A Longitudinal Analysis of Traffic Policing Across the Web
نویسندگان
چکیده
Internet traffic has increased 5× in 5 years [4], much of it from high-volume services such as cloud storage and peerto-peer sharing, and from the explosion of streaming video. YouTube and Netflix alone combine to contribute nearly half of the traffic to North American Internet users [8]. This is driven by the fact that these services deliver high-volume traffic, and by the vast popularity of some of these services— YouTube has one billion unique users per month [12] and more than 12% of the US population uses Netflix [6]. This high-volume traffic and its performance is important: users want a quality Internet experience; content providers rely on it for revenue; and Internet Service Providers (ISPs) must cope with delivering its volume. While content providers want to maximize the user quality of experience for their services, an ISP needs to accommodate traffic from a multitude of services and users, often through different service agreements such as tiered data plans. High-volume services like streaming video and bulk downloads (e.g., software updates) that require high goodput must coexist with smaller volume Web services that require low latency. The question of how to manage high-volume traffic has generated both technical and policy discussions. Disputes arise over how to efficiently deliver it [9], and the question of how to handle the growing volumes of traffic has become important enough that even the President of the United States recently weighed in [7]. Content providers spend considerable effort optimizing their infrastructure to deliver data from a server to the client as well as possible [2, 5, 10]. This high-volume traffic has been subject to several forms of traffic management for several years now. A commonlydeployed traffic management mechanism, policing, limits a flow to a preconfigured throughput rate, for example to enforce a bandwidth corresponding to a data plan purchased by a user, with any traffic exceeding the rate being dropped immediately. However, a traffic policer (the logical entity in a router or middlebox that performs policing) can often be configured to accommodate short bursts that exceed the rate 0.0 0.5 1.0 1.5 2.0 2.5
منابع مشابه
Representing a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking
With the expansion of the Internet and the Web, communication and information gathering between individual has distracted from its traditional form and into web sites. The World Wide Web also offers a great opportunity for businesses to improve their relationship with the client and expand their marketplace in online world. Businesses use a criterion called traffic ranking to determine their si...
متن کاملA Longitudinal Study of Small-Time Scaling Behavior of Internet Traffic
During the last decade, many new Web applications have emerged and become extremely popular. Together, these new “Web 2” applications have changed how people use the Web and the Internet. In light of these changes, we conduct a longitudinal study of the small-time scaling behavior of Internet traffic using network traffic traces, available from the MAWI repository, that span a period of eight y...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملFuzzy Sliding Mode Control System Design for Car- Following Behavior in Real Traffic Flow
In this paper a control system has been designed to improve traffic conditions in car following maneuver. There are different methods to design a control system. In this paper design approach is based on the Fuzzy sliding mode control (FSMC) system. The aim of designing FSMC system is to achieve safe and desire longitudinal distance and less lateral displacement. In orde...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016