Documente Academic
Documente Profesional
Documente Cultură
Abstract— Ethernet, wireless LAN, ADSL, cable modem protocols and applications. For instance, there is a large
and dialup are common access networks, but have dramat- amount of literature on improving the performance of
ically different characteristics. Fast and accurate classifi- TCP when the last hop is a wireless link (e.g. [3], [4])
cation of access network type can improve protocol or ap- or cable connection (e.g. [5]), assuming that it is known
plication performance significantly. In this paper, we pro- that the last hop is a wireless link or cable connection. In
pose a simple and efficient end-end scheme to classify the peer-to-peer applications, given a group of neighbors, a
type of an access network using packet pairs. Our scheme
peer may well choose a neighbor using an Ethernet con-
is based on the intrinsic characteristics of the various access
nection over those using other connection types. Simi-
networks and utilizes the median and entropy of the packet
pair inter-arrival times. Extensive experiments show that
larly, when constructing an application-level overlay [6],
our scheme obtains accurate classification results in a very it is often desirable to choose overlay nodes with Ether-
short time (10 to 100 seconds). net connections over those with other connection types.
In application layer multicast [7], it is desirable to select
nodes at higher levels of the multicast tree to have wired
high-bandwidth connections. Being able to determine the
I. I NTRODUCTION
type of access network can also be useful for applications
Access networks, consisting of the links connecting with bandwidth and delay requirements. For example, for
end systems to edge routers, are of dramatically different streaming multimedia applications, a server may want to
types. Dialup, ADSL (asymmetric digital subscriber line) adapt the rate of the media to the access network band-
and HFC (hybrid fiber coaxial cable) are three prevalent width.
types in residential area. Ethernet and switched Ethernet However, accurate classification of connection types is
are common LAN technologies in business and educa- not an easy task. It is often not possible for the end system
tional institutions. In addition, wireless LANs (WLAN) to reliably report the connection type for the following
using the IEEE 802.11b standard are becoming more and reasons. First, the end system may not have knowledge
more popular in the office environment. We refer to the of the connection type. A laptop connected to a cable or
above access networks as dialup, ADSL, cable modem, ADSL modem using a wireless connection would report
Ethernet and WLAN connections. The various types of WLAN as its connection type instead of cable or ADSL.
connections have dramatically different characteristics in Also, an end system may have an incentive to conceal its
terms of physical media, capacity, and symmetry of the connection type, and a compromised machine may also
upload and download bandwidths. Furthermore, user be- report its connection type inaccurately to degrade the per-
havior can be very different when using different access formance of an overlay network.
networks. For instance, studies show that wireless ses- In this paper, we are interested in end-end approaches
sions are usually short (within several to tens of min- for determining the access network type. We propose a
utes) [1], [2]. Dialup connections may also have short simple and efficient end-end scheme to classify the type of
durations, while cable modem and ADSL users tend to an access network using packet pairs (a packet pair con-
be on line for a longer time. Ethernet connections might tains two back-to-back packets). Our algorithm is based
be the most stable among all types of connections. In on the intrinsic characteristics of the various connection
this paper, we do not differentiate between Ethernet and types and roughly works as follows. If node A needs to
switched Ethernet and refer to them loosely as a high- determine the connection type of node B, A asks B to
bandwidth wired Ethernet connection or simply a wired send a sequence of packet pairs to A. A determines B’s
connection. connection type based on median and entropy of the inter-
Classifying connection types using end-end approaches arrival times of the packet pairs from B (see Section III).
is very useful in a wide range of scenarios for network Extensive experiments show that our scheme obtains ac-
2
curate classification results in a very short time (10 to 100 A wireless station accesses the channel using a basic ac-
seconds). cess method or an optional four-way handshaking access
Packet-pair or packet-train approaches have been pre- method. When the packet size is smaller than an RTS
viously used in the literature to determine the capacity Threshold, the basic access method is used in order to
or available bandwidth of an end-end path [8], [9]. Our improve efficiency. Since the packet pairs we use are of
work differs from the above in that we use packet pairs to very small packet size, they are sent using the basic ac-
determine the access network type based on characteris- cess method, and thus we only describe the basic access
tics of the different access network types. It turns out that method here. When using the basic access method, if a
the median and entropy of the inter-arrival time of packet station has a packet to send, it may transmit when the me-
pairs demonstrates very different characteristics for dif- dia is free for greater than or equal to a DIFS (Distributed
ferent access network types. In [10], the authors distin- Interframe Space) time. If the media is busy, a station
guish congestion losses from wireless losses using packet sets a random backoff timer following a binary exponen-
inter-arrival times at the receiver assuming that the last tial backoff procedure. The wireless station chooses the
hop is wireless and the wireless link is the only bottleneck. initial backoff timer value for a packet to be a random
Our scheme can differentiate access network types in both number uniformly distributed in the range of 0 and the
lossy and un-lossy environments. Furthermore, we do not contention window, CW . The contention window is set
assume the wireless link to be a bottleneck. The only to CWmin for each new data transmission and doubles
work that we are aware of that considers differentiating each time a transmission is unsuccessful until it reaches
connection types is [11]. However, [11] only differenti- the maximum contention window, CWmax . The backoff
ates between wireless and wired connections and assumes timer decreases by one when the media is idle for a slot
very low bandwidth and lossy wireless links. The method time and is frozen when the channel is sensed busy. When
in [11] is based on the observation that the high loss rate the backoff timer reaches zero, the station sends the data
of wireless links leads to a wider RTT spread. Our work, frame.
in contrast, is based on the fundamental characteristics of
the various access networks and therefore provides accu- In 802.11, unlike in Ethernet, the destination needs
rate classification regardless of the loss rate at the access to send an explicit ACK to the sender since a wireless
network. sender cannot determine whether or not its transmission
The rest of the paper is organized as follows. In Sec- has been successful. Since IEEE 802.11b is used most
tion II, we provide some background for the access net- widely in a WLAN, we focus on IEEE 802.11b in this pa-
works considered in this paper. In Section III, we present per. Table I [13] summarizes the transmission overhead
our scheme to classify the connection types. Section IV per packet in 11 Mbps 802.11b [13], [14]. The slot time is
presents an analytical foundation for our approach. Sec- 20 µs and the minimum Contention Window, CWmin , is
tion V describes the experimental results. Finally, Sec- 31. Therefore, assuming no collisions, the average back-
tion VI concludes the paper and describes future work. off duration is 310 µs, leading to an average transmission
overhead of around 810 µs per packet. Some wireless
II. BACKGROUND hosts and base stations are 802.11b compatible and sup-
port bandwidth up to 22 Mbps. When using a bandwidth
In this section, we provide background for all the ac-
of 22 Mbps, the total average transmission overhead per
cess networks considered in this paper. Our goal here is
packet is halved to around 400 µs, assuming no collisions.
to describe those mechanisms in the access protocol that
will allow us to distinguish one type of access network
from another. We first describe the IEEE 802.11 standard Last, we emphasize that, a 802.11b wireless station
used in WLAN and its main difference from Ethernet. We must wait for a random backoff time after a successful
then describe the Data Over Cable Service Interface Spec- transmission, even if no other station is transmitting, in
ification (DOCSIS) in cable networks. Last, we briefly order to avoid channel capture. This backoff mechanism
describe Ethernet, ADSL and dialup connections. is not used only when the station decides to transmit a
new packet and the medium has been free for more than
DIFS. This implies that random backoff will occur be-
A. IEEE 802.11 standard tween two back-to-back packets. Hence, when two back-
IEEE 802.11 standard [12] defines the physical layer to-back packets are sent on a perfect wireless channel, the
and media access control (MAC) layer for WLAN. In inter-departure time of the packet pair is uniformly dis-
IEEE 802.11 MAC layer, CSMA/CA (carrier sense mul- tributed between 500 µs and 1130 µs, with the median of
tiple access with collision avoidance) is implemented in 810 µs. We will take advantage of the distribution and
all wireless stations and base stations in order to coordi- median of the packet-pair inter-departure time in our clas-
nate the access of the shared media by multiple stations. sification scheme.
3
TABLE I
B REAKDOWN OF TRANSMISSION OVERHEAD PER FRAME IN 802.11 B ( USING 11 M BPS ).
Fig. 1. Two distributions with the same mean, variance but very else the sender uses ADSL, cable or dialup connection
different entropy. (low-bandwidth connection).
a time unit of length 1/µ = 300 µs, and refer to this Proof: Under the assumption that the bandwidth of the
as the packet transmission time. We discretize the inter- sender is 100 Mbps and the first low-bandwidth interme-
departure time of a packet pair at link Lk using the packet diate link is 10 Mbps, we have ∆0 = 30µs = 0.1/µ. That
transmission time as the time unit, and denote the dis- is, X0 = 0.1. By Lemma 1,
cretized inter-departure time as Xk , k = 0, 1, 2. That is,
Xk = d∆k µe = d∆k /(300µs)e. We calculate entropy P (X1 ≤ 2 | X0 = 0.1, ρ1 ) = e−0.1ρ1 + 0.1ρ1 e−0.1ρ1
using time scales of 300 µs and 900 µs. Let H2300 (∆k ) ≥ e−0.1 + 0.1e−0.1 = 0.9953
and H2900 (∆k ) denote the entropy of ∆k using the respec-
tive time scale and base 2 logarithm, k = 0, 1, 2. It is easy Since I = ∆1 in Setting (a), we prove the above theorem
n (∆ ) ≤ 600 µs) ≈ 1. Let p =
by showing that P (ξ.5
to see that H2300 (∆k ) = H2 (Xk ). Let ξ.5
n (∆ ) denote the
k 1
median of n samples of inter-departure times at link Lk , P (X1 ≤ 2 | ρ1 ) = P (∆1 ≤ 600 µs). Then
k = 1, 2. In our experiments, n is in the range of 400 to n
à !
X n i
500. n
P (ξ.5 (∆1 ) ≤ 600 µs) = p (1 − p)n−i .
We are interested in the median and entropy of packet i=n/2
i
pair inter-arrival times at the receiver, that is, H2 (I)
and ξ.5n (I). In Setting (a), since the inter-arrival time
When n is between 400 and 500, we prove that
of a packet pair at the receiver is the same as the inter- n (∆ ) ≤ 600 µs) is an increasing function of p [17].
P (ξ.5 1 ¡ ¢
P
departure time of the packet pair at link L1 , we have When p = 0.9953, ni=n/2 ni pi (1 − p)n−i ≈ 1. Since
I = ∆1 . Similarly, in Setting (b), we have I = ∆2 . We p ≥ 0.9953, we have P (ξ.5 n (∆ ) ≤ 600 µs) ≈ 1. The
1
first present two lemmas on the distribution of the packet- proof for setting (b) is in [17].
pair inter-departure time at an M/D/1 queue. In the in- The above theorem provides an upper bound on the me-
terest of space, derivations and proofs are omitted and can dian packet pair inter-arrival time at the receiver and is
be found in [17]. used in Rule 1 of our classification scheme.
Lemma 1: Consider an M/D/1 queue with processing Theorem 2: (Entropy for Ethernet connection) In
rate µ and utilization ρ. Suppose that the inter-arrival time Setting (a), H2300 (I) ≤ 0.49 bit, H2900 (I) ≤ 0.071 bit. In
of a packet pair at the queue is ∆a = Xa /µ, Xa > 0. Let Setting (b), when ρ1 = 1 and ρ2 = 1, H2300 (I) = 1.989
∆d denote the inter-departure time of the packet pair after bits, H2900 (I) = 0.574 bit.
the queue and ∆d = Xd /µ, Xd > 0. Then if xa ≤ 1, we Proof: Since I = ∆1 in Setting (a), we prove the
have above theorem by showing that H2300 (∆1 ) ≤ 0.49 bit,
e−xa ρ (xa ρ)xd −1 H2900 (∆1 ) ≤ 0.071 bit. By Lemma 1,
P (Xd = xd | Xa = xa , ρ) =
(xd − 1)! e−0.1ρ1 (0.1ρ1 )x1 −1
P (X1 = x1 | X0 = 0.1, ρ1 ) =
where xd = 1, 2, . . . (x1 − 1)!
Lemma 2: Under the conditions of Lemma 1, if xa > 1 Let p(x1 | 0.1, ρ1 ) = P (X1 = x1 | X0 = 0.1, ρ1 ). We
and ρ = 1, we have have
e−xa xxad −1 1 X
∞
P (Xd = xd | Xa = xa , ρ = 1) = H2 (X1 | ρ1 ) = p(x1 | 0.1, ρ1 ) log(p(x1 | 0.1, ρ1 ))
(xd − 1)! log 2 x =1
1
TABLE III
VALIDATION USING ns: THE MAXIMUM ENTROPY AND MEDIAN VALUES IN ALL CONFIGURATIONS .
TABLE IV
S MALL - SCALE CONTROLLED EXPERIMENTS : BOTH THE SENDER AND THE RECEIVER ARE AT UM ASS .
Sender Receiver Sample size min max median H2300 (I) H2900 (I)
(pairs) (µs) (µs) (µs) (bit) (bit)
UMass-2 UMass-1 500 1 190 16 0.0 0.0
UMass-w1 UMass-2 500 79 8246 1099 0.8 0.3
UMass-w1 UMass-2 500 873 3959 1138 1.2 0.2
UMass-w1 UMass-1 500 693 8644 1117 1.4 0.6
UMass-w1 UMass-1 500 845 5700 1115 1.7 0.9
UMass-w1 (40 ms) UMass-1 500 716 3428 1147 1.2 0.3
UMass-w2 UMass-1 500 193 7567 1096 1.9 1.1
TABLE V
S MALL - SCALE CONTROLLED EXPERIMENTS : USC ACTS AS THE RECEIVER .
Sender Sample size min max median H2300 (I) H2900 (I)
(pairs) (µs) (µs) (µs) (bit) (bit)
UMass-1 (Ethernet) 500 45 2293 46 0.2 0.1
UMass-2 (Ethernet) 499 44 4225 46 0.2 0.1
UPenn (Ethernet) 500 44 524 46 0.1 0.0
UMN (Ethernet) 497 45 2457 384 0.6 0.2
Brazil (Ethernet) 469 45 21036 46 0.5 0.2
Taiwan (Ethernet) 496 44 665 46 0.1 0.0
Italy (Ethernet) 498 55 8523 68 0.7 0.5
UMass-w2 (WLAN) 497 46 29341 961 2.8 1.6
UMass-w1 (WLAN) 499 46 3817 1056 2.4 1.1
UMass-w1 (WLAN, 40ms) 500 44 4380 1021 2.7 1.3
Home-1 (ADSL) 500 3440 8270 5281 2.1 1.2
Home-2 (WLAN+ADSL) 500 3343 13507 5286 2.4 1.4
Home-1 (cable) 500 43 69053 5954 4.9 3.7
Home-2 (WLAN+cable) 498 43 167707 5653 4.6 3.8
5 5 100 100
Inter-Arrival Inter-Arrival Inter-Arrival Inter-Arrival
4 4 80 80
Inter-arrival (ms)
Inter-arrival (ms)
Inter-arrival (ms)
Inter-arrival (ms)
3 3 60 60
2 2 40 40
1 1 20 20
0 0 0 0
0 2 4 6 8 10 0 2 4 6 8 10 0 2 4 6 8 10 0 2 4 6 8 10
Time (sec) Time (sec) Time (sec) Time (sec)
1
UMass using tcpdump [21] and calculates the inter-arrival time of
UMN
0.8 Brazil
Taiwan
the two packets in each packet pair. The Linux version
0.6 at two machines (Brazil and UPenn) are too low to cap-
ACF
0.4 ture timestamps accurately. We therefore use 6 machines
0.2
(UMass-1, UMass-2, USC, UMN, Taiwan and Italy) as
0
receivers.
Let {Ii }ni=1 denote the sequence of inter-arrival times
-0.2
0 2 4 6 8 10
Lag of packet pairs at the receiver. Before looking at the ex-
perimental results, we first validate that the Ii ’s can be
Fig. 6. Autocorrelation function of the sequence of packet pair inter-
regarded as independent random variables. We first plot
arrival times with USC as the receiver.
the autocorrelation function of {Ii }ni=1 for various senders
and the same receiver USC in Fig. 6. We observe that,
types. Our experiments are in two sets. The first set of ex- the autocorrelation function of {Ii }ni=1 falls into the con-
periments involves 12 machines located in 4 continents. fidence interval for the various lags, indicating that the Ii ’s
We have accounts on all of the machines and are able to are not correlated. Thus we regard the Ii ’s as independent
run experiments between each pair of machines. We refer random variables.
to this set of experiments as small-scale controlled exper- We now consider some experimental results where both
iments. In the second set of experiments, experimenters the sender and the receiver are at UMass, as listed in Ta-
in 10 countries ran a sender program which sent packet ble IV. In the first experiment (the first row in the table),
pairs to two machines in the University of Massachusetts the sender has an Ethernet connection; in all the other ex-
(UMass). We refer to this set of experiments as large- periments, the sender has a WLAN connection. It is inter-
scale uncontrolled experiments. We next describe these esting to note from Table IV that, even for the sender and
two sets of experiments in detail. At the end, we summa- receiver located in the same domain, the median of inter-
rize the key results from both sets of experiments. arrival time for a WLAN is beyond 600 µs, which easily
differentiates Ethernet and WLAN connections. Further-
A. Small-scale controlled experiments more, when the sender uses a WLAN connection, the en-
This set of experiments involves 12 machines, all Linux tropy at the time scale of 300 µs is generally above 1 bit,
based, and with the connection of Ethernet, WLAN, cable except for one case (with the value of 0.8 bit). We specu-
or ADSL connections. We name the machines by their late that this exception is due to sampling error.
locations. Four machines are in UMass, where UMass- We next consider experiments where the sender and
1 and UMass-2 are two machines with Ethernet connec- the receiver are at geographically different locations. In
tions and UMass-w1 and UMass-w2 are two machines particular, we consider the case that USC is the receiver.
with WLAN connections. The Ethernet card for UMass-1 We first visually examine the inter-arrival times at the re-
is configured to be 10 Mbps while the Ethernet card for ceiver from different types of connections. Fig. 4 plots the
UMass-2 is at the default 100 Mbps. Both UMass-w1 inter-arrival times at USC when the sender’s connection
and UMass-w2 are 802.11b compatible. The bandwidth is Ethernet or WLAN. For the Ethernet connection, the
of UMass-w1 and UMass-w2 is 11 Mbps and 22 Mbps inter-arrival times are much lower and more regular than
respectively. Two machines, referred to as Home-1 and those for the WLAN connection, indicating a lower me-
Home-2, are at a resident home in Amherst, MA, where dian inter-arrival time and entropy. Fig. 5 depicts the inter-
both cable and ADSL connections are installed. Home- arrival times at USC when the connection of the sender is
1 connects to the Internet through a router at the resident cable or ADSL. For the cable connection, the inter-arrival
home. Home-2 has a wireless card which is 802.11b com- times are scattered in a wide range of 70 ms, while for
patible and connects to the Internet through a wireless ac- the ADSL connection, the inter-arrival times are concen-
cess point at the resident home at a bandwidth of 22 Mbps. trated around 5 ms. This indicates that the entropy of the
All the other machines have Ethernet connections and are cable connection tends to be larger than that of the ADSL
located at university sites in the east coast (UPenn), mid- connection.
dle west (UMN), west coast (USC) of the US, Brazil, Tai- We next consider the quantitative results shown in Ta-
wan and Italy. ble V. The sender includes all the other machines with all
Machines with Ethernet connections act as receivers. the possible connection types. We observe that the min-
For each receiver, any other machine can act as a sender imum and maximum of the inter-arrival times are not as
of packet pairs. In each experiment, the sender sends a stable as the median. The median inter-arrival time from
packet pair every 20 ms or 40 ms with a total of 500 packet an Ethernet connection is generally tens of microseconds
pairs. Therefore, each experiment lasts for 10 or 20 sec- (except from UMN), all within 600 µs and the entropy is
onds. The receiver records the arrival time of each packet no more than 0.7 bit at the timescale of 300 µs. When
10
1e+06 1e+06
wired wired
10000 10000
1000 1000
100 100
10 10
1 1
0.1 1 10 0.1 1 10
Entropy (bits) Entropy (bits)
(a) Time scale of 300 µs. (b) Time scale of 900 µs.
Fig. 7. Small-scale controlled experiments: classification results.
1000 1000
100 100
10 10
1 1
0.1 1 10 0.1 1 10
Entropy (bits) Entropy (bits)
(a) Time scale of 300 µs. (b) Time scale of 900 µs.
Fig. 9. Large-scale uncontrolled experiments: classification results for all connection types (UMass-1 as the receiver).
1e+06 1e+06
cable cable
Median of Inter-arrival (microsec)
10000 10000
1000 1000
100 100
10 10
1 1
0.1 1 10 0.1 1 10
Entropy (bits) Entropy (bits)
(a) Time scale of 300 µs. (b) Time scale of 900 µs.
Fig. 10. Large-scale uncontrolled experiments: classification results for connection types of cable, ADSL and dialup (UMass-1 as the receiver).
times for all the experiments where UMass-1 is the re- is difficult to obtain a clear cut differentiation among the
ceiver. The entropy is at the time scales of 300 µs and three low-bandwidth connections using median and en-
900 µs. We observe similar results when UMass-2 acts as tropy. The median and entropy from various traces are
the receiver. This indicates that the results are not sensi- close for ADSL connections, while they are in a much
tive to the bandwidth of the receiver. In Fig. 9, the me- wider range for cable and dialup connections. The major-
dian and entropy of the inter-arrival times for Ethernet ity of the traces have median above 2 ms. However, for
connections satisfy the three criteria in the classification two traces from cable connections and five traces from di-
scheme. Furthermore, no other connection type satisfies alup connections, the median is as low as a few microsec-
the three criteria simultaneously. Therefore, our classifi- onds. We speculate that this is due to traffic shaping, as
cation method accurately differentiates between the Eth- observed in [18]. These traces are nevertheless correctly
ernet and non-Ethernet connections. According to Theo- classified as non-Ethernet connections since their entropy
rem 2 (see Section IV), when there is only one intermedi- under the time scale of 900 µs is beyond 0.6 bit, which
ate low-bandwidth link, the upper bound of entropy is 0.5 disqualifies them as Ethernet connections. One example
and 0.1 bit at the time scale of 300 µs and 900 µs respec- of traffic shaping is shown in Fig. 11, which is from a di-
tively when using a precision of 0.1. In Fig. 9, approxi- alup connection. We observe that although majority of the
mately half of the Ethernet connections are within these inter-arrival times are lower than 10 µs, a significant frac-
upper bounds. For WLAN connections, the medians are tion of the inter-arrival times are in a wide range of 1000
in the range of 600 µs and 2 ms and the entropy at the to 6000 µs. The wide spread of inter-arrival times results
time scale of 300 µs is larger than 1 bit, satisfying the cri- in a large entropy value, which differentiates it from an
teria for WLAN connection in the classification scheme. Ethernet connection.
All the traces from cable, ADSL and dialup connections
have a median outside the range of 600 µs to 2 ms ex-
C. Summary
cept for two traces from an ADSL connection, which are
mis-classified as WLAN. We next summarize the results from the small-scale
controlled and the large-scale uncontrolled experiments.
We now examine the results of cable, ADSL and dialup The key observations are:
connections more closely. Fig. 10 plots the results for ca- • It is important to combine median and entropy to-
ble, ADSL and dialup connections. We observe that it gether for the classification. For instance, the entropy
12
7000
Inter-Arrival [2] A. Balachandran, G. Voelker, P. Bahl, and P. Rangan, “Character-
6000 izing user behavior and network performance in a public wireless
Inter-arrival(microsec)
5000 lan,” 2002.
4000 [3] M. Gerla, R. Bagrodia, L. Zhang, K. Tang, and L. Wang, “TCP
3000 over wireless multihop protocols: Simulation and experiments,”
2000 1999.
1000 [4] B. S. Bakshi, P. Krishna, N. H. Vaidya, and D. K. Pradhan, “Im-
0 proving performance of TCP over wireless networks,” in Inter-
0 1 2 3 4 5 6 7 8 9 10
Time(sec)
national Conference on Distributed Computing Systems, 1997.
[5] R. Cohen and S. Ramanathan, “TCP for high performance in
Fig. 11. An example of the packet-pair inter-arrival time of a dialup hybrid fiber coaxial broad-band access networks,” IEEE/ACM
connection: the small median value might be due to traffic shaping. Trans. on Networking, vol. 6, no. 1, pp. 15–29, 1998.
[6] D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Mor-
ris, “Resilient overlay networks,” in Proc. 18th ACM SOSP, Oc-
of Ethernet and WLAN can overlap; the median of tober 2001.
Ethernet and some cable and dialup connections can [7] S. Banerjee, B. Bhattacharjee, and C. Kommareddy, “Scalable
application layer multicast,” in Proceedings of ACM Sigcomm
also overlap. 2002, August 2002.
• Our classification scheme distinguishes between Eth- [8] R. Carter and M. Crovella, “Measuring bottleneck link speed in
ernet and non-Ethernet connections accurately in all packet-switched networks,” Performance evaluation, pp. 297–
of the experiments (totally 509 experiments). 318, 1996.
• Our classification scheme identifies all of the 93 [9] C. Dovrolis, P.Ramanathan, and D. Moore, “What do packet dis-
traces from a WLAN connection accurately. How- persion techniques measure?,” in Proc. IEEE INFOCOM, 2001.
[10] S. Biaz and N. Vaidya, “Discriminating congestion losses from
ever, 5 of the 100 traces from ADSL connections are wireless losses using inter-arrival times at the receiver,” IEEE
mis-classified as WLAN connections. All of the 5 Symposium ASSET’99, Richardson, TX, USA, 1999.
ADSL traces are from Calgary, Canada. [11] L. Cheng and I. Marsic, “Fuzzy reasoning for wireless aware-
• Connections with a large median usually have a large ness,” International Journal of Wireless Information Networks,
entropy. For instance, no trace with a median above vol. 8, no. 1, 2001.
600 µs has an entropy below 0.8 bit. This might be [12] “LAN/MAN standards of the IEEE Computer Society. Wireless
LAN medium access control (MAC) and physical layer (PHY)
because, when the distance between two packets in a specification. IEEE standard 802.11,” 1997.
packet pair is large, more cross traffic packets can be [13] S. Garg, M. Kappes, and A. S. Krishnakumar, “On the effect of
inserted between the two packets. contention-window sizes in IEEE 802.11b networks,” Tech. Rep.
ALR-2002-024, Avaya Labs Research, 2002.
[14] “IEEE 802.11, 802.11a, 802.11b standards for wireless local area
VI. C ONCLUSION netowrks.” http://standards.ieee.org/getieee802/802.11.html.
[15] “CableLabs, Data-over-cable service interface specifications - ra-
Ethernet, wireless LAN, ADSL, cable modem and di- dio frequency interface specification, MCNS consortium, 2000,
alup are common types of connections with dramatically SP-RFIv1.1-106-001215.”
different characteristics. Fast and accurate classification [16] K. Papagiannaki, S. Moon, C. Fraleigh, P. Thiran, and C. Diot,
“Measurement and analysis of single-hop delay on an IP back-
of connection types can improve the performance of net- bone network,” IEEE JSAC Special Issue on Internet and WWW
work protocol and applications dramatically. In this pa- Measurement, Mapping, and Modeling, vol. 21, no. 6, 2003.
per, we proposed a simple and efficient end-end scheme to [17] W. Wei, B. Wang, C. Zhang, J. Kurose, and D. Towsley, “Classifi-
classify the type of an access link using packet pairs. Our cation of access network types: Ethernet, wireless LAN, ADSL,
scheme utilized both the median and the entropy of the cable or dialup?,” tech. rep., Department of Computer Science,
packet pair inter-arrival times, based on the intrinsic char- University of Massachusetts, Amherst, 2004.
[18] K. Lakshminarayanan and V. N. Padmanabhan, “Some findings
acteristics of the various connection types. Extensive ex- on the network performance of broadband hosts,” in ACM SIG-
periments showed that our scheme obtains accurate clas- COMM Conference on Internet Measurement, (Miami Beach,
sification results in a very short time (10 to 100 seconds). FL), 2003.
As future work, we are pursuing in the following direc- [19] K. Thompson, G. Miller, and R. Wilder, “Wide-area Internet traf-
tions: (i) Investigating using passive measurements (e.g., fic patterns and characteristics,” IEEE Network, vol. 11, pp. 10–
packets in TCP) to classify the connection types. (ii) Clas- 23, Nov./Dec. 1997.
[20] “Packet trace analysis.”
sification of cable and ADSL connections based on more http://ipmon.sprintlabs.com/packstat/packetoverview.php.
specific characteristics of these two kinds of connections. [21] “tcpdump.” http://www.tcpdump.org/.
R EFERENCES
[1] D. Kotz and K. Essien, “Analysis of a campus-wide wireless net-
work,” Mobile Networks and Applications, 2003.