Advertisement

Unmasking the Growing UDP Traffic in a Campus Network

  • Changhyun Lee
  • D K Lee
  • Sue Moon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7192)

Abstract

Transmission control protocol (TCP) has been the dominating protocol for Internet traffic for the past decades. Most network research based on traffic analysis (e.g., router buffer sizing and traffic classification) has been conducted assuming the dominance of TCP over other protocols. However, a few recent traffic statistics are showing a sign of significant UDP traffic growth at various points of Internet links [21]. In this paper we show that the UDP traffic has grown significantly in recent years on our campus network; we have observed a 46-fold increase in volume (from 0.47% to 22.0% of total bytes) in the past four years. The trace collected in 2011 shows that the grown volume is not from a small number of UDP hosts nor port numbers. In addition, the recent UDP flows are not sent at constant bit rate (CBR) for most cases, and the aggregated traffic shows burstiness close to TCP traffic.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Samplepoint-F Traces from MAWI Working Group Traffic archive (2006-2011), http://mawi.wide.ad.jp/mawi
  3. 3.
  4. 4.
    CAIDA’s Passive Network Monitor Statistics, http://www.caida.org/data/realtime/passive/
  5. 5.
    Appenzeller, G., Keslassy, I., McKeown, N.: Sizing Router Buffers. In: Proc. ACM SIGCOMM (2004)Google Scholar
  6. 6.
    Beheshti, N., Ganjali, Y., Ghobadi, M., McKeown, N., Salmon, G.: Experimental Study of Router Buffer Sizing. In: Proc. ACM SIGCOMM IMC (2008)Google Scholar
  7. 7.
    Dhamdhere, A., Jiang, H., Dovrolis, C.: Buffer Sizing for Congested Internet Links. In: Proc. IEEE INFOCOM (2005)Google Scholar
  8. 8.
    Finamore, A., Mellia, M., Meo, M., Rossi, D.: KISS: Stochastic Packet Inspection Classifier for UDP Traffic. IEEE/ACM Trans. Netw. 18, 1505–1515 (2010)CrossRefGoogle Scholar
  9. 9.
    Fu, T.Z.J., Hu, Y., Shi, X., Chiu, D.M., Lui, J.C.S.: PBS: Periodic Behavioral Spectrum of P2P Applications. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 155–164. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Henderson, T., Kotz, D., Abyzov, I.: The Changing Usage of a Mature Campus-wide Wireless Network. In: Proc. ACM Mobicom (2004)Google Scholar
  11. 11.
    Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport Layer Identification of P2P Traffic. In: Proc. ACM SIGCOMM IMC (2004)Google Scholar
  12. 12.
    Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in thee Dark. In: Proc. ACM SIGCOMM (2005)Google Scholar
  13. 13.
    Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. In: Proc. ACM CoNEXT (2008)Google Scholar
  14. 14.
    Lee, D., Carpenter, B., Brownlee, N.: Observations of UDP to TCP Ratio and Port Numbers. In: Proc. IEEE ICIMP (2010)Google Scholar
  15. 15.
    Maier, G., Feldmann, A., Paxson, V., Allman, M.: On Dominant Characteristics of Residential Broadband Internet Traffic. In: Proc. ACM SIGCOMM IMC (2009)Google Scholar
  16. 16.
    Olivier, P., Benameur, N.: Flow Level IP Traffic Characterization. In: Proc. ITC (2001)Google Scholar
  17. 17.
    Qian, F., Gerber, A., Mao, Z., Sen, S., Spatscheck, O., Willinger, W.: TCP Revisited: A Fresh Look at TCP in the Wild. In: Proc. ACM SIGCOMM IMC (2009)Google Scholar
  18. 18.
    Rodrigues, L., Guardieiro, P.: A Spatial and Temporal Analysis of Internet Aggregate Traffic at the Flow Level. In: Proc. IEEE GLOBECOM (2004)Google Scholar
  19. 19.
    Sommers, J., Barford, P., Greenberg, A., Willinger, W.: An SLA Perspective on the Router Buffer Sizing Problem. ACM SIGMETRICS Perform. Eval. Rev. 35, 40–51 (2008)CrossRefGoogle Scholar
  20. 20.
    Thopmson, K., Miller, G., Wilder, R.: Wide-area Internet Traffic Patterns and Characteristics. IEEE Network 11, 10–23 (1997)Google Scholar
  21. 21.
    Zhang, M., Dusi, M., John, W., Chen, C.: Analysis of UDP Traffic Usage on Internet Backbone Links. In: Proc. IEEE/IPSJ SAINT (2009)Google Scholar
  22. 22.
    Kim, M., Won, Y., Hong, J.: Characteristic Analysis of Internet Traffic from the Perspective of Flows. Elsevier Computer Communications 29, 1639–1652 (2005)CrossRefGoogle Scholar
  23. 23.
    Park, K., Willinger, W.: Self-Similar Network Traffic and Performance Evaluation. John Wiley & Sons, Inc., New York (2002)Google Scholar
  24. 24.
    Abry, P., Veitch, D.: Wavelet Analysis of Long-Range-Dependent Traffic. IEEE Trans. on Information Theory 44, 2–15 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    Zhang, Z., Ribeiro, V., Moon, S., Diot, C.: Small-Time Scaling Behaviors of Internet Backbone Traffic: An Empirical Study. In: Proc. IEEE INFOCOM (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Changhyun Lee
    • 1
  • D K Lee
    • 1
  • Sue Moon
    • 1
  1. 1.Department of Computer ScienceKAISTSouth Korea

Personalised recommendations