End-to-End Detection of Compression of Traffic Flows by Intermediaries

被引:0
|
作者
Pournaghshband, Vahab [1 ]
Afanasyev, Alexander [1 ]
Reiher, Peter [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
来源
2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS) | 2014年
关键词
BANDWIDTH;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Routers or nodes on the Internet sometimes apply link-layer or IP-level compression on traffic flows with no knowledge of the end-hosts. If the end-host applications are aware of the compression already provided by an intermediary, they can save time and resources by not applying compression themselves. The benefits from these savings are even greater in mobile applications. We present a probing technique to detect the compression of traffic flows by intermediaries. Our technique is non-intrusive and robust to cross traffic. It is entirely end-to-end, requiring neither changes to nor information from intermediate nodes. We present two different but similar approaches based on how cooperative the end-hosts are. Our proposed technique only uses packet inter-arrival times for detection. It does not require synchronized clocks at the sender and receiver. Simulations and Internet experiments were used to evaluate our approach. Our findings demonstrate an accurate detection of compression applied to traffic flows by intermediaries.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Line-CNN: End-to-End Traffic Line Detection With Line Proposal Unit
    Li, Xiang
    Li, Jun
    Hu, Xiaolin
    Yang, Jian
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (01) : 248 - 258
  • [22] End-to-End Detection of Middlebox Interference
    Pournaghshband, Vahab
    Reiher, Peter
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [23] End-to-End Compromised Account Detection
    Karimi, Hamid
    VanDam, Courtland
    Ye, Liyang
    Tang, Jiliang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 314 - 321
  • [24] End-to-End Active Speaker Detection
    Alcazar, Juan Leon
    Cordes, Moritz
    Zhao, Chen
    Ghanem, Bernard
    COMPUTER VISION, ECCV 2022, PT XXXVII, 2022, 13697 : 126 - 143
  • [25] End-to-End Object Detection with YOLOF
    Xi, Xing
    Huang, Yangyang
    Wu, Weiye
    Luo, Ronghua
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VII, ICIC 2024, 2024, 14868 : 101 - 112
  • [26] End-to-end jitter analysis in networks of periodic flows
    Sohraby, K
    Privalov, A
    IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 575 - 583
  • [27] End-to-end QoS management for adaptive video flows
    Campbell, A
    Eleftheriadis, A
    Aurrecoechea, C
    MULTIMEDIA COMMUNICATIONS AND VIDEO CODING, 1996, : 105 - 115
  • [28] End-to-end traffic management in IP/ATM internetworks
    Jagannath, S
    Yin, NY
    IEEE ATM '97 WORKSHOP, PROCEEDINGS, 1997, : 83 - 89
  • [29] Proportional differentiated services for end-to-end traffic control
    Jiang, Y
    Wu, JP
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 672 - 681
  • [30] On minimizing end-to-end delay with optimal traffic partitioning
    Mao, SW
    Panwar, SS
    Hou, YT
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (02) : 681 - 690