End-to-end Detection of ISP Traffic Shaping using Active and Passive Methods

نویسندگان

  • Partha Kanuparthy
  • Constantine Dovrolis
چکیده

We present end-to-end measurement methods for the detection of traffic shaping. Traffic shaping is typically implemented using token buckets, allowing a maximum burst of traffic to be serviced at the peak capacity of the link, while any remaining traffic is serviced at a lower shaping rate. The contribution of this paper is threefold. First, we develop an active end-to-end detection mechanism, referred to as ShaperProbe, that can infer whether a particular path is subject to traffic shaping, and in that case, estimate the shaper characteristics. Second, we analyze results from a large-scale deployment of ShaperProbe on M-Lab over the last few months, detecting traffic shaping in several major ISPs. Our deployment has received more than one million users so far from 5,700 ISPs. Third, we modify the ShaperProbe detection algorithm so that it can be applied passively on the traffic of any TCP-based application. We apply this passive method in NDT traces, also collected at M-Lab. Our work is the first to design detection methodologies and to measure traffic shaping deployments in the Internet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

شیوه های توزیع بار در مهندسی ترافیک

Because of rapidly rising network traffic, ISP providers are trying to create new network structures and extend more resources to control the growth of demands. It is important to efficiently split the network bandwidth among different sources so that each user has enough bandwidth.  Traffic engineering is used to achieve this goal.   Performing reliable and efficient network ope...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Bypassing internet service provider traffic shaping with peer-to-peer file sharing through deliberate false positives

QoS applications rely on accurate detection of protocols in order to effectively manage traffic passing across networks. Peer-to-peer developers already use encryption and network overlays to bypass ISP traffic shaping but their methods only obfuscate telltale signatures. Unidentifiable or encrypted traffic can still be classified as such and therefore can still be managed. The author addresses...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011