Academia.eduAcademia.edu

Outline

Characterizing broadband user behavior

2004, Proceedings of the 2004 ACM workshop on Next-generation residential broadband challenges

https://doi.org/10.1145/1026763.1026767

Abstract

This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the characterization is performed along four criteria: (i) session arrival process, (ii) session duration, (iii) number of bytes transferred within a session and (iv) user request patterns. Our results show that both residential and SOHO session inter-arrival times are exponentially distributed. Whereas residential session arrival rates remain relatively high during the day, SOHO session arrival rates vary much more significantly during the day. On the other hand, a typical SOHO user session is longer and transfers a larger volume of data. Furthermore, our analysis uncovers two main groups of session request patterns within each user category. The first group consists of user sessions that use traditional Internet services, such as e-mail, instant messenger and, mostly, www services. On the other hand, sessions from the second group, a smaller group, use typically peer-to-peer file sharing applications, remain active for longer periods and transfer a large amount of data. Looking further into the e-business services most commonly accessed, we found that subscription-based and advertising services account for the vast majority of user HTTP requests in both residential and SOHO workloads. Understanding these user behavior patterns is important to the development of more efficient applications for broadband users.

References (22)

  1. Netflow. www.cisco.com/warp/public/732/Tech/netflow.
  2. The broadband difference. Pew & American Life, 2004. www.pewinternet.org.
  3. M. Arlitt. Characterizing web user sessions. ACM SIGMETRICS Performance Evaluation Review, 28(2):50-56, Sep. 2000.
  4. M. Arlitt, R. Friedrich, and T. Jin. Workload characteri- zation of a web proxy in a cable modem environment. Techni- cal Report HPL-1999-48, Internet Systems and Applications Laboratory -HP Laboratories Palo Alto, Apr. 1999.
  5. M. Arlitt and T. Jin. Workload characterization of the 1998 world cup web site. IEEE Network, 14(3):30-37, May/Jun 2000.
  6. P. Barford, A. Bestavros, A. Bradley, and M. E. Crov- ella. Changes in web client access patterns: characteristics and caching implications. World Wide Web, Special Issue on Characterization and Performance Evaluation, 2(1-2):15-28, 1999.
  7. C. Costa, I. Cunha, A. Borges, C. Ramos, M. Rocha, J. Almeida, and B. Ribeiro-Neto. Analyzing client interactiv- ity in streaming media. In Proceedings 13th World Wide Web Conference, New York, NY, May 2004.
  8. C. R. Cunha, A. Bestravos, and M. E. Crovella. Char- acteristics of www client-based traces. Technical Report TR- 95-010, Department of Computer Science -Boston Univer- sity, 1995.
  9. S. Floyd and V. Paxson. Difficulties in simulating the internet. IEEE/ACM Transactions on Networking, 9(4), Aug. 2001.
  10. K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP- 19), Bolton Landing, NY, Oct. 2003.
  11. T. Hamada, K. Chujo, T. Chujo, and X. Yang. Peer-to- peer traffic in metro networks: analysis, modeling and poli- cies. IEEE/IFIP Network Operations & Management Sympo- sium (NOMS 2004), Apr. 2004.
  12. K. Lakshminarayanan and V. Padmanabhan. Some findings on the network performance of broadband hosts. In- ternet Measurement Workshop (IMC'03), pages 45-50, Oct. 2003.
  13. N. Leibowitz, M. Ripeanu, and A. Wierzbicki. Decon- structing the kazaa network. 3rd IEEE Workshop on Internet Applications (WIAPP'03), Jun. 2003.
  14. D. Menascé and V. Almeida. Scaling for E-business: technologies, models, performance and capacity planning. Prentice Hall, Upper Saddle River -NJ, 2000.
  15. M. A. Rappa. The utility business model and the future of computing services. In IBM Systems Journal, 43(1):32-42, 2004.
  16. C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865. IETF, June 2000.
  17. C. Rigney. Radius Accounting. RFC 2866. IETF, June 2000.
  18. S. Saroiu, K. Gummadi, R. Dunn, S. Gribble, and H. Levy. An analysis of internet content delivery systems. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Dec. 2002.
  19. S. Sen and J. Wang. Analyzing peer-to-peer traffic across large networks. In Proceedings of the second ACM SIGCOMM Workshop on Internet Measurment Workshop, Marseille, France, Nov. 2002.
  20. K. Trivedi. Probability & Statistics with Reliability, Queueing, and Computer Science Applications. 2nd edition, John Wiley & Sons, 2002.
  21. K. Tutschku. A Measurement-based Traffic Profile of the eDonkey Filesharing Service. In Proc. of the 5th Pas- sive and Active Measurement Workshop (PAM 2004), Antibes Juan-les-Pins, France. April 19-20, 2004.
  22. E. Veloso, V. Almeida, W. Meira, A. Bestravos, and S. Jin. A hierarchical characterization of a live streaming me- dia workload. In Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002.