2019
DOI: 10.1145/3322205.3311090
|View full text |Cite
|
Sign up to set email alerts
|

Retroactive Packet Sampling for Traffic Receipts

Abstract: Is it possible to design a packet-sampling algorithm that prevents the network node that performs the sampling from treating the sampled packets preferentially? We study this problem in the context of designing a "network transparency" system. In this system, networks emit receipts for a small sample of the packets they observe, and a monitor collects these receipts to estimate each network's loss and delay performance. Sampling is a good building block for this system, because it enables a solution that is fl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…When the governance confirms that all the devices are assigned as per the SLA, further investigations of throughput degradation due to problems such as link failure and packet drop/loss should be carried out. As BEAT is focused fundamentally on resource assignment, service degradation due to other copiously discussed factors such as packet loss and delay [17] [27], prioritisation attacks [28] and devices intentionally dropping packet [29] are out of scope for this work, and we leave these details for future enhancements. Nevertheless, the throughput and packet loss per device can still be calculated with the timestamps in the receipts (ts) and proofs (tr).…”
Section: Interrogation Protocolmentioning
confidence: 99%
“…When the governance confirms that all the devices are assigned as per the SLA, further investigations of throughput degradation due to problems such as link failure and packet drop/loss should be carried out. As BEAT is focused fundamentally on resource assignment, service degradation due to other copiously discussed factors such as packet loss and delay [17] [27], prioritisation attacks [28] and devices intentionally dropping packet [29] are out of scope for this work, and we leave these details for future enhancements. Nevertheless, the throughput and packet loss per device can still be calculated with the timestamps in the receipts (ts) and proofs (tr).…”
Section: Interrogation Protocolmentioning
confidence: 99%
“…ERSPAN [33,34,11] and INT [16,35] can potentially achieve full-visibility, but suffer from granularity-cost trade-off. Their bandwidth and processing overhead grow quickly with the scale of the network.…”
Section: Related Workmentioning
confidence: 99%
“…When the governance confirms that all the devices are assigned as per the SLA, further investigations of throughput degradation due to problems such as link failure and packet drop/loss should be carried out. As BEAT is focused fundamentally on resource assignment, service degradation due to other copiously discussed factors factors such as packet loss and delay [17] [22], prioritisation attacks [23] and devices intentionally dropping packet [24] are out of scope for this work, and we leave these details for future enhancements. Nevertheless, the throughput and packet loss per device can still be calculated with the timestamps in the receipts (𝑡𝑠) and proofs (𝑡𝑟).…”
Section: Interrogation Protocolmentioning
confidence: 99%