We seek additional funding for infrastructure that promises to deliver measurable progress in a wide range of Internet modeling, simulation, analysis, and theoretical research activities currently occurring without any validation against the real world. The measurement data gathered from the Internet with the proposed infrastructure will advance four areas:
- validation of scientific research;
- new measurement technology;
- evaluation of proposed future Internet architectures;
- empirical answers to questions of critical national security and public policy importance.
In August 2005, CAIDA submitted the proposal below to the National Science Foundation's (NSF) Computer and Information Science and Engineering (CISE) Computing Research Infrastructure (CRI) solicitation. The requested budget was $2M for the purchase of measurement equipment and the people to administer it. On 26 May 2006, NSF notified us that the proposal reviewed well, and that they would be able to support up to 25% of the requested budget.
"The proposal reviewed very well; the past performance of your team was praised and the need for upgrading the sensors and data repository was considered very important to current and future Internet research."
The awarded budget allows us to fund a core backbone monitor by 2007. We are hoping to upgrade our active measurement infrastructure as additional funding is authorized. Below we provide the original proposal and budget that we submitted to the NSF.
Funding Source: NSF 05-51542. Period of performance: September 1, 2006 - August 31, 2011.
Project SummaryInternet research critically depends on measurement, but effective Internet measurement raises several daunting issues for the research community and funding agencies. There is increasing awareness that obtaining a better understanding of the structure and dynamics of Internet topology, routing, workload, performance, and vulnerabilities calls for large-scale distributed network measurement infrastructure. But to be viable, such measurement must overcome many challenges: logistical, financial, methodological, technical, legal, and ethical. CAIDA has been navigating these challenges with modest success for ten years, providing data sets to the Internet research and operational community in support of Internet science . However, CAIDA's measurement infrastructure now faces a financial crisis. There is no dedicated source of funds to support macroscopic Internet measurement, particularly in pursuit of rigorous scientific validation of a vast amount of currently unvalidated network research. CAIDA proposes to upgrade both of our current measurement infrastructures (passive and active) to provide the research community data from the wide area Internet that will target the need for validation of current and proposed efforts in large-scale network modeling, simulation, empirical analysis, and architecture development. Our infrastructure upgrade has two components. First, CAIDA's (and, to our knowledge, the Internet's) last remaining single last point of public insight into the commercial Internet backbone was lost this year. The OC-48 link that a commercial Internet backbone allows us to monitor (at the packet header level) upgraded in February to OC192, well out of our financial ability to monitor. This is devastating news for the Internet research community, who no longer has any source of Internet backbone data upon which to base empirically grounded research. CAIDA proposes to build a set of 10 passive monitoring platforms to capture data in support of both technical and public policy questions of vital interest to the health of the Internet. We already have agreements in place to allow access to strategic infrastructural locations in backbone providers, tools for anonymizing the data, and are now only blocked on funding for the monitors themselves. Second, CAIDA's (and, to our knowledge, the Internet's) most comprehensive macroscopic Internet topology measurement infrastructure will be out of funding in January 2006, and has been limping along for years without repairs, upgrades or expansions despite the Internet's relentless topological growth. CAIDA proposes to upgrade this infrastructure based on research commuity feedback from the NSF-funded CONMI workshop  so that the data gathered will meet the needs of as much of the Internet research community as possible at lowest overall cost. Maintaining funding for such measurement infrastructure past the span of a given funded research project has eluded the Internet research community. This failure has a huge negative impact on one of CISE's critical interests: supporting not only scientifically sound Internet research but all large-scale networking research that requires empirical validation. We propose the acquisition of infrastructure that not only directly addresses this failure, but promises measurable progress toward restoring the intellectual strength of a wide range of Internet modeling, simulation, analysis, and theoretical research activities currently occurring without any validation against the real world. The measurement data gathered from the proposed infrastructure will enable a wide breadth of CISE-funded and CISE-relevant projects, in at least four categories: support for validation of scientific research; development of new measurement technology; evaluation of proposed future Internet architectures; and empirical answers to questions of critical national security and public policy importance. CAIDA's long-standing relationships with Internet operational and governance organizations will continue to improve our understanding of the landscape and enable us to better meet the measurement and analysis needs of the network research community as well as the larger Internet.
1 Overview: Measurement history, status, problems, and threats
1.1 Historical context of Internet measurementAs the era of the NSFnet Backbone Service came to a close in April 1995, the community lost the ability to rely on what was the only set of publically available statistics for a large national U.S. backbone. The transition to the commercial sector essentially eliminated the public availability of statistics and analyses at a macroscopic national level. Obstacles to the collection and analysis of traffic data on the commercial Internet pose not only formidable technical and engineering challenges but also include often more daunting legal (privacy), logistical, and proprietary considerations. Data acquisition is further complicated by the networks upgrading to new technologies that are generally prohibitively more expensive or impossible for research groups to monitor. Indeed, statistics collection functionality takes resources directly away from forwarding of packets/frames, which tends to drive commercial providers toward switches from vendors who sacrifice such functionality in exchange for forwarding performance. As a result, core backbone routers simply do not have the functionality to gather fine-grained data needed to support scientifically sound modeling, simulation, and analysis efforts. In combination these issues leave the Internet research community continually starved for data. For ten years, the NSF has partially funded CAIDA to try to address this problem, by supporting CAIDA in the development and deployment of Internet monitoring hardware and software, as well as supporting curation, analysis, and research based on the resulting data. CAIDA has the only source of OC-48 commercial backbone data provided to the research community, under appropriate non-disclosure and acceptable use agreements.1 However, NSF and other U.S. federal agency support has allowed CAIDA to make measurable progress at a goal more directly in line with NSF's critical interest: supporting the scientific community with data to improve the scientific integrity of Internet research. It is this goal, achievable within our current context, that motivates this proposed infrastructure upgrade. Specifically, we want to expand our ability to serve the network research community with data essential to improving the currently abysmal state of Internet science. Furthermore, more recently the Department of Homeland Security has recognized the need to support the calibration of cybersecurity tools in real world environments, and is in the process of launching the PREDICT Project  to allow researchers to request datasets to assist their research into cyber defense technologies, products, models and strategies. The DHS has facilitated progress in the legal and privacy aspects of infrastructure data access, specifically addressing the concerns of ISPs who want to support if not collaborate with the research community but are constrained by privacy laws or policies. But the DHS does not currently fund any measurement infrastructure of the kind proposed here. In the last decade CAIDA has learned a great deal about both technical and non-technical obstacles to measurement, and we have established relationships and participated in projects with other agencies which continue to improve our understanding of the measurement landscape and enable us better to meet the needs of the network research community as well as the larger Internet.
1.2 Limitations of previous and existing infrastructureCAIDA is strongly supportive of community-oriented measurement infrastructure, and considers the proposed infrastructure acquisition to be a step in the direction toward providing infrastructure that can satisfy the needs of as much of the scientific community as possible. We have experience in trying to accommodate the needs of a large and diverse research community, and in particular where the most difficult obstacles arise. For active measurement infrastructure, the paramount concerns are how to coordinate measurement requests from a large community of researchers, and how to ensure integrity of the data if gathered by an unknown party. For passive measurement infrastructure, the paramount concerns are cost of hardware for high speed trace collection, and protected access to trace data. In both cases, a community-oriented approach will be necessary to accommodate as many needs of the community as possible as cost-effectively as possible. And yet, given the limited funding currently available to invest in measurement infrastructure, a radical departure from the current approach is premature. We describe relevant current infrastructures for macroscopic Internet measurement and how we propose to maintain their strengths and mitigate their weaknesses as we support the community in developing a more integrated longer term strategy.
1.2.1 Active measurement infrastructuresSeveral infrastructures have supported or are currently supporting active measurement for research: fully dedicated, such as Skitter ; shared with AUPs but more easily accessed, such as PlanetLab  or RON ; and fully decentralized, such as NetDIMES . Other infrastructures that supported limited active measurement went away after the funding period ended (Surveyor , AMP , NIMI ). The skitter project runs out of funding in January 2006. Each project has different costs, advantages, and weaknesses. There is no consensus on a single correct model for supporting network measurement, and while there is general support for integration of component infrastructures into a higher level platform to be used by the larger Internet community, there is no available agent or funding source to support such an endeavor. Considerable obstacles to such an open platform were discussed at the NSF-funded CONMI workshop : preventing unscrupulous use of the data to facilitate infrastructure attack; forestalling attempts to manipulate measurements to mischaracterize ISP network structure and scope. Further, measurements that generate bad press for ISPs or difficulty for ISP operators may lead quickly to countermeasures that try to deceive or block network measurement efforts. In this project we offer a compromise for our active measurement infrastructure: support limited flexibility of the infrastructure, in particular implementing more intelligent probing techniques described in the literature . We will continue to make periodic traceroute-derived AS adjacency matrices available for research, education and non-commercial purposes.
1.2.2 Passive measurement infrastructuresFor years it has been virtually impossible for researchers to get access to passive (sniffed) data from Internet backbone links due to privacy reasons.2 Based on trust relationships that have been maintained for 10 years, CAIDA has been able to measure strategic links in the backbone so long is it could provide funding for the monitor. Four times in the last ten years this backbone infrastructure has upgraded beyond the scope of the budget CAIDA has for monitoring (OC3, OC12, OC48, and OC192). As of March 2005 there is no available data on Internet backbone links, and so researchers can no longer analyze Internet backbone workloads. The infrastructure we propose to acquire for this project would solve this ominous problem.
1.2.3 End-user (peer production) measurement infrastructuresSeveral projects have drawn on the inspiration of SETI@home to develop client-based measurement software for use in a peer production  model, taking advantage of end users volunteering their hosts to the measurement infrastructure by downloading and executing measurement software that sends gathered data or statistics back to the project's central processing site. The NSF-sponsored CONMI workshop  discussed the challenges faced by three projects in this area: traceroute@home ; DIMES ; and NETI@home, a passive measurement platform with especially daunting challenges. For active measurements, the biggest challenges are: deployment to insure low impact on the infrastructure; prevention of use of tools for dDOS attacks; accountability of measurement source in case of operational problems; analysis of bias due to self-selection of sources (by volunteers); and validation of the integrity of resulting data. Client-side passive measurement infrastructures have all the same problems as active ones but in addition they bear formidable privacy challenges. For certain measurement questions, such as provider or application prevalence on the macroscopic Internet, there is substantial material incentive to manipulate a macroscopic Internet measurement system, so trust in the integrity of the measurement is essential. In general, we do not yet understand the methodological problems of scaling Internet measurement to the peer production mode. We propose a strategic approach toward a model for peer production of Internet measurements, that begins with cross-validation of client-produced data with more trusted measurements from controlled infrastructure. Indeed, we hope the next few years can serve as a transition period for the community to determine if we can achieve the same integrity from client-side infrastructures that we now can from controlled infrastructures.
2 Infrastructure to be acquiredCAIDA proposes to build a set of 10 passive OC192/10GE (core Internet backbone) monitoring platforms to directly capture data in support of both technical and public policy questions of vital interest to the health of the Internet. We already have agreements in place to allow access to strategic infrastructural locations in backbone providers, donated colocation space for measurement infrastructure, tools for anonymizing the data, and are now only blocked on funding for the monitors themselves. These monitors will allow research access to backbone links across the continental United States, as well as links connecting the US to Europe and Asia. The monitors will be manufactured by Endace (www.endace.com). This is an OC192/STM-64/10GB monitor. One FTE system administrator will be needed to build, install, and maintain the passive monitoring system. This systems administrator will deploy ten passive monitoring systems, configure, calibrate, and maintain sensitive measurement cards remotely, and monitor the tapped network links to ensure maximum availability for research efforts. CAIDA also proposes to replace active measurement monitors that are more than five years old with current infrastructure so that the data gathered will meet the needs of as much of the Internet research community as possible at lowest overall cost to NSF. The active boxes we will be using are Dell PowerEdge 750s. One half-time programmer will develop and maintain drivers and software for collecting measurements on passive and active systems. As traffic measurement card firmware and link encapsulation change, software to perform reliable measurement collection must continue to evolve. This software is a critical component of the measurement system, as it preserving information about any physical loss or corruption of data and ensures that timestamps applied to packets are preserved accurately. As link speeds exceed bandwidth to disk, this software allows longer-term data collections by using sampling techniques tuned to disk bandwidth with provable error bounds to support subsequent research. We will use existing storage facilities to store the traces, and index them in CAIDA's Internet Measurement Catalog  to be available for public use in late 2005.
3 Research and education activities enabledA variety of CISE-funded and CISE-relevant projects will be enabled by the measurement data gathered from the proposed infrastructure. We separate these into four classes of projects: support for validation of Internet scientific research, development of new measurement technology, research into future Internet architectures, and empirical research of critical national security and public policy importance.
3.1 Support for validation of Internet modeling, simulation, analysis, and measurement
- congestion control models and simulations. Sally Floyd has carefully described the kind of data required to provide legitimate validation for congestion control modeling [14,15]. Specifically, proposed congestion control schemes, including those for emerging VOIP and real-time streaming protocols, need to be tested in realistic traffic scenarios, which means researchers need accurate data on: distribution of per-packet round-trip times, relevant to fairness and delay/throughput tradeoffs; distribution of per-packet sequence numbers and of connection sizes, both relevant to burstiness of aggregate traffic. Effective modeling will also require statistics on drop rates as a function of packet and burst size. This infrastructure will directly support the needs of the congestion control research community by providing traces of aggregate traffic flows from core Internet backbone links, by far the most difficult but critical scenarios against which to test.
- evaluation of proposed transport protocols. Transport protocol research also needs realistic data on the degree of synchronization of loss events between two TCP flows on the same path. TCP-friendly rate control  is a particularly timely example since the IETF is trying to standardize on transport protocols for voice that will be most effective and efficient on the wide-area Internet. Evaluating such proposals requires data comparing drop rates for large-packet TCP, small-packet TCP, and small-packet UDP on the same path, and paths that transit the core will be of critical importance to such evaluation.
- Internet topology models. Many key publications of Internet topology analysis and modeling [17,18,19,20,21,22] have relied on NLANR  passive data, funding for which was discontinued in 2005, and RouteViews  BGP data. However, several researchers have independently shown that BGP-based topology measurements yield results that are different [25,26] from those based on traceroute-based measurements . Resolving incongruities within and across these data sources is still an active area of research. Data from the proposed infrastructure will support not only the networking but also on physical science communities, who are actively using results of Internet topology measurements [17,27,28,18,19,29,20,21,30,31,32,33,34,35,36,37,38,22]. In particular, there is still a lively debate in the Internet research community regarding whether an infrastructure with few (~ 50) sources but many (~ 1M) destinations will sufficiently capture the relevant parameters of topological structure and dynamics. Resolving this debate will be impossible without more strategic measurements of the wide-area Internet, targeted specifically toward validation of proposed hypotheses.. In addition to extensive measurement and cross-validation, discovering the fundamental laws that govern Internet topology growth will require understanding the economic forces that promote interconnection. Important work has begun in this area , and the proposed infrastructure will allow further validation of such developing economic models.
- Internet reverse engineering. CISE is funding a sizable project called "A Shared Facility for Internet Reverse Engineering"  draws on Spring et al.'s 2003 work , but there is no discussion of how the reverse engineered knowledge will be validated. Their objective is ambitious: "the public availability of an unprecedented data set: an annotated map of the entire Internet, complete with a rich set of link, router and operational attributes", but there is no existing infrastructure to support validation of the data gathered, nor has it been made clear how the data will be gathered. The proposed infrastructure could support this project in a number of ways, and CAIDA has offered to support this project with validation as much possible with the available infrastructure.
- Internet path characterization and diagnosis. Diagnosis of Internet path characteristics and problems is a persistently daunting challenge, since the phenomena being measured are occuring in infrastructure not under the control or influence of the person performing the diagnosis. A variety of tools for bandwidth estimation have been developed, but validating their accuracy across real-world paths remains challenging  since paths with known link characteristics are required for validation. We have been able to use our current topology measurement infrastructure, in cooperation with Abilene, to evaluate the performance and accuracy of some of these tools, but continued access to active and passive monitors will allow an unprecedented level of validation of bandwidth estimation tools. Mahajan et al.  introduces an architecture for user-level Internet path diagnosis and a practical tool (tulip) to diagnose paths in the current Internet. Tulip diagnoses reordering, loss and significant queuing events by leveraging well deployed but little exploited router features. The availability of dedicated active measurement probes can provide an opportunity for validation, refinement, and extension of such tools, and co-location of active probes with passive monitors along a path can allow integrated techniques that will improve the integrity of the models and tools.
- Inference of Internet routing policies. Recent techniques for inferring business relationships between ASs have yielded maps that have few `invalid BGP paths' in the terminology of Gao . However, although these algorithms are improvements over their predecessors, some relationships inferred by these newer algorithms are incorrect, leading to the deduction of unrealistic AS hierarchies. CAIDA has investigated this problem, discovered what caused it, and generalized the problem of AS relationship inference as a multi-objective optimization problem with node-degree-based corrections to the original objective function of minimizing the number of invalid paths. We solved the generalized version of the problem using the semidefinite programming relaxation of the MAX2SAT problem. Keeping the number of invalid paths small, we obtained a more veracious solution than yielded by previous heuristics. Validation of routing policy inference techniques is still an essential component of measuring progress in the field of topology analysis, and a dedicated infrastructure for active probing measurement will support this progress.
3.2 Support for development of new measurement technology
- Active measurement tools. CAIDA has three main goals with its own topology measurement activities: provide the Internet topology data to the community [45,46]; analyze the statistical properties of Internet topologies ; and construct equilibrium models for Internet graphs. And yet it important to acknowledge that the accuracy of all current tools used for wide area macroscopic topology measurement [4,7,48] is under dispute in the research community [47,49]. As stated in section 1.2.3, CAIDA seeks to support the research community in using this infrastructure to explore the use of more efficient and validated algorithms for large-scale topology discovery, starting with implementing the intelligent probing techniques described in the traceroute@home project . The proposed infrastructure will also provide a source of data against with to validate existing client-side topology measurement projects  which have thus far had no validation. CAIDA is also undertaking the development of a probing tool that will characterize topology at a POP (point of presence) granularity. Pop-level traceroute (PLT) is analogous to traceroute except working at the POP level. PLT will show the POPs in the forwarding path from oneself to a given destination. PLT will work by segmenting the router-level forwarding path obtained with standard traceroute into POPs based on several heuristics and measurement. PLT will provide a glimpse into AS topology and AS peering at the granularity of POPs. Indeed, without progress on PLT techniques the network research community will be unable to make breakthrough progress in modeling of intradomain and interdomain routing, including inference and analysis of fine-grained peering relationships. More broadly, research on PLT is a requisite step toward ultimately developing an Internet-wide pop-level map, which will allow empirically grounded answers to a multitude of relevant architectural and policy questions about the Internet. This infrastructure will provide a place to test and refine CAIDA's and others' pop-level topology probing tools.
- Passive measurement tools. Good performance under extreme workloads and isolation of resource consumption of concurrent jobs are perennial design goals of computer systems ranging from multitasking servers to network routers. CAIDA has developed a specialized system that computes multiple summaries of IP traffic in real time and achieves robustness and isolation between tasks in a novel way: by automatically adapting the parameters of the summarization algorithms . In traditional systems, anomalous network behavior such as denial of service attacks or worms can overwhelm the memory or CPU, making the system produce meaningless results exactly when measurement is needed most. In contrast, our measurement system reacts by gracefully degrading the accuracy of the affected summaries. We have evaluated many existing algorithmic solutions for computing traffic summaries, as well as two of our own solutions that offer better memory versus accuracy tradeoffs and have more predictable resource consumption. We have also evaluated the actual implementation of a protoype system that combines the best of these algorithms. The proposed infrastructure provides an ideal place to test and further improve these implementations.
- Trajectory Sampling. Trajectory sampling  is a measurement technique that allows the inference of a traffic flow via observation of the trajectories of a subset of all packets in a flow as it traverses a path. This approach samples packets based on a hash function computed over the packet content, allowing reconstruction of packet trajectories. Experimenting with these novel techniques requires instrumentation of multiple nodes along a path, a circumstance the research community does not have access to without dedicated measurement infrastructure for this purpose, e.g., what we propose here.
- IETF's packet sampling protocol development.The IETF's Packet Sampling (PSAMP) working group  is in the process of defining a standard set of capabilities for network elements to sample packets at high speed but with rich filtering semantics. The goal of this effort is to have network devices support multiple parallel packet samplers, each with independently configurable filters, reports, and export. The proposed infrastructure would support experimentation and refinement of packet sampling algorithms under realistic traffic loads, in pursuit of developing functionality that can eventually be deployed standard on device line cards.
3.3 Support for empirical research of critical public policy questionsThere are several areas where empirical macroscopic Internet measurement could directly inform critically important public policy debates.
- Workload characterization and calibration. Various measurements over the years have offered confirmation of the heavy-tailed distribution of Internet flow sizes, but this knowledge has had little impact on operational reality. There is growing interest in capturing and analyzing Internet traffic characteristics in pursuit of insights that will positively affect operations, but opportunities to gather such data have diminished almost completely since the privatization of the infrastructure. Since its establishment CAIDA has been able to measure strategic links in the backbone so long is it could provide funding for the monitor. Four times in the last ten years this backbone infrastructure has upgraded beyond the scope of the budget CAIDA has for monitoring (OC3, OC12, OC48, and OC192). As of March 2005 there is no available data on Internet backbone links, and so researchers can no longer analyze Internet backbone workloads. If researchers are lucky enough to gather workload data from local campuses, they have no means to calibrate it with commercial Internet backbone traffic. The proposed infrastructure addresses this problem.
- Analysis of the spread of Internet worms. It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such worm outbreaks. For example, the Code-Red worm epidemics of 2001 infected hundreds of thousands of Internet hosts in a short period - incurring enormous operational expense to track down, contain, and repair each infected machine. In response to this threat, considerable effort has focused on developing technical means for detecting and containing worm infections before they can cause such damage. CAIDA used its empirical topology data to investigate how well worm containment approaches would work on actual Internet infrastructure. Using a combination of analytic modeling and simulation, we described how various design factors impact the dynamics of a worm epidemic and, conversely, the minimum engineering requirements necessary to contain the spread of a given worm. While our analysis cannot provide definitive guidance for engineering defenses against all future threats, we demonstrated the lower bounds that any such system must exceed to be useful today. Unfortunately, our results suggest that there are significant technological and administrative gaps to be bridged before an effective defense can be provided in today's Internet. Data from the proposed measurement infrastructure will support continued research into the viable protections and responses of Internet infrastructure to virulent worms.
- Analysis of the Internet Service Provider hierarchy. Analysis of the the Internet Service Provider (ISP) hierarchy is critical to a deeper understanding of technical, economic and regulatory aspects of the Internet inter-domain routing system. As part of CAIDA's research agenda to measure and analyze macroscopic Internet structure, we have developed and refined our procedure to rank Autonomous Systems (AS Rank) by their location in the Internet hierarchy . Our ranking relies upon AS relationship information that we discover using our new inference algorithms , rooted in economic AS relationships. Specifically, we rank each AS as a function of the number of IP prefixes advertised by this AS, its customer ASes, their customers ASs, and so on. This analysis is critically dependent on the accurate collection of a vast amount of Internet topology data. Without the infrastructure proposed in this project, we know of no other objective analysis of commercial ISP coverage of the Internet's topology.
- Prevalence and growth of P2P file sharing. Since the emergence of peer-to-peer (P2P) networking in the late '90s, P2P file shsaring applications have multiplied, evolved and established themselves as the leading growth application of Internet traffic workload. The presence of this traffic on the Internet has catapulted into the focus of public policy, legislative, and ethical discussions in the mainstream media, including U.S. Supreme Court case (MGM vs. Grokster). In particular, the RIAA and others have published claims that P2P file sharing traffic on the Internet is dropping as a result of the RIAA's criminal lawsuits [55,56]. These conclusions are based on no actual Internet traffic data, but rather on telephone surveys or software downloads of a single P2P application. CAIDA has invested considerable effort in the objective analysis of P2P traffic identification and growth, in an attempt to ground policy discussions with as accurate empirical data and the most scientifically sound analysis possible. The identification of P2P file sharing traffic is challenging from a scientific perspective. In contrast to first-generation P2P networks which used well-defined port numbers, current P2P applications have the ability to disguise their existence through the use of arbitrary ports (application identifiers). As a result, reliable estimates of P2P traffic require examination of packet payload, a methodological land mine from legal and privacy perspectives. Indeed, access to user payload is often rendered impossible by these factors, inhibiting trustworthy estimation of P2P traffic growth and dynamics. To deal with these issues, CAIDA has developed a systematic methodology to identify P2P flows at the transport layer , i.e., based on connection patterns of P2P networks, without relying on packet payload. We believe our approach is the first method for characterizing P2P traffic using only knowledge of network dynamics rather than any user payload. To evaluate our methodology, we also developed a payload technique for P2P traffic identification, by reverse engineering and analyzing the nine most popular P2P protocols, and demonstrating its efficacy with the discovery of P2P protocols in our traces that were previously unknown to us. Our results, including a follow-up study , demonstrate that P2P traffic continues to grow unabatedly, contrary to claims made in the popular media [55,56]. The availability of neutral data sources and objective analyses from the most aggregated, statistically multiplexed points in the network, i.e., the core backbones, will inform one of the most important public policy questions of the 21st century: will either litigious or technical (DRM) approaches succeed in thwarting the explosion of P2P file sharing on the global Internet?
3.4 Support for research into future Internet architecturesAs the National Science Foundation considers its role in supporting the research and development of new and innovative Internet architectures [59,60], it will be important to draw on lessons that we have learned about the current Internet, in particular its persistent weaknesses, of which measurement is a huge one. It would be unwise to undertake such an ambitious venture without clearly identifying the roots of the problems with the current Internet. Research areas include: validating or refuting [implicit] assumptions about the current network (traffic, naming, routing, security) that are driving its evolution; and applying what we have learned from Internet measurement to the design of new network architectures, including how to facilitate the kind of measurement needed to support architectural goals . Without applied experience with real-world Internet measurement, researchers will be addressing such questions in a vacuum. The proposed infrastructure will allow a larger fraction of the research community access to data that would inform discussion of measurement questions that are increasingly relevant to not just the Internet, but future large-scale networks.
4 Limitations of proposed infrastructureWe recognize that even if this project is funded, it will only facilitate insights into small pieces of the larger picture. The proposed infrastructure does not cover wireless data, IGP data, traffic matrix data. The active probing will run into the same methodological problems that all probing does: filtering, layer-2 technologies that hide layer 3 information, e.g., MPLS, and inconsistent non-standard behavior in responding to probes that can mislead topology inferences. But ten years of Internet research has made it clear that gathering enough data to improve the state of Internet science at a broad scale would take substantially more funding than CISE has available, so for now we seek strategic areas that can offer us the greatest potential for a wide range of scientific progress at the lowest cost to the taxpayers.
- Cooperative Association of Internet Data Analysis, ``CAIDA Internet Data Repository.''
- M. Crovella and J. Michel, ``NSF sponsored workshop: Community-Oriented Network Measurement Infrastructure.'' https://www.caida.org/workshops/conmi/, March 2005.
- D. of Homeland Security, ``PREDICT project: Protected Repository for Defense of Infrastructure against Cyber Threats.'' http://www.predict.org/.
- CAIDA, ``skitter active measurement tool.'' https://www.caida.org/tools/measurement/skitter.
- L. Peterson, T. Anderson, D. Culler, and T. Roscoe, ``A blueprint for introducing disruptive technology into the Internet,'' in Hotnets, pp. 59-64, 2002.
- D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris, ``Resilient overlay networks,'' in SOSP, pp. 131-145, 2001.
- Y. Shavitt and E. Shir, ``DIMES: Let the Internet Measure Itself,'' tech. rep., Tel-Aviv University EE Department, 2005.
- S. Kalidindi and M. J. Zekauskas, ``Surveyor: An infrastructure for Internet performance measurements,'' in INET'99, June 1999.
- ``Active Measurement Project.'' http://amp.nlanr.net/.
- V. Paxson, A. Adams, and M. Mathis, ``Experiences with NIMI,'' in Passive and Active Measurement, Apr. 2000.
- J. I. Alvarez-hamelin, A. Barrat, M. Crovella, B. Donnet, T. Friedman, M. Latapy, P. Raoult, and A. Vespignani, ``Traceroute@home project,'' August 2005.
- Y. Benkler, ``Coase's penguin, or, linux and the nature of the firm,'' The Yale Law Journal, vol. 112, 2002.
- CAIDA, ``Internet Measurement Data Catalog Project.'' http://www.datcat.org/.
- S. Floyd, ``Requirements for Simulation and Modeling Tools,'' August 2005.
- S. Floyd, ``Questions about the Internet,'' May 2002.
- S. Floyd and E. Kohler, ``TCP Friendly Rate Control (TFRC) for Voice: VoIP Variant,'' July 2005.
- M. Faloutsos, P. Faloutsos, and C. Faloutsos, ``On power-law relationships of the Internet topology,'' in ACM SIGCOMM, pp. 251-262, 1999.
- H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, ``Network topology generators: Degree-based vs. structural,'' in ACM SIGCOMM, pp. 147-159, 2002.
- Q. Chen, H. Chang, R. Govindan, S. Jamin, S. J. Shenker, and W. Willinger, ``The origin of power laws in Internet topologies revisited,'' in IEEE INFOCOM, 2002.
- H. Chang, S. Jamin, and W. Willinger, ``Internet connectivity at the AS level: An optimization driven modeling approach,'' in Proceedings of MoMeTools, 2003.
- R. Albert and A.-L. Barabási, ``Statistical mechanics of complex networks,'' Reviews of Modern Physics, vol. 74, pp. 47-97, 2002.
- S. N. Dorogovtsev and J. F. F. Mendes, Evolution of Networks: From Biological Nets to the Internet and WWW. Oxford: Oxford University Press, 2003.
- National Laboratory for Applied Network Research. http://www.nlanr.net/.
- David Meyer, ``University of oregon route views project.'' http://www.routeviews.org/.
- Y. Hyun, A. Broido, and k claffy, ``Traceroute and BGP AS path incongruities,'' in Cooperative Association for Internet Data Analysis (CAIDA), 2003. https://www.caida.org/publications/papers/2003/ASP/.
- Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz, ``Towards an accurate AS-level traceroute tool,'' in ACM SIGCOMM, 2003.
- G. Siganos, M. Faloutsos, P. Faloutsos, and C. Faloutsos, ``Power-laws and the AS-level Internet topology,'' ACM/IEEE Transactions on Networking, vol. 11, no. 4, pp. 514-524, 2003.
- T.Bu and D. Towsley, ``On distinguishing between Internet power law topology generators,'' in IEEE INFOCOM, 2002.
- W. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker, ``Scaling phenomena in the Internet: Critically examining criticality,'' PNAS, vol. 99, no. Suppl. 1, pp. 2573-2580, 2002.
- S. Zhou and R. J. Mondragon, ``Towards modelling the Internet topology - the Interactive Growth Model,'' in Proceedings of the 18th International Teletraffic Congress (ITC18), (Berlin), 2003. http://arxiv.org/abs/cs.NI/0303029.
- A. Vázquez, R. Pastor-Satorras, and A. Vespignani, ``Internet topology at the router and Autonomous System level,'' http://arxiv.org/abs/cond-mat/0112400.
- A. Vázquez, R. Pastor-Satorras, and A. Vespignani, ``Large-scale topological and dynamical properties of the Internet,'' Physical Review E, vol. 65, no. 06, p. 066130, 2002. http://arxiv.org/abs/cond-mat/0112400.
- A. Capocci, G. Caldarelli, R. Marchetti, and L. Pietronero, ``Growing dynamics of Internet providers,'' Physical Review E, vol. 64, p. 35105, 2001.
- S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes, ``Pseudofractal scale-free web,'' Physical Review E, vol. 65, no. 06, p. 066122, 2002.
- S.-H. Yook, H. Jeong, and A.-L. Barabási, ``Modeling the Internet's large-scale topology,'' PNAS, vol. 99, pp. 13382-13386, 2002.
- K.-I. Goh, B. Kahng, and D. Kim, ``Fluctuation-driven dynamics of the Internet topology,'' Physical Review Letters, vol. 88, p. 108701, 2002.
- G. Caldarelli, A. Capocci, P. D. L. Rios, , and M. A. M. noz, ``Scale-free networks from varying vertex intrinsic fitness,'' Physical Review Letters, vol. 89, p. 258702, 2002.
- G. Caldarelli, P. D. L. Rios, and L. Pietronero, ``Generalized Network Growth: from microscopic strategies to the real Internet properties.'' http://arxiv.org/abs/cond-mat/0307610.
- Emanuele Giovannetti and Alessio D'Ignazio and Joerg Lepler, `` Report on Vertical and Geographical Market Boundaries for the European Internet ,'' tech. rep., University of Cambridge CoCombine Project Report, 2005.
- T. Anderson and D. Wetherall, ``A shared facility for internet reverse engineering,'' 2004. NSF awarded NeTS proposal.
- N. Spring, D. Wetherall, and T. Anderson, ``Reverse engineering the internet,'' SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp. 3-8, 2004.
- A. Shriram, M. Murray, Y. Hyun, N. B. e, A. Broido, M. Fomenkov, and k claffy, ``Comparison of Public End-to-end Bandwidth Estimation Tools on Hig h-Speed Links,'' in PAM 2005, to appear, Apr. 2005.
- R. Mahajan, N. Spring, D. Wetherall, and T. Anderson, ``User-level internet path diagnosis,'' in SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, (New York, NY, USA), pp. 106-119, ACM Press, 2003.
- L. Gao and F. Wang, ``Inferring and characterizing internet routing policies,'' in ACM SIGCOMM Internet measurement workshop, april 2003.
- CAIDA, ``As-level topology data extracted from continuous traceroute (skitter) measurements.''
- CAIDA, ``Router-level topology data extracted from continuous traceroute (skitter) measurements.''
- P. Mahadevan, D. Krioukov, M. Fomenkov, B. Huffaker, X. Dimitropoulos, and kc claffy, ``Lessons from three views of the internet topology: Technical report,'' tech. rep.
- N. Spring and R. Mahajan, ``rocketfuel: an ISP topology mapping engine,'' 2002. http://www.cs.washington.edu/research/networking/rocketfuel/.
- R. Teixeira, K. Marzullo, S. Savage, and G. M. Voelker, ``In search of path diversity in isp networks,'' in IMC '03: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (New York, NY, USA), pp. 313-318, ACM Press, 2003.
- C. Estan, K. Keys, D. Moore, and G. Varghese, ``Building a better netflow,'' in SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (New York, NY, USA), pp. 245-256, ACM Press, 2004.
- N. G. Duffield and M. Grossglauser, ``Trajectory sampling for direct traffic observation,'' in SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (New York, NY, USA), pp. 271-282, ACM Press, 2000.
- CAIDA, ``Ietf PSAMP working group.''
- CAIDA, ``Ranking of internet service providers by observed topology,'' 2005.
- X. Dimitropoulos, D. Krioukov, B. Huffaker, kc claffy, and G. Riley, ``Inferring as relationships: Dead end or lively beginning?,'' in 4th Workshop on Efficient and Experimental Algorithms, 2005.
- PC World, ``Are the RIAA's Lawsuits Working?,'' January 2004.
- Pew Internet Life, ``The RIAA lawsuits against online music file sharers appear to have had a devastating impact,'' January 2004.
- Thomas Karagiannias and Andre Broido and Michalis Faloutsos and kc claffy, ``Transport Layer Identification of P2P Traffic,'' in Internet Measurement Conference, October 2004.
- Thomas Karagiannias and Andre Broido and Nevil Brownlee and Michalis Faloutsos and kc claffy, ``Is P2P dying or just hiding,'' in Globecom, November 2004.
- N. workshop report, ``Overcoming barriers to disruptive innovation in networking,'' tech. rep., January 2005.
- M. Baard, ``Net pioneer wants new internet,''
- ``email@example.com, mailing list for discussion of Future Internet Measurement Architectures.''
- CAIDA. https://www.caida.org/publications/papers/.
- Emile Aben, ``Whale, CAIDA's data set catalog management software,'' August 2005.
- CAIDA, ``Caidabbatical program.'' https://www.caida.org/home/jobs/index.xml#caidabbatical.xml.
Footnotes:1We acknowledge that CAIDA had a larger goal of stimulating the formation of an industry-wide neutral body empowered (by its constituent members) to serve as a clearinghouse for analysis and aggregation of potentially sensitive data into formats safe for sharing, as well as to take macroscopic Internet measurements to quantify performance and workload dynamics and trends. Not only did CAIDA not succeed at this loftier goal, but several other attempts at organized data-sharing consortiums, including by non-regulatory federal government agencies, have failed as well, for similar reasons. Namely, while technical measurement challenges exist, the non-technical aspects (legal, economic, privacy, ethical) quickly became, and have remained for a decade, the persistent obstacles to progress in this area. 2There are exceptions for researchers who worked directly for a backbone ISP, e.g., Sprint, ATT, but the number of such researchers has diminished over the years due to the meager financial situation of the ISPs.
File translated from TEX by TTH, version 2.78.
On 24 Mar 2006, 10:28.