Philipp Winter, Ramakrishna Padmanabhan, Alistair King, A. Dainotti
{"title":"Geo-locating BGP prefixes","authors":"Philipp Winter, Ramakrishna Padmanabhan, Alistair King, A. Dainotti","doi":"10.23919/TMA.2019.8784509","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784509","url":null,"abstract":"Geo-locating BGP prefixes can help us understand routing anomalies, prefix aggregation, or reveal what regions are affected by an Internet outage. Our work shows that the naive approach to prefix geo-location—simply mapping each IP address to its corresponding geo-location—can be ambiguous because a prefix may contain another, separately-announced prefix that maps to a different geographical location. Should the containing prefix also map to the locations of the contained prefix? We show that this question is difficult to answer and characterize the scope of these ambiguities by geo-locating around 680,000 prefixes to countries, regions, and cities using both GeoLite and NetAcuity Edge. We find that 0.3% of prefixes are ambiguous with respect to countries but these prefixes constitute 8.5% of the IPv4 address space. In the second part of our work, we study the mappings from prefix to location. We find that most prefixes map to only a single city but the shorter a prefix, the more locations it maps to. Our dataset however contains outliers, e.g., a /23 that maps to as many as 127 (potentially spoofed) countries. Our work takes a first look at prefix geo-location and identifies issues one should be aware of, which paves the way towards more sophisticated applications such as the geo-location of autonomous systems. We make our code and datasets publicly available to facilitate further analysis.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121777695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yekta Turk, E. Zeydan, Fatih Mercimek, Engin Danişman
{"title":"Unified and Automated Fault Management Platform for Optical Networks","authors":"Yekta Turk, E. Zeydan, Fatih Mercimek, Engin Danişman","doi":"10.23919/TMA.2019.8784675","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784675","url":null,"abstract":"A unified and automated fault management platform for heterogeneous optical networks is quite important for telecom operators to monitor and respond to various levels of network events. In this demo, we are demonstrating the details of the design, implementation and evaluation of the proposed HUBBLE platform while targeting to manage the underlying optical network of a telecom operator in real time. The proposed HUBBLE platform consists of three major building blocks i) a data collection layer that is integrated with the telecom operator infrastructure, (ii) data association and analysis layer that is used to measure the severity levels based on predefined alarm severity levels and constraints, and (iii) user interface layer that is on top of management and infrastructure layer which is used to demonstrate the faulty optical lines and is also integrated with fault management systems. Through the dashboard interface of the proposed HUBBLE platform, telecommunication operator’s network optimization experts can easily detect the problems related to either fiber or DWDM link and can take appropriate actions.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128505959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raymond Yu, Callan Christophersen, Yo-Der Song, Aniket Mahanti
{"title":"Comparative Analysis of Adult Video Streaming Services: Characteristics and Workload","authors":"Raymond Yu, Callan Christophersen, Yo-Der Song, Aniket Mahanti","doi":"10.23919/TMA.2019.8784688","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784688","url":null,"abstract":"With the Internet continuing to produce more Web 2.0 services and online adult content seemingly taking up a large proportion of the Internet traffic, pornography services have embraced the shift to user generated content (UGC). This has allowed for more user engagement, forming the so called Porn 2.0. By investigating the characteristics of UGC porn, we can better understand how users are interacting with these streaming services. However, due to the taboo nature of pornography, there has been little work done in this area. In this paper, we examine three of the most consistently popular Porn 2.0 services: PornHub, xHamster, and YouPorn. Using a video corpus of nearly 3 million videos spanning over 10 years, we find that adult videos are commented and rated much less frequently than they are viewed, videos are significantly shorter than the typical TV show, and closer in duration to that of the typical YouTube video. The views for the videos are skewed towards a few popular videos. Video injection rate was variable across the sites. All three sites have on average far more ratings than comments. Video comments are distributed as per the Pareto principle, where a small number of videos receive vastly more comments than the other videos. Most videos receive a moderate number of tags with some more popular videos receiving higher numbers of tags.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferring Netflix User Experience from Broadband Network Measurement","authors":"S. Madanapalli, H. Gharakheili, V. Sivaraman","doi":"10.23919/TMA.2019.8784609","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784609","url":null,"abstract":"Netflix is the largest video-streaming provider in the world today, with over 148 million subscribers and accounting for over 20% of broadband traffic in most developed countries. Internet Service Providers (ISPs) are acutely aware of the need to provide good video streaming experience to viewers, but are poorly equipped to measure and monitor per-stream quality. In this paper, we measure and analyze Netflix playback data from multiple households, develop a practical and scalable method to correlate network activity with client playback behavior, and provide a means for ISPs to infer per-stream Netflix experience from broadband traffic patterns. Our specific contributions are: (1) We develop a measurement tool for collecting network flow activity and client playback metrics, deploy it in 9 households and our lab to gather data for about 8000 Netflix video streams under various network conditions, and release the data to the public; (2) We analyze our data to highlight correlation between active flows and video playback phase, and between network chunk transfers and playback buffer health, during both regular-play and trick-play of video; (3) We develop a method for the ISP to infer Netflix user experience in terms of buffer fill-time, video bitrate and throughput, and detect playback buffer depletion and quality degradation events. ISPs can use our methods to measure, monitor, and manage Netflix user experience in real-time.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127332252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical View on Content Provider Fairness","authors":"Jan Rüth, Ike Kunze, O. Hohlfeld","doi":"10.23919/TMA.2019.8784684","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784684","url":null,"abstract":"Congestion control is an indispensable component of transport protocols to prevent congestion collapse. As such, it distributes the available bandwidth among all competing flows, ideally in a fair manner. However, there exists a constantly evolving set of congestion control algorithms, each addressing different performance needs and providing the potential for custom parametrizations. In particular, content providers such as CDNs are known to tune TCP stacks for performance gains. In this paper, we thus empirically investigate if current Internet traffic generated by content providers still adheres to the conventional understanding of fairness. Our study compares fairness properties of testbed hosts to actual traffic of six major content providers subject to different bandwidths, RTTs, queue sizes, and queueing disciplines in a home-user setting. We find that some employed congestion control algorithms lead to significantly asymmetric bandwidth shares, however, AQMs such as FQ_CoDel are able to alleviate such unfairness.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130645594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yves Vanaubel, Jean-Romain Luttringer, P. Mérindol, Jean-Jacques Pansiot, B. Donnet
{"title":"TNT, Watch me Explode: A Light in the Dark for Revealing MPLS Tunnels","authors":"Yves Vanaubel, Jean-Romain Luttringer, P. Mérindol, Jean-Jacques Pansiot, B. Donnet","doi":"10.23919/TMA.2019.8784525","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784525","url":null,"abstract":"Internet topology discovery aims at analyzing one of the most complex distributed system currently deployed. Usually, it relies on measurement campaigns using hop-limited probes sent with traceroute. However, this probing tool comes with several limits. In particular, some MPLS clouds might obfuscate collected traces. Thus, the resulting Internet maps, the inferred properties, and the graph models are incomplete and inaccurate.In this paper, we introduce TNT (Trace the Naughty Tunnels), an extension to Paris traceroute for revealing, or at least detect, all MPLS tunnels along a path. First, along with traceroute and ping probes, TNT looks for hints indicating the presence of hidden tunnels. Those hints are peculiar patterns in the resulting output, e.g., significant TTL shifts or duplicate IP addresses. Second, if those hints trigger alarms, TNT launches additional dedicated probing for possibly revealing hidden tunnels. We use GNS3 to reproduce, verify, and understand the limits and capabilities of TNT in a controlled environment. We also calibrate the thresholds at which alarms are triggered through a dedicated measurement campaign. Finally, we deploy TNT on the Archipelago platform and provide a quantified classification of MPLS usage. All our results, including the data, the code, and the emulation configurations, are fully and publicly available.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125214386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}