SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and
           Operating System Support for Digital Audio and Video)




            Game Traffic Analysis:
           An MMORPG Perspective
       (MMORPG: Massive Multiplayer Online Role Playing Game)



                    Kuan-Ta Chen, Polly Huang,
                 Chun-Ying Huang, Chin-Laung Lei

              Department of Electrical Engineering
                  National Taiwan University

                                                                  Apr. 29, 2005
Talk Outline

           Overview
                network game research
                current status of MMORPG
           Trace collection
           Traffic characterization & their physical
           explanations
           Conclusion
           Future work


Game Traffic Analysis: An MMORPG Perspective           2
Network Game Research

           Traffic analysis and modeling
                packet size/arrival process
                connection time/arrival process
           User behavior analysis and modeling
                session time, session arrival process
                session membership
           The effects of network QoS
                affect player duration?
                affect arrival / departure rate?
                affect overall score or running speed?

Game Traffic Analysis: An MMORPG Perspective             3
Network Game Research (cont.)

           Dead reckoning (client-side prediction)
           Interest management (preference clustering)
           Server discovery mechanism
           (select a best game server)
           Network infrastructure
                multicast – group management
                multi-tier (proxyed)
                p2p / overlay networks



Game Traffic Analysis: An MMORPG Perspective             4
Motivation

           Network games contribute 3% -- 4% Internet
           traffic at backbones in 2000
           MMORPG
                the dominate network game genre in Asia
                exhibit distinct features, such as
                • no explicit game rounds
                • no restrict on player number




Game Traffic Analysis: An MMORPG Perspective              5
The Increasing Popularity of MMOG




                                               Figure curtsey of http://www.mmogchart.com/
Game Traffic Analysis: An MMORPG Perspective                                                 6
Popular Genres in MMORPG




  Figure curtsey of http://www.mmogchart.com/
Game Traffic Analysis: An MMORPG Perspective    7
Network Games in Taiwan

           120 network games in 1st quarter, 2003
           market value of 6,800 million NT dollars in
           2003 fl 80% share of the whole PC game
           industry
           Gamania (Lineage) owns > 4,000 Mbps links
           R. O. has a record of 370,000 players online,
           equivalent to 1.5% of the population




Game Traffic Analysis: An MMORPG Perspective               8
Online

           a mid-scale, commercial MMORPG in Taiwan
           a typical Asia MMORPG ---
                Microsoft Windows platform (Windows 2000,
                MS SQL Server)
                data communication based on TCP
           (By the way) Issues on network protocols
                UDP: Ultima Online (EA), Everquest series (SOE)
                TCP: World of Warcraft (Blizzard)
                no general agreement on the use of base protocol


Game Traffic Analysis: An MMORPG Perspective                       9
神州 Online

                 m   e
            It’s
Trace Collection - Setup

                                                                                Game Traffic




                                                   Ethernet
                                                   Gigabit
                               Management
     a FreeBSD PC               interface

     w/ tcpdump                              L3 switch          Game & Database servers

                                      Monitoring
                                      interface

                                         Port
                                      forwarding
                    Traffic Monitor                 L4 switch       L2 switch


Game Traffic Analysis: An MMORPG Perspective                                                   11
Trace Collection - Summary

        Trace Sets                    Date        Time Period    Drops
          N1          3       8/29/04 (Sun.) 15:00 8 hr.        0.003%
          N2          2       8/30/04 (Mon.) 13:00 12 hr.          ?

        Trace        TCP             Packets                 Bytes
                    Conn.         (in/out/both)         (in/out/both)
          N1        57,945        342M / 353M /       4.7TB / 27.3TB /
                                      695M                  32.0TB
          N2        54,424        325M / 336M /       4.7TB / 21.7TB /
                                      661M                  26.5TB
                             1,356 million packets in total

Game Traffic Analysis: An MMORPG Perspective                             12
Term definition

         Client traffic           all traffic sent from clients
         Client packets all packets sent from clients
         Client data    all packets excluding “pure TCP ack
         packets        packets” (40 bytes) sent from clients

           The same rules apply to server traffic, server
           packets, and server data packets




Game Traffic Analysis: An MMORPG Perspective                      13
Traffic Characterization

           Tiny packets
           Low bandwidth requirement
           Temporal dependency in both
                within-connection traffic
                aggregate traffic
           Periodicity and synchronization




Game Traffic Analysis: An MMORPG Perspective   14
Payload size distribution - CDF

                                               client packets
                                                 98% pkts’ payload ≤ 31
                                                 bytes
                                                 the most two modes
                                                 occupy 90% fl certain
                                                 commands are popular
                                               server packets
                                                 avg. payload size 114
                                                 bytes
                                               contrast to the mean
                                               packet size 400 bytes
                                               observed in backbones


Game Traffic Analysis: An MMORPG Perspective                              15
The consequence of tiny packets

           overhead of protocol in client traffic
                73% bytes are headers
                30% bytes (38% pkts) are for pure TCP acks
           The challenge on infrastructures
                overall avg. pkt size is 84 bytes
                routers generally assume pkt size within
                125 -- 250 bytes
                when vendors claim 1 Gbps rate, they may
                indicate 5M pkt/sec for avg. pkt size = 200 bytes



Game Traffic Analysis: An MMORPG Perspective                        16
Packet load distribution

                                               < 5 pkt/sec for
                                               server data pkt in
                                               most of conn.
                                               < 15 pkt/sec for
                                               99% of conn.




Game Traffic Analysis: An MMORPG Perspective                        17
Bandwidth Usage

                                               client traffic
                                                  < 3 Kbps data
                                                  < 8 Kbps w/ ack
                                               server traffic
                                                  < 13 Kbps
                                               << 40 Kbps for a FPS
                                               (First Person Shooting)
                                               game, Counter-Strike
                                               Similar to Warcraft III, a
                                               RTS (Realtime Strategy)
                                               Game


Game Traffic Analysis: An MMORPG Perspective                                18
Cannot Overlook the Traffic of MMOGs

           R. O. in Taiwan announced a record of
           370,000 online players
           assuming each user use 10 Kbps fl total
           3.7 Gbps is required in average for just A
           game.




Game Traffic Analysis: An MMORPG Perspective            19
Packet Interarrivals within a Connection

           User inputs is not Poisson
           Temporal dependence exist in both client
           traffic and server traffic




Game Traffic Analysis: An MMORPG Perspective          20
CDF of Packet Interarrival Times




                                               deviation from
                                               exponential distribution




Game Traffic Analysis: An MMORPG Perspective                              21
Diversity in User Behaviors

                                                   active player:
                                                   close to
                                   active player
                                                   exponential
                                   common player   idle player:
                                   idle player     uniform +
                                                   determinist distr.
                                                   common player:
                                                   in-between the
                                                   two extremes


Game Traffic Analysis: An MMORPG Perspective                            22
神州 Online




            These players are
              keeping stalls.
CDF of Packet Interarrival Times




                                               50% are around 200 ms
                                               fl signature of periodic
                                               message dispatch




Game Traffic Analysis: An MMORPG Perspective                             24
Temporal Locality in Client Traffic




           ACF: auto-correlation functions
           clustering nature in player actions
           active actions: walking, fighting
           inactive actions: talking, viewing equipments,
           trading, idle
Game Traffic Analysis: An MMORPG Perspective                25
Clustered nature in user actions

                Client packet inter-arrival times
                from a player




                                                 30 s
                         100 s           120 s          120 s           150 s


                                 140 s                          400 s




Game Traffic Analysis: An MMORPG Perspective                                    26
Temporal Locality in Server Traffic




           Server pkt primarily convey position updates
           the rate of position updates depends on the
           number of nearby characters


Game Traffic Analysis: An MMORPG Perspective              27
Spatial Locality in # of Neighbors




                                               Pos     Neighbor #
                                               (3,3)       1
                                               (2,3)       2
                                                …
                                               (1,1)       4
                                               (1,2)       5
                                               (1,3)       4
Game Traffic Analysis: An MMORPG Perspective                        28
Transformation: Spatial Locality to Temporal Locality




                 The spatial locality shows up in terms of
                 temporal locality in the traffic as the
                 characters move continuously on the map.

                                               t    Neighbor #
                                               1        1
                                               2        2
                                               3        1
                                               …
                                               10       4
                                               11       5
                                               12       4
Game Traffic Analysis: An MMORPG Perspective                     29
Temporal locality in server traffic
               Server packet rates for a player




Game Traffic Analysis: An MMORPG Perspective      30
Aggregate Packet Arrivals

           the aggregate packet arrival time series
                count the number of incoming/outgoing packets
                regardless of connections
                take samples every 10 ms
           Patterns identified
                temporal dependence
                periodicity




Game Traffic Analysis: An MMORPG Perspective                    31
ACF of aggregate server pkt arrivals

                                               periodity: 200 ms
                                               position updates
                                               are synchronous to
                                               all clients
                                               incurring packet
                                               bursts




Game Traffic Analysis: An MMORPG Perspective                        32
ACF of aggregate client pkt arrivals


                           Positive temporal dependence up to
                           three minutes.




Game Traffic Analysis: An MMORPG Perspective                    33
The “flash crowds” effects

                                               ACF for successive
                                               3 minutes
                                               Players are active
                                               simultaneously at
                                               times
                                               “global events”
                                               lead to flash
                                               crowds effects



Game Traffic Analysis: An MMORPG Perspective                        34
Frequency Components in Server Traffic

                                                 PSD: power
                                 5 Hz            spectral density
                                                 another proof of
                                                 the 200 ms round
                                                 Servers seem to
                                     Multiples   adapt frequency
                                     of 5 Hz     by certain metrics,
                                                 such as number of
                                                 nearby characters




Game Traffic Analysis: An MMORPG Perspective                           35
Frequency Components in Client Traffic

                                                       by auto-walk and
                                 6 Hz
                                                       auto-attack timers
                                                       Adjust frequency
                                                       by level/skill and
                                                       weapons held
                                       Multiples of
                                       6 Hz            client timers are
                                                       synchronized
                                                      Does the sync. lead
                                                      to performance
                                                      problems?

Game Traffic Analysis: An MMORPG Perspective                                36
Conclusion

           Traffic characteristics & physical explanations
                Tiny packets
                Low bandwidth requirement for individual client
                Non-poisson user inputs
                (diversity of user behaviors)
                Temporal dependency in within-connection traffic
                (clustering nature in user inputs)
                Temporal dependency in aggregate traffic
                (flash crowds effects)
                Periodicity and synchronization
                (common implementation practice)


Game Traffic Analysis: An MMORPG Perspective                       37
Conclusion (cont.)

           TCP maybe an overkill for MMORPG, e.g., in
           oveall client traffic
                73% bytes used by TCP/IP headers
                30% bytes used by pure TCP acks




Game Traffic Analysis: An MMORPG Perspective            38
Future Work

           assessment for impacts of network QoS
           more traffic characterization
                Identify abnormal sessions, e.g., bots in Lineage &
                Ragnarok Online
                Identify game traffic
           performance evaluation

                     To provide a better network
                     infrastructure for netgames

Game Traffic Analysis: An MMORPG Perspective                          39
Questions?
Thank You!




    kuan@ilife.cx
http://kuan.ilife.cx/

Mais conteúdo relacionado

Mais procurados

EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...Thang Nguyen
 
564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slidesMuthukrishnan008
 
Networking questions
Networking questionsNetworking questions
Networking questionsrajujast
 
Tcpip (Dharmender Kumar) 09990478253
Tcpip (Dharmender Kumar)   09990478253Tcpip (Dharmender Kumar)   09990478253
Tcpip (Dharmender Kumar) 09990478253guestda14e85
 
Literature review report
Literature review reportLiterature review report
Literature review reportBirju Tank
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTEdebamoha
 
BICC protocol and application
BICC protocol and applicationBICC protocol and application
BICC protocol and applicationIsybel Harto
 
internetworking operation
internetworking operationinternetworking operation
internetworking operationSrinivasa Rao
 
Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)
Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)
Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)Ayann Khan
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
 

Mais procurados (20)

Question
QuestionQuestion
Question
 
Umts 18 19
Umts 18 19Umts 18 19
Umts 18 19
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
A Survey of Border Gateway Protocol
A Survey of Border Gateway ProtocolA Survey of Border Gateway Protocol
A Survey of Border Gateway Protocol
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...
 
3G Mobile Internet
3G Mobile Internet3G Mobile Internet
3G Mobile Internet
 
F0322038042
F0322038042F0322038042
F0322038042
 
564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
Tcpip (Dharmender Kumar) 09990478253
Tcpip (Dharmender Kumar)   09990478253Tcpip (Dharmender Kumar)   09990478253
Tcpip (Dharmender Kumar) 09990478253
 
Literature review report
Literature review reportLiterature review report
Literature review report
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTE
 
Networks faq
Networks faqNetworks faq
Networks faq
 
BICC protocol and application
BICC protocol and applicationBICC protocol and application
BICC protocol and application
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
 
Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)
Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)
Gsm bss-network-kpi-tch-call-drop-rate-optimization-manual(cdr)
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
 
Lecture05
Lecture05Lecture05
Lecture05
 

Destaque

Social Networking In MMOG‘s
Social Networking In MMOG‘sSocial Networking In MMOG‘s
Social Networking In MMOG‘sCCPWhisper
 
MMOTraffic - The Leading MMO Marketing Partner
MMOTraffic -  The Leading MMO Marketing PartnerMMOTraffic -  The Leading MMO Marketing Partner
MMOTraffic - The Leading MMO Marketing PartnerMMO Traffic
 
Online games: a real-time problem for the network
Online games: a real-time problem for the networkOnline games: a real-time problem for the network
Online games: a real-time problem for the networkJose Saldana
 
Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...
Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...
Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...Amazon Web Services
 
5 Major Challenges in Real-time Rendering (2012)
5 Major Challenges in Real-time Rendering (2012)5 Major Challenges in Real-time Rendering (2012)
5 Major Challenges in Real-time Rendering (2012)Electronic Arts / DICE
 
3D Graphics & Rendering in Computer Graphics
3D Graphics & Rendering in Computer Graphics3D Graphics & Rendering in Computer Graphics
3D Graphics & Rendering in Computer GraphicsFaraz Akhtar
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsAman Srivastava
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating systemMohammad Alam
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 

Destaque (10)

Social Networking In MMOG‘s
Social Networking In MMOG‘sSocial Networking In MMOG‘s
Social Networking In MMOG‘s
 
MMOTraffic - The Leading MMO Marketing Partner
MMOTraffic -  The Leading MMO Marketing PartnerMMOTraffic -  The Leading MMO Marketing Partner
MMOTraffic - The Leading MMO Marketing Partner
 
Online games: a real-time problem for the network
Online games: a real-time problem for the networkOnline games: a real-time problem for the network
Online games: a real-time problem for the network
 
Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...
Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...
Building a World in the Clouds: MMO Architecture on AWS (MBL304) | AWS re:Inv...
 
5 Major Challenges in Real-time Rendering (2012)
5 Major Challenges in Real-time Rendering (2012)5 Major Challenges in Real-time Rendering (2012)
5 Major Challenges in Real-time Rendering (2012)
 
3D Graphics & Rendering in Computer Graphics
3D Graphics & Rendering in Computer Graphics3D Graphics & Rendering in Computer Graphics
3D Graphics & Rendering in Computer Graphics
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life Applications
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 

Semelhante a Analysis of MMORPG Game Traffic

Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & TroubleshootingAPNIC
 
Enhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network ApplianceEnhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network ApplianceOpen Networking Summit
 
The problem of using a best-effort network for online games
The problem of using a best-effort network for online gamesThe problem of using a best-effort network for online games
The problem of using a best-effort network for online gamesJose Saldana
 
An Empirical Evaluation of TCP Performance in Online Games
An Empirical Evaluation of TCP Performance in Online GamesAn Empirical Evaluation of TCP Performance in Online Games
An Empirical Evaluation of TCP Performance in Online GamesAcademia Sinica
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
N2os overview
N2os overviewN2os overview
N2os overviewhwjeon1
 
ONS Summit 2017 SKT TINA
ONS Summit 2017 SKT TINAONS Summit 2017 SKT TINA
ONS Summit 2017 SKT TINAJunho Suh
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 
Redesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsNitinder Mohan
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Spark Summit
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosBrent Salisbury
 

Semelhante a Analysis of MMORPG Game Traffic (20)

Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
 
Enhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network ApplianceEnhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network Appliance
 
The problem of using a best-effort network for online games
The problem of using a best-effort network for online gamesThe problem of using a best-effort network for online games
The problem of using a best-effort network for online games
 
An Empirical Evaluation of TCP Performance in Online Games
An Empirical Evaluation of TCP Performance in Online GamesAn Empirical Evaluation of TCP Performance in Online Games
An Empirical Evaluation of TCP Performance in Online Games
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
N2os overview
N2os overviewN2os overview
N2os overview
 
ONS Summit 2017 SKT TINA
ONS Summit 2017 SKT TINAONS Summit 2017 SKT TINA
ONS Summit 2017 SKT TINA
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
Redesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge clouds
 
How to use mtr 2
How to use mtr 2How to use mtr 2
How to use mtr 2
 
Interprocess Message Formats
Interprocess Message FormatsInterprocess Message Formats
Interprocess Message Formats
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
Towards Benchmaking Modern Distruibuted Systems-(Grace Huang, Intel)
 
Polyraptor
PolyraptorPolyraptor
Polyraptor
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
internet services
internet servicesinternet services
internet services
 

Mais de Academia Sinica

Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Academia Sinica
 
Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?Academia Sinica
 
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...Academia Sinica
 
Cloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and OutlookCloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and OutlookAcademia Sinica
 
Quantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud GamesQuantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud GamesAcademia Sinica
 
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值Academia Sinica
 
On The Battle between Online Gamers and Lags
On The Battle between Online Gamers and LagsOn The Battle between Online Gamers and Lags
On The Battle between Online Gamers and LagsAcademia Sinica
 
Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingAcademia Sinica
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkAcademia Sinica
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsAcademia Sinica
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemAcademia Sinica
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAcademia Sinica
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game AddictivenessAcademia Sinica
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesAcademia Sinica
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficAcademia Sinica
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryAcademia Sinica
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessAcademia Sinica
 
A Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation SystemsA Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation SystemsAcademia Sinica
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionAcademia Sinica
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionAcademia Sinica
 

Mais de Academia Sinica (20)

Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
 
Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?Games on Demand: Are We There Yet?
Games on Demand: Are We There Yet?
 
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on ...
 
Cloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and OutlookCloud Gaming Onward: Research Opportunities and Outlook
Cloud Gaming Onward: Research Opportunities and Outlook
 
Quantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud GamesQuantifying User Satisfaction in Mobile Cloud Games
Quantifying User Satisfaction in Mobile Cloud Games
 
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
量化「樂趣」-以心理生理量測探究數位娛樂商品之市場價值
 
On The Battle between Online Gamers and Lags
On The Battle between Online Gamers and LagsOn The Battle between Online Gamers and Lags
On The Battle between Online Gamers and Lags
 
Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client Gaming
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired Comparisons
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming System
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game Addictiveness
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype Traffic
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar Trajectory
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
 
A Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation SystemsA Collusion-Resistant Automation Scheme for Social Moderation Systems
A Collusion-Resistant Automation Scheme for Social Moderation Systems
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player Interaction
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Analysis of MMORPG Game Traffic

  • 1. Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer Online Role Playing Game) Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei Department of Electrical Engineering National Taiwan University Apr. 29, 2005
  • 2. Talk Outline Overview network game research current status of MMORPG Trace collection Traffic characterization & their physical explanations Conclusion Future work Game Traffic Analysis: An MMORPG Perspective 2
  • 3. Network Game Research Traffic analysis and modeling packet size/arrival process connection time/arrival process User behavior analysis and modeling session time, session arrival process session membership The effects of network QoS affect player duration? affect arrival / departure rate? affect overall score or running speed? Game Traffic Analysis: An MMORPG Perspective 3
  • 4. Network Game Research (cont.) Dead reckoning (client-side prediction) Interest management (preference clustering) Server discovery mechanism (select a best game server) Network infrastructure multicast – group management multi-tier (proxyed) p2p / overlay networks Game Traffic Analysis: An MMORPG Perspective 4
  • 5. Motivation Network games contribute 3% -- 4% Internet traffic at backbones in 2000 MMORPG the dominate network game genre in Asia exhibit distinct features, such as • no explicit game rounds • no restrict on player number Game Traffic Analysis: An MMORPG Perspective 5
  • 6. The Increasing Popularity of MMOG Figure curtsey of http://www.mmogchart.com/ Game Traffic Analysis: An MMORPG Perspective 6
  • 7. Popular Genres in MMORPG Figure curtsey of http://www.mmogchart.com/ Game Traffic Analysis: An MMORPG Perspective 7
  • 8. Network Games in Taiwan 120 network games in 1st quarter, 2003 market value of 6,800 million NT dollars in 2003 fl 80% share of the whole PC game industry Gamania (Lineage) owns > 4,000 Mbps links R. O. has a record of 370,000 players online, equivalent to 1.5% of the population Game Traffic Analysis: An MMORPG Perspective 8
  • 9. Online a mid-scale, commercial MMORPG in Taiwan a typical Asia MMORPG --- Microsoft Windows platform (Windows 2000, MS SQL Server) data communication based on TCP (By the way) Issues on network protocols UDP: Ultima Online (EA), Everquest series (SOE) TCP: World of Warcraft (Blizzard) no general agreement on the use of base protocol Game Traffic Analysis: An MMORPG Perspective 9
  • 10. 神州 Online m e It’s
  • 11. Trace Collection - Setup Game Traffic Ethernet Gigabit Management a FreeBSD PC interface w/ tcpdump L3 switch Game & Database servers Monitoring interface Port forwarding Traffic Monitor L4 switch L2 switch Game Traffic Analysis: An MMORPG Perspective 11
  • 12. Trace Collection - Summary Trace Sets Date Time Period Drops N1 3 8/29/04 (Sun.) 15:00 8 hr. 0.003% N2 2 8/30/04 (Mon.) 13:00 12 hr. ? Trace TCP Packets Bytes Conn. (in/out/both) (in/out/both) N1 57,945 342M / 353M / 4.7TB / 27.3TB / 695M 32.0TB N2 54,424 325M / 336M / 4.7TB / 21.7TB / 661M 26.5TB 1,356 million packets in total Game Traffic Analysis: An MMORPG Perspective 12
  • 13. Term definition Client traffic all traffic sent from clients Client packets all packets sent from clients Client data all packets excluding “pure TCP ack packets packets” (40 bytes) sent from clients The same rules apply to server traffic, server packets, and server data packets Game Traffic Analysis: An MMORPG Perspective 13
  • 14. Traffic Characterization Tiny packets Low bandwidth requirement Temporal dependency in both within-connection traffic aggregate traffic Periodicity and synchronization Game Traffic Analysis: An MMORPG Perspective 14
  • 15. Payload size distribution - CDF client packets 98% pkts’ payload ≤ 31 bytes the most two modes occupy 90% fl certain commands are popular server packets avg. payload size 114 bytes contrast to the mean packet size 400 bytes observed in backbones Game Traffic Analysis: An MMORPG Perspective 15
  • 16. The consequence of tiny packets overhead of protocol in client traffic 73% bytes are headers 30% bytes (38% pkts) are for pure TCP acks The challenge on infrastructures overall avg. pkt size is 84 bytes routers generally assume pkt size within 125 -- 250 bytes when vendors claim 1 Gbps rate, they may indicate 5M pkt/sec for avg. pkt size = 200 bytes Game Traffic Analysis: An MMORPG Perspective 16
  • 17. Packet load distribution < 5 pkt/sec for server data pkt in most of conn. < 15 pkt/sec for 99% of conn. Game Traffic Analysis: An MMORPG Perspective 17
  • 18. Bandwidth Usage client traffic < 3 Kbps data < 8 Kbps w/ ack server traffic < 13 Kbps << 40 Kbps for a FPS (First Person Shooting) game, Counter-Strike Similar to Warcraft III, a RTS (Realtime Strategy) Game Game Traffic Analysis: An MMORPG Perspective 18
  • 19. Cannot Overlook the Traffic of MMOGs R. O. in Taiwan announced a record of 370,000 online players assuming each user use 10 Kbps fl total 3.7 Gbps is required in average for just A game. Game Traffic Analysis: An MMORPG Perspective 19
  • 20. Packet Interarrivals within a Connection User inputs is not Poisson Temporal dependence exist in both client traffic and server traffic Game Traffic Analysis: An MMORPG Perspective 20
  • 21. CDF of Packet Interarrival Times deviation from exponential distribution Game Traffic Analysis: An MMORPG Perspective 21
  • 22. Diversity in User Behaviors active player: close to active player exponential common player idle player: idle player uniform + determinist distr. common player: in-between the two extremes Game Traffic Analysis: An MMORPG Perspective 22
  • 23. 神州 Online These players are keeping stalls.
  • 24. CDF of Packet Interarrival Times 50% are around 200 ms fl signature of periodic message dispatch Game Traffic Analysis: An MMORPG Perspective 24
  • 25. Temporal Locality in Client Traffic ACF: auto-correlation functions clustering nature in player actions active actions: walking, fighting inactive actions: talking, viewing equipments, trading, idle Game Traffic Analysis: An MMORPG Perspective 25
  • 26. Clustered nature in user actions Client packet inter-arrival times from a player 30 s 100 s 120 s 120 s 150 s 140 s 400 s Game Traffic Analysis: An MMORPG Perspective 26
  • 27. Temporal Locality in Server Traffic Server pkt primarily convey position updates the rate of position updates depends on the number of nearby characters Game Traffic Analysis: An MMORPG Perspective 27
  • 28. Spatial Locality in # of Neighbors Pos Neighbor # (3,3) 1 (2,3) 2 … (1,1) 4 (1,2) 5 (1,3) 4 Game Traffic Analysis: An MMORPG Perspective 28
  • 29. Transformation: Spatial Locality to Temporal Locality The spatial locality shows up in terms of temporal locality in the traffic as the characters move continuously on the map. t Neighbor # 1 1 2 2 3 1 … 10 4 11 5 12 4 Game Traffic Analysis: An MMORPG Perspective 29
  • 30. Temporal locality in server traffic Server packet rates for a player Game Traffic Analysis: An MMORPG Perspective 30
  • 31. Aggregate Packet Arrivals the aggregate packet arrival time series count the number of incoming/outgoing packets regardless of connections take samples every 10 ms Patterns identified temporal dependence periodicity Game Traffic Analysis: An MMORPG Perspective 31
  • 32. ACF of aggregate server pkt arrivals periodity: 200 ms position updates are synchronous to all clients incurring packet bursts Game Traffic Analysis: An MMORPG Perspective 32
  • 33. ACF of aggregate client pkt arrivals Positive temporal dependence up to three minutes. Game Traffic Analysis: An MMORPG Perspective 33
  • 34. The “flash crowds” effects ACF for successive 3 minutes Players are active simultaneously at times “global events” lead to flash crowds effects Game Traffic Analysis: An MMORPG Perspective 34
  • 35. Frequency Components in Server Traffic PSD: power 5 Hz spectral density another proof of the 200 ms round Servers seem to Multiples adapt frequency of 5 Hz by certain metrics, such as number of nearby characters Game Traffic Analysis: An MMORPG Perspective 35
  • 36. Frequency Components in Client Traffic by auto-walk and 6 Hz auto-attack timers Adjust frequency by level/skill and weapons held Multiples of 6 Hz client timers are synchronized Does the sync. lead to performance problems? Game Traffic Analysis: An MMORPG Perspective 36
  • 37. Conclusion Traffic characteristics & physical explanations Tiny packets Low bandwidth requirement for individual client Non-poisson user inputs (diversity of user behaviors) Temporal dependency in within-connection traffic (clustering nature in user inputs) Temporal dependency in aggregate traffic (flash crowds effects) Periodicity and synchronization (common implementation practice) Game Traffic Analysis: An MMORPG Perspective 37
  • 38. Conclusion (cont.) TCP maybe an overkill for MMORPG, e.g., in oveall client traffic 73% bytes used by TCP/IP headers 30% bytes used by pure TCP acks Game Traffic Analysis: An MMORPG Perspective 38
  • 39. Future Work assessment for impacts of network QoS more traffic characterization Identify abnormal sessions, e.g., bots in Lineage & Ragnarok Online Identify game traffic performance evaluation To provide a better network infrastructure for netgames Game Traffic Analysis: An MMORPG Perspective 39
  • 41. Thank You! kuan@ilife.cx http://kuan.ilife.cx/