ABSTRACT
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to prove both comprehensive in terms of the properties we measure and easy to employ and understand for users with little technical background. We structure Netalyzr as a signed Java applet (which users access via their Web browser) that communicates with a suite of measurement-specific servers. Traffic between the two then probes for a diverse set of network properties, including outbound port filtering, hidden in-network HTTP caches, DNS manipulations, NAT behavior, path MTU issues, IPv6 support, and access-modem buffer capacity. In addition to reporting results to the user, Netalyzr also forms the foundation for an extensive measurement of edge-network properties. To this end, along with describing Netalyzr 's architecture and system implementation, we present a detailed study of 130,000 measurement sessions that the service has recorded since we made it publicly available in June 2009.
References
- D. Ardelean, E. Blanton, and M. Martynov. Remote active queue management. In NOSSDAV '08: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages 21--26, New York, NY, USA, 2008. ACM. Google Scholar
Digital Library
- J. Bennett, C. Partridge, and N. Shectman. Packet reordering is not pathological network behavior. IEEE/ACM Transactions on Networking (TON), 7:789--798, 1999. Google Scholar
Digital Library
- R. Beverly, S. Bauer, and A. Berger. The Internet's Not a Big Truck: Toward Quantifying Network Neutrality. In Proc. PAM, 2007. Google Scholar
Digital Library
- M. Casado and M. Freedman. Peering through the Shroud: The Effect of Edge Opacity on IP-based Client Identification. In Proc. NSDI, 2007. Google Scholar
Digital Library
- Chad R. Dougherty. CERT Vulnerability Note VU 800113: Multiple DNS implementations vulnerable to cache poisoning, July 2008.Google Scholar
- What ports are blocked by Comcast High-Speed Internet? http://lite.help.comcast.net/content/faq/ What-ports-are-blocked-by-Comcast-High-Speed- Internet.Google Scholar
- D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee. Increased DNS Forgery Resistance Through 0x20-bit Encoding. In Proc. CCS, 2008. Google Scholar
Digital Library
- M. Dischinger, A. Haeberlen, K. P. Gummadi, and S. Saroiu. Characterizing Residential Broadband Networks. In Proc. IMC, 2007. Google Scholar
Digital Library
- M. Dischinger, A. Mislove, A. Haeberlen, and K. Gummadi. Detecting BitTorrent Blocking. In Proc. IMC, 2008. Google Scholar
Digital Library
- R. Erzs and R. Bush. Clarifications to the DNS Specification. RFC 2181, IETF, July 1997.Google Scholar
- M. Fauenfelder. How to get rid of Vimax ads. http://boingboing.net/2009/01/16/how-to-get-rid-of-vi.html, January 2009.Google Scholar
- R. Giobbi. CERT Vulnerability Note VU 435052: Intercepting proxy servers may incorrectly rely on HTTP headers to make connections, February 2009.Google Scholar
- J. Huang, Q. Xu, B. Tiwana, and M. Mao. The UMich Smartphone 3G Test. http://www.eecs.umich.edu/3gtest/.Google Scholar
- C. Kent and J. Mogul. Fragmentation considered harmful. ACM SIGCOMM Computer Communication Review, 25(1):87, 1995. Google Scholar
Digital Library
- G. Maier, A. Feldmann, V. Paxson, and M. Allman. On dominant characteristics of residential broadband internet traffic. In Proc. IMC, 2009. Google Scholar
Digital Library
- M. Mathis and J. Heffner. Packetization Layer Path MTU Discovery. RFC 4821, IETF, March 2007.Google Scholar
- Mozilla. Effective TLD names. http://mxr.mozilla.org/mozilla-central/source/netwerk/dns/src/effective_tld_names.dat.Google Scholar
- M. Nottingham. XMLHttpRequest Caching Tests. http://www.mnot.net/javascript/xmlhttprequest/cache.html, December 2008.Google Scholar
- V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Computer Communication Review, 31(3):38--47, 2001. Google Scholar
Digital Library
- C. Reis, S. Gribble, T. Kohno, and N. Weaver. Detecting In-Flight Page Changes with Web Tripwires. In Proc. NSDI, 2008. Google Scholar
Digital Library
- A. Ritacco, C. Wills, and M. Claypool. How's My Network? A Java Approach to Home Network Measurement. In ICCCN 2009, pages 1--7. IEEE, 2009. Google Scholar
Digital Library
- S. Saroiu, P. Gummadi, S. Gribble, et al. A measurement study of peer-to-peer file sharing systems. In Proceedings of Multimedia Computing and Networking, volume 2002, page 152, 2002.Google Scholar
- P. Savola. MTU and Fragmentation Issues with In-the-Network Tunneling. RFC 4459, 2006.Google Scholar
- M. Tariq, M. Motiwala, N. Feamster, and M. Ammar. Detecting network neutrality violations with causal inference. In Proc. Emerging Networking Experiments and Technologies, 2009. Google Scholar
Digital Library
- P. Vixie. Extension Mechanisms for DNS (EDNS0). RFC 2671, IETF, August 1999.Google Scholar
- Wikipedia. http://en.wikipedia.org/wiki/Usage_ share_of_operating_systems, January 2010.Google Scholar
- Wikipedia. http://en.wikipedia.org/wiki/Usage_ share_of_web_browsers, January 2010.Google Scholar
- Y. Zhang, Z. M. Mao, and M. Zhang. Detecting traffic differentiation in backbone ISPs with NetPolice. In Proc. IMC, 2009. Google Scholar
Digital Library
Index Terms
Netalyzr: illuminating the edge network





Comments