005 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2005 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (78 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005 , Page(s): v - vi
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Autonomous end to end QoS monitoring

    Publication Year: 2005 , Page(s): 1 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1846 KB) |  | HTML iconHTML  

    Verifying that each flow in the network satisfies its QoS requirements is one of the biggest scalability challenges in the current DiffServ architecture. This task is usually performed by a centralized allocation entity that monitors the flows' QoS parameters. Efficient detection of problematic flows is even more challenging when considering aggregated information such as the end to end delay suffered by packets belonging to a specific flow. Known oblivious and reactive monitoring techniques do not scale well when the number of flows and the length of their paths increase, and when the network load increases. This is due both to load on the centralized bandwidth allocation entity and to the excessive number of monitoring and control messages needed. We propose a new monitoring paradigm termed autonomous monitoring, in which the network itself (i.e. the routers along the flow path) is responsible to discover when a violation of the SLA occurs (or is soon to occur). Only in such cases the centralized allocation entity is notified, and can take the required actions. We study the performance of this new distributed algorithm through theoretical analysis and extensive simulations. Our results indicate that in addition to dramatically reducing the load from the centralized allocation entity, the amount of network traffic needed is relatively small and thus the new monitoring scheme scales well. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management interface for programmable end-to-end 'data connectivity' provisioning

    Publication Year: 2005 , Page(s): 17 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1984 KB) |  | HTML iconHTML  

    The paper describes a management-oriented model for cost-effective 'data connectivity' provisioning between the peer entities of a networked multimedia application. The 'connectivity' service provider (SP) may maintain multiple protocol mechanisms to support its clientele: ranging between bandwidth-reserved paths to bandwidth-shared paths. Client applications prescribe the required QoS obligations through a service interface, with the SP instantiating one of the protocol modules with appropriate parameters to meet the QoS requirements. The model allows dynamic switching from one protocol module to another, based on a notion of cost associated with bandwidth usage by the network infrastructure for a given level of QoS offering. The management functions of SP monitor the changes and/or outages in network bandwidth in a dynamic setting, and map them into connectivity costs incurred by the selected protocol mechanism. The paper describes the signaling required between the SP and network infrastructure to install appropriate policy functions that can make the connectivity provisioning cost-optimal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • InTraBase: integrated traffic analysis based on a database management system

    Publication Year: 2005 , Page(s): 32 - 46
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1929 KB) |  | HTML iconHTML  

    Internet traffic analysis as a research area has attracted lots of interest over the last decade. The traffic data collected for analysis are usually stored in plain files and the analysis tools consist of customized scripts each tailored for a specific task. As data are often collected over a longer period of time or from different vantage points, it is important to keep metadata that describe the data collected. The use of separate files to store the data, the metadata, and the analysis scripts provides an abstraction that is much too primitive. The information that "glues" these different files together is not made explicit but is solely in the heads of the people involved in the activity. As a consequence, manipulating the data is very cumbersome, does not scale, and severely limits the way these data can be analyzed. We propose to use a database management system (DBMS) that provides the infrastructure for the analysis and management of data from measurements, related metadata, and obtained results. We discuss the problems and limitations with today's approaches, describe our ideas, and demonstrate how our DBMS-based solution, called InTraBase, addresses these problems and limitations. We present the first version of our prototype and preliminary performance analysis results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • nCap: wire-speed packet capture and transmission

    Publication Year: 2005 , Page(s): 47 - 55
    Cited by:  Papers (24)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1106 KB) |  | HTML iconHTML  

    With the increasing network speed, it is no longer possible to capture and transmit network packets at wire-speed using general-purpose operating systems. Many companies tried to tackle this problem by manufacturing costly network adapters able to keep up at high network speeds. This paper describes a new approach to wire-speed packet capture and transmission named nCap based on commercial network adapters rather than on custom network adapters and software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An inline measurement method for capacity of end-to-end network path

    Publication Year: 2005 , Page(s): 56 - 70
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3703 KB) |  | HTML iconHTML  

    We previously proposed a new version of TCP, called inline measurement TCP (ImTCP), in Cao Le Thanh Man et al. (2004). The ImTCP sender adjusts the transmission intervals of data packets and then utilizes the arrival intervals of ACK packets for available bandwidth estimation. This type of active measurement is preferred because the obtained results are as accurate as those of other conventional types of active measurement, even though no extra probe traffic is injected onto the network. In the present research, we combine a new capacity measurement function with ImTCP in order to enable simultaneous measurement of both capacity and available bandwidth in ImTCP. The capacity measurement algorithm is a new packet-pair-based measurement technique that utilizes the estimated available bandwidth values for capacity calculation. This new algorithm promises faster measurement than current packet-pair-based measurement algorithms for various situations and works well for high-load networks, in which current algorithms do not work properly. Moreover, the new algorithm provides a confidence interval for the measurement result. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of active measurement tools for bandwidth estimation in real environment

    Publication Year: 2005 , Page(s): 71 - 85
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2370 KB) |  | HTML iconHTML  

    Available bandwidth - as well as capacity or achievable bandwidth - on a path or a link is one of the very important parameters to measure or estimate in a network: it is of high interest for many networking functions (routing, admission and congestion control, load balancing, etc). Active probing techniques provide the easiest and the more flexible approach, for estimating available bandwidth. In addition, they can be used for different network technologies or structures. Many techniques and tools for available bandwidth estimation appeared recently, but little attention has been given to the accuracy of the estimated values in the real Internet, most of previous studies focusing on validating the accuracy of these tools on local platform. Therefore, this paper deals with evaluating the accuracy of active estimation tools in the real wide area Internet. We use passive monitoring tools for this purpose. We then built a platform combining active and passive equipments, and define a methodology for evaluating active probing techniques using passive tools. The passive evaluation relies on DAG system cards that represent references for such kind of measurements. This paper then discusses the results we got in the different experiments with different tools. In particular, we use traffic generators for changing the characteristics of the traffic on the Internet paths, which we are making our measurements on. It is useful for analyzing the accuracy of active estimation tools according to network and traffic conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontimemeasure: a scalable framework for scheduling active measurements

    Publication Year: 2005 , Page(s): 86 - 100
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4366 KB) |  | HTML iconHTML  

    In order to satisfy and maintain service level agreements (SLAs), which demand high network availability and good network health, ISPs have started instrumenting their networks with network measurement infrastructures (NMIs) that are composed of dedicated measurement servers. Active measurements are frequently used in NMIs to regularly monitor network health and analyze the experience of end-user application traffic traversing the network. However, active measurements initiated by measurement servers need to be regulated. Unregulated active measurement traffic can cause an unpredictable negative impact on the actual application traffic. Also, running simultaneous conflicting active measurements on measurement servers could result in misleading reports of network performance. In this paper, we describe our active measurements scheduling framework called "OnTimeMeasure" that allows ISPs to regulate the amount of active measurement traffic injected into the network and also prevents conflicts in ongoing active measurements between measurement servers. OnTimeMeasure provides a simple scripting language interface to specify various measurement requirements such as physical topology of measurement server clusters, periodicity of the measurements, and properties of measurement tools. For a given measurement requirements script, OnTimeMeasure uses an efficient heuristic bin-packing algorithm to generate measurement timetables for orchestrating active measurements for a network involving multiple measurement servers, each hosting multiple measurement tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracerouting peer-to-peer networks

    Publication Year: 2005 , Page(s): 101 - 114
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2162 KB) |  | HTML iconHTML  

    As peer-to-peer (P2P) networks are being developed and deployed on the Internet at a fast pace, the need for a traceroute like mechanism at the application layer surfaces. Such mechanism, once implemented and deployed, will significantly reduce the complexity involved in developing, researching and evolving P2P networks. It will also help users understand how their queries are handled in P2P networks and mitigate their frustration when their queries return nothing. In this paper, we propose and describe AppTraceroute, which is analogous to traditional traceroute but determines the application layer hops and hosts that a query has visited. Meanwhile, we studied the bandwidth consumptions involved when introducing AppTraceroute into pure P2P networks, hybrid P2P networks and structured P2P networks. We have implemented and experimented the concept of AppTraceroute on a structured P2P network, and the results are promising. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing dynamics measurement and detection for next step Internet signaling protocol

    Publication Year: 2005 , Page(s): 115 - 126
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1356 KB) |  | HTML iconHTML  

    A next step in signaling (NSIS) protocol is currently under standardization by the Internet Engineering Task Force (IETF) to support various applications that need to manipulate control information along the flow path. This paper addresses the NSIS protocol and IP routing interaction problem. We conducted routing measurement experiments to characterize the current Internet path dynamics, and discussed the impact of the observations on NSIS protocol design. The focus of our study is route change. We introduce NSIS-affecting route changes and define them in typical NSIS deployment models. With the NSIS deployment models in mind, we evaluate the simple packet TTL monitoring route change detection method. Finally, we propose a new route change detection method based on one-way-delay monitoring and provide preliminary evaluation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CARENA: a tool to capture and replay Web navigation sessions

    Publication Year: 2005 , Page(s): 127 - 141
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2680 KB) |  | HTML iconHTML  

    Web user behavior has widely changed over the last years. To perform precise and up-to-date Web user behavior characterization is important to carry out representative Web performance studies. In this sense, it is valuable to capture detailed information about the user's experience, which permits to perform a fine grain characterization. Two main types of tools are distinguishable: complex commercial software tools like workload generators and academic tools. The latter mainly concentrate on the development of windows applications which gather Web events (e.g., browser events) or tools modifying a part of the web browser rode. In this paper, we present CARENA, a client-side browser-embedded tool to capture and replay user navigation sessions. Like some commercial software packages our tool captures information about the user session, which can be used later to replay or mimic the gathered user navigation. Nevertheless, unlike these software packages, our tool emulates the original user think times since these times are important to obtain precise and reliable performance results. Among the main features of CARENA are: multiplatform, open source, lightweight, standards based, easily installable and usable, programmed in JavaScript and XUL. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end monitoring service for multicast-based high-quality real-time media delivery

    Publication Year: 2005 , Page(s): 142 - 151
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2212 KB) |  | HTML iconHTML  

    As the demand for high-quality real-time media service through multicast-enabled AG (access grid) increases, the end-to-end QoS (quality of service) provisioning of the media service has become very important. To guarantee the end-to-end QoS, it is essential to monitor the time-varying status of both network (i.e., delay, jitter and loss) and system metrics (i.e., CPU and memory utilization). In this paper, we propose a new service for the AG, to monitor the time-varying conditions of both multicast networks and the AG node systems. When the performance of the AG degrades, the proposed monitoring attempts to pinpoint the cause of performance degradation and explores corresponding reactions to improve the end-to-end performance of the AG. The experimental results show that the proposed monitoring service is really useful in improving the quality of media service for the AG. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilizing higher order statistics of packet interarrival times for bottleneck detection

    Publication Year: 2005 , Page(s): 152 - 163
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3205 KB) |  | HTML iconHTML  

    This paper introduces a new approach for determining bottleneck link locations in a network. The considered measurement model is passive monitoring of a backbone link. We analyze the properties of packet interarrival time (PIT) distribution functions of network segments and make decisions whether the extracted properties of a link suggest bottleneck behavior or not. The correlation between bottleneck behavior and packet interarrival time distribution is demonstrated through simulations featuring tighter and tighter bottleneck connections. Locating shared bottlenecks with passive monitoring requires effective metrics for distinguishing seriously congested links from normal or underutilized connections. The current paper presents the third and fourth central moments (skewness and kurtosis, respectively) of PIT distribution as possible and promising metrics for bottleneck detection. According to the simulation results, kurtosis of PITs is found to be a powerful measure of bottleneck behavior. This is further validated by investigation of real measurement data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and analysis of packet loss on underutilized enterprise network links

    Publication Year: 2005 , Page(s): 164 - 176
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3470 KB) |  | HTML iconHTML  

    ISPs and enterprises usually overprovision their networks as a means of supporting QoS. In spite of that, the service quality of QoS-sensitive applications such as VoIP, video conferencing and streaming media may not be up to expectations. We believe this is due to sporadic but non-negligible packet losses due to traffic bursts even in underutilized links. Our earlier work attempted to detect and analyze packet losses in underutilized links in an enterprise network environment using SNMP. This paper presents an extension of our earlier work by attempting to detect and analyze packet loss at finer granularity of time scale. We have developed a passive traffic capturing system, which can provide smaller time scale analysis of packet loss. We have analyzed the data and identified parts that are representative of packet loss across various time scales: 10 milliseconds, one second, 10 seconds and one minute. Analysis reveals that packet losses on underutilized link do occur due to bursty traffic packets in a small time scale. We also present analysis of other traffic properties such as packet size distribution and flows for the packet loss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual dropping for endpoint admission control

    Publication Year: 2005 , Page(s): 177 - 186
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1306 KB) |  | HTML iconHTML  

    Endpoint admission control is a scalable QoS mechanism that relies on measuring the amount of lost or marked packets of a probing stream before allowing user data flows to enter the network. The existing approaches can be classified based on whether or not they use a separate traffic class for probing traffic, and whether or not they rely on a marking mechanism. Approaches that use a separate traffic class and rely on a marking mechanism are called out-of-band marking approaches and have proven to be most reliable but are also hard to deploy. As an alternative for out-of-band marking the approach of virtual dropping has been proposed, which discards packets that would have been marked otherwise, based on a virtual queue algorithm, thus removing the requirement of a common marking scheme. This paper compares the behavior of virtual dropping and out-of-band marking. Both mechanisms do not behave exactly the same, but differ slightly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.