This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Measuring Client-Perceived Pageview Response Time of Internet Services
May 2011 (vol. 22 no. 5)
pp. 773-785
Jianbin Wei, Yahoo! Inc, Sunnyvale
Cheng-Zhong Xu, Wayne State University, Detroit
As e-commerce services are exponentially growing, businesses need quantitative estimates of client-perceived response times to continuously improve the quality of their services. Current server-side nonintrusive measurement techniques are limited to nonsecured HTTP traffic. In this paper, we present the design and evaluation a monitor, namely sMonitor, which is able to measure client-perceived response times for both HTTP and HTTPS traffic. At the heart of sMonitor is a novel size-based analysis method that parses live packets to delimit different webpages and to infer their response times. The method is based on the observation that most HTTP(S)-compatible browsers send significantly larger requests for container objects than those for embedded objects. sMonitor is designed to operate accurately in the presence of complicated browser behaviors, such as parallel downloading of multiple webpages and HTTP pipelining, as well as packet losses and delays. It requires only to passively collect network traffic in and out of the monitored secured services. We conduct comprehensive experiments across a wide range of operating conditions using live secured Internet services, on the PlanetLab, and on controlled networks. The experimental results demonstrate that sMonitor is able to control the estimation error within 6.7 percent, in comparison with the actual measured time at the client side.

[1] J. Almeida, M. Dabu, A. Manikutty, and P. Cao, "Providing Differentiated Levels of Service in Web Content Hosting," Proc. ACM SIGMETRICS Workshop Internet Server Performance, pp. 91-102, June 1998.
[2] P. Barford and M. Crovella, "Generating Representative Web Workloads for Network and Server Performance Evaluation," Proc. ACM SIGMETRICS, pp. 151-160, June 1998.
[3] N. Bhatti, A. Bouch, and A. Kuchinsky, "Integrating User-Perceived Quality into Web Server Design," Proc. Ninth Int'l World Wide Web (WWW) Conf. Computer Networks, pp. 1-16, 2000.
[4] S. Chen, K. Joshi, M. Hiltunen, W. Sanders, and R. Schlichting, "Link Gradients: Predicting the Impact of Network Latency on Multi-Tier Applications," Proc. IEEE INFOCOM, 2009.
[5] L. Cherkasova, Y. Fu, W. Tang, and A. Vahdat, "Measuring and Characterizing End-to-End Internet Service Performance," ACM Trans. Internet Technology, vol. 3, no. 4, pp. 347-391, 2003.
[6] A. Feldmann, "BLT: Bi-Layer Tracing of HTTP and TCP/IP," Proc. Ninth Int'l World Wide Web (WWW) Conf. Computer Networks, pp. 321-335, 2000.
[7] N. Ferguson and B. Schneier, Practical Cryptography. John Wiley & Sons, 2003.
[8] R.T. Fielding, J. Gettys, J.C. Mogul, H.F. Nielsen, L. Masinter, P.J. Leach, and T. Berners-Lee, Hypertext Transfer Protocol - HTTP/1.1. Network Working Group, Request for Comments 2616bis, June 1999.
[9] F. Hernandez-Campos, K. Jeffay, and F.D. Smith, "Tracking the Evolution of Web Traffic: 1995-2003," Proc. 11th IEEE Int'l Symp. Modeling, Analysis, and Simulation of Computer and Telecomm. Systems (MASCOTS), pp. 16-25, 2003.
[10] HP, "Openview Transaction Analyzer," http:/openview.hp. com/, 2010.
[11] IBM, "Page Detailer," http://www.alphaworks.ibm.com/techpagedetailer , 2010.
[12] Keynote Systems, Inc., www.keynote.com, 2010.
[13] R. Kohavi, R. Henne, and D. Sommerfield, "Practical Guide to Controlled Experiments on the Web: Listen to Your Customers Not the HiPPO," Proc. ACM SIGKDD, 2007.
[14] H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication. Network Working Group, Request for Comments 2104, Feb. 1997.
[15] B. Krishnamurthy and C.E. Wills, "Improving Web Performance by Client Characterization Driven Server Adaptation," Proc. 11th Int'l Conf. World Wide Web, 2002.
[16] Z. Li, M. Zhang, Z. Zhu, Y. Chen, A. Greenberg, and Y.-M. Wang, "WebProphet: Automating Performance Prediction for Web Services," Proc. Seventh USENIX Symp. Networked Systems Design and Implementation (NSDI), 2010.
[17] Microsoft Corporation, "How to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll," http://support.microsoft.com?kbid=245030 , Dec. 2004.
[18] NetApplications.com, "Browser Version Market Share," http://marketshare.hitslink.comreport.aspx?qprid=6 , Dec. 2006.
[19] D. Olshefski and J. Nieh, "Understanding the Management of Client Perceived Response Time," Proc. ACM SIGMETRICS, pp. 240-251, 2006.
[20] D. Olshefski, J. Nieh, and D. Agrawal, "Using Certes to Infer Client Response Time at the Web Server," ACM Trans. Computer Sysmtems, vol. 22, no. 1, pp. 49-93, 2004.
[21] D.P. Olshefski, J. Nieh, and E. Nahum, "ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams," Proc. Sixth USENIX Symp. Operating Systems Design and Implementation (OSDI), pp. 333-346, 2004.
[22] V.N. Padmanabhan and L. Qiu, "The Content and Access Dynamics of a Busy Web Site: Findings and Implications," Proc. ACM SIGCOMM, pp. 111-123, 2000.
[23] D. Patterson, "A Simple Way to Estimate the Cost of Downtime," Proc. 16th USENIX Large Installation System Administration Conf. (LISA), pp. 185-188, 2002.
[24] V. Paxson and M. Allman, Computing TCP's Retransmission Timer. Network Working Group, Request for Comments 2988, Nov. 2000.
[25] R. Rajamony and M. Elnozahy, "Measuring Client-Perceived Response Time on the WWW," Proc. Third Conf. USENIX Symp. Internet Technologies and Systems (USITS), 2001.
[26] Jupiter Research, "Retail Web Site Performance: Consumer Reaction to a Poor Online Shopping Experience," technical report, JupiterKagan, Inc., 2006.
[27] L. Rizzo, "Dummynet: A Simple Approach to the Evaluation of Network Protocols," ACM SIGCOMM Computer Comm. Rev., vol. 27, no. 1, pp. 31-41, 1997.
[28] S. Shakkottai, R. Srikant, N. Brownlee, A. Broido, and K. Claffy, "The RTT Distribution of TCP Flows in the Internet and Its Impact on TCP-Based Flow Control," technical report, The Cooperative Assoc. for Internet Data Analysis (CAIDA), 2004.
[29] J. Slottow, A. Shahriari, M. Stein, X. Chen, C. Thomas, and P.B. Ender, "Instrumenting and Tuning Dataview—A Networked Application for Navigating through Large Scientific Datasets," Software: Practice and Experience, vol. 32, no. 2, pp. 165-190, Feb. 2002.
[30] F.D. Smith, F. Hernandez-Campos, K. Jeffay, and D. Ott, "What TCP/IP Protocol Headers Can Tell Us About the Web," Proc. ACM SIGMETRICS, pp. 245-256, 2001.
[31] Q. Sun, D.R. Simon, Y.-M. Wang, W. Russell, V.N. Padmanabhan, and L. Qiu, "Statistical Identification of Encrypted Web Browsing Traffic," Proc. IEEE Symp. Security and Privacy, pp. 19-30, May 2002.
[32] M. Tariq, K. Bhandankar, V. Valancius, A. Zeitoun, N. Feamster, and M. Ammar, "Answering "What-If" Deployment and Configuration Questions with WISE: Techniques and Deployment Experience," Proc. ACM SIGCOMM, 2008.
[33] J. Wei and C. Xu, "eQoS: Provisioning of Client-Perceived End-to-End QoS Guarantees in Web Servers," IEEE Trans. Computers, vol. 55, no. 12, pp. 1543-1556, Dec. 2006.
[34] J. Wei and C.-Z. Xu, "sMonitor: A Non-Intrusive Client-Perceived End-to-End Performance Monitor of Secured Internet Services," Proc. USENIX Ann. Technical Conf., June 2006.
[35] J. Wei, X. Zhou, and C.-Z. Xu, "Robust Processing Rate Allocation for Proportional Slowdown Differentiation on Internet Servers," IEEE Trans. Computers, vol. 54, no. 8, pp. 964-977, Aug. 2005.
[36] C.-Z. Xu, J. Wei, and F. Liu, "Model Predictive Feedback Control for QoS Assurance in Web Servers," Computer, vol. 41, no. 3, pp. 66-72, Mar. 2008.

Index Terms:
Client-perceived service quality, monitoring and measurement, pageview response time, secured Internet services.
Citation:
Jianbin Wei, Cheng-Zhong Xu, "Measuring Client-Perceived Pageview Response Time of Internet Services," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 773-785, May 2011, doi:10.1109/TPDS.2010.131
Usage of this product signifies your acceptance of the Terms of Use.