Top Banner
CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015
17

CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Dec 16, 2015

Download

Documents

Todd Townsend
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

CSE534 – Fundamentals of Computer Networks

Lecture 16: Traffic Shaping + Net Neutrality

Created by P. Gill Spring 2014, updated Spring 2015

Page 2: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

2

Outline

Background on Traffic Differentiation + Net Neutrality

Glasnost (optional reading) Required Reading presentation.

Page 3: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Traffic differentiation

• The act of identifying and discriminating against certain types of Internet traffic

• Example:• Comcast + BitTorrent

Page 4: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Comcast's interference affects all types of content, meaning that, for instance, an independent movie producer who wanted to distribute his work using BitTorrent and his Comcast connection could find that difficult or impossible — as would someone pirating music.

Page 5: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

The result?

Page 6: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

What exactly is traffic differentiation?• Traffic is identified and performance is degraded• How can traffic be identified?

• IP address• Port• Host name• Payload• Flow level characteristics

• Large body of work on “traffic classification” to identify different types of traffic• Many products: e.g., Sandvine

• How might performance be degraded?• Lower priority queues • Spoofing dupacks (tested but not deployed)

Page 7: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Underlying issue: Net neutrality

They want to deliver vast amounts of information over the Internet. And again, the Internet is not something that you just dump something on. It's not a big truck. It's a series of tubes.

And if you don't understand, those tubes can be filled and if they are filled, when you put your message in, it gets in line and it's going to be delayed by anyone that puts into that tube enormous amounts of material, enormous amounts of material.

Page 8: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Net neutrality

The principle that ISPs and governments should treat data on the Internet equally

• No discrimination (performance or cost) based on• User, content, site, application, etc.

• Debated since early 00’s • Mainly in context of last-mile providers wanting to

block certain sites/protocols• Example: A local ISP approached a colleague for a

collaboration on traffic classification… guess why?• Vint Cerf (co-inventor of IP), Tim Berners-Lee

(creator of Web) speak out in favor of Net Neutrality

Page 9: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

History of Net neutrality in US

• 2008 FCC serves cease and desist to Comcast in relation to BitTorrent blocking

• June 2010 US court of appeals rules that FCC doesn’t have power to regulate ISP networks or management of its practices

• Dec. 2010 FCC Open Internet Order: bans cable television and phone providers from preventing access to competing services (eg., Netflix)

• 2012 variety of complaints: vs. AT&T (for restricting Facetime), Comcast (for restricting Netflix)

Page 10: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

History of Net neutrality in US (2)

• 2014 court says FCC doesn’t have authority to enforce net neutrality because ISPs are not “common carriers”• Common carrier is liable for goods it carries• E.g., oil pipelines• ISPs treated like common carriers but not liable for third

party content (e.g., slander, copyright infringement)• 2015 (few weeks ago!)• FCC votes in favor of treating ISPs like common carriers• (with some caveats)

• Mobile ISPs subject to new rules! • Doesn’t include things like paid peerings• E.g., Google paying an ISP for a less congested connection

Page 11: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

11

Outline

Background on Traffic Differentiation + Net Neutrality

Glasnost (optional reading) Required Reading presentation.

Page 12: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

How can technology help?

• Increasing transparency of traffic differentiation• Give users tools to detect traffic differentiation when it

happens• Example: Reading from Web site

• Glasnost: Enabling End Users to Detect Traffic Differentiation. M. Dischinger, M. Marcon, S. Guha, K. Gummadi, R. Mahajan, and S. Saroiu.

• Goal: Allow users to detect if they are subject to traffic differentiation

• Focus on differentiation based on transport protocol headers (ports), or packet payload.

• Tests are run on demand: harder to identify shaping based on time of day

• Detects differentiation based on performance rather than mechanism

Page 13: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Design of glasnost

Emulate flows between the client and server. Vary the packet payload.

Traces kept on server. Errors logged on client and then sent to server for analysis.

Page 14: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Detecting differentiation

• Comparing the maximum throughput between the control and BitTorrent flows• Conservative detector

• Threshold computed using data from an ISP that does not differentiate

Page 15: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Results

Page 16: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

Not all users of an ISP are impacted

Page 17: CSE534 – Fundamentals of Computer Networks Lecture 16: Traffic Shaping + Net Neutrality Created by P. Gill Spring 2014, updated Spring 2015.

17

Outline

Background on Traffic Differentiation + Net Neutrality

Glasnost (optional reading) Required Reading presentation.