Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1644893.1644905acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Detecting traffic differentiation in backbone ISPs with NetPolice

Published: 04 November 2009 Publication History

Abstract

Traffic differentiations are known to be found at the edge of the Internet in broadband ISPs and wireless carriers [13, 2]. The ability to detect traffic differentiations is essential for customers to develop effective strategies for improving their application performance. We build a system, called NetPolice, that enables detection of content- and routing-based differentiations in backbone ISPs. NetPolice is easy to deploy since it only relies on loss measurement launched from end hosts. The key challenges in building NetPolice include selecting an appropriate set of probing destinations and ensuring the robustness of detection results to measurement noise.
We use NetPolice to study 18 large ISPs spanning 3 major continents over 10 weeks in 2008. Our work provides concrete evidence of traffic differentiations based on application types and neighbor ASes. We identify 4 ISPs that exhibit large degree of differentiation on 4 applications and 10 ISPs that perform previous-AS hop based differentiation, resulting in up to 5% actual loss rate differences. The significance of differences increases with network load. Some ISPs simply differentiate traffic based on port numbers irrespective of packet payload and the differentiation policies may only be partially deployed within their networks. We also find strong correlation between performance differences and Type-of-Service value differences in the traffic.

References

[1]
Arbor Ellacoya e100. http://www.arbornetworks.com.
[2]
AT&T Continues to Adjust TOS to Limit 3G Video. http://newteevee.com/2009/04/29/att-continues-to-adjust-tos-to-limit-3g-video.
[3]
Schooner User-Configurable Lab Environment. http://www.schooner.wail.wisc.edu/index.php3?stayhome=1.
[4]
A. Akella, S. Seshan, and A. Shaikh. An empirical evaluation of wide-area internet bottlenecks. In IMC, 2003.
[5]
B. Augustin, M. Curie, T. Friedman, and R. Teixeira. Measuring Load-balanced Paths in the Internet. In Proc. ACM SIGCOMM IMC, 2007.
[6]
B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira. Avoiding Traceroute Anomalies with Paris Traceroute. In Proc. of ACM IMC, 2006.
[7]
I. Avramopoulos and J. Rexford. Stealth probing: Efficient data-plane security for IP routing. In Proceedings of USENIX Annual Technical Conference, 2006.
[8]
R. Beverly, S. Bauer, and A. Berger. The Internet's Not a Big Truck: Toward Quantifying Network Neutrality. In Proceedings of the 8th Passive and Active Measurement (PAM) Conference, 2007.
[9]
Cisco Systems. Configuring Port to Application Mapping. http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7c8.html.
[10]
Cisco Systems. Configuring Priority Queueing. http://www.cisco.com/en/US/docs/ios/12_0/qos/configuration/guide/qcpq.html.
[11]
Cisco Systems. Simple network management protocol.
[12]
cPacket Networks Inc. Complete Packet Inspection on a Chip. http://www.cpacket.com/.
[13]
M. Dischinger, A. Mislove, A. Haeberlen, and K. P. Gummadi. Detecting BitTorrent Blocking. In Proc. ACM SIGCOMM IMC, 2008.
[14]
Deep packet inspection. www.networkworld.com/details/6299.html.
[15]
P. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. Jin. An Architecture for a Global Internet Host Distance Estimation Service. In Proceedings of IEEE INFOCOM, 1999.
[16]
L. Gao. On Inferring Autonomous System Relationships in the Internet. In Proc. IEEE Global Internet Symposium 2000.
[17]
V. S. Kaulgud. IP Quality of Service: Theory and best practices. www.sanog.org/resources/sanog4-kaulgud-qos-tutorial.pdf, 2004.
[18]
S. G. Kolliopoulos and N. E. Young. Approximation algorithms for covering/packing integer programs. Journal of Computer and System Sciences, 71(4), 2005.
[19]
G. Lu, Y. Chen, S. Birrer, F. E. Bustamante, C. Y. Cheung, and X. Li. End-to-end inference of router packet forwarding priority. In Proc. IEEE INFOCOM, 2007.
[20]
H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In Proc. Operating Systems Design and Implementation, 2006.
[21]
R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. Inferring Link Weights Using End-to-End Measurements. In Proc. ACM SIGCOMM IMW, 2002.
[22]
R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. User-level Internet Path Diagnosis. In Proceedings of ACM SOSP, 2003.
[23]
R. Mahajan, M. Zhang, L. Poole, and V. Pai. Uncovering Performance Differences in Backbone ISPs with Netdiff. In Proceeding of NSDI, 2008.
[24]
A. W. Moore and D. Zuev. Internet traffic classification using bayesian analysis techniques. SIGMETRICS Perform. Eval. Rev., 33(1), 2005.
[25]
V. Paxson, J. Mahdavi, A. Adams, and M. Mathis. An architecture for large-scale Internet measurement. In IEEE Communications, 1998.
[26]
L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A Blueprint for Introducing Disruptive Technology Into the Internet. In Proc. of ACM HotNets, 2002.
[27]
J. Saltzer, D. Reed, and D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4), 1984.
[28]
J. Sommers and P. Barford. An Active Measurement System for Shared Environments. In Proc. ACM SIGCOMM IMC, 2007.
[29]
N. Spring, R. Mahajan, D. Wetherall, and T. Anderson. Measuring isp topologies with rocketfuel. IEEE/ACM Trans Netw., 12(1), 2004.
[30]
N. Spring, D. Wetherall, and T. Anderson. Reverse-Engineering the Internet. In Proc. ACM HotNets, 2002.
[31]
A. Stuart, K. Ord, and S. Arnold. Kendall's Advanced Theory of Statistics. Wiley, 1999.
[32]
M. B. Tariq, M. Motiwala, and N. Feamster. NANO: Network Access Neutrality Observatory . In Proceedings of ACM HotNets, 2008.
[33]
J. Tukey. Bias and confidence in not quite large samples. Ann. Math. Statist, 1958.
[34]
C. Wright, F. Monrose, and G. Masson. On inferring application protocol behaviors in encrypted network traffic. In Journal of Machine Learning Research (JMLR): Special issue on Machine Learning for Computer Security, 2006.
[35]
Y. Zhang, M. Mao, and M. Zhang. Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs. In Proceedings of ACM HotNets, 2008.

Cited By

View all
  • (2024)NAWQ-SR: A Hybrid-Precision NPU Engine for Efficient On-Device Super-ResolutionIEEE Transactions on Mobile Computing10.1109/TMC.2023.325582223:3(2367-2381)Online publication date: Mar-2024
  • (2024)End-to-End Detection of Middlebox InterferenceNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575716(1-9)Online publication date: 6-May-2024
  • (2023)FairNet: A Measurement Framework for Traffic Discrimination Detection on the InternetIEEE Transactions on Network and Service Management10.1109/TNSM.2023.326337320:4(4097-4109)Online publication date: Dec-2023
  • Show More Cited By

Index Terms

  1. Detecting traffic differentiation in backbone ISPs with NetPolice

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement
      November 2009
      468 pages
      ISBN:9781605587714
      DOI:10.1145/1644893
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 November 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. internet measurement
      2. traffic differentiation

      Qualifiers

      • Research-article

      Conference

      IMC '09
      Sponsor:
      IMC '09: Internet Measurement Conference
      November 4 - 6, 2009
      Illinois, Chicago, USA

      Acceptance Rates

      Overall Acceptance Rate 277 of 1,083 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)18
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 06 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)NAWQ-SR: A Hybrid-Precision NPU Engine for Efficient On-Device Super-ResolutionIEEE Transactions on Mobile Computing10.1109/TMC.2023.325582223:3(2367-2381)Online publication date: Mar-2024
      • (2024)End-to-End Detection of Middlebox InterferenceNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575716(1-9)Online publication date: 6-May-2024
      • (2023)FairNet: A Measurement Framework for Traffic Discrimination Detection on the InternetIEEE Transactions on Network and Service Management10.1109/TNSM.2023.326337320:4(4097-4109)Online publication date: Dec-2023
      • (2022)Zero-Rating, One Big Mess: Analyzing Differential Pricing Practices of European MNOsGLOBECOM 2022 - 2022 IEEE Global Communications Conference10.1109/GLOBECOM48099.2022.10001701(203-208)Online publication date: 4-Dec-2022
      • (2022)Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool and Improvements2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)10.1109/COMSNETS53615.2022.9668372(506-514)Online publication date: 4-Jan-2022
      • (2022)Tools to Monitor NeutralityFrom Net Neutrality to ICT Neutrality10.1007/978-3-031-06271-1_9(157-168)Online publication date: 11-May-2022
      • (2021)Throttling TwitterProceedings of the 21st ACM Internet Measurement Conference10.1145/3487552.3487858(435-443)Online publication date: 2-Nov-2021
      • (2021)Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)10.1109/COMSNETS51098.2021.9352826(169-173)Online publication date: 5-Jan-2021
      • (2020)Weaknesses and Challenges of Network Neutrality Measurement Tools2020 16th International Conference on Network and Service Management (CNSM)10.23919/CNSM50824.2020.9269077(1-5)Online publication date: 2-Nov-2020
      • (2020)Characterizing Transnational Internet Performance and the Great Bottleneck of ChinaProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33794794:1(1-23)Online publication date: 5-Jun-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media