skip to main content
10.1145/1879141.1879173acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Netalyzr: illuminating the edge network

Published: 01 November 2010 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to prove both comprehensive in terms of the properties we measure and easy to employ and understand for users with little technical background. We structure Netalyzr as a signed Java applet (which users access via their Web browser) that communicates with a suite of measurement-specific servers. Traffic between the two then probes for a diverse set of network properties, including outbound port filtering, hidden in-network HTTP caches, DNS manipulations, NAT behavior, path MTU issues, IPv6 support, and access-modem buffer capacity. In addition to reporting results to the user, Netalyzr also forms the foundation for an extensive measurement of edge-network properties. To this end, along with describing Netalyzr 's architecture and system implementation, we present a detailed study of 130,000 measurement sessions that the service has recorded since we made it publicly available in June 2009.

    References

    [1]
    D. Ardelean, E. Blanton, and M. Martynov. Remote active queue management. In NOSSDAV '08: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages 21--26, New York, NY, USA, 2008. ACM.
    [2]
    J. Bennett, C. Partridge, and N. Shectman. Packet reordering is not pathological network behavior. IEEE/ACM Transactions on Networking (TON), 7:789--798, 1999.
    [3]
    R. Beverly, S. Bauer, and A. Berger. The Internet's Not a Big Truck: Toward Quantifying Network Neutrality. In Proc. PAM, 2007.
    [4]
    M. Casado and M. Freedman. Peering through the Shroud: The Effect of Edge Opacity on IP-based Client Identification. In Proc. NSDI, 2007.
    [5]
    Chad R. Dougherty. CERT Vulnerability Note VU 800113: Multiple DNS implementations vulnerable to cache poisoning, July 2008.
    [6]
    What ports are blocked by Comcast High-Speed Internet? http://lite.help.comcast.net/content/faq/ What-ports-are-blocked-by-Comcast-High-Speed- Internet.
    [7]
    D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee. Increased DNS Forgery Resistance Through 0x20-bit Encoding. In Proc. CCS, 2008.
    [8]
    M. Dischinger, A. Haeberlen, K. P. Gummadi, and S. Saroiu. Characterizing Residential Broadband Networks. In Proc. IMC, 2007.
    [9]
    M. Dischinger, A. Mislove, A. Haeberlen, and K. Gummadi. Detecting BitTorrent Blocking. In Proc. IMC, 2008.
    [10]
    R. Erzs and R. Bush. Clarifications to the DNS Specification. RFC 2181, IETF, July 1997.
    [11]
    M. Fauenfelder. How to get rid of Vimax ads. http://boingboing.net/2009/01/16/how-to-get-rid-of-vi.html, January 2009.
    [12]
    R. Giobbi. CERT Vulnerability Note VU 435052: Intercepting proxy servers may incorrectly rely on HTTP headers to make connections, February 2009.
    [13]
    J. Huang, Q. Xu, B. Tiwana, and M. Mao. The UMich Smartphone 3G Test. http://www.eecs.umich.edu/3gtest/.
    [14]
    C. Kent and J. Mogul. Fragmentation considered harmful. ACM SIGCOMM Computer Communication Review, 25(1):87, 1995.
    [15]
    G. Maier, A. Feldmann, V. Paxson, and M. Allman. On dominant characteristics of residential broadband internet traffic. In Proc. IMC, 2009.
    [16]
    M. Mathis and J. Heffner. Packetization Layer Path MTU Discovery. RFC 4821, IETF, March 2007.
    [17]
    Mozilla. Effective TLD names. http://mxr.mozilla.org/mozilla-central/source/netwerk/dns/src/effective_tld_names.dat.
    [18]
    M. Nottingham. XMLHttpRequest Caching Tests. http://www.mnot.net/javascript/xmlhttprequest/cache.html, December 2008.
    [19]
    V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Computer Communication Review, 31(3):38--47, 2001.
    [20]
    C. Reis, S. Gribble, T. Kohno, and N. Weaver. Detecting In-Flight Page Changes with Web Tripwires. In Proc. NSDI, 2008.
    [21]
    A. Ritacco, C. Wills, and M. Claypool. How's My Network? A Java Approach to Home Network Measurement. In ICCCN 2009, pages 1--7. IEEE, 2009.
    [22]
    S. Saroiu, P. Gummadi, S. Gribble, et al. A measurement study of peer-to-peer file sharing systems. In Proceedings of Multimedia Computing and Networking, volume 2002, page 152, 2002.
    [23]
    P. Savola. MTU and Fragmentation Issues with In-the-Network Tunneling. RFC 4459, 2006.
    [24]
    M. Tariq, M. Motiwala, N. Feamster, and M. Ammar. Detecting network neutrality violations with causal inference. In Proc. Emerging Networking Experiments and Technologies, 2009.
    [25]
    P. Vixie. Extension Mechanisms for DNS (EDNS0). RFC 2671, IETF, August 1999.
    [26]
    Wikipedia. http://en.wikipedia.org/wiki/Usage_ share_of_operating_systems, January 2010.
    [27]
    Wikipedia. http://en.wikipedia.org/wiki/Usage_ share_of_web_browsers, January 2010.
    [28]
    Y. Zhang, Z. M. Mao, and M. Zhang. Detecting traffic differentiation in backbone ISPs with NetPolice. In Proc. IMC, 2009.

    Cited By

    View all
    • (2023)Fourteen years in the lifeProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620415(3171-3186)Online publication date: 9-Aug-2023
    • (2023)A Worldwide Look Into Mobile Access Networks Through the Eyes of AmiGos2023 7th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA58422.2023.10198920(1-10)Online publication date: 26-Jun-2023
    • (2023)Where on Earth is the Spatial Name System?Proceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628210(79-86)Online publication date: 28-Nov-2023
    • Show More Cited By

    Index Terms

    1. Netalyzr: illuminating the edge network

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
        November 2010
        496 pages
        ISBN:9781450304832
        DOI:10.1145/1879141
        • Program Chair:
        • Mark Allman
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        In-Cooperation

        • USENIX Assoc: USENIX Assoc

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 November 2010

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. network measurement
        2. network neutrality
        3. network performance
        4. network troubleshooting

        Qualifiers

        • Research-article

        Conference

        IMC '10
        IMC '10: Internet Measurement Conference
        November 1 - 30, 2010
        Melbourne, Australia

        Acceptance Rates

        Overall Acceptance Rate 277 of 1,083 submissions, 26%

        Upcoming Conference

        IMC '24
        ACM Internet Measurement Conference
        November 4 - 6, 2024
        Madrid , AA , Spain

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)76
        • Downloads (Last 6 weeks)2

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Fourteen years in the lifeProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620415(3171-3186)Online publication date: 9-Aug-2023
        • (2023)A Worldwide Look Into Mobile Access Networks Through the Eyes of AmiGos2023 7th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA58422.2023.10198920(1-10)Online publication date: 26-Jun-2023
        • (2023)Where on Earth is the Spatial Name System?Proceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628210(79-86)Online publication date: 28-Nov-2023
        • (2023)Inferring Changes in Daily Human Activity from Internet ResponseProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624796(627-644)Online publication date: 24-Oct-2023
        • (2023)Investigating on Black Holes in Segment Routing Networks: Identification and DetectionIEEE Transactions on Network and Service Management10.1109/TNSM.2022.319745320:1(14-29)Online publication date: Mar-2023
        • (2023)A Novel Multimodal Deep Learning Framework for Encrypted Traffic ClassificationIEEE/ACM Transactions on Networking10.1109/TNET.2022.321550731:3(1369-1384)Online publication date: Jun-2023
        • (2023)Intercept and Inject: DNS Response Manipulation in the WildPassive and Active Measurement10.1007/978-3-031-28486-1_19(461-478)Online publication date: 21-Mar-2023
        • (2022)NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a NetworkApplied Cybersecurity & Internet Governance10.5604/01.3001.0016.14611:1(1-25)Online publication date: 15-Dec-2022
        • (2022)An Extensive Study of Residential Proxies in ChinaProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559377(3049-3062)Online publication date: 7-Nov-2022
        • (2022)Measuring DNS over TCP in the era of increasing DNS response sizesACM SIGCOMM Computer Communication Review10.1145/3544912.354491852:2(44-55)Online publication date: 20-Jun-2022
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media