10.1145/1879141.1879173acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Netalyzr: illuminating the edge network

Online:01 November 2010Publication History

ABSTRACT

In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to prove both comprehensive in terms of the properties we measure and easy to employ and understand for users with little technical background. We structure Netalyzr as a signed Java applet (which users access via their Web browser) that communicates with a suite of measurement-specific servers. Traffic between the two then probes for a diverse set of network properties, including outbound port filtering, hidden in-network HTTP caches, DNS manipulations, NAT behavior, path MTU issues, IPv6 support, and access-modem buffer capacity. In addition to reporting results to the user, Netalyzr also forms the foundation for an extensive measurement of edge-network properties. To this end, along with describing Netalyzr 's architecture and system implementation, we present a detailed study of 130,000 measurement sessions that the service has recorded since we made it publicly available in June 2009.

References

  1. D. Ardelean, E. Blanton, and M. Martynov. Remote active queue management. In NOSSDAV '08: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages 21--26, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Bennett, C. Partridge, and N. Shectman. Packet reordering is not pathological network behavior. IEEE/ACM Transactions on Networking (TON), 7:789--798, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Beverly, S. Bauer, and A. Berger. The Internet's Not a Big Truck: Toward Quantifying Network Neutrality. In Proc. PAM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Casado and M. Freedman. Peering through the Shroud: The Effect of Edge Opacity on IP-based Client Identification. In Proc. NSDI, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chad R. Dougherty. CERT Vulnerability Note VU 800113: Multiple DNS implementations vulnerable to cache poisoning, July 2008.Google ScholarGoogle Scholar
  6. What ports are blocked by Comcast High-Speed Internet? http://lite.help.comcast.net/content/faq/ What-ports-are-blocked-by-Comcast-High-Speed- Internet.Google ScholarGoogle Scholar
  7. D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee. Increased DNS Forgery Resistance Through 0x20-bit Encoding. In Proc. CCS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Dischinger, A. Haeberlen, K. P. Gummadi, and S. Saroiu. Characterizing Residential Broadband Networks. In Proc. IMC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Dischinger, A. Mislove, A. Haeberlen, and K. Gummadi. Detecting BitTorrent Blocking. In Proc. IMC, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Erzs and R. Bush. Clarifications to the DNS Specification. RFC 2181, IETF, July 1997.Google ScholarGoogle Scholar
  11. M. Fauenfelder. How to get rid of Vimax ads. http://boingboing.net/2009/01/16/how-to-get-rid-of-vi.html, January 2009.Google ScholarGoogle Scholar
  12. R. Giobbi. CERT Vulnerability Note VU 435052: Intercepting proxy servers may incorrectly rely on HTTP headers to make connections, February 2009.Google ScholarGoogle Scholar
  13. J. Huang, Q. Xu, B. Tiwana, and M. Mao. The UMich Smartphone 3G Test. http://www.eecs.umich.edu/3gtest/.Google ScholarGoogle Scholar
  14. C. Kent and J. Mogul. Fragmentation considered harmful. ACM SIGCOMM Computer Communication Review, 25(1):87, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Maier, A. Feldmann, V. Paxson, and M. Allman. On dominant characteristics of residential broadband internet traffic. In Proc. IMC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Mathis and J. Heffner. Packetization Layer Path MTU Discovery. RFC 4821, IETF, March 2007.Google ScholarGoogle Scholar
  17. Mozilla. Effective TLD names. http://mxr.mozilla.org/mozilla-central/source/netwerk/dns/src/effective_tld_names.dat.Google ScholarGoogle Scholar
  18. M. Nottingham. XMLHttpRequest Caching Tests. http://www.mnot.net/javascript/xmlhttprequest/cache.html, December 2008.Google ScholarGoogle Scholar
  19. V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Computer Communication Review, 31(3):38--47, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Reis, S. Gribble, T. Kohno, and N. Weaver. Detecting In-Flight Page Changes with Web Tripwires. In Proc. NSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Ritacco, C. Wills, and M. Claypool. How's My Network? A Java Approach to Home Network Measurement. In ICCCN 2009, pages 1--7. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Saroiu, P. Gummadi, S. Gribble, et al. A measurement study of peer-to-peer file sharing systems. In Proceedings of Multimedia Computing and Networking, volume 2002, page 152, 2002.Google ScholarGoogle Scholar
  23. P. Savola. MTU and Fragmentation Issues with In-the-Network Tunneling. RFC 4459, 2006.Google ScholarGoogle Scholar
  24. M. Tariq, M. Motiwala, N. Feamster, and M. Ammar. Detecting network neutrality violations with causal inference. In Proc. Emerging Networking Experiments and Technologies, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Vixie. Extension Mechanisms for DNS (EDNS0). RFC 2671, IETF, August 1999.Google ScholarGoogle Scholar
  26. Wikipedia. http://en.wikipedia.org/wiki/Usage_ share_of_operating_systems, January 2010.Google ScholarGoogle Scholar
  27. Wikipedia. http://en.wikipedia.org/wiki/Usage_ share_of_web_browsers, January 2010.Google ScholarGoogle Scholar
  28. Y. Zhang, Z. M. Mao, and M. Zhang. Detecting traffic differentiation in backbone ISPs with NetPolice. In Proc. IMC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Netalyzr: illuminating the edge network

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!