A characterization of broadband user behavior and their e-business activities

This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the characterization is performed along four criteria: (i) session arrival process, (ii) session duration, (iii) number of bytes transferred within a session and (iv) user request patterns.Our results show that both residential and SOHO session inter-arrival times are exponentially distributed. Whereas residential session arrival rates remain relatively high during the day, SOHO session arrival rates vary much more significantly during the day. On the other hand, a typical SOHO user session is longer and transfers a larger volume of data. Furthermore, our analysis uncovers two main groups of session request patterns within each user category. The first group consists of user sessions that use traditional Internet services, such as e-mail, instant messenger and, mostly, www services. On the other hand, sessions from the second group, a smaller group, use typically peer-to-peer file sharing applications, remain active for longer periods and transfer a large amount of data. Looking further into the e-business services most commonly accessed, we found that subscription-based and advertising services account for the vast majority of user HTTP requests in both residential and SOHO workloads. Understanding these user behavior patterns is important to the development of more efficient applications for broadband users.

[1]  H. Apte,et al.  An Analysis of Internet Content Delivery Systems , 2006 .

[2]  Michael A. Rappa,et al.  The utility business model and the future of computing services , 2004, IBM Syst. J..

[3]  Carl Rigney,et al.  RADIUS Accounting , 1997, RFC.

[4]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[5]  Virgílio A. F. Almeida,et al.  A hierarchical characterization of a live streaming media workload , 2006, TNET.

[6]  Kurt Tutschku,et al.  A Measurement-Based Traffic Profile of the eDonkey Filesharing Service , 2004, PAM.

[7]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[8]  Martin Arlitt,et al.  A workload characterization study of the 1998 World Cup Web site , 2000, IEEE Netw..

[9]  Daniel A. Menascé,et al.  Scaling for E-Business: Technologies, Models, Performance, and Capacity Planning , 2000 .

[10]  Ítalo S. Cunha,et al.  Analyzing client interactivity in streaming media , 2004, WWW '04.

[11]  Sally Floyd,et al.  Difficulties in simulating the internet , 2001, TNET.

[12]  Martin Arlitt,et al.  Workload Characterization of the 1998 World Cup Web Site , 1999 .

[13]  Mark Crovella,et al.  Characteristics of WWW Client-based Traces , 1995 .

[14]  Azer Bestavros,et al.  Changes in Web client access patterns: Characteristics and caching implications , 1999, World Wide Web.

[15]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[16]  Venkata N. Padmanabhan,et al.  Some findings on the network performance of broadband hosts , 2003, IMC '03.

[17]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.

[18]  Terry Williams,et al.  Probability and Statistics with Reliability, Queueing and Computer Science Applications , 1983 .

[19]  Takeo Hamada,et al.  Peer-to-peer traffic in metro networks: analysis, modeling, and policies , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[20]  Martin F. Arlitt,et al.  Characterizing Web user sessions , 2000, PERV.

[21]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[22]  Adam Wierzbicki,et al.  Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.

[23]  Martin F. Arlitt,et al.  Workload characterization of a Web proxy in a cable modem environment , 1999, PERV.