ascertaining the reality of network ascertaining the
play

Ascertaining the Reality of Network Ascertaining the Reality of - PowerPoint PPT Presentation

Ascertaining the Reality of Network Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs Neutrality Violation in Backbone ISPs Ying Zhang, Z. Morley Mao Ming Zhang Ming Zhang Ying Zhang, Z. Morley Mao 1 1 2 2


  1. Ascertaining the Reality of Network Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs Neutrality Violation in Backbone ISPs Ying Zhang, Z. Morley Mao Ming Zhang Ming Zhang Ying Zhang, Z. Morley Mao 1 1

  2. 2 2 Net neutrality debate Net neutrality debate

  3. Why is there debate? (from wikipedia wikipedia) ) Why is there debate? (from � Internet content companies: Microsoft, Google, � Internet content companies: Microsoft, Google, Yahoo, eBay, Amazon Yahoo, eBay, Amazon � Protecting control of data � Protecting control of data � Protecting small providers and consumers � Level playing field � ISPs & network equipment manufactures: AT&T, � ISPs & network equipment manufactures: AT&T, Verizon, Comcast, Cisco, Alcatel Verizon, Comcast, Cisco, Alcatel � Counterweight to server � Counterweight to server- -side non side non- -neutrality neutrality � Encouraging investment � Skepticism of government regulation 3 3

  4. Goals of NVLens NVLens Goals of � Known cases in broadband networks � Known cases in broadband networks � Comcast severely delayed � Comcast severely delayed BitTorrent BitTorrent � Few evidence in backbone networks � Few evidence in backbone networks � Potentially wider impact � Potentially wider impact � First system that detects traffic � First system that detects traffic differentiation in backbone networks differentiation in backbone networks � Protect customers � Protect customers � Deter undesirable � Deter undesirable “ “differentiation differentiation” ” 4 4

  5. Content based differentiation Content based differentiation Src BT HTTP Ingress ISP Egress Dst

  6. Previous- -hop AS based differentiation hop AS based differentiation Previous Src A Src B ISP A ISP B Ingress ISP Egress Dst

  7. Measurement methodology Measurement methodology � At large time scale, map ISP topology � Probe all the IP prefixes � Track topological changes � At small time scale, measure loss rate and latency of ISP internal paths � Probe ingress/egress with traceroute-like packets � Packets extracted from application traces

  8. Which applications do we measure? Which applications do we measure? � Five representative applications with distinct traffic characteristics � HTTP � UDP � BitTorrent � Skype � World of Warcraft � Use HTTP as baseline for comparison

  9. How to detect differentiation? How to detect differentiation? � Given two sets of data samples: � Given two sets of data samples: � Same ingress and destination, different previous � Same ingress and destination, different previous- -hop hop AS, AS, � Same source and egress, different next � Same source and egress, different next- -hop AS hop AS � Same source and destination, different applications � Same source and destination, different applications � Apply hypothesis tests to compute statistical � Apply hypothesis tests to compute statistical significance of difference significance of difference � Wilcoxon � Wilcoxon test and permutation test test and permutation test � No assumption on properties of data distribution � No assumption on properties of data distribution 9 9

  10. Current status of NVlens NVlens Current status of � Running on 750 � Running on 750 PlanetLab PlanetLab nodes across nodes across 300 sites 300 sites � Monitoring 19 backbone ISPs � Monitoring 19 backbone ISPs � AT&T, Sprint, British Telecom, � AT&T, Sprint, British Telecom, Tiscali Tiscali… … � Results based on five weeks of data � Results based on five weeks of data 10 10

  11. Detected traffic differentiation Detected traffic differentiation ISP BT Previous hop Next hop Same AS 633 UUNet 20 38 92 0.2% 0.9% 3.6% 0.5% Tiscali 221 184 6 0 8% 3% 0.1% 0%

  12. Correlation with TOS value Correlation with TOS value Traceroute planetlab1.arizona-gigapop.net 193.58.13.1 � Tonto.telcom.arizona.edu 0 � Tuco.telcom.arizona.edu 0 � Morgan.telcom.arizona.edu 0 � 216-64-190-5.static.twtelecom.net 0 � * 0 � So-1-0-0.was11.ip.tiscali.net 128 � So-3-0-0-0.lon12.ip.tiscali.net 128 � Xe-2-0-0.lon10.ip.tiscali.net 128 � Xe-0-0-0.bru20.ip.tiscali.net 128 � Ge-1-0-0.bru21.ip.tiscali.net 128

  13. More results More results � Quantifying the impact of noise and errors � Equal cost multi-paths � Overloaded prober � ICMP rate limiting � Packet loss on reverse path � Detailed analysis of differentiation � What information is used? � Where and when is it enforced?

  14. Discussion Discussion � How to deal with differentiation? � How to deal with differentiation? � Modify content � Modify content � Change routing � Change routing � May miss certain types of differentiation � May miss certain types of differentiation based on based on � Traffic timing behavior � Traffic timing behavior � Source � Source 14 14

  15. Conclusion Conclusion � NVlens � NVlens is the first system that can detect traffic is the first system that can detect traffic differentiation in backbone networks differentiation in backbone networks � Protect customers, deter undesirable � Protect customers, deter undesirable “differentiation differentiation” ” “ � ISPs do differentiate traffic based on content � ISPs do differentiate traffic based on content and routing policy and routing policy � Result in different loss rates � Result in different loss rates � More research needs to be done this area � More research needs to be done this area � Understand differentiation policies and scope � Understand differentiation policies and scope 15 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend