Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/347059.347557acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Measuring link bandwidths using a deterministic model of packet delay

Published: 28 August 2000 Publication History

Abstract

We describe a deterministic model of packet delay and use it to derive both the packet pair [2] property of FIFO-queueing networks and a new technique packet tailgating) for actively measuring link bandwidths. Compared to previously known techniques, packet tailgating usually consumes less network bandwidth, does not rely on consistent behavior of routers handling ICMP packets, and does not rely on timely delivery of acknowledgments.

References

[1]
S. M. Bellovin. A Best-Case Network Performance Model. http://www.research.att.com/ smb/papers/netmeas.ps, 1992.]]
[2]
J.-C. Bolot. End-to-End Packet Delay and Loss Behavior in the Internet. In Proceedings of ACM SIGCOMM, 1993.]]
[3]
R. L. Carter and M. E. Crovella. Measuring Bottleneck Link Speed in Packet-Switched Networks. Technical Report BU-CS-96-006, Boston University, 1996.]]
[4]
A. B. Downey. Using pathchar to Estimate Internet Link Characteristics. In Proceedings of ACM SIGCOMM, 1999.]]
[5]
B. Efron and R. J. Tibshirani. An Introductin to the Bootstrap. Chapman and Hall, 1993.]]
[6]
V. Jacobson. Congestion Avoidance and Control. In Proceedings of ACM SIGCOMM, 1988.]]
[7]
V. Jacobson. pathchar. ftp://ftp.ee.lbl.gov/pathchar/, 1997.]]
[8]
V. Jacobson. pathchar a tool to infer characteristics of Internet paths. Presented at the Mathmatical Sciences Research Institute, 1997.]]
[9]
S. Keshav. A Control-Theoretic Approach toFlow Control. In Proceedings of ACM SIGCOMM, 1991.]]
[10]
K. Lai and M. Baker. Measuring Bandwidth. In Proceedings of IEEE INFOCOM, 1999.]]
[11]
B. A. Mah. pchar. http://www.ca.sandia.gov/ bmah/Software/pchar/, 2000.]]
[12]
S. McCanne and V. Jacobson. The BSD Packet Filter: A New Architecture for User-level Packet Capture. In Proceedings of the 1993 Winter USENIX Technical Conference, 1993.]]
[13]
V. Paxson. End-to-End Routing Behavior in the Internet. In Proceedings of ACM SIGCOMM, 1996.]]
[14]
V. Paxson. End-to-End Internet Packet Dynamics. In Proceedings of ACM SIGCOMM, 1997.]]
[15]
V. Paxson. Measurements and Analysis of End-to-End Internet Dynamics. PhD thesis, University of California, Berkeley, April 1997.]]
[16]
S. Savage. Sting: a TCP-based Network Measurement Tool. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, 1999.]]
[17]
S. Seshan, M. Stemm, and R. Katz. SPAND: Shared Passive Network Performance Discovery. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, 1997.]]
[18]
I. Stoica and H. Zhang. Providing guaranteed services without per ow management. In Proceedings of ACM SIGCOMM, 1999.]]

Cited By

View all
  • (2023)A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing ServicesIEEE Transactions on Mobile Computing10.1109/TMC.2021.308621922:1(1-18)Online publication date: 1-Jan-2023
  • (2022)Elasticity detectionProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544221(158-176)Online publication date: 22-Aug-2022
  • (2022)Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth TomographyIEEE/ACM Transactions on Networking10.1109/TNET.2021.311800630:2(501-514)Online publication date: Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
August 2000
348 pages
ISBN:1581132239
DOI:10.1145/347059
  • cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 30, Issue 4
    October 2000
    319 pages
    ISSN:0146-4833
    DOI:10.1145/347057
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 August 2000

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM00
Sponsor:
SIGCOMM00: ACM SIGCOMM 2000
August 28 - September 1, 2000
Stockholm, Sweden

Acceptance Rates

SIGCOMM '00 Paper Acceptance Rate 26 of 238 submissions, 11%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)133
  • Downloads (Last 6 weeks)24
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing ServicesIEEE Transactions on Mobile Computing10.1109/TMC.2021.308621922:1(1-18)Online publication date: 1-Jan-2023
  • (2022)Elasticity detectionProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544221(158-176)Online publication date: 22-Aug-2022
  • (2022)Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth TomographyIEEE/ACM Transactions on Networking10.1109/TNET.2021.311800630:2(501-514)Online publication date: Apr-2022
  • (2021)Multi-Path Forwarding Strategy for Named Data Networking Based on Pending Interests and Available Bandwidth2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00105(731-737)Online publication date: Sep-2021
  • (2021)Bound Inference and Reinforcement Learning-based Path Construction in Bandwidth TomographyIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488691(1-10)Online publication date: 10-May-2021
  • (2020)A Simulation Study of the Measurement of Queueing Delay Over End-to-End PathsIEEE Open Journal of the Computer Society10.1109/OJCS.2020.29782311(1-11)Online publication date: 2020
  • (2019)Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack ModelIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.2948167(1-1)Online publication date: 2019
  • (2018)Available Bandwidth Estimation Method Using End-to-End Delay Increase RateJournal of Signal Processing10.2299/jsp.22.6322:2(63-76)Online publication date: 2018
  • (2018)Online orchestration of cooperative defense against DDoS attacks for 5G MEC2018 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2018.8377309(1-6)Online publication date: Apr-2018
  • (2018)Applying sigmoid filter for detecting the low-rate denial of service attacks2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC.2018.8301654(450-456)Online publication date: Jan-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media