SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Network traffic locality in a rural African village

              D.L. Johnson, Elizabeth M. Belding,                                                 Gertjan van Stam
                  University of California, Santa Barbara                                       Linknet, Macha, Zambia
                    davidj,ebelding@cs.ucsb.edu                                       gertjan.vanstam@machaworks.org




ABSTRACT                                                                            1. INTRODUCTION
The Internet is evolving from a system of connections be-                              The Internet has evolved both in terms of size and appli-
tween humans and machines to a new paradigm of social con-                          cation since its birth in the early 1990s. Recent studies have
nection. However, it is still dominated by a hub and spoke                          shown that the average web page size in 2011 is 48 times
architecture with inter-connectivity between users typically                        larger than the average size in 1995 (14.12K in 1995 [3] and
requiring connections to a common server on the Internet.                           679K in 2011 [14]). There is an increasing amount of off-PC
This creates a large amount of traffic that must traverse an                          storage and processing using cloud computing for services
Internet gateway, even when users communicate with each                             such as navigation, photo sharing and file hosting. Many
other in a local network. Nowhere is this inefficiency more                           applications that in the past were run on a user’s operating
pronounced than in rural areas with low-bandwidth connec-                           system, such as email, word processors and instant message
tivity to the Internet. Our previous work in a rural village in                     clients, are now run on web browsers. These features have
Macha, Zambia showed that web traffic, and social network-                            brought users in developed countries closer to the vision of
ing in particular, are dominant services. In this paper we use                      “anywhere any-time” computing, where devices connected to
a recent network trace, from this same village, to explore the                      high speed Internet connections delegate computing power
degree of local user-to-user interaction in the village. Extrac-                    and storage capacity to cloud computing services. However,
tion of a social graph, using instant message interactions on                       what is not clear are the implications for users in develop-
Facebook, reveals that 54% of the messages are between lo-                          ing regions where Internet access speeds of between 128kbps
cal users. Traffic analysis highlights that the potential spare                       and 256kbps are common, as was typical of dial-up users of
capacity of the local network is not utilized for direct local                      the 1990s.
communication between users even though indirect commu-                                One of the key consequences of web-based computing is
nication between local users is routed through services on                          an increase in traffic load. In the rural villages we have
the Internet. These findings build a strong motivation for a                         studied in Zambia [6], there can be as many as 60 concur-
new rural network architecture that places services that en-                        rent users sharing a single relatively slow satellite link. As
able user-to-user interaction and file sharing in the village.                       a result, web-applications become increasingly slow, to the
                                                                                    point where they are unusable. We have seen that social
                                                                                    networking is the most popular web application in the vil-
Categories and Subject Descriptors                                                  lage of Macha, Zambia and users share messages, pictures,
C.2.2 [Computer-Communications Networks]: Network                                   music and software with each other, where the sender and
Protocols-Applications; C.4 [Performance of Systems]:                               recipient are often in the same village. When a user shares
Measurement Techniques                                                              an object with another user in the same village using an off-
                                                                                    PC storage server such as Facebook or Dropbox, the same
                                                                                    file traverses the slow satellite gateway twice: once as it is
General Terms                                                                       uploaded to the server, and again as it is downloaded to the
Measurement, Performance                                                            recipient. This leads to congestion of an already constrained
                                                                                    satellite link.
                                                                                       The most widely used solution to deal with inefficiencies in
Keywords                                                                            this centralized model is to use peer-to-peer (P2P) network-
Rural network, Social network, Traffic analysis, Developing                           ing. Bittorrent is an example of a popular P2P networking
regions, Measurement                                                                protocol and accounts for between 27% to 55% of Internet
                                                                                    traffic, depending on geographic location [13]. Bittorrent
                                                                                    works on the principle of “tit for tat” in which users may
                                                                                    not download content faster than they can upload content.
Permission to make digital or hard copies of all or part of this work for           Peers are always located outside the local network, rendering
personal or classroom use is granted without fee provided that copies are           Bittorrent unusable or extremely slow due to the limited ca-
not made or distributed for profit or commercial advantage and that copies
                                                                                    pability of the satellite link. Although we found only traces
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific   of P2P traffic (1% of total aggregate traffic passing through
permission and/or a fee.                                                            gateway) it did account for a surprising portion of traffic
ICTD2012 2012 Atlanta, GA, USA                                                      with large outbound flows (35% of all outbound flows greater
Copyright 2012 ACM 978-1-4503-1045-1/12/03 ...$10.00.
than 100KB). Many users in Macha use Skype, which also            extensive analysis of performance and traffic characteriza-
uses P2P networking. A large portion of these large P2P           tion in Macha, Zambia in 2010 [6, 7]. This work highlighted
outgoing flows may be Skype traffic, which is difficult to             some negative effects of the satellite link, such as high round
distinguish from Bittorrent traffic. We found no evidence of        trip times that lead to web request time-outs. We analyzed
P2P traffic being directly routed between two local users as        usage patterns and found that the most commonly used ser-
most local users have no direct network routes to each other      vice is social networking; we have since confirmed that this
and super-peers — well provisioned nodes for routing P2P          usage pattern continued into 2011 (see Figure 3). In this
traffic — are always located non-locally. Clearly traditional       paper we analyze these social interactions in the network to
P2P networking has not been the panacea to save Internet          study the level of local interactivity between users in the
gateway bandwidth in rural networks.                              village.
   In order to find a more well suited solution to the ineffi-          More recent work to improve Internet usability in rural
ciencies of centralized web access, we analyse the locality of    regions has been done by Chen et al [1, 2]. In [1], an asyn-
interest in the Macha network and its potential to save gate-     chronous queuing model was used where users can queue
way bandwidth. We carry out two tasks in this study. The          web requests as well as a cache search feature with predic-
first task is to measure the strength of social connections in     tive text. Users responded positively even though a custom
the village of Macha by extracting a social graph from Face-      web frame was used to search a local cache or queue content.
book instant message chat. This helps us to understand            In [2], a browser plugin was used to pre-fetch pages and
the potential of users to share information and files. The         serve stale cached pages. This achieved an average accelera-
second task is to measure the fraction of local traffic sent di-    tion of 2.8x for users browsing non-video web pages. These
rectly between users without the use of the Internet, or the      results bode well for interventions that may need the web
fraction of traffic being used to upload content to Internet        access paradigm to be modified somewhat. Our study looks
file-sharing services in order to determine how effectively or      at traffic locality in a rural network and its implications on
ineffectively users are utilizing the local network.               improving network performance and, as such, represents an-
   To this end we collected traffic traces over a period of         other tool in the toolbox of techniques to improve network
two months in Macha, Zambia that includes all local traffic         performance in rural regions.
within the network and all traffic to and from the Inter-              A recent media and society study of the localization in the
net. Facebook instant messaging was common in our trace;          Internet highlights the fact that as the Internet continues to
however there was no direct local file sharing and a very          grow, it is becoming “more local” [12]. This phenomena is
small fraction of traffic using file synchronizations (0.94%)        beginning to blur the boundaries between online and offline
or file sharing services (0.65%). We believe this is due to the    social domains, and it is this trend that demands a localiza-
poor nature of the network and the relatively high cost of        tion approach to network design, especially in isolated rural
bandwidth ($30/GB) rather than a desire not to share these        communities.
objects; on-line interviews substantiate this hypothesis.            There are many studies on social network interactions,
   Our interaction graphs of Facebook instant message chats       both at a structural level using friend lists and at an inter-
reveal that 54% of chats are between local users in the vil-      action level using wall posts [8, 11]. Wilson et al argue that
lage, even though only 35% of the observed users were local       social links created by friend lists are not valid indicators
to the village. We also find that people who travel to ar-         of user interactions [15]. This is shown by the fact that the
eas outside the village are strong sources and sinks for local    number of “friend adds” account for 45% of the activity per
information exchange. We extract other statistics, such as        day whereas comments only account for 10% of the activity.
social degree and clustering coefficients, for the social graph.    Interestingly the common notion of small-world clustering,
Packet flows are analysed to understand the percentage of          which is present in a social graph derived from “friend adds”,
traffic sent directly between users in the village and via cen-     is absent from the interaction graph. Our work captures the
tral web servers. Finally, we correlate some of our findings       physical locality of the users, which adds a new dimension
with on-line interviews that were collected from 77 users in      to interaction graph analysis.
the village from a wide range of age groups.                         Locality of interest has been primarily studied in the do-
   Other than interesting anthropological inferences from this    main of peer-to-peer networks. For example, a semantic
analysis, there are many technical implications. The high         clustering technique is employed by Handurukande et al in [5].
degree of local conversation provides strong motivation for       The semantic relationship is either implicit, using informa-
an automated localization engine that is able to intercept        tion such as peer-history, or explicit, using meta-information
content for local users and re-route it directly to a local       about the file, such as whether it is music or video. In a rural
user rather than traversing the satellite link. Relocating ser-   village, a P2P mechanism that first looks for a peer in a lo-
vices that enable user-to-user interaction from the Internet      cal subnet may be a possible solution to making file sharing
to servers in the local village is also promising for improving   more efficient.
local performance.
                                                                  3. MACHA NETWORK
2.   RELATED WORK                                                    Macha, Zambia, highlighted in Figure 1, is a resource-
   There is a small set of studies that examine traffic usage in    limited rural area in Africa with scattered homesteads, very
rural networks. One of the first studies on Internet caf`s and
                                                       e          little infrastructure, and people living a subsistence lifestyle;
kiosks in rural regions in Cambodia and Ghana [4] revealed        the primary livelihood is maize farming. Like many sub-
that many web applications — often monolithic in nature —         Saharan rural communities, Macha has a concentrated cen-
are poorly suited for low bandwidth environments and sug-         tral area, and a large, geographically dispersed rural commu-
gest smart proxies on either end of the bandwidth-limited         nity with a sparse population. Macha Works, through the
link to reduce bandwidth usage. Our previous work includes        LinkNet project, has deployed a wireless network that pro-
Figure 1: Location of Macha in the southern province of
Zambia.

vides connectivity to approximately 300 community workers
                                                                  Figure 2: A simplified model of the network architecture in
and visitors living around a mission hospital and medical
                                                                  the Macha network. All traffic in the village passes through
research institute using a satellite-based Internet connec-
                                                                  a bridge. Four types of possible traffic are highlighted. All
tion [9]. The majority of users access the Internet at work
                                                                  traffic types are captured by our monitor server.
but half the users access the Internet in their homes.
   The satellite connection has a committed download speed
of 128 kbps bursting to 1 Mbps and a committed upload               Over the course of two months (February and March 2011),
speed of 64 kbps bursting to 256 kbps with no monthly max-        we captured traces of all traffic passing through the bridge,
imum. The total monthly cost of the C-band VSAT satellite         which connects all machines in the network, using tcpdump.
connection is $1200 (US dollars). Internet access is based on     The total traffic collected is 250 GB and is stored as multiple
a pay-as-you-go model. Users buy voucher-based data bun-          pcap formatted files.
dles at a cost of $30 for 1GB or 31 days (whichever expires
first). The community has a large enough user base to make         4.2 Data characteristics
the sale of Internet access vouchers sustainable in a ‘not-for-      As described earlier, one of our main goals is to determine
profit’ and ‘not-for-loss’ environment. There are, however,        the quantity of traffic, from the Macha trace, between two
many frustrated users due to the poor network performance,        local machines in the village. This is trivial to determine
particular during peak usage times.                               for traffic sent directly between two machines by checking
                                                                  whether the source and destination IP address are both in
4.   DATA COLLECTION AND PROCESSING                               the local village subnet. However, determining this for traffic
                                                                  that passes through an Internet server is far more difficult.
4.1 Data collection                                               Hence, we need to compare uplink and downlink flows to
   A simplified model of the network in the Macha commu-           look for similar patterns leaving and entering the network.
nity in Zambia is depicted in Figure 2. Computers are con-        These patterns are characterized by features such as IP ad-
nected through a bridged wireless network to the gateway,         dresses, port numbers flow sizes, content headers and, when
which is connected to the Internet through a slow satellite       these are not sufficient, features unique to specific objects,
link. All traffic in the network passes through the bridge          such as colour distribution in images. This traffic may be
that is monitored passively by a data collector. This allows      real-time, as in the case of VOIP calls or instant messaging,
us to capture all local traffic as well as traffic to the Internet.   or it may be non-real time when using a file sharing service,
   Local or non-local direct links between machines using         for example.
services such as secure copy are very rare in networks with-         Real-time traffic between two local machines routed through
out advanced computer users and we found no evidence of           an Internet server is relatively simple to detect using IP ad-
this traffic. P2P traffic also creates direct links between ma-       dress pairs for flow classification. Returning to Figure 2, if
chines and is common amongst many users in the developed          Client 1 routes a real-time connection to Client 2 through
world (between 42.51% and 69.95% in 2008/2009 [13]), but          CDN 1, there will be a steady stream of packets from Client
because of the high cost of data and low bandwidth capac-         1 to CDN 1 through the gateway. This same stream of pack-
ity, it makes up a small portion of traffic in Macha (1% of         ets will appear from CDN 1 to Client 2 within a time-window
total aggregate traffic). The majority of traffic is either to        typical of the round trip time of the satellite link. If two dif-
and from an Internet web server or between two local clients      ferent CDN servers are used, as is also shown in Figure 2,
through an Internet web service. When using a web service         the CDN domain, rather than IP addresses can be used as a
like Facebook, a content delivery network (CDN) is typically      flow feature. For example, two Facebook CDN’s for IM traf-
employed to receive and deliver content. As shown in Fig-         fic could be “im-a.ak.fbcdn.net” and “im-b.ak.fbcdn.net”; we
ure 2, it is fairly common for a user in the village (Client      would use the domain “fbcdn.net” rather than the IP address
1) to send a packet to a service like Facebook through a          to define the Internet server being used in the flow.
CDN (CDN 1) and for a different CDN (CDN 2) to deliver                The task becomes more challenging with non real-time
a packet to another user in the village (Client 2).               traffic where features such as IP addresses and flow lengths
*facebook.com                            15.76%
                                                              20.26%

                  *twitter.com                  11.47%
                                 0.24%

                 *google.com                  8.88%
                                            7.88%

             *postzambia.com          4.45%
                                      4.30%

                  *yahoo.com         3.91%
                                      4.65%

          *windowsupdate.com        2.54%
                                   1.63%

             lusakatimes.com       2.05%                                   2011 (Feb−Mar)
                                  1.56%
                                                                           2010 (Feb−Mar)
               doubleclick.net     1.93%
                                  1.01%
 Domain




                    cstv.com       1.66%
                                 0.53%

             quickbooks.com        1.58%
                                 0.57%

                        co.uk      1.55%
                                  0.96%

                  adobe.com        1.49%
                                 0.02%

                      *.co.zm     1.15%
                                            7.58%

                  *.yimg.com      1.47%
                                   2.03%                                                               Figure 4: Outgoing and incoming packets when sending an
                   *.msn.com     0.73%
                                   1.86%                                                               IM message in Facebook. (a) A message is typed on user A’s
*.googlesyndication.com          0.50%
                                  0.99%
                                                                                                       Facebook IM console. (b) The message is displayed on user
                *.ubuntu.com     0.10%                                                                 A’s Facebook IM dialogue area. (c) The message is displayed
                                 0.49%
                                                                                        38.79%
                                                                                                       on user B’s Facebook IM dialogue area. (d) A flow diagram
                         other                                                                43.44%
                                                                                                       of packets sent between client A and B and the Facebook
                                                    Fraction of requests                               CDN for each of the 3 events in (a),(b) and (c).

            Figure 3: Internet usage analysis in Macha, Zambia for
            February and March 2010 and 2011.
                                                                                                       cial networking site, gained a strong following. While consti-
                                                                                                       tuting only .24% of the network traffic in 2010, it has become
            may not be enough to correlate an upload with a down-                                      the second most popular web service in 2011. Considering
            load. For example, when using services that host pictures                                  that both Facebook and Twitter are social networking ser-
            or videos such as Picasa and Youtube, the hosting server will                              vices, social networking now accounts for almost three times
            compress or manipulate the object in some way, such that                                   the number of page visits compared with Google. The con-
            the uploaded object does not match the downloaded object.                                  tinued dominance of Facebook gives credence to our notion
            Fingerprinting can help solve this problem. For example, an                                that Facebook traffic is a good representation of social con-
            image can be fingerprinted using a histogram of colours and                                 nections in Macha, Zambia.
            will be immune to compression. However, a further compli-                                     Facebook instant message traffic was extracted by search-
            cation is introduced when encryption is employed, render-                                  ing for a header, unique to Facebook, in the HTML body of
            ing even fingerprinting techniques useless. In this study we                                the packets in our network trace. Although Facebook uses
            were only able to analyse flows between local machines and                                  a different schema for sending and receiving a packet during
            real-time flows employing an Internet service. Extracting lo-                               an IM conversation, we were able to simplify the analysis by
            cality in flows that have been manipulated or which employ                                  only analysing the incoming packets due to the inherent be-
            encryption is left as an exercise for future work. However to                              haviour shown in Figure 4. For every message transmitted,
            establish the potential quantity of local traffic using services                             the same message is sent back to both the sending user and
            on the Internet, we analyse the domains visited by large out-                              receiving user as it is displayed on the IM web client. To de-
            going flows, to establish whether web sites are being visited                               termine whether a conversation is local, we check whether we
            that enable sharing between users.                                                         receive two packets with the same user pair on two different
               We extract outgoing and incoming Facebook instant mes-                                  local machines (machines with different IP addresses).
            sages from the trace as the headers of instant messages travel
            in the network in plain text. They are also timestamped and
            can easily be associated with specific users, which makes it                                5. SOCIAL GRAPH ANALYSIS
            possible to build an interaction graph with temporal infor-                                   In this section, we present an analysis of a social graph
            mation embedded. We ensure privacy by anonymising the                                      built from instant messages sent in Facebook. We call this
            user names before performing our analysis.                                                 social graph an “interaction graph” as it captures the actual
                                                                                                       interactivity between users rather than passive links. In-
            4.3 Identifying local Facebook traffic                                                      stant messages represent the strongest possible relationship
               As mentioned in Section 2, we analysed Internet usage                                   linkage between users in Facebook as they indicate a one-
            statistics in 2010 and found that Facebook traffic accounted                                 to-one mapping between users, and they capture true user
            for the majority of traffic in the network. We carried out the                               interaction rather than passive relationships represented by
            same analysis using our new 2011 network trace and found                                   “friend adds” and wall posts. Previous studies support the
            that this trend continued; however, some new interesting us-                               notion of different levels of relationships in Facebook [15].
            age trends appeared. We compare the traffic analysis from                                    They showed that wall posts and photo comments represent
            2010 and 2011 traces in Figure 3. Although Facebook de-                                    a much stronger indication of relationship bonds between
            clined slightly from 20.26% to 15.76%, Twitter, another so-                                Facebook users than “friend adds”.
5.1 Social graph
   In order to understand the relationships between users
within and outside the village, we create a social graph that
captures users as nodes and conversations as edges. The
weight of the edge depicts the number of conversations in
the two month measurement period between two specific
users. Figure 5 shows the central section of the Facebook
interaction graph for the village. The graph has been ar-
ranged so that users who are well connected with each other
are closer to the centre. The color, as shown by the key,
depicts whether the user was always in the village, always
outside the village, or a traveller. Users were detected as
travellers when they originated a message both from within
and from outside the village during the trace. This was
possible to detect as users were tracked using Facebook IDs
rather than associated IP addresses, which are not persis-
tent. Figure 6 shows the edge of the interaction graph with
isolated communities of users, often having one to six local
village users, connecting up to 20 outside users.               Figure 6: A section on the periphery of the interaction
                                                                graph showing isolated communities of users.


                                                                     information brokers enabling the flow of information
                                                                     between users outside and inside the village.

                                                                   • There are surprisingly few cases of one external user
                                                                     connecting to many users in the village. One inter-
                                                                     pretation is that users who arrive in the village come
                                                                     from a diverse set of communities, where people in
                                                                     each community only know one person in the village.
                                                                     Another is that outside users who meet travellers from
                                                                     Macha tend to use only one person as their key contact
                                                                     or gatekeeper in the village.

                                                                   It is clear from this interaction graph that users in the
                                                                village form a very close knit community with stronger links
                                                                between other local users than to users outside the village.
                                                                However, the graph also reveals that Macha is not a homo-
                                                                geneous community. There is a small set of isolated indi-
Figure 5: Interaction graph for Facebook IM traffic showing       viduals and communities; on-the-ground observations reveal
users as nodes who either remain in the village, travel but     that these are often non-locals living in the village. The
return to the village or who are always outside the village.    presence of non-locals in the community is common due to
The edges denote conversations. Thicker edges indicate that     international visitors and relocations and rotation of Zam-
more instant messages were sent between users.                  bian health and education personnel nationwide.
                                                                   In order to understand the characteristics of this inter-
  There are a few key conclusions we can draw from these        action graph, such as the fraction of local messaging and
interaction graphs:                                             clustering, we now perform more detailed statistical analy-
                                                                sis.
   • There are key users in the village that act as strong
     links to the outside world. Often these key people are     5.2 Statistical analysis
     travellers. These users are easily identified by the fan       Over the two month measurement period 573 unique Face-
     shape motifs in the graph.                                 book users were identified, of which 140 were local users
                                                                who never left the village and 43 were users who travelled.
   • There are a number of isolated communities where the       There were 14,217 unique instant messages sent between 726
     majority of nodes are external, often linking to only      unique user pairs. Our analysis reveals that 54% of the in-
     one or two local users. From personal observations         stant messages were between local users in the village even
     made in the village, these are likely researchers who      though only 35% of the users were in the village, with 7.5%
     visit the village to carry out their research and col-     of these local users occasionally travelling. This shows that
     laborate with overseas colleagues and have very little     instant messaging is used extensively for intra-village com-
     online interaction with local people.                      munication.
                                                                   To understand the statistical distribution of these rela-
   • The strongest bonds (highest number of conversations)      tionships and messages among the users in the village, we
     are between local users, especially those that travel      plot the cumulative distribution function (CDF) of the social
     and key contact people. These users most likely form       degree between local users, and from local to external users
in Figure 7(a). Social degree is a measure of the number of                              1
edges connected to a node; this correlates to the number of                             0.9
                                                                                                                                 Local to local
users with which a specific user has communicated. Only                                  0.8
                                                                                                                                 Local to external
a local user’s perspective is shown as the social degree of                             0.7




                                                                    Fraction of Users
the external users cannot be fully known. We also plot the                              0.6
CDF of messages sent between local users, and from local                                0.5
to external users, in Figure 7(b).                                                      0.4
   Node degree between local users reveals a large number                               0.3
of small cliques and a small set of well connected commu-                               0.2
nity members who act as messenger hubs. Local users who                                 0.1
have connections with external users generally tend to have                              0
a large number of connections. 70% of local users have a                                      0   5     10     15        20         25      30        35
degree of 3 or less, compared to 7 or less for local to ex-                                                  Social Degree
ternal users. The average degree of a local user is 3.6 and
                                                                   (a) CDF of social degree between local Macha users in Facebook
the average degree from a local user to an external user is        and from local users to users outside Macha.
5.3. However, Figure 7(b) shows that local users send more
messages to each other than to external users even though
                                                                                         1
they have a lower node degree. Local to local user commu-
                                                                                        0.9
nication also has a heavier tail revealing a small subset of                                                                   Local to local
                                                                                        0.8
very active local users who message each other. Looking at                                                                     Local to external
                                                                                        0.7
the social graph, we see that well connected users are often




                                                                    Fraction of Users
                                                                                        0.6
also responsible for high message counts, confirming their
                                                                                        0.5
role as information brokers. These results confirm that it
                                                                                        0.4
is not enough to look at the connections between users in a
social graph. Interaction between users reveals the true be-                            0.3

havioural characteristics of users, and in our specific domain                           0.2
of interest, potential of users to interact locally.                                    0.1
   In order to understand the level of cohesiveness of users                             0
                                                                                              0   200    400        600       800        1000        1200
in the social graph, a number of social graph related metrics
                                                                                                         Number of messages sent
are employed:
                                                                   (b) CDF of instant messages between local Macha users in
   • Clustering coefficient measures the tendency of nodes           Facebook and from local users to users outside Macha.
     in a graph to cluster together. For a node with N
     neighbours and E edges between these neighbours, the
     clustering coefficient is (2E)/(N(N-1)). A higher clus-         Figure 7: Statistical distributions for all Facebook instant
     tering coefficient can be interpreted as nodes forming          messages sent in February and March 2011.
     tightly connected localized cliques with their direct
     neighbours.
                                                                   as we have an incomplete graph, with edges only extending
   • Average path length defines the number of edges                to the first tier of external users. This, together with the
     along the shortest path between all possible pairs of         clustering coefficient, provides further proof for a strongly
     nodes in the network. This measures the degree of             connected local community.
     separation between users. A lower average path length            The diameter of the local graph is 8 (average on facebook
     indicates a community that is closely connected and           is 9.8 [15] and average on Orkit is 9 [15]). Considering that
     through which information can spread quickly.                 this is a localized graph, the value is surprisingly high. This
   • Eccentricity of a graph is the maximum distance be-           is due to a set of outlier users who are weakly connected to
     tween any two nodes.                                          other users in the network (low social degree). They form a
                                                                   a category of users who do not use Facebook IM as a regular
   • Diameter is the maximum of all eccentricities.                means of communication and most likely use other channels
                                                                   such as different IM clients, SMS or email.
   The clustering coefficient is only measured for local users          From this social graph analysis, it is clear that the poten-
in the network as we do not have a complete picture of Face-       tial for local interaction, other than instant message interac-
book interaction for external users. This value effectively         tion captured in the social graph, is very high. If the infras-
measures the cohesiveness of the local community rather            tructure was supportive of local connectivity, users would
than checking for a “small-world effect” in the larger Face-        share music, pictures, videos and software as a natural con-
book community. The average clustering coefficient is 0.1            sequence of these relationships as is seen in well provisioned
(average on facebook is 0.164 [15]) for all the local nodes.       networks in developed countries. In the next section, we
Taking into account that, on average, regular interactiv-          determine if indeed there are any attempts to send data be-
ity only occurs with one fourth of a user’s Facebook friend        tween local users.
list [15], this value still represents a local community that is
strongly connected.
   The average path length between all nodes in the graph is       6. LOCAL TRAFFIC PATTERNS
3.798 (average on facebook is 4.8 [15]). This is far less than        Information can be exchanged between users using a de-
the six-degrees of separation hypothesis for social graphs [10]    liberate or passive action. A deliberate action includes activ-
ities such as making a Skype call, transferring a file directly   such as the “File Transfer Protocol” or “Secure Copy”. There
between two computers, or sending an email. A passive ac-        was also no evidence of any VoIP calls being made directly
tion involves a user uploading a file to a server, such as an     between two local machines without the use of the Internet.
image upload on Facebook, and another user downloading              Clearly the best solution to conserve the bandwidth-limited
this file at a later point in time. In this section we analyse    and costly Internet gateway is to make use of services that
our traffic traces to detect deliberate actions to share con-      can enable direct user-to-user communication or host con-
tent with other users in the village or use of services which    tent on local servers in Macha. For example, a simple FTP
may lead to passive content sharing.                             server could host music files that users wish to share or a As-
   We begin with an analysis of all traffic transmitted di-        terisk VoIP server could enable local calls between users in
rectly between local machines in the network.                    Macha using soft-phones. However, this requires advanced
                                                                 computer skills and breaks the current paradigm of web-
6.1 Traffic sent directly between machines                        based computer usage [7]. As a result, we primarily observe
  The local wireless network makes use of approximately          flow patterns where users make use of web services to share
100 802.11b/g wireless routers to connect close to 300 users     content or make phone calls. We discuss this scenario in the
in the village. These routers are typically able to operate      following section.
between 1 Mbps and 5 Mbps depending on the distance be-
tween them and level of interference [6]. Hence the local        6.2 Traffic sent locally through Internet servers
network has substantially higher capacity than the satellite        As highlighted in Section 4.2, the process of extracting
gateway (128kbps) and, as such, represents a large amount        local traffic routed via servers on the Internet is a complex
of unused spare capacity. In order to understand whether         process. In order to determine the quantity of potential
this local capacity is utilized we now analyse the amount of     local traffic, we first analyse the destination domains of large
traffic transmitted between users in the local network.            outgoing flows (flows greater than 100KB). These flows have
                                                                 the potential to contain objects that may be downloaded
                                                                 later or streamed in real-time to local users in the village.
  Table 1: Statistics for traffic between local machines.          We found that 15% of the outgoing traffic consisted of large
            Description                Quantity                  outgoing flows. We divide this portion of traffic into domain
            Total flows                50,355,759                 categories in Figure 8. We are also able to check whether any
         Total Data (GB)               249,338                   of the Skype flows embedded in the “Skype and Bittorrent”
     Including gateway servers                                   category are routed between local users through an Internet
          Total local flows        13,546,582 (26%)               super-peer. We leave the task of matching up and down
       Total local data (GB)         12,548 (5%)                 flows in manipulated objects, such as photos and images,
     Excluding gateway servers                                   and encrypted flows for future work.
          Total local flows         6,726 (0.013%)
       Total local data (GB)         7 (0.0029%)                                                                                                         3491 (35.1%)
                                                                  Skype and Bittorrent
                                                                                                                       2556 (17.0%)

                                                                                                                                  2262 (22.7%)
                                                                  Google mail via imap
                                                                                                                            2855 (19.0%)

   We summarize the high level findings of local traffic in                     Facebook
                                                                                                         817 (8.2%)
                                                                                                            1497 (10.0%)
Macha in Table 1. Traffic, including gateway servers (DNS
                                                                                                       701 (7.0%)
server, capture portal server), consists primarily of HTTP                Web Hosting
                                                                                                               1805 (12.0%)

traffic as users sign onto the Internet using the local web                  Podcasting
                                                                                               300 (3.0%)
                                                                                          15 (0.1%)
“capture portal”. There were also many DNS requests to
                                                                                            175 (1.8%)                                           flows
the local DNS server to resolve host names. This traffic                 Yahoo web mail
                                                                                           167 (1.1%)                                            MB
constitutes 26% of the total aggregate traffic passing through                 Mendeley
                                                                                            132 (1.3%)
                                                                                          41 (0.3%)
the gateway. Due to the local network having between five
                                                                                           107 (1.1%)
and twenty times more bandwidth than the satellite link             Microsoft web mail
                                                                                              477 (3.2%)

and the opportunity for local connections to create isolated     Ubuntu One (file sync)
                                                                                           94 (0.9%)
                                                                                          15 (0.1%)
flows between local users in different parts of the network,
                                                                                          66 (0.7%)
we conclude that the local network will have a large amount                File sharing
                                                                                           183 (1.2%)

of residual capacity.                                                 Google web mail
                                                                                          22 (0.2%)
                                                                                          47 (0.3%)
   In order to understand whether users connect directly to
                                                                                                                           1780 (17.9%)
each other in the network, we exclude traffic to the gate-                         Other
                                                                                                                                                          5383 (35.8%)

way servers, which perform common tasks of Internet login
and DNS resolution, and calculate the remaining residual
traffic transmitted directly between client machines. This         Figure 8: Domains visited by outgoing flows greater than
makes up a very small portion of the traffic, constituting         100KB.
only 0.0029% of the total traffic seen during the measure-
ment period. Further investigation of this traffic revealed          Skype and Bittorrent applications create the largest amount
that 44% is Netbios traffic, a Windows networking protocol,        of upload activity. It was not possible to separate these
and 2.4% is samba traffic, a Windows network and printer           two traffic types, as they both behave in a similar manner.
sharing service. These are services which are automatically      They use a mix of UDP and TCP and random source and
activated by Windows and do not represent an explicit desire     destination ports, and they exhibit balanced throughput for
by a user to connect to another user. No evidence was found      incoming and outgoing streams. Bittorrent over a satellite
of files being transferred using Samba or any other protocol      gateway with cap-based-Internet access is a costly option
as users pay for somebody else downloading fragments of           on the behaviour we observed in our trace, we conducted an
the file. This is due to the ‘tit-for-tat’ nature of Bittorrent.   on-line survey in Macha. This survey was conducted during
Hence we expect that most of this traffic is Skype rather than      June and July 2011 and collected data broadly focused on
Bittorrent (strong evidence for Skype dominance is also pro-      access and usage of Web 2.0 applications and services. The
vided in our interviews in Section 7), but further advanced       survey was implemented on the SurveyMonkey tool, and
data mining techniques will be required to extract the exact      was based upon an open source example. It was the first
breakdown of these two traffic types. Skype and Bittorrent          time that an extended questionnaire was offered in Macha
have the potential to be used to make calls between users         with only an online version available. Users were invited to
in the village or exchange files. However this is far more         participate via email and Facebook links. Local support to
likely to occur with Skype as Bittorrent is mostly used to        help respondents in interacting with the online survey was
download software, music or video that was not sourced by         provided upon request. 77 users living in Macha participated
local friends.                                                    in the survey consisting of 89 questions.
   The “Google mail via imap” category is for users who con-        Some demographic findings from the survey:
nect through an IMAP email client and send file attach-
ments. This traffic type is encrypted using SSL. Analysis              • 69% of respondents were between 20 and 30 years old.
of the Facebook traffic category shows primarily image up-
                                                                     • 34% of the respondents were female, and 66% male.
loads which are usually compressed by the Facebook server.
Matching up and down flows for both these forms of traf-              • 88% of respondents were able to use computers and
fic, containing encryption and image manipulation, is left              the Internet to achieve most of their objectives. 12%
as a future exercise. There were a number of web-hosting               regarded themselves as novice to computers.
sites used in Macha, such as softlayer and freewebs; these are
grouped together to form one category called “Web hosting”.          • 67% of respondents use the Internet more than 3 hours
Although no Youtube uploads were found, users in Macha                 a day.
regularly upload podcasts to Podomatic, which accepts short
audio or video clips that users have generated using mobile          • 49% of respondents have Internet connectivity at home.
phones or web cams. Only a small portion of file sharing was
found as well as some file synchronization services through           • 87% of respondents use the Internet at work.
Ubuntu One. Mendeley is a program for managing and shar-             • 71% of respondents use the Internet for learning.
ing research papers, and some academic paper uploads oc-
curred. There was a surprisingly small fraction of uploads           • 51% of respondents use the Internet for entertainment.
using web-based email clients; most of the mail attachments
occur through non web-based email clients.                           • 91% of respondents wish to access the Internet more
   Using a set of basic heuristics, it was possible to iden-           frequently. 34% are prevented from doing so because of
tify two local Skype calls in the measurement period that              Internet connectivity costs, 33% because of bandwidth
were routed between two local users via an international               limitations, and 25% because of the (institutional) reg-
super-peer. Each flow is time-stamped and a simple check                ulations for use.
was made to see whether a local user connects to an exter-
nal super-peer, and this same super-peer connects back to           The survey examined current online activity in 16 cate-
a different local user. The second heuristic is to check that      gories. Key findings of the survey relevant to social network-
the time-stamp between the outgoing and incoming flows is          ing are:
not more than a few seconds. These two skype calls lasted
10 minutes, and 3 minutes respectively, and make up an               • In online engagement, the use of photo sharing stands
insignificant proportion of the total number of Skype and               out, with 60% of the respondents sharing pictures on
Bittorrent traffic seen.                                                 Facebook and 52% commenting on them, at least sev-
   Although it is difficult to conclusively determine the amount         eral times per month or more;
of local content sharing in Macha due to much of the traf-           • 34% of respondents do watch videos on a video sharing
fic being encrypted or manipulated, we conclude that there              website several times per month or more.
is most likely only a small portion of overall uplink net-
work traffic that is being used to share large objects be-             • 53% of respondents indicate that they work collabora-
tween local users. One of the key reasons for this is the high         tively online using tools such as Google Docs.
cost of bandwidth, together with the Internet-cap-model be-
ing used. This is in stark contrast to the large amount of           • 54% of respondents interact on social networks like
instant messaging between users. For example, sharing a                Facebook several times a week or more. A mere 9%
500M video costs a user $15. It is far more cost effective to           of respondents never interact on social networks, while
put the video on a flash drive and walk to another local user.          24% never used Facebook. 72% use instant messaging.
However, if the architecture of the network made it possi-
ble to exchange these files for free using a local web-based          • All respondents use e-mail. 59% of respondents make
application or through intelligent routing, local file sharing          phone calls over the Internet several times per month
would be sure to increase as it has in developed regions.              or more, and 59% of respondents search for news online
                                                                       at least several times a week.
7.   ON-LINE INTERVIEWS                                              • 94% of respondents never used the Internet for an on-
  To understand whether the demographics and qualitative               line business. 73% have never used the Internet to
usage behaviour of the users in the village have any bearing           purchase goods.
In conclusion, the survey and measurements give indica-       9. ACKNOWLEDGEMENTS
tions of an Internet community of 300 users with 200 regular        The work described in this paper was funded in part by
users in Macha. Most people desire more access and interac-      NSF NetSE award CNS-1064821. The authors would also
tion, but costs and bandwidth limitations restrain them from     like to thank Linknet in Macha, Zambia for their cooperation
doing so. Many of these findings correlate well with what we      on this project.
have observed in our analysis. The 140 local Facebook users
active on instant messaging correlates with 72% of the 200
regular users who claim to actively use instant messaging.
                                                                 10. REFERENCES
The well connected interaction graph in Facebook is sup-          [1] J. Chen, S. Amershi, A. Dhananjay, and
ported by the fact that only 9% of the community does not             L. Subramanian. Comparing web interaction models
use social networking. The dominance of email traffic in our            in developing regions. In Proceedings of the First ACM
trace is also well supported by the fact that all respondents         Symposium on Computing for Development, London,
claim to use email.                                                   December 2010.
   The lower proportion of users who have Internet access         [2] J. Chen, D. Hutchful, W. Thies, and L. Subramanian.
at home versus users who have access at work will most                Analyzing and accelerating web access in a school in
likely have a negative effective on local user connections as          peri-urban india. In WWW, Hyperabad, India, March
activities like local VoIP and file sharing often occur after          2011.
work. Internet users in Macha are primarily under 30 and          [3] J. Domˇnech, A. Pont, J. Sahuquillo, and J. A. Gil. A
                                                                              c
represent a new burgeoning group of trend setters for the rest        user-focused evaluation of web prefetching algorithms.
of the surrounding rural community. As these users, and               Computer communications, 30(10):2213–2224, 2007.
others that will join, begin to generate and share content        [4] Bowei Du, Michael Demmer, and Eric Brewer.
and become active members of the global digital village,              Analysis of WWW traffic in Cambodia and Ghana. In
every effort should be made to mask the crippling effect of             WWW, Edinburgh, UK, May 2006.
the slow Internet gateway. Building a novel new localized         [5] S. B. Handurukande, A. M. Kermarrec, F. L. Fessant,
network software architecture, that takes full advantage the          and L. Massouli´. Exploiting semantic clustering in
                                                                                       e
unique strong clustering revealed in our traffic analysis, is           the edonkey p2p network. In Proceedings of the 11th
one such mechanism to do this.                                        workshop on ACM SIGOPS European workshop,
                                                                      Leuven, Belgium, September 2004.
                                                                  [6] D. L. Johnson, E. M. Belding, K. Almeroth, and
8.   CONCLUSION                                                       G. van Stam. Internet usage and performance analysis
   Social networking has grown in Macha and the network               of a rural wireless network in Macha, Zambia. In
in Macha is used extensively for intra-village conversation           NSDR’10, San Francisco, CA, June 2010.
in the form of instant messaging. For Facebook instant            [7] D. L. Johnson, V. Pejovic, E. M. Belding, and G. van
messaging, our statistical analysis revealed that 35% of the          Stam. Traffic characterization and internet usage in
users were local to the village, with 7% of these being trav-         rural africa. In WWW, Hyperabad, India, March 2011.
ellers, and 54% of the instant messages sent were between         [8] R. Kumar, J. Novak, and A. Tomkins. Structure and
local users. Interviews also revealed a large proportion of           evolution of online social networks. Link Mining:
users who make extensive use of social networking with in-            Models, Algorithms, and Applications, pages 337–357,
stant messaging being especially popular. Although there              2010.
is strong social cohesion in this community, no direct local      [9] K. W. Matthee, G. Mweemba, A. V. Pais, G. van
networking traffic related to sharing files or making voice              Stam, and M. Rijken. Bringing Internet connectivity
or video calls was found. There was also very little use of           to rural Zambia using a collaborative approach. In
Skype between users in the village via Internet super-peers           ICTD’07, Bangalore, India, December 2007.
(2 calls within the two month measurement window) or file         [10] S. Milgram. The small world problem. Psychology
sharing (0.65% of large outgoing flows). File synchronization          today, 2(1):60–67, 1967.
services on the Internet were also minimal (0.94% of large       [11] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel,
outgoing flows) due to the high cost of bandwidth ($32/GB)             and B. Bhattacharjee. Measurement and analysis of
and bandwidth limitations of the satellite gateway.                   online social networks. In Proceedings of the 7th ACM
   It is clear that the current hub and spoke architecture of         SIGCOMM conference on Internet measurement, San
the web, with most services running as monolithic servers, is         Diego, CA, 2007.
not well suited to rural networks with low-bandwidth gate-       [12] J. Postill. Localizing the internet beyond communities
ways. However, the strong social cohesion and interdepen-             and networks. New Media & Society, 10(3):413, 2008.
dence often found in rural communities is a key differentiator
                                                                 [13] H. Schulze and K. Mochalski. ipoque Internet Study
which, if taken advantage of, can make substantial improve-
                                                                      2008/2009, 2009.
ments to network performance when bandwidth-limited In-
                                                                 [14] S. Sounders. The HTTP archive.
ternet gateways are used. A new localized network software
                                                                      http://httparchive.org.
architecture is needed to take full advantage of this strong
clustering found in rural communities. This software should      [15] C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and
place services that enable user-to-user interaction and file           B.Y. Zhao. User interactions in social networks and
sharing in the village. Once in place, rural communities will         their implications. In Proceedings of the 4th ACM
disseminate information amongst each other more efficiently             European Conference on Computer systems, pages
and Internet responsiveness will improve due to offloading              205–218, 2009.
“local” traffic from the gateway.

Contenu connexe

Tendances

On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksOn the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksZhenyun Zhuang
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networksMarc Smith
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc SmithMarc Smith
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
 
Church Choir Online Communication and Music Recording and Streaming System
Church Choir Online Communication and Music Recording and Streaming SystemChurch Choir Online Communication and Music Recording and Streaming System
Church Choir Online Communication and Music Recording and Streaming SystemEditor IJCATR
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Thamalsha Wijayarathna
 
Baym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital ageBaym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital ageRAJU852744
 

Tendances (11)

On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksOn the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....
Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....
Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
 
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
 
Church Choir Online Communication and Music Recording and Streaming System
Church Choir Online Communication and Music Recording and Streaming SystemChurch Choir Online Communication and Music Recording and Streaming System
Church Choir Online Communication and Music Recording and Streaming System
 
Gamsns
GamsnsGamsns
Gamsns
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
Communication Networks
Communication NetworksCommunication Networks
Communication Networks
 
Baym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital ageBaym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital age
 

En vedette

MONA Foundation Annual Report 2011 - TKP on page 16
MONA Foundation Annual Report 2011 - TKP on page 16MONA Foundation Annual Report 2011 - TKP on page 16
MONA Foundation Annual Report 2011 - TKP on page 16Lynn Langit
 
Understanding Codenvy - for Containerized Developer Workspaces
Understanding Codenvy - for Containerized Developer WorkspacesUnderstanding Codenvy - for Containerized Developer Workspaces
Understanding Codenvy - for Containerized Developer WorkspacesLynn Langit
 
Learning GitHub Part 2
Learning GitHub Part 2Learning GitHub Part 2
Learning GitHub Part 2Lynn Langit
 
Learning GitHub Part 4
Learning GitHub Part 4Learning GitHub Part 4
Learning GitHub Part 4Lynn Langit
 
Learning GitHub Part 3
Learning GitHub Part 3Learning GitHub Part 3
Learning GitHub Part 3Lynn Langit
 

En vedette (6)

MONA Foundation Annual Report 2011 - TKP on page 16
MONA Foundation Annual Report 2011 - TKP on page 16MONA Foundation Annual Report 2011 - TKP on page 16
MONA Foundation Annual Report 2011 - TKP on page 16
 
Understanding Codenvy - for Containerized Developer Workspaces
Understanding Codenvy - for Containerized Developer WorkspacesUnderstanding Codenvy - for Containerized Developer Workspaces
Understanding Codenvy - for Containerized Developer Workspaces
 
Learning GitHub Part 2
Learning GitHub Part 2Learning GitHub Part 2
Learning GitHub Part 2
 
Learning GitHub Part 4
Learning GitHub Part 4Learning GitHub Part 4
Learning GitHub Part 4
 
Learning GitHub Part 3
Learning GitHub Part 3Learning GitHub Part 3
Learning GitHub Part 3
 
Kodu class
Kodu classKodu class
Kodu class
 

Similaire à Network traffic locality in a rural african village, ictd, 2012

P118 gummadi
P118 gummadiP118 gummadi
P118 gummadifoufa31
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
 
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL AIRCC Publishing Corporation
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13Uvaraj Shan
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Uvaraj Shan
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Uvaraj Shan
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
 
Save 14million-through-wifi-offload
Save 14million-through-wifi-offloadSave 14million-through-wifi-offload
Save 14million-through-wifi-offloadJustus @GreenPacket
 
OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING
 OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING
OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADINGGreen Packet
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Zhenyun Zhuang
 

Similaire à Network traffic locality in a rural african village, ictd, 2012 (20)

P118 gummadi
P118 gummadiP118 gummadi
P118 gummadi
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
 
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
 
Save 14million-through-wifi-offload
Save 14million-through-wifi-offloadSave 14million-through-wifi-offload
Save 14million-through-wifi-offload
 
OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING
 OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING
OPERATORS CAN SAVE $14 MILLION YEARLY THROUGH DATA OFFLOADING
 
presentation_SB_v01
presentation_SB_v01presentation_SB_v01
presentation_SB_v01
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Plus de Lynn Langit

VariantSpark on AWS
VariantSpark on AWSVariantSpark on AWS
VariantSpark on AWSLynn Langit
 
Serverless Architectures
Serverless ArchitecturesServerless Architectures
Serverless ArchitecturesLynn Langit
 
10+ Years of Teaching Kids Programming
10+ Years of Teaching Kids Programming10+ Years of Teaching Kids Programming
10+ Years of Teaching Kids ProgrammingLynn Langit
 
Blastn plus jupyter on Docker
Blastn plus jupyter on DockerBlastn plus jupyter on Docker
Blastn plus jupyter on DockerLynn Langit
 
Testing in Ballerina Language
Testing in Ballerina LanguageTesting in Ballerina Language
Testing in Ballerina LanguageLynn Langit
 
Teaching Kids to create Alexa Skills
Teaching Kids to create Alexa SkillsTeaching Kids to create Alexa Skills
Teaching Kids to create Alexa SkillsLynn Langit
 
Understanding Jupyter notebooks using bioinformatics examples
Understanding Jupyter notebooks using bioinformatics examplesUnderstanding Jupyter notebooks using bioinformatics examples
Understanding Jupyter notebooks using bioinformatics examplesLynn Langit
 
Genome-scale Big Data Pipelines
Genome-scale Big Data PipelinesGenome-scale Big Data Pipelines
Genome-scale Big Data PipelinesLynn Langit
 
Teaching Kids Programming
Teaching Kids ProgrammingTeaching Kids Programming
Teaching Kids ProgrammingLynn Langit
 
Serverless Reality
Serverless RealityServerless Reality
Serverless RealityLynn Langit
 
Genomic Scale Big Data Pipelines
Genomic Scale Big Data PipelinesGenomic Scale Big Data Pipelines
Genomic Scale Big Data PipelinesLynn Langit
 
VariantSpark - a Spark library for genomics
VariantSpark - a Spark library for genomicsVariantSpark - a Spark library for genomics
VariantSpark - a Spark library for genomicsLynn Langit
 
Bioinformatics Data Pipelines built by CSIRO on AWS
Bioinformatics Data Pipelines built by CSIRO on AWSBioinformatics Data Pipelines built by CSIRO on AWS
Bioinformatics Data Pipelines built by CSIRO on AWSLynn Langit
 
Serverless Reality
Serverless RealityServerless Reality
Serverless RealityLynn Langit
 
Beyond Relational
Beyond RelationalBeyond Relational
Beyond RelationalLynn Langit
 
New AWS Services for Bioinformatics
New AWS Services for BioinformaticsNew AWS Services for Bioinformatics
New AWS Services for BioinformaticsLynn Langit
 
Google Cloud and Data Pipeline Patterns
Google Cloud and Data Pipeline PatternsGoogle Cloud and Data Pipeline Patterns
Google Cloud and Data Pipeline PatternsLynn Langit
 
Scaling Galaxy on Google Cloud Platform
Scaling Galaxy on Google Cloud PlatformScaling Galaxy on Google Cloud Platform
Scaling Galaxy on Google Cloud PlatformLynn Langit
 

Plus de Lynn Langit (20)

VariantSpark on AWS
VariantSpark on AWSVariantSpark on AWS
VariantSpark on AWS
 
Serverless Architectures
Serverless ArchitecturesServerless Architectures
Serverless Architectures
 
10+ Years of Teaching Kids Programming
10+ Years of Teaching Kids Programming10+ Years of Teaching Kids Programming
10+ Years of Teaching Kids Programming
 
Blastn plus jupyter on Docker
Blastn plus jupyter on DockerBlastn plus jupyter on Docker
Blastn plus jupyter on Docker
 
Testing in Ballerina Language
Testing in Ballerina LanguageTesting in Ballerina Language
Testing in Ballerina Language
 
Teaching Kids to create Alexa Skills
Teaching Kids to create Alexa SkillsTeaching Kids to create Alexa Skills
Teaching Kids to create Alexa Skills
 
Practical cloud
Practical cloudPractical cloud
Practical cloud
 
Understanding Jupyter notebooks using bioinformatics examples
Understanding Jupyter notebooks using bioinformatics examplesUnderstanding Jupyter notebooks using bioinformatics examples
Understanding Jupyter notebooks using bioinformatics examples
 
Genome-scale Big Data Pipelines
Genome-scale Big Data PipelinesGenome-scale Big Data Pipelines
Genome-scale Big Data Pipelines
 
Teaching Kids Programming
Teaching Kids ProgrammingTeaching Kids Programming
Teaching Kids Programming
 
Practical Cloud
Practical CloudPractical Cloud
Practical Cloud
 
Serverless Reality
Serverless RealityServerless Reality
Serverless Reality
 
Genomic Scale Big Data Pipelines
Genomic Scale Big Data PipelinesGenomic Scale Big Data Pipelines
Genomic Scale Big Data Pipelines
 
VariantSpark - a Spark library for genomics
VariantSpark - a Spark library for genomicsVariantSpark - a Spark library for genomics
VariantSpark - a Spark library for genomics
 
Bioinformatics Data Pipelines built by CSIRO on AWS
Bioinformatics Data Pipelines built by CSIRO on AWSBioinformatics Data Pipelines built by CSIRO on AWS
Bioinformatics Data Pipelines built by CSIRO on AWS
 
Serverless Reality
Serverless RealityServerless Reality
Serverless Reality
 
Beyond Relational
Beyond RelationalBeyond Relational
Beyond Relational
 
New AWS Services for Bioinformatics
New AWS Services for BioinformaticsNew AWS Services for Bioinformatics
New AWS Services for Bioinformatics
 
Google Cloud and Data Pipeline Patterns
Google Cloud and Data Pipeline PatternsGoogle Cloud and Data Pipeline Patterns
Google Cloud and Data Pipeline Patterns
 
Scaling Galaxy on Google Cloud Platform
Scaling Galaxy on Google Cloud PlatformScaling Galaxy on Google Cloud Platform
Scaling Galaxy on Google Cloud Platform
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Network traffic locality in a rural african village, ictd, 2012

  • 1. Network traffic locality in a rural African village D.L. Johnson, Elizabeth M. Belding, Gertjan van Stam University of California, Santa Barbara Linknet, Macha, Zambia davidj,ebelding@cs.ucsb.edu gertjan.vanstam@machaworks.org ABSTRACT 1. INTRODUCTION The Internet is evolving from a system of connections be- The Internet has evolved both in terms of size and appli- tween humans and machines to a new paradigm of social con- cation since its birth in the early 1990s. Recent studies have nection. However, it is still dominated by a hub and spoke shown that the average web page size in 2011 is 48 times architecture with inter-connectivity between users typically larger than the average size in 1995 (14.12K in 1995 [3] and requiring connections to a common server on the Internet. 679K in 2011 [14]). There is an increasing amount of off-PC This creates a large amount of traffic that must traverse an storage and processing using cloud computing for services Internet gateway, even when users communicate with each such as navigation, photo sharing and file hosting. Many other in a local network. Nowhere is this inefficiency more applications that in the past were run on a user’s operating pronounced than in rural areas with low-bandwidth connec- system, such as email, word processors and instant message tivity to the Internet. Our previous work in a rural village in clients, are now run on web browsers. These features have Macha, Zambia showed that web traffic, and social network- brought users in developed countries closer to the vision of ing in particular, are dominant services. In this paper we use “anywhere any-time” computing, where devices connected to a recent network trace, from this same village, to explore the high speed Internet connections delegate computing power degree of local user-to-user interaction in the village. Extrac- and storage capacity to cloud computing services. However, tion of a social graph, using instant message interactions on what is not clear are the implications for users in develop- Facebook, reveals that 54% of the messages are between lo- ing regions where Internet access speeds of between 128kbps cal users. Traffic analysis highlights that the potential spare and 256kbps are common, as was typical of dial-up users of capacity of the local network is not utilized for direct local the 1990s. communication between users even though indirect commu- One of the key consequences of web-based computing is nication between local users is routed through services on an increase in traffic load. In the rural villages we have the Internet. These findings build a strong motivation for a studied in Zambia [6], there can be as many as 60 concur- new rural network architecture that places services that en- rent users sharing a single relatively slow satellite link. As able user-to-user interaction and file sharing in the village. a result, web-applications become increasingly slow, to the point where they are unusable. We have seen that social networking is the most popular web application in the vil- Categories and Subject Descriptors lage of Macha, Zambia and users share messages, pictures, C.2.2 [Computer-Communications Networks]: Network music and software with each other, where the sender and Protocols-Applications; C.4 [Performance of Systems]: recipient are often in the same village. When a user shares Measurement Techniques an object with another user in the same village using an off- PC storage server such as Facebook or Dropbox, the same file traverses the slow satellite gateway twice: once as it is General Terms uploaded to the server, and again as it is downloaded to the Measurement, Performance recipient. This leads to congestion of an already constrained satellite link. The most widely used solution to deal with inefficiencies in Keywords this centralized model is to use peer-to-peer (P2P) network- Rural network, Social network, Traffic analysis, Developing ing. Bittorrent is an example of a popular P2P networking regions, Measurement protocol and accounts for between 27% to 55% of Internet traffic, depending on geographic location [13]. Bittorrent works on the principle of “tit for tat” in which users may not download content faster than they can upload content. Permission to make digital or hard copies of all or part of this work for Peers are always located outside the local network, rendering personal or classroom use is granted without fee provided that copies are Bittorrent unusable or extremely slow due to the limited ca- not made or distributed for profit or commercial advantage and that copies pability of the satellite link. Although we found only traces bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific of P2P traffic (1% of total aggregate traffic passing through permission and/or a fee. gateway) it did account for a surprising portion of traffic ICTD2012 2012 Atlanta, GA, USA with large outbound flows (35% of all outbound flows greater Copyright 2012 ACM 978-1-4503-1045-1/12/03 ...$10.00.
  • 2. than 100KB). Many users in Macha use Skype, which also extensive analysis of performance and traffic characteriza- uses P2P networking. A large portion of these large P2P tion in Macha, Zambia in 2010 [6, 7]. This work highlighted outgoing flows may be Skype traffic, which is difficult to some negative effects of the satellite link, such as high round distinguish from Bittorrent traffic. We found no evidence of trip times that lead to web request time-outs. We analyzed P2P traffic being directly routed between two local users as usage patterns and found that the most commonly used ser- most local users have no direct network routes to each other vice is social networking; we have since confirmed that this and super-peers — well provisioned nodes for routing P2P usage pattern continued into 2011 (see Figure 3). In this traffic — are always located non-locally. Clearly traditional paper we analyze these social interactions in the network to P2P networking has not been the panacea to save Internet study the level of local interactivity between users in the gateway bandwidth in rural networks. village. In order to find a more well suited solution to the ineffi- More recent work to improve Internet usability in rural ciencies of centralized web access, we analyse the locality of regions has been done by Chen et al [1, 2]. In [1], an asyn- interest in the Macha network and its potential to save gate- chronous queuing model was used where users can queue way bandwidth. We carry out two tasks in this study. The web requests as well as a cache search feature with predic- first task is to measure the strength of social connections in tive text. Users responded positively even though a custom the village of Macha by extracting a social graph from Face- web frame was used to search a local cache or queue content. book instant message chat. This helps us to understand In [2], a browser plugin was used to pre-fetch pages and the potential of users to share information and files. The serve stale cached pages. This achieved an average accelera- second task is to measure the fraction of local traffic sent di- tion of 2.8x for users browsing non-video web pages. These rectly between users without the use of the Internet, or the results bode well for interventions that may need the web fraction of traffic being used to upload content to Internet access paradigm to be modified somewhat. Our study looks file-sharing services in order to determine how effectively or at traffic locality in a rural network and its implications on ineffectively users are utilizing the local network. improving network performance and, as such, represents an- To this end we collected traffic traces over a period of other tool in the toolbox of techniques to improve network two months in Macha, Zambia that includes all local traffic performance in rural regions. within the network and all traffic to and from the Inter- A recent media and society study of the localization in the net. Facebook instant messaging was common in our trace; Internet highlights the fact that as the Internet continues to however there was no direct local file sharing and a very grow, it is becoming “more local” [12]. This phenomena is small fraction of traffic using file synchronizations (0.94%) beginning to blur the boundaries between online and offline or file sharing services (0.65%). We believe this is due to the social domains, and it is this trend that demands a localiza- poor nature of the network and the relatively high cost of tion approach to network design, especially in isolated rural bandwidth ($30/GB) rather than a desire not to share these communities. objects; on-line interviews substantiate this hypothesis. There are many studies on social network interactions, Our interaction graphs of Facebook instant message chats both at a structural level using friend lists and at an inter- reveal that 54% of chats are between local users in the vil- action level using wall posts [8, 11]. Wilson et al argue that lage, even though only 35% of the observed users were local social links created by friend lists are not valid indicators to the village. We also find that people who travel to ar- of user interactions [15]. This is shown by the fact that the eas outside the village are strong sources and sinks for local number of “friend adds” account for 45% of the activity per information exchange. We extract other statistics, such as day whereas comments only account for 10% of the activity. social degree and clustering coefficients, for the social graph. Interestingly the common notion of small-world clustering, Packet flows are analysed to understand the percentage of which is present in a social graph derived from “friend adds”, traffic sent directly between users in the village and via cen- is absent from the interaction graph. Our work captures the tral web servers. Finally, we correlate some of our findings physical locality of the users, which adds a new dimension with on-line interviews that were collected from 77 users in to interaction graph analysis. the village from a wide range of age groups. Locality of interest has been primarily studied in the do- Other than interesting anthropological inferences from this main of peer-to-peer networks. For example, a semantic analysis, there are many technical implications. The high clustering technique is employed by Handurukande et al in [5]. degree of local conversation provides strong motivation for The semantic relationship is either implicit, using informa- an automated localization engine that is able to intercept tion such as peer-history, or explicit, using meta-information content for local users and re-route it directly to a local about the file, such as whether it is music or video. In a rural user rather than traversing the satellite link. Relocating ser- village, a P2P mechanism that first looks for a peer in a lo- vices that enable user-to-user interaction from the Internet cal subnet may be a possible solution to making file sharing to servers in the local village is also promising for improving more efficient. local performance. 3. MACHA NETWORK 2. RELATED WORK Macha, Zambia, highlighted in Figure 1, is a resource- There is a small set of studies that examine traffic usage in limited rural area in Africa with scattered homesteads, very rural networks. One of the first studies on Internet caf`s and e little infrastructure, and people living a subsistence lifestyle; kiosks in rural regions in Cambodia and Ghana [4] revealed the primary livelihood is maize farming. Like many sub- that many web applications — often monolithic in nature — Saharan rural communities, Macha has a concentrated cen- are poorly suited for low bandwidth environments and sug- tral area, and a large, geographically dispersed rural commu- gest smart proxies on either end of the bandwidth-limited nity with a sparse population. Macha Works, through the link to reduce bandwidth usage. Our previous work includes LinkNet project, has deployed a wireless network that pro-
  • 3. Figure 1: Location of Macha in the southern province of Zambia. vides connectivity to approximately 300 community workers Figure 2: A simplified model of the network architecture in and visitors living around a mission hospital and medical the Macha network. All traffic in the village passes through research institute using a satellite-based Internet connec- a bridge. Four types of possible traffic are highlighted. All tion [9]. The majority of users access the Internet at work traffic types are captured by our monitor server. but half the users access the Internet in their homes. The satellite connection has a committed download speed of 128 kbps bursting to 1 Mbps and a committed upload Over the course of two months (February and March 2011), speed of 64 kbps bursting to 256 kbps with no monthly max- we captured traces of all traffic passing through the bridge, imum. The total monthly cost of the C-band VSAT satellite which connects all machines in the network, using tcpdump. connection is $1200 (US dollars). Internet access is based on The total traffic collected is 250 GB and is stored as multiple a pay-as-you-go model. Users buy voucher-based data bun- pcap formatted files. dles at a cost of $30 for 1GB or 31 days (whichever expires first). The community has a large enough user base to make 4.2 Data characteristics the sale of Internet access vouchers sustainable in a ‘not-for- As described earlier, one of our main goals is to determine profit’ and ‘not-for-loss’ environment. There are, however, the quantity of traffic, from the Macha trace, between two many frustrated users due to the poor network performance, local machines in the village. This is trivial to determine particular during peak usage times. for traffic sent directly between two machines by checking whether the source and destination IP address are both in 4. DATA COLLECTION AND PROCESSING the local village subnet. However, determining this for traffic that passes through an Internet server is far more difficult. 4.1 Data collection Hence, we need to compare uplink and downlink flows to A simplified model of the network in the Macha commu- look for similar patterns leaving and entering the network. nity in Zambia is depicted in Figure 2. Computers are con- These patterns are characterized by features such as IP ad- nected through a bridged wireless network to the gateway, dresses, port numbers flow sizes, content headers and, when which is connected to the Internet through a slow satellite these are not sufficient, features unique to specific objects, link. All traffic in the network passes through the bridge such as colour distribution in images. This traffic may be that is monitored passively by a data collector. This allows real-time, as in the case of VOIP calls or instant messaging, us to capture all local traffic as well as traffic to the Internet. or it may be non-real time when using a file sharing service, Local or non-local direct links between machines using for example. services such as secure copy are very rare in networks with- Real-time traffic between two local machines routed through out advanced computer users and we found no evidence of an Internet server is relatively simple to detect using IP ad- this traffic. P2P traffic also creates direct links between ma- dress pairs for flow classification. Returning to Figure 2, if chines and is common amongst many users in the developed Client 1 routes a real-time connection to Client 2 through world (between 42.51% and 69.95% in 2008/2009 [13]), but CDN 1, there will be a steady stream of packets from Client because of the high cost of data and low bandwidth capac- 1 to CDN 1 through the gateway. This same stream of pack- ity, it makes up a small portion of traffic in Macha (1% of ets will appear from CDN 1 to Client 2 within a time-window total aggregate traffic). The majority of traffic is either to typical of the round trip time of the satellite link. If two dif- and from an Internet web server or between two local clients ferent CDN servers are used, as is also shown in Figure 2, through an Internet web service. When using a web service the CDN domain, rather than IP addresses can be used as a like Facebook, a content delivery network (CDN) is typically flow feature. For example, two Facebook CDN’s for IM traf- employed to receive and deliver content. As shown in Fig- fic could be “im-a.ak.fbcdn.net” and “im-b.ak.fbcdn.net”; we ure 2, it is fairly common for a user in the village (Client would use the domain “fbcdn.net” rather than the IP address 1) to send a packet to a service like Facebook through a to define the Internet server being used in the flow. CDN (CDN 1) and for a different CDN (CDN 2) to deliver The task becomes more challenging with non real-time a packet to another user in the village (Client 2). traffic where features such as IP addresses and flow lengths
  • 4. *facebook.com 15.76% 20.26% *twitter.com 11.47% 0.24% *google.com 8.88% 7.88% *postzambia.com 4.45% 4.30% *yahoo.com 3.91% 4.65% *windowsupdate.com 2.54% 1.63% lusakatimes.com 2.05% 2011 (Feb−Mar) 1.56% 2010 (Feb−Mar) doubleclick.net 1.93% 1.01% Domain cstv.com 1.66% 0.53% quickbooks.com 1.58% 0.57% co.uk 1.55% 0.96% adobe.com 1.49% 0.02% *.co.zm 1.15% 7.58% *.yimg.com 1.47% 2.03% Figure 4: Outgoing and incoming packets when sending an *.msn.com 0.73% 1.86% IM message in Facebook. (a) A message is typed on user A’s *.googlesyndication.com 0.50% 0.99% Facebook IM console. (b) The message is displayed on user *.ubuntu.com 0.10% A’s Facebook IM dialogue area. (c) The message is displayed 0.49% 38.79% on user B’s Facebook IM dialogue area. (d) A flow diagram other 43.44% of packets sent between client A and B and the Facebook Fraction of requests CDN for each of the 3 events in (a),(b) and (c). Figure 3: Internet usage analysis in Macha, Zambia for February and March 2010 and 2011. cial networking site, gained a strong following. While consti- tuting only .24% of the network traffic in 2010, it has become may not be enough to correlate an upload with a down- the second most popular web service in 2011. Considering load. For example, when using services that host pictures that both Facebook and Twitter are social networking ser- or videos such as Picasa and Youtube, the hosting server will vices, social networking now accounts for almost three times compress or manipulate the object in some way, such that the number of page visits compared with Google. The con- the uploaded object does not match the downloaded object. tinued dominance of Facebook gives credence to our notion Fingerprinting can help solve this problem. For example, an that Facebook traffic is a good representation of social con- image can be fingerprinted using a histogram of colours and nections in Macha, Zambia. will be immune to compression. However, a further compli- Facebook instant message traffic was extracted by search- cation is introduced when encryption is employed, render- ing for a header, unique to Facebook, in the HTML body of ing even fingerprinting techniques useless. In this study we the packets in our network trace. Although Facebook uses were only able to analyse flows between local machines and a different schema for sending and receiving a packet during real-time flows employing an Internet service. Extracting lo- an IM conversation, we were able to simplify the analysis by cality in flows that have been manipulated or which employ only analysing the incoming packets due to the inherent be- encryption is left as an exercise for future work. However to haviour shown in Figure 4. For every message transmitted, establish the potential quantity of local traffic using services the same message is sent back to both the sending user and on the Internet, we analyse the domains visited by large out- receiving user as it is displayed on the IM web client. To de- going flows, to establish whether web sites are being visited termine whether a conversation is local, we check whether we that enable sharing between users. receive two packets with the same user pair on two different We extract outgoing and incoming Facebook instant mes- local machines (machines with different IP addresses). sages from the trace as the headers of instant messages travel in the network in plain text. They are also timestamped and can easily be associated with specific users, which makes it 5. SOCIAL GRAPH ANALYSIS possible to build an interaction graph with temporal infor- In this section, we present an analysis of a social graph mation embedded. We ensure privacy by anonymising the built from instant messages sent in Facebook. We call this user names before performing our analysis. social graph an “interaction graph” as it captures the actual interactivity between users rather than passive links. In- 4.3 Identifying local Facebook traffic stant messages represent the strongest possible relationship As mentioned in Section 2, we analysed Internet usage linkage between users in Facebook as they indicate a one- statistics in 2010 and found that Facebook traffic accounted to-one mapping between users, and they capture true user for the majority of traffic in the network. We carried out the interaction rather than passive relationships represented by same analysis using our new 2011 network trace and found “friend adds” and wall posts. Previous studies support the that this trend continued; however, some new interesting us- notion of different levels of relationships in Facebook [15]. age trends appeared. We compare the traffic analysis from They showed that wall posts and photo comments represent 2010 and 2011 traces in Figure 3. Although Facebook de- a much stronger indication of relationship bonds between clined slightly from 20.26% to 15.76%, Twitter, another so- Facebook users than “friend adds”.
  • 5. 5.1 Social graph In order to understand the relationships between users within and outside the village, we create a social graph that captures users as nodes and conversations as edges. The weight of the edge depicts the number of conversations in the two month measurement period between two specific users. Figure 5 shows the central section of the Facebook interaction graph for the village. The graph has been ar- ranged so that users who are well connected with each other are closer to the centre. The color, as shown by the key, depicts whether the user was always in the village, always outside the village, or a traveller. Users were detected as travellers when they originated a message both from within and from outside the village during the trace. This was possible to detect as users were tracked using Facebook IDs rather than associated IP addresses, which are not persis- tent. Figure 6 shows the edge of the interaction graph with isolated communities of users, often having one to six local village users, connecting up to 20 outside users. Figure 6: A section on the periphery of the interaction graph showing isolated communities of users. information brokers enabling the flow of information between users outside and inside the village. • There are surprisingly few cases of one external user connecting to many users in the village. One inter- pretation is that users who arrive in the village come from a diverse set of communities, where people in each community only know one person in the village. Another is that outside users who meet travellers from Macha tend to use only one person as their key contact or gatekeeper in the village. It is clear from this interaction graph that users in the village form a very close knit community with stronger links between other local users than to users outside the village. However, the graph also reveals that Macha is not a homo- geneous community. There is a small set of isolated indi- Figure 5: Interaction graph for Facebook IM traffic showing viduals and communities; on-the-ground observations reveal users as nodes who either remain in the village, travel but that these are often non-locals living in the village. The return to the village or who are always outside the village. presence of non-locals in the community is common due to The edges denote conversations. Thicker edges indicate that international visitors and relocations and rotation of Zam- more instant messages were sent between users. bian health and education personnel nationwide. In order to understand the characteristics of this inter- There are a few key conclusions we can draw from these action graph, such as the fraction of local messaging and interaction graphs: clustering, we now perform more detailed statistical analy- sis. • There are key users in the village that act as strong links to the outside world. Often these key people are 5.2 Statistical analysis travellers. These users are easily identified by the fan Over the two month measurement period 573 unique Face- shape motifs in the graph. book users were identified, of which 140 were local users who never left the village and 43 were users who travelled. • There are a number of isolated communities where the There were 14,217 unique instant messages sent between 726 majority of nodes are external, often linking to only unique user pairs. Our analysis reveals that 54% of the in- one or two local users. From personal observations stant messages were between local users in the village even made in the village, these are likely researchers who though only 35% of the users were in the village, with 7.5% visit the village to carry out their research and col- of these local users occasionally travelling. This shows that laborate with overseas colleagues and have very little instant messaging is used extensively for intra-village com- online interaction with local people. munication. To understand the statistical distribution of these rela- • The strongest bonds (highest number of conversations) tionships and messages among the users in the village, we are between local users, especially those that travel plot the cumulative distribution function (CDF) of the social and key contact people. These users most likely form degree between local users, and from local to external users
  • 6. in Figure 7(a). Social degree is a measure of the number of 1 edges connected to a node; this correlates to the number of 0.9 Local to local users with which a specific user has communicated. Only 0.8 Local to external a local user’s perspective is shown as the social degree of 0.7 Fraction of Users the external users cannot be fully known. We also plot the 0.6 CDF of messages sent between local users, and from local 0.5 to external users, in Figure 7(b). 0.4 Node degree between local users reveals a large number 0.3 of small cliques and a small set of well connected commu- 0.2 nity members who act as messenger hubs. Local users who 0.1 have connections with external users generally tend to have 0 a large number of connections. 70% of local users have a 0 5 10 15 20 25 30 35 degree of 3 or less, compared to 7 or less for local to ex- Social Degree ternal users. The average degree of a local user is 3.6 and (a) CDF of social degree between local Macha users in Facebook the average degree from a local user to an external user is and from local users to users outside Macha. 5.3. However, Figure 7(b) shows that local users send more messages to each other than to external users even though 1 they have a lower node degree. Local to local user commu- 0.9 nication also has a heavier tail revealing a small subset of Local to local 0.8 very active local users who message each other. Looking at Local to external 0.7 the social graph, we see that well connected users are often Fraction of Users 0.6 also responsible for high message counts, confirming their 0.5 role as information brokers. These results confirm that it 0.4 is not enough to look at the connections between users in a social graph. Interaction between users reveals the true be- 0.3 havioural characteristics of users, and in our specific domain 0.2 of interest, potential of users to interact locally. 0.1 In order to understand the level of cohesiveness of users 0 0 200 400 600 800 1000 1200 in the social graph, a number of social graph related metrics Number of messages sent are employed: (b) CDF of instant messages between local Macha users in • Clustering coefficient measures the tendency of nodes Facebook and from local users to users outside Macha. in a graph to cluster together. For a node with N neighbours and E edges between these neighbours, the clustering coefficient is (2E)/(N(N-1)). A higher clus- Figure 7: Statistical distributions for all Facebook instant tering coefficient can be interpreted as nodes forming messages sent in February and March 2011. tightly connected localized cliques with their direct neighbours. as we have an incomplete graph, with edges only extending • Average path length defines the number of edges to the first tier of external users. This, together with the along the shortest path between all possible pairs of clustering coefficient, provides further proof for a strongly nodes in the network. This measures the degree of connected local community. separation between users. A lower average path length The diameter of the local graph is 8 (average on facebook indicates a community that is closely connected and is 9.8 [15] and average on Orkit is 9 [15]). Considering that through which information can spread quickly. this is a localized graph, the value is surprisingly high. This • Eccentricity of a graph is the maximum distance be- is due to a set of outlier users who are weakly connected to tween any two nodes. other users in the network (low social degree). They form a a category of users who do not use Facebook IM as a regular • Diameter is the maximum of all eccentricities. means of communication and most likely use other channels such as different IM clients, SMS or email. The clustering coefficient is only measured for local users From this social graph analysis, it is clear that the poten- in the network as we do not have a complete picture of Face- tial for local interaction, other than instant message interac- book interaction for external users. This value effectively tion captured in the social graph, is very high. If the infras- measures the cohesiveness of the local community rather tructure was supportive of local connectivity, users would than checking for a “small-world effect” in the larger Face- share music, pictures, videos and software as a natural con- book community. The average clustering coefficient is 0.1 sequence of these relationships as is seen in well provisioned (average on facebook is 0.164 [15]) for all the local nodes. networks in developed countries. In the next section, we Taking into account that, on average, regular interactiv- determine if indeed there are any attempts to send data be- ity only occurs with one fourth of a user’s Facebook friend tween local users. list [15], this value still represents a local community that is strongly connected. The average path length between all nodes in the graph is 6. LOCAL TRAFFIC PATTERNS 3.798 (average on facebook is 4.8 [15]). This is far less than Information can be exchanged between users using a de- the six-degrees of separation hypothesis for social graphs [10] liberate or passive action. A deliberate action includes activ-
  • 7. ities such as making a Skype call, transferring a file directly such as the “File Transfer Protocol” or “Secure Copy”. There between two computers, or sending an email. A passive ac- was also no evidence of any VoIP calls being made directly tion involves a user uploading a file to a server, such as an between two local machines without the use of the Internet. image upload on Facebook, and another user downloading Clearly the best solution to conserve the bandwidth-limited this file at a later point in time. In this section we analyse and costly Internet gateway is to make use of services that our traffic traces to detect deliberate actions to share con- can enable direct user-to-user communication or host con- tent with other users in the village or use of services which tent on local servers in Macha. For example, a simple FTP may lead to passive content sharing. server could host music files that users wish to share or a As- We begin with an analysis of all traffic transmitted di- terisk VoIP server could enable local calls between users in rectly between local machines in the network. Macha using soft-phones. However, this requires advanced computer skills and breaks the current paradigm of web- 6.1 Traffic sent directly between machines based computer usage [7]. As a result, we primarily observe The local wireless network makes use of approximately flow patterns where users make use of web services to share 100 802.11b/g wireless routers to connect close to 300 users content or make phone calls. We discuss this scenario in the in the village. These routers are typically able to operate following section. between 1 Mbps and 5 Mbps depending on the distance be- tween them and level of interference [6]. Hence the local 6.2 Traffic sent locally through Internet servers network has substantially higher capacity than the satellite As highlighted in Section 4.2, the process of extracting gateway (128kbps) and, as such, represents a large amount local traffic routed via servers on the Internet is a complex of unused spare capacity. In order to understand whether process. In order to determine the quantity of potential this local capacity is utilized we now analyse the amount of local traffic, we first analyse the destination domains of large traffic transmitted between users in the local network. outgoing flows (flows greater than 100KB). These flows have the potential to contain objects that may be downloaded later or streamed in real-time to local users in the village. Table 1: Statistics for traffic between local machines. We found that 15% of the outgoing traffic consisted of large Description Quantity outgoing flows. We divide this portion of traffic into domain Total flows 50,355,759 categories in Figure 8. We are also able to check whether any Total Data (GB) 249,338 of the Skype flows embedded in the “Skype and Bittorrent” Including gateway servers category are routed between local users through an Internet Total local flows 13,546,582 (26%) super-peer. We leave the task of matching up and down Total local data (GB) 12,548 (5%) flows in manipulated objects, such as photos and images, Excluding gateway servers and encrypted flows for future work. Total local flows 6,726 (0.013%) Total local data (GB) 7 (0.0029%) 3491 (35.1%) Skype and Bittorrent 2556 (17.0%) 2262 (22.7%) Google mail via imap 2855 (19.0%) We summarize the high level findings of local traffic in Facebook 817 (8.2%) 1497 (10.0%) Macha in Table 1. Traffic, including gateway servers (DNS 701 (7.0%) server, capture portal server), consists primarily of HTTP Web Hosting 1805 (12.0%) traffic as users sign onto the Internet using the local web Podcasting 300 (3.0%) 15 (0.1%) “capture portal”. There were also many DNS requests to 175 (1.8%) flows the local DNS server to resolve host names. This traffic Yahoo web mail 167 (1.1%) MB constitutes 26% of the total aggregate traffic passing through Mendeley 132 (1.3%) 41 (0.3%) the gateway. Due to the local network having between five 107 (1.1%) and twenty times more bandwidth than the satellite link Microsoft web mail 477 (3.2%) and the opportunity for local connections to create isolated Ubuntu One (file sync) 94 (0.9%) 15 (0.1%) flows between local users in different parts of the network, 66 (0.7%) we conclude that the local network will have a large amount File sharing 183 (1.2%) of residual capacity. Google web mail 22 (0.2%) 47 (0.3%) In order to understand whether users connect directly to 1780 (17.9%) each other in the network, we exclude traffic to the gate- Other 5383 (35.8%) way servers, which perform common tasks of Internet login and DNS resolution, and calculate the remaining residual traffic transmitted directly between client machines. This Figure 8: Domains visited by outgoing flows greater than makes up a very small portion of the traffic, constituting 100KB. only 0.0029% of the total traffic seen during the measure- ment period. Further investigation of this traffic revealed Skype and Bittorrent applications create the largest amount that 44% is Netbios traffic, a Windows networking protocol, of upload activity. It was not possible to separate these and 2.4% is samba traffic, a Windows network and printer two traffic types, as they both behave in a similar manner. sharing service. These are services which are automatically They use a mix of UDP and TCP and random source and activated by Windows and do not represent an explicit desire destination ports, and they exhibit balanced throughput for by a user to connect to another user. No evidence was found incoming and outgoing streams. Bittorrent over a satellite of files being transferred using Samba or any other protocol gateway with cap-based-Internet access is a costly option
  • 8. as users pay for somebody else downloading fragments of on the behaviour we observed in our trace, we conducted an the file. This is due to the ‘tit-for-tat’ nature of Bittorrent. on-line survey in Macha. This survey was conducted during Hence we expect that most of this traffic is Skype rather than June and July 2011 and collected data broadly focused on Bittorrent (strong evidence for Skype dominance is also pro- access and usage of Web 2.0 applications and services. The vided in our interviews in Section 7), but further advanced survey was implemented on the SurveyMonkey tool, and data mining techniques will be required to extract the exact was based upon an open source example. It was the first breakdown of these two traffic types. Skype and Bittorrent time that an extended questionnaire was offered in Macha have the potential to be used to make calls between users with only an online version available. Users were invited to in the village or exchange files. However this is far more participate via email and Facebook links. Local support to likely to occur with Skype as Bittorrent is mostly used to help respondents in interacting with the online survey was download software, music or video that was not sourced by provided upon request. 77 users living in Macha participated local friends. in the survey consisting of 89 questions. The “Google mail via imap” category is for users who con- Some demographic findings from the survey: nect through an IMAP email client and send file attach- ments. This traffic type is encrypted using SSL. Analysis • 69% of respondents were between 20 and 30 years old. of the Facebook traffic category shows primarily image up- • 34% of the respondents were female, and 66% male. loads which are usually compressed by the Facebook server. Matching up and down flows for both these forms of traf- • 88% of respondents were able to use computers and fic, containing encryption and image manipulation, is left the Internet to achieve most of their objectives. 12% as a future exercise. There were a number of web-hosting regarded themselves as novice to computers. sites used in Macha, such as softlayer and freewebs; these are grouped together to form one category called “Web hosting”. • 67% of respondents use the Internet more than 3 hours Although no Youtube uploads were found, users in Macha a day. regularly upload podcasts to Podomatic, which accepts short audio or video clips that users have generated using mobile • 49% of respondents have Internet connectivity at home. phones or web cams. Only a small portion of file sharing was found as well as some file synchronization services through • 87% of respondents use the Internet at work. Ubuntu One. Mendeley is a program for managing and shar- • 71% of respondents use the Internet for learning. ing research papers, and some academic paper uploads oc- curred. There was a surprisingly small fraction of uploads • 51% of respondents use the Internet for entertainment. using web-based email clients; most of the mail attachments occur through non web-based email clients. • 91% of respondents wish to access the Internet more Using a set of basic heuristics, it was possible to iden- frequently. 34% are prevented from doing so because of tify two local Skype calls in the measurement period that Internet connectivity costs, 33% because of bandwidth were routed between two local users via an international limitations, and 25% because of the (institutional) reg- super-peer. Each flow is time-stamped and a simple check ulations for use. was made to see whether a local user connects to an exter- nal super-peer, and this same super-peer connects back to The survey examined current online activity in 16 cate- a different local user. The second heuristic is to check that gories. Key findings of the survey relevant to social network- the time-stamp between the outgoing and incoming flows is ing are: not more than a few seconds. These two skype calls lasted 10 minutes, and 3 minutes respectively, and make up an • In online engagement, the use of photo sharing stands insignificant proportion of the total number of Skype and out, with 60% of the respondents sharing pictures on Bittorrent traffic seen. Facebook and 52% commenting on them, at least sev- Although it is difficult to conclusively determine the amount eral times per month or more; of local content sharing in Macha due to much of the traf- • 34% of respondents do watch videos on a video sharing fic being encrypted or manipulated, we conclude that there website several times per month or more. is most likely only a small portion of overall uplink net- work traffic that is being used to share large objects be- • 53% of respondents indicate that they work collabora- tween local users. One of the key reasons for this is the high tively online using tools such as Google Docs. cost of bandwidth, together with the Internet-cap-model be- ing used. This is in stark contrast to the large amount of • 54% of respondents interact on social networks like instant messaging between users. For example, sharing a Facebook several times a week or more. A mere 9% 500M video costs a user $15. It is far more cost effective to of respondents never interact on social networks, while put the video on a flash drive and walk to another local user. 24% never used Facebook. 72% use instant messaging. However, if the architecture of the network made it possi- ble to exchange these files for free using a local web-based • All respondents use e-mail. 59% of respondents make application or through intelligent routing, local file sharing phone calls over the Internet several times per month would be sure to increase as it has in developed regions. or more, and 59% of respondents search for news online at least several times a week. 7. ON-LINE INTERVIEWS • 94% of respondents never used the Internet for an on- To understand whether the demographics and qualitative line business. 73% have never used the Internet to usage behaviour of the users in the village have any bearing purchase goods.
  • 9. In conclusion, the survey and measurements give indica- 9. ACKNOWLEDGEMENTS tions of an Internet community of 300 users with 200 regular The work described in this paper was funded in part by users in Macha. Most people desire more access and interac- NSF NetSE award CNS-1064821. The authors would also tion, but costs and bandwidth limitations restrain them from like to thank Linknet in Macha, Zambia for their cooperation doing so. Many of these findings correlate well with what we on this project. have observed in our analysis. The 140 local Facebook users active on instant messaging correlates with 72% of the 200 regular users who claim to actively use instant messaging. 10. REFERENCES The well connected interaction graph in Facebook is sup- [1] J. Chen, S. Amershi, A. Dhananjay, and ported by the fact that only 9% of the community does not L. Subramanian. Comparing web interaction models use social networking. The dominance of email traffic in our in developing regions. In Proceedings of the First ACM trace is also well supported by the fact that all respondents Symposium on Computing for Development, London, claim to use email. December 2010. The lower proportion of users who have Internet access [2] J. Chen, D. Hutchful, W. Thies, and L. Subramanian. at home versus users who have access at work will most Analyzing and accelerating web access in a school in likely have a negative effective on local user connections as peri-urban india. In WWW, Hyperabad, India, March activities like local VoIP and file sharing often occur after 2011. work. Internet users in Macha are primarily under 30 and [3] J. Domˇnech, A. Pont, J. Sahuquillo, and J. A. Gil. A c represent a new burgeoning group of trend setters for the rest user-focused evaluation of web prefetching algorithms. of the surrounding rural community. As these users, and Computer communications, 30(10):2213–2224, 2007. others that will join, begin to generate and share content [4] Bowei Du, Michael Demmer, and Eric Brewer. and become active members of the global digital village, Analysis of WWW traffic in Cambodia and Ghana. In every effort should be made to mask the crippling effect of WWW, Edinburgh, UK, May 2006. the slow Internet gateway. Building a novel new localized [5] S. B. Handurukande, A. M. Kermarrec, F. L. Fessant, network software architecture, that takes full advantage the and L. Massouli´. Exploiting semantic clustering in e unique strong clustering revealed in our traffic analysis, is the edonkey p2p network. In Proceedings of the 11th one such mechanism to do this. workshop on ACM SIGOPS European workshop, Leuven, Belgium, September 2004. [6] D. L. Johnson, E. M. Belding, K. Almeroth, and 8. CONCLUSION G. van Stam. Internet usage and performance analysis Social networking has grown in Macha and the network of a rural wireless network in Macha, Zambia. In in Macha is used extensively for intra-village conversation NSDR’10, San Francisco, CA, June 2010. in the form of instant messaging. For Facebook instant [7] D. L. Johnson, V. Pejovic, E. M. Belding, and G. van messaging, our statistical analysis revealed that 35% of the Stam. Traffic characterization and internet usage in users were local to the village, with 7% of these being trav- rural africa. In WWW, Hyperabad, India, March 2011. ellers, and 54% of the instant messages sent were between [8] R. Kumar, J. Novak, and A. Tomkins. Structure and local users. Interviews also revealed a large proportion of evolution of online social networks. Link Mining: users who make extensive use of social networking with in- Models, Algorithms, and Applications, pages 337–357, stant messaging being especially popular. Although there 2010. is strong social cohesion in this community, no direct local [9] K. W. Matthee, G. Mweemba, A. V. Pais, G. van networking traffic related to sharing files or making voice Stam, and M. Rijken. Bringing Internet connectivity or video calls was found. There was also very little use of to rural Zambia using a collaborative approach. In Skype between users in the village via Internet super-peers ICTD’07, Bangalore, India, December 2007. (2 calls within the two month measurement window) or file [10] S. Milgram. The small world problem. Psychology sharing (0.65% of large outgoing flows). File synchronization today, 2(1):60–67, 1967. services on the Internet were also minimal (0.94% of large [11] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, outgoing flows) due to the high cost of bandwidth ($32/GB) and B. Bhattacharjee. Measurement and analysis of and bandwidth limitations of the satellite gateway. online social networks. In Proceedings of the 7th ACM It is clear that the current hub and spoke architecture of SIGCOMM conference on Internet measurement, San the web, with most services running as monolithic servers, is Diego, CA, 2007. not well suited to rural networks with low-bandwidth gate- [12] J. Postill. Localizing the internet beyond communities ways. However, the strong social cohesion and interdepen- and networks. New Media & Society, 10(3):413, 2008. dence often found in rural communities is a key differentiator [13] H. Schulze and K. Mochalski. ipoque Internet Study which, if taken advantage of, can make substantial improve- 2008/2009, 2009. ments to network performance when bandwidth-limited In- [14] S. Sounders. The HTTP archive. ternet gateways are used. A new localized network software http://httparchive.org. architecture is needed to take full advantage of this strong clustering found in rural communities. This software should [15] C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and place services that enable user-to-user interaction and file B.Y. Zhao. User interactions in social networks and sharing in the village. Once in place, rural communities will their implications. In Proceedings of the 4th ACM disseminate information amongst each other more efficiently European Conference on Computer systems, pages and Internet responsiveness will improve due to offloading 205–218, 2009. “local” traffic from the gateway.