[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A characterization of broadband user behavior and their e-business activities

Published: 01 December 2004 Publication History

Abstract

This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the characterization is performed along four criteria: (i) session arrival process, (ii) session duration, (iii) number of bytes transferred within a session and (iv) user request patterns.Our results show that both residential and SOHO session inter-arrival times are exponentially distributed. Whereas residential session arrival rates remain relatively high during the day, SOHO session arrival rates vary much more significantly during the day. On the other hand, a typical SOHO user session is longer and transfers a larger volume of data. Furthermore, our analysis uncovers two main groups of session request patterns within each user category. The first group consists of user sessions that use traditional Internet services, such as e-mail, instant messenger and, mostly, www services. On the other hand, sessions from the second group, a smaller group, use typically peer-to-peer file sharing applications, remain active for longer periods and transfer a large amount of data. Looking further into the e-business services most commonly accessed, we found that subscription-based and advertising services account for the vast majority of user HTTP requests in both residential and SOHO workloads. Understanding these user behavior patterns is important to the development of more efficient applications for broadband users.

References

[1]
Netflow. www.cisco.com/warp/public/732/Tech/netflow.]]
[2]
The broadband difference. Pew & American Life, 2004. www.pewinternet.org.]]
[3]
M. Arlitt. Characterizing web user sessions. ACM SIGMETRICS Performance Evaluation Review, 28(2):50--56, Sep. 2000.]]
[4]
M. Arlitt, R. Friedrich, and T. Jin. Workload characterization of a web proxy in a cable modem environment. Technical Report HPL-1999-48, Internet Systems and Applications Laboratory - HP Laboratories Palo Alto, Apr. 1999.]]
[5]
M. Arlitt and T. Jin. Workload characterization of the 1998 world cup web site. IEEE Network, 14(3):30--37, May/Jun 2000.]]
[6]
P. Barford, A. Bestavros, A. Bradley, and M. E. Crovella. Changes in web client access patterns: characteristics and caching implications. World Wide Web, Special Issue on Characterization and Performance Evaluation, 2(1-2):15--28, 1999.]]
[7]
C. Costa, I. Cunha, A. Borges, C. Ramos, M. Rocha, J. Almeida, and B. Ribeiro-Neto. Analyzing client interactivity in streaming media. In Proceedings 13th World Wide Web Conference, New York, NY, May 2004.]]
[8]
C. R. Cunha, A. Bestravos, and M. E. Crovella. Characteristics of www client-based traces. Technical Report TR-95-010., Department of Computer Science - Boston University, 1995.]]
[9]
S. Floyd and V. Paxson. Difficulties in simulating the internet. IEEE/ACM Transactions on Networking, 9(4), Aug. 2001.]]
[10]
K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19), Bolton Landing, NY, Oct. 2003.]]
[11]
T. Hamada, K. Chujo, T. Chujo, and X. Yang. Peer-to-peer traffic in metro networks: analysis, modeling and policies. IEEE/IFIP Network Operations & Management Symposium (NOMS 2004), Apr. 2004.]]
[12]
K. Lakshminarayanan and V. Padmanabhan. Some findings on the network performance of broadband hosts. Internet Measurement Workshop (IMC'03), pages 45--50, Oct. 2003.]]
[13]
N. Leibowitz, M. Ripeanu, and A. Wierzbicki. Deconstructing the kazaa network. 3rd IEEE Workshop on Internet Applications (WIAPP'03), Jun. 2003.]]
[14]
D. Menascé and V. Almeida. Scaling for E-business: technologies, models, performance and capacity planning. Pretice Hall, Upper Saddle River - NJ, 2000.]]
[15]
M. A. Rappa. The utility business model and the future of computing services. In IBM Systems Journal, 43(1):32--42, 2004.]]
[16]
C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865. IETF, June 2000.]]
[17]
C. Rigney. Radius Accounting. RFC 2866. IETF, June 2000.]]
[18]
S. Saroiu, K. Gummadi, R. Dunn, S. Gribble, and H. Levy. An analysis of internet content delivery systems. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Dec. 2002.]]
[19]
S. Sen and J. Wang. Analyzing peer-to-peer traffic across large networks. In Proceedings of the second ACM SIGCOMM Workshop on Internet Measurment Workshop, Marseille, France, Nov. 2002.]]
[20]
K. Trivedi. Probability & Statistics with Reliability, Queueing, and Computer Science Applications. 2nd edition, John Wiley & Sons, 2002.]]
[21]
K. Tutschku. A Measurement-based Traffic Profile of the eDonkey Filesharing Service. In Proc. of the 5th Passive and Active Measurement Workshop (PAM 2004), Antibes Juan-les-Pins, France. April 19-20, 2004.]]
[22]
E. Veloso, V. Almeida, W. Meira, A. Bestravos, and S. Jin. A hierarchical characterization of a live streaming media workload. In Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002.]]

Cited By

View all
  • (2017)Challenges in the Analysis of Online Social NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4712-397:3(4015-4061)Online publication date: 1-Dec-2017
  • (2014)An Improved Community Partition Algorithm Integrating Mutual InformationJournal of Networks10.4304/jnw.9.9.2289-22989:9Online publication date: 7-Sep-2014
  • (2012)Time-of-Day Analysis of Web User in CDMA Network2012 8th International Conference on Wireless Communications, Networking and Mobile Computing10.1109/WiCOM.2012.6478723(1-6)Online publication date: Sep-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMETRICS Performance Evaluation Review
ACM SIGMETRICS Performance Evaluation Review  Volume 32, Issue 3
December 2004
51 pages
ISSN:0163-5999
DOI:10.1145/1052305
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2004
Published in SIGMETRICS Volume 32, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Challenges in the Analysis of Online Social NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4712-397:3(4015-4061)Online publication date: 1-Dec-2017
  • (2014)An Improved Community Partition Algorithm Integrating Mutual InformationJournal of Networks10.4304/jnw.9.9.2289-22989:9Online publication date: 7-Sep-2014
  • (2012)Time-of-Day Analysis of Web User in CDMA Network2012 8th International Conference on Wireless Communications, Networking and Mobile Computing10.1109/WiCOM.2012.6478723(1-6)Online publication date: Sep-2012
  • (2012)A Novel Mobility Model for Clustered MANET2012 8th International Conference on Wireless Communications, Networking and Mobile Computing10.1109/WiCOM.2012.6478340(1-4)Online publication date: Sep-2012
  • (2012)Characterization of ISP Traffic: Trends, User Habits, and Access Technology ImpactIEEE Transactions on Network and Service Management10.1109/TNSM.2012.022412.1101849:2(142-155)Online publication date: Jun-2012
  • (2012)Sequential analysis of the web access state2012 IEEE 14th International Conference on Communication Technology10.1109/ICCT.2012.6511414(850-854)Online publication date: Nov-2012
  • (2011)CDMA mobile internet user behavior analysis based on RP interfaceProceedings of the 2011 international conference on Web information systems and mining - Volume Part I10.5555/2045561.2045580(114-123)Online publication date: 24-Sep-2011
  • (2011)On the Benefits of Planning and Grouping Software Maintenance RequestsProceedings of the 2011 15th European Conference on Software Maintenance and Reengineering10.1109/CSMR.2011.10(55-64)Online publication date: 1-Mar-2011
  • (2011)Characterization of the busy-hour traffic of IP networks based on their intrinsic featuresComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2011.02.01555:9(2111-2125)Online publication date: 1-Jun-2011
  • (2011)CDMA Mobile Internet User Behavior Analysis Based on RP InterfaceWeb Information Systems and Mining10.1007/978-3-642-23971-7_17(114-123)Online publication date: 2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media