Measurement

Statistics of Internet traffic volumes

Submitted by richard on Fri, 03/12/2021 - 17:02
Location
Next Generation Networks Webinar
Comments

This talk is based around the Transactions on Networking paper. We use 232 traffic traces to establish that for "mid-large" internet link (backbone links or ingress/egress links from reasonable sized institutions) the traffic is well-modelled by a log-normal distribution.

The associated paper is here: 

https://arxiv.org/abs/2007.10150

On the Distribution of Traffic Volumes in the Internet and its Implications

Submitted by richard on Fri, 06/28/2019 - 10:23
Proc IEEE Infocom

This paper updates previous work on fitting traffic profiles. We use more modern statistical techniques to question (and refute) previous assumptions about heavy tails in statistics. In this case we believe that the best fit for traffic volume per unit time is the log-normal distribution. Tail distributions an have big impacts for capacity planning and for prediction of pricing (say 95th percentile).

Mobile Sensor Data Anonymization

Submitted by richard on Wed, 06/05/2019 - 09:42
ACM/IEEE International Conference on Internet-of-Things Design and Implementation

This paper looks the problem of releasing time-series data when privacy is a concern. It uses information theory to look at what extra information could "leak" if our device sends motion data. For example, can users be reidentified or can features such as height and weight be determined. A machine learning framework is given that can produce a tradeoff between allowing useful data to pass through while distorting the signal minimally to disguise information we wish to be private.

On rate limitation mechanisms for TCP throughput: a longitudinal analysis

Submitted by richard on Tue, 12/13/2016 - 17:00
Computer Networks

This paper is a considerably expanded version of the INFOCOM paper.

Again it argues that TCP is no longer mainly controlled by loss and congestion but instead by algorithms and settings under the control of the sender or receiver deliberately or accidentally designed to restrict throughput for a variety of reasons (for example limiting video sending to the rate at which the viewer is watching).

It contains extended discussion of the methodology and in particular how flight and RTT data was extracted from passive traces.