Improving distributed traffic generation performance by using IMUNES network emulator
|
|
|
- Constance Leona Barton
- 10 years ago
- Views:
Transcription
1 Improving distributed traffic generation performance by using network emulator Valter Vasić, Mirko Sužnjević, Miljenko Mikuc, Maja Matijašević University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 1 Zagreb, Croatia {valter.vasic, mirko.suznjevic, miljenko.mikuc, maja.matijasevic}@fer.hr Abstract In this paper we present improvements of our software architecture for User Behaviour Based Network Traffic Generation (UrBBan-Gen). It consists of four modules Service repository, Control function and user interface, Behaviour process, and Traffic generation process. Improvements are performed on the traffic generation process, specifically on the virtualization section of UrBBaN-Gen through integration of the Distributed Internet Traffic Generator (D-ITG) which we use as a module for traffic generation with network simulator and emulator. In this way we achieve two goals: 1) better scalability of the traffic generation and 2) possibility for testing of various network scenarios in simulated networks under realistic loads. 1. INTRODUCTION In recent years Massively Multiplayer Online Role-Playing Games (MMORPGs) have become a growing phenomenon which attracts millions of players. As the number of games and users grows, so does the amount of traffic which needs to traverse the network. According to the Cisco Visual Networking Index [1], gaming traffic will grow with a compound annual growth rate of 43% in a period of , a second largest growth after the video category. These games generate traffic that is very demanding in terms of Quality of Service (QoS) due to the real-time nature of virtual worlds of networked games. In order to achieve a satisfying level of QoS for a MMORPG on a network level, a network provider must primarily ensure that the latency and jitter values are very low, and that crucial data is delivered in a timely manner. The network providing connectivity for these games needs to be well designed and tested. Generating realistic traffic loads is one of the most important tasks in network testing. In our previous work [2] we have developed a software architecture for distributed traffic generation based on player behaviour named User Behaviour Based Network Traffic Generator (UrBBaN-Gen). The goal of UrBBaN-Gen is to generate the traffic of hundreds and thousands of players. To achieve this we employed two scalability techniques: 1) virtualization and 2) expandability (additional PCs can simply be added into the traffic generation process). In this paper we further improve UrBBan-Gen in the aspect of scalability. We replace previous virtualization technology ( Containers - LXC) through integration of UrBBan- Gen with network simulator and emulator [3][4]. We demonstrate the gains through several measurements focusing on generated packed load and bandwidth load, and measuring saturation of the CPU and RAM usage of the PC participating in the traffic generation. This integration also enables testing traffic workloads on realistic network topologies, thus enabling more precise and detailed tests which can be used to identify problems and bottlenecks in the network. The remainder of the paper is organized as follows: in section 2 we present the related work in the area of behaviour based traffic generation with emphasis on networked games and virtualization techniques, in section 3 we describe the UrBBaN-Gen, in section 4 we explain improvements of the emulated environment, section 5 contains the testing methodology applied, section 6 the results of the measurements, and we conclude the paper in section RELATED WORK Network traffic generators (TGs) may be categorized based on how they derive the traffic patterns into three groups: 1) TGs based on replay of previously captured traffic, 2) TGs emulating the properties of previously captured traffic based on statistical analysis of the traces, and 3) source based TGs, which emulate the behaviour of the traffic source (user and application). In this paper, we focus on source based traffic generators. One of the first source level traffic generators was Scalable URL Reference Generator (SURGE) [5]. SURGE creates a realistic web workload that mimics a set of real users accessing a server. Surge defines a concept of user equivalent (UE) as a process in an endless loop that alternates between making requests for web files, and being idle. The statistical properties of web reference streams that are needed by each UE are described by parameters such as file sizes, request sizes, popularity, embedded references, temporal locality, OFF times. GenSyn is a synthetic traffic generator implemented in Java based on user behaviour [6]. The stochastic user behaviour is described by state diagrams. The stochastic user behaviour model controls the creation of TCP connections and UDP streams through interface modules that links the GenSyn process to the underlying Internet protocol stack on the workstation. While there are several models of network traffic of MMORPGs described in literature [7], [8], [9] there are very
2 few implementations of models in traffic generators. Shin et al. [1] propose a novel method for modelling the network traffic of games. They analyse packet size and inter-arrival times of World of Warcraft (WoW) and first person shooter game Left 4 Dead (L4D) by Turtle Rock Studios. Authors propose a transformational scheme in order to simplify the shape of the traffic so it can be mapped to an analytical model. They implement their model in a online game traffic generator [11]. Authors claim that their traffic model is based on player behaviour, but this behaviour is only referred to as high erraticism of the traffic. On the other hand, traffic generation process used in UrBBaN-Gen [2] is fully defined by application level user behaviour. There are a couple of integrated network topology emulator solutions that use kernel based virtualization. The first emulator to use this kind of technology was [3], [4]. runs natively on FreeBSD, and it can also run in virtual machine software such as VMware. The CORE network emulator was created as an offspring of [12]. It is fully based on an older release with improvements regarding mobility. It has been ported to work on distributions and no longer works on the newer FreeBSD releases. A similar network emulator is also mininet [13] which provides a much simpler GUI and also runs on. was chosen because of stability, performance, user-friendliness and GUI, advanced scripting options, and capabilities for testbed automation. 3. URBBAN-GEN The goal of UrBBaN-Gen is to generate realistic traffic of a MMORPG, as a complex IP service, on both client and server side and based on user behaviour. This is achieved through implementing a source based traffic model based on player behaviour on the application level defined through action categories [14] and traffic models of each for each action category [15]. While UrBBaN-Gen has been developed to generate WoW network traffic, functional architecture and implementation are service independent so new services may be added through new user behaviour and traffic models. MMORPGs are a good case study as they involve large number of users with diverse application level behaviours which significantly affect network traffic characteristics [16]. Figure 1 shows the traffic generation part of UrBBaN-Gen. The higher layers perform simulation of the player behaviour and control the traffic generation process. For the functional elements of Traffic sender and Traffic receiver we used the Distributed Internet Traffic Generator (D-ITG), an open source tool developed at Universita degli Studi di Napoli Federico II (Italy). D-ITG is a tool for network traffic generation which offers a choice of various transport and application layer protocols. D-ITGs distributed architecture includes sender, receiver, logger, and manager components. More details regarding D-ITG can be found in several publications of its authors [17], [18], [19]. 4. IMPROVEMENTS OF EMULATED ENVIRONMENT In this paper we focus on the Emulated environment of the traffic generation process as shown in Figure 1. This component has been proven to be the bottleneck when the number of senders/receivers has been increased over 1. We replace the existing LXC containers implementation with FreeBSD jails, a kernel based virtualization system used in. Also the network configuration is done in an optimized environment (FreeBSD kernel) by using netgraph kernel modules. 4.1 fundamentals (Integrated Multiprotocol Network Emulator/Simulator) is a lightweight kernel level network emulator [3][4]. Three main tools inside the standard FreeBSD kernel are used to provide the emulating environment: 1) FreeBSD jails - a lightweight virtualization solution that enables different jails to share system resources with minimum overhead. It is based on separating system resources as a means of providing a higher level of security without affecting system performance [2]. The main advantage of jails is that they run on the same kernel and enable full binary compatibility with FreeBSD executables. Most Unix and applications can be run without recompilation. If recompiling is needed the changes to the original source are minimal. Each jail has its own: directory subtree - root file system, hostname, IP address - crucial for achieving network emulation and communication between emulated nodes. A jail has a complete instance of the network stack. This is enabled by the clonable network stack that is described in [4]. 2) Netgraph kernel modules - used for emulating node network interfaces and linking virtual nodes in the simulation. Netgraph also provides the implementation of lower layer (data link layer) network equipment such as hubs and switches [21]. 3) ZFS file system - Transactional file system developed by Sun Microsystems. ZFS uses the concept of storage pools to manage physical storage. ZFS has the ability to create snapshots, read-only copies of the file system state. Snapshots can be cloned and replicated. This makes them suitable for creating initial copies of root file systems used by virtual nodes during simulation [22]. The main advantage of is the low system footprint that topologies generate. Traffic manipulation is also done efficiently in the FreeBSD kernel, where packets are transferred by passing references rather than copied as they cross the emulated network environment. The system architecture enables fast experiment instantiation and termination.
3 Fig. 1. Architecture of UrBBaN-Gen functionality [2] is suitable for executing multiple experiments at once, and it also facilitates creation of large topologies with canvas support [23]. 4.2 nodes The system has a set of nodes that can be instantiated and preconfigured when a simulation is started. Nodes can be seen in the left sidebar inside the GUI [23]. These nodes can be grouped in the following groups: Physical layer nodes - Used for interconnecting network nodes and creating the topology. The first node in this category are links that create all the paths between network nodes. Links can be configured to emulate network problems and properties such as bandwidth, delay, biterror-rate (BER) and duplicate packets. There is also the physical interface node that enables the connection of all the nodes to the external network by assigning a NIC (Network Interface Card) to the physical interface node. By using this node can route real-world traffic and manipulate traffic with link settings. Both physical nodes are part of the netgraph suite (ng pipe, ng ether). Layer 1/2 nodes - Emulate hub and layer 2 switch nodes. Both implemented as netgraph nodes (ng hub, ng bridge). Used for creating more complex local area connections. The main difference is that the hub node, when it receives a packet, forwards it to all the other interfaces, whereas the switch node forwards packets based on link layer data. Layer 3 nodes - Include nodes that operate from the IP layer up. These nodes are in-fact jails with their own set of processes and file systems. allows us to create three types of jailed nodes: PC - An empty jail that is created, by default, without any processes running. The PC is an example of a persistent jail [2]. This node is a base for creating all other layer 3 nodes. Host - Jail used for running services. By default it has the inetd and rpcbind processes running. Router - This node is used for emulating real routers. It can run the Quagga routing protocol suite [24], or simply be a static router that needs to be manually configured. The Quagga routing suite offers support for most widely used routing protocols: RIP, RIPng, OSPFv2, OSPFv3, BGP, etc. is setup to automatically configure RIP(ng) and OSPFv2/3. If needed, other routing protocols and suites can be manually configured to run on the router node. 4.3 D-ITG in The main issue regarding replacing LXCs with is that D-ITG does not have innate support for BSD operating systems (OSs) as it is designed for Windows and OSs. The latest D-ITG version 2.8.-rc1 would not compile by default on FreeBSD. After all errors were solved and D-ITG was successfully recompiled on a FreeBSD system the process of integration in is fairly simple. The D-ITG executables are inserted into the ZFS system snapshot which is replicated across nodes in the simulation. In this way, each node in a simulation has access to D-ITG binaries. 5. SCALABILITY TESTING METHODOLOGY Two testbeds were created: 1) (LXC) testbed and 2) testbed. The testing was performed on commodity hardware PC-s (Intel Core i Ghz with 4GB of RAM). For both testbeds the same hardware was used. testbed consisted of two PCs running Ubuntu 11.1 operating system. One PC hosted all LXCs hosting D-ITG senders connected to a bridge, while other PC hosted D-ITG receivers. The number of instances of LXCs varied depending on the experiment. The testbed was also
4 set on 2 PCs, one for running the system with all D- ITG sender nodes in an emulated environment and the other that acted as a receiver. The D-ITG receiver node was run on another PC so that it would not interfere with the testbed and testing results. Two tests were performed on both testbeds: 1) Testing with fixed pps (packets per second) rate and fixed packet size, while changing the number of sender nodes. 2) Testing with fixed pps rate and fixed number of nodes, while changing the packet size. For each test iteration the CPU load and packet loss were noted. The third test was run only on the testbed on top of VMware. Through this test we inspected how the packet rate created by a single sender to a single receiver varies in the emulated network. CPU load (%) Fig Number of sender nodes CPU load with respect to the number of sender nodes 6. RESULTS The testbed was, in overall, more stable than the testbed. The reason is due to jails started inside were more lightweight in comparison to the containers used for the testbed. The first test was done as follows. The packet rate was fixed to 1 pps and the packet size was 64 bytes. The number of nodes was gradually increased from 1 nodes to 18 nodes. had a much smaller packet loss while the testbed started losing packets much more quickly. The results can be seen in Figure The testbed in terms of CPU load had a linear growth compared to the testbed, which grew faster up to until 6 nodes. This can be seen in Figure 3. Obviously the tesbed was more stable because the packet loss was substantially smaller than in the testbed. The second test had a fixed number of 1 nodes and the packet rate of 2 pps. The packet size was changed from 64 bytes to 1472 bytes because the MTU size was set to 15 bytes (IP header is 2 bytes and the UDP header is 8 bytes). The results can be seen in Figure 4 depicting the load of the processor depending on the size of the packets generated. As it can be seen, the implementation varies significantly in load while the is much more stable. As previously stated, the third test was run only on which was run on top of VMware. In Figure 5 results of this experiment are depicted so that for each packet size, the maximum achieved packet rate without loss is shown. Packet loss (%) Number of sender nodes CPU load (%) 6 4 Fig. 2. Packet loss with respect to the number of sender nodes 2 The testbed had much less packet loss than the testbed and the CPU load successfully reached 1%. From 2 we can see that at generation rate of 18 packets per second (18 nodes at a rate of 1pps) had only 1% loss while the implementation reached 5% Packet size (bytes) Fig. 4. Processor load with respect to packet size
5 Packet rate (pps) Fig. 5. Packet size (bytes) 64 bytes 512 bytes 15 bytes Packet rate with respect to packet size We measured for the packet sizes of 64, 512, and 15 bytes for 1, 1, 5, 1, 25 streams. It can be noted that the highest packet rate without loss has been achieved for the packet size of 64 bytes. The tests showed that the testbed is more stable than the one. Also, results regarding CPU use and packet loss show that is a better solution, which additionally offers possibility of emulating complex network scenarios. 7. CONCLUSION In this paper we have presented improvements to our architecture for user behaviour based traffic generation. containers, the previously used technology for virtualization has been replaced with. Both testbeds have been tested in order to compare loads on the processor and packet losses during traffic generation with a high number of packets per second. The implementation with showed better results in both terms of lost packets and processor load. Performance evaluation was done with high packet rates. Shown results enable generation of MMORPG traffic on a truly massive scale. For our future work we aim to add expandability into the prototype so multiple PCs can participate in a single simulation. ACKNOWLEDGMENTS This work was supported by the research projects and , funded by the Ministry of Science, Education, and Sports of the Republic of Croatia and the E- project funded by Ericsson Nikola Tesla, Zagreb, Croatia. Also, the research leading to these results has received funding from the European Community s Seventh Framework Programme under grant agreement no (ACROSS). REFERENCES [1] Cisco Systems, Cisco Visual Networking Index: Forecast and methodology, , 211. [2] M. Suznjevic, I. Stupar, and M. Matijasevic, A model and software architecture for MMORPG traffic generation based on player behavior, Multimedia Systems, DOI: 1.17/s x, 212. [3] M. Zec and M. Mikuc, Real-time network IP network simulation at gigabit data rates, in Proceedings ConTEL 23, pp , 23. [4] M. Zec and M. Mikuc, Operating system support for integrated network emulation in, in 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS), pp. 3-12, 24. [5] P. Barford and M. Crovella, Generating representative web workloads for network and server performance evaluation, in Proceedings of the ACM SIGMETRICS, pp , [6] P. E. Heegaard, Gensyn - a Java based generator of synthetic Internet traffic linking user behaviour models to real network protocols, in ITC Specialist Seminar on IP Traffic Measurement, Modeling and Management, 2. [7] P. Svoboda, W. Karner, and M. Rupp, Traffic analysis and modeling for World of Warcraft, in Communications, 27. ICC 7. IEEE International Conference on, pp , 27. [8] J. Kim, E. Hong, and J. Choi, Measurement and Analysis of a Massively Multiplayer Online Role Playing Game Traffic, in Proceedings of Advanced Network Conference, pp. 1 8, 23. [9] H. Park, T. Kim, and S. Kim, Network traffic analysis and modeling for games, in Internet and Network Economics, Lecture Notes in Computer Science, pp , Springer Berlin / Heidelberg, 25. [1] K. Shin, J. Kim, K. Sohn, C. J. Park, and S. Choi, Transformation Approach to Model Online Gaming Traffic, ETRI Journal, vol. 33, no. 2, pp , 211. [11] K. Shin, J. Kim, K. Sohn, C. Park, and S. Choi, Online gaming traffic generator for reproducing gamer behavior, in Proceedings of the 9th international conference on Entertainment computing, pp , 21. [12] J. Arenholz, C. Danilov, T.R. Henderson and J.H. Kim, CORE: A real-time network emulator, in IEEE MILCOM, 28. [13] B. Lantz, B. Heller and N. McKeown, A network in a laptop: rapid prototyping for software-defined networks, in 9th ACM SIGCOMM Workshop on Hot Topics in Networks, 21. [14] M. Suznjevic, I. Stupar, and M. Matijasevic, MMORPG player behavior model based on player action categories, in Proceedings of the 1th Workshop on Network and System Support for Games, p. 6, 211. [15] M. Suznjevic, I. Stupar, and M. Matijasevic, Traffic modeling of player action categories in a MMORPG, in Proceedings of the 2nd workshop on DIstributed SImulation and Online gaming (DISIO), p. 8, 211. [16] M. Suznjevic, O. Dobrijevic, and M. Matijasevic, MMORPG player actions: Network performance, session patterns and latency requirements analysis, Multimedia Tools and Applications, vol. 45, no. 1-3, pp , 29. [17] S. Avallone, S. Guadagno, D. Emma, A. Pescapé, and G. Venturi, D- ITG Distributed Internet Traffic Generator, in Proceeding of International Conference on Quantitative Evaluation of Systems, pp , 24. [18] A. Botta, A. Dainotti, and A. Pescapé, Do you trust your softwarebased traffic generator?, Communications Magazine, IEEE, vol. 48, no. 9, pp , 24. [19] A. Botta, A. Dainotti, and A. Pescapè, Multi-protocol and Multiplatform Traffic Generation and Measurement, in INFOCOM 27, 26th IEEE International Conference on Computer Communications, Demonstration Session, 27. [2] P.H. Kamp and R.N.M. Watson, Jails: Confining the omnipotent root, in 2nd International SANE Conference, p. 15, 2. [21] A. Cobbs, All about nethgraph. julian/ netgraph.html. [22] J. Bonwick and B. Moore, ZFS: The last word in filesystems. http: //hub.opensolaris.org/bin/view/community+group+zfs/webhome. [23] M. Zec, M. Mikuc, A. Mijocevic, S. Marjanovic and V. Vasic, Imunes manual. ug pdf. [24] Quagga project, quagga routing suite.
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Network Performance Evaluation of Latest Windows Operating Systems
Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management
Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London
POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар
УПРАВЛЕНИЕ И ОБРАЗОВАНИЕ MANAGEMENT AND EDUCATION TOM IX (6) 2013 VOL. IX (6) 2013 POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА Селчук
Tutorial: Traffic of Online Games
Tutorial: Traffic of Online Games Jose Saldana & Mirko Suznjevic IETF 87, Berlin, August 1 st, 2013 Transport Area Open Meeting 1.8.2013. 1 Goals of this presentation Information about current practices
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Performance Monitoring of VoIP with Multiple Codecs Using IPv4 and IPv6to4 Tunnelling Mechanism on Windows and Linux
Performance Monitoring of VoIP with Multiple Codecs Using and IPv6to4 Tunnelling Mechanism on Windows and Linux Hira Sathu and Mohib A. Shah Abstract In this paper, the performance of Voice over Internet
Network Performance Comparison of Multiple Virtual Machines
Network Performance Comparison of Multiple Virtual Machines Alexander Bogdanov 1 1 Institute forhigh-performance computing and the integrated systems, e-mail: [email protected], Saint-Petersburg, Russia
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
Quantifying TCP Performance for IPv6 in Linux- Based Server Operating Systems
Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), November Edition, 2013 Volume 3, Issue 11 Quantifying TCP Performance for IPv6
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
software networking Jithesh TJ, Santhosh Karipur QuEST Global
software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS
382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:
OpenFlow Switching: Data Plane Performance
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings OpenFlow : Data Plane Performance Andrea Bianco,
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
SIP Infrastructure Performance Testing
SIP Infrastructure Performance Testing MIROSLAV VOZNAK, JAN ROZHON Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15, Ostrava CZECH REPUBLIC [email protected],
High-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
Oracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure
I.J. Wireless and Microwave Technologies, 2012, 6, 29-36 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.05 Available online at http://www.mecs-press.net/ijwmt
Collecting Packet Traces at High Speed
Collecting Packet Traces at High Speed Gorka Aguirre Cascallana Universidad Pública de Navarra Depto. de Automatica y Computacion 31006 Pamplona, Spain [email protected] Eduardo Magaña Lizarrondo
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine
Where IT perceptions are reality Test Report OCe14000 Performance Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Document # TEST2014001 v9, October 2014 Copyright 2014 IT Brand
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran
The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
The Elements of GigE Vision
What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal
SDN Interfaces and Performance Analysis of SDN components
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia SDN Interfaces and Performance Analysis of SDN components, David Hock, Michael Jarschel, Thomas Zinner, Phuoc
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS
Performance, Verio FreeBSD Virtual Control, Private Server and (VPS) Security: v3 CONTENTS Why outsource hosting?... 1 Some alternative approaches... 2 Linux VPS and FreeBSD VPS overview... 3 Verio VPS
Cisco Active Network Abstraction 4.0
Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM) www.fntsoftware.com
FNT EXPERT PAPER AUTOR Oliver Lindner Head of Business Line DCIM FNT GmbH // From Cable to Service Data Center Infrastructure Management (DCIM) Data center infrastructure management (DCIM), as understood
Performance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case.
Performance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case. Franco Callegati, Walter Cerroni, Chiara Contoli, Giuliano Santandrea Dept. of Electrical, Electronic and Information
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: [email protected] Bulgaria
Lustre Networking BY PETER J. BRAAM
Lustre Networking BY PETER J. BRAAM A WHITE PAPER FROM CLUSTER FILE SYSTEMS, INC. APRIL 2007 Audience Architects of HPC clusters Abstract This paper provides architects of HPC clusters with information
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks
A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks Bob Lantz, Brandon Heller, Nick McKeown Stanford University HotNets 2010, 10/20/10 1 2 Wouldn t it be amazing if systems papers were
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Application Delivery Testing at 100Gbps and Beyond
Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link
Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link Jason But, Shaun Burriss and Grenville Armitage Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne,
Web Application s Performance Testing
Web Application s Performance Testing B. Election Reddy (07305054) Guided by N. L. Sarda April 13, 2008 1 Contents 1 Introduction 4 2 Objectives 4 3 Performance Indicators 5 4 Types of Performance Testing
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
Traffic Modelling for Fast Action Network Games
to be published in Multimedia Tools And Applications 24 (MTAP) Traffic Modelling for Fast Action Network Games Johannes Färber University of Stuttgart, Inst. of Communication Networks and Computer Engineering
Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro
Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Whitepaper What s wrong with today s clouds? Compute and storage virtualization has enabled
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management
An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource
Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck
Sockets vs. RDMA Interface over 1-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Pavan Balaji Hemal V. Shah D. K. Panda Network Based Computing Lab Computer Science and Engineering
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Large-scale Network Protocol Emulation on Commodity Cloud
Large-scale Network Protocol Emulation on Commodity Cloud Anirup Dutta University of Houston [email protected] Omprakash Gnawali University of Houston [email protected] ABSTRACT Network emulation allows us
LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION
LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION 1 NCTUns Program In General NCTUns Program is an extensible network simulator and emulator for teleinformatic networks.
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Challenges in high speed packet processing
Challenges in high speed packet processing Denis Salopek University of Zagreb, Faculty of Electrical Engineering and Computing, Croatia [email protected] Abstract With billions of packets traveling
Enhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Cisco, Citrix, Microsoft, and NetApp Deliver Simplified High-Performance Infrastructure for Virtual Desktops
Cisco, Citrix, Microsoft, and NetApp Deliver Simplified High-Performance Infrastructure for Virtual Desktops Greater Efficiency and Performance from the Industry Leaders Citrix XenDesktop with Microsoft
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
Whitepaper Performance Testing and Monitoring of Mobile Applications
M eux Test Whitepaper Performance Testing and Monitoring of Mobile Applications Abstract The testing of a mobile application does not stop when the application passes all functional tests. Testing the
A Heterogeneous Internetworking Model with Enhanced Management and Security Functions
Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Saving Time & Money Across The Organization With Network Management Simulation
Saving Time & Money Across The Organization With Network Management Simulation May, 2011 Copyright 2011 SimpleSoft, Inc. All Rights Reserved Introduction Network management vendors are in business to help
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning
L-Series LAN Provisioning Best Practices for Local Area Network Deployment Introduction Scope NComputing s L-series access devices connect to a host computer through an Ethernet interface and IP protocol.
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Cisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
SDN CENTRALIZED NETWORK COMMAND AND CONTROL
SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016
An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
