Switches under Real Internet Traffic
|
|
|
- Morgan Gilbert
- 9 years ago
- Views:
Transcription
1 Switches under Real Internet Traffic Paolo Giaccone, Marco Mellia, Luca Muscariello, Dario Rossi Dipartimento di Elettronica Politecnico di Torino Corso Duca degli Abruzzi, 24 I Torino, Italy Abstract In this paper we propose a novel methodology to generate realistic traffic traces to be used for performance evaluation of switches. Indeed, real Internet traffic shows long and short range dependency characteristics, difficult to be captured by flexible, yet simple, synthetic models. One option is to use real traffic traces, which however are difficult to obtain, as requires to capture traffic in different places with synchronization and management problems. We therefore present a methodology to generate several synthetic traffic traces from a single real trace of packets, by carefully grouping packets belonging to the same flow to guarantee to keep the same statistical properties of the original trace. After formalizing the problem, we solve it and apply the results to assess the performance of scheduling algorithms in high performance switches, comparing the results to other simpler traffic models traditionally adopted in the switching community. Our results show that realistic traffic degrades the performance of the switch by more than one order of magnitude with respect to the traditional traffic models. I. INTRODUCTION In the last years, many different studies have pointed out how the Internet traffic behaves, focusing their analysis on the statistical properties of IP packets and traffic flows. The whole network community is now more conscious that traffic arriving at an IP router is considerably different from the traditional models (Bernoulli, on/off and many others). The seminal paper of Leland [1] gave new impulses in traffic modeling, leading to a huge number of papers deeply investigating such problem from different point of view. A group of studies focused on statistical analysis and data fit, e.g. [2]. These works highlighted traffic properties such as Long Range Dependence (LRD) at large time scales and also multi-fractal properties. LRD is probably the most relevant cause of degradation in system performance because it heavily influences the buffer performance whose behavior, being characterized by a Weibull tail [3], is considerably different from the exponential tail of conventional Markovian models. However, no commonly accepted model of Internet traffic has yet emerged, because either the proposed models are too simple (e.g., Markovian models), or very complex and difficult to understand and tune (e.g., multi-fractal models). Therefore, Internet traffic is intrinsically different from the random processes commonly used in performance evaluation of networking systems, where trace-driven simulations are the most commonly used approach. This This work was supported by the Italian Ministry for Education, University and Research, within the EURO project. applies in particular to performance evaluation of high speed switches/routers, since the overall complexity of switching systems cannot be fully captured by analytical models. Hence, all the switch designers use simulation to validate their architectures by stressing its performance under critical situations. How to generate the traffic to feed the simulation model is still an open question, because: i) traffic models (like Bernoulli, on/off, etc.) are indeed flexible and easy to tune, but they are not good model of real Internet traffic; ii) real traffic traces are more difficult to tune, and are not flexible since they refer to a particular network topology/configuration. In this paper, we propose a novel approach to generate synthetic traffic traces to be used for performance evaluation. It steams from the generation of synthetic traffic from a real trace, and adds the capability of building different scenarios (e.g., number of input/output ports and traffic pattern), keeping real traffic characteristics and providing synthetic traffic flexibility. The main idea is to generate the traffic which follows the time correlation of packets at IP flow level and, at the same time, satisfies some given traffic pattern relations. As interesting example of application, the performance of basic switching architectures are discussed and compared to the tradition benchmarking models. II. INTERNET TRAFFIC SYNTHESIS We consider a switch, where each switch port is associated to an input/output link toward external networks, as shown in top plot of Fig. 1. One possible approach to feed this switch with real packet traces requires to sample the traffic at each of the links; unfortunately, this approach is not easily viable, since it requires either to have a real switching architecture or to manage and synchronize several distributed packet sniffers. In a more realistic situation, only one trace referring to one link is available: for example in this work, traffic traces have been sniffed at Politecnico s egress router, as shown in bottom part of Fig. 1. Once the trace is available, a methodology to create different traffic scenarios is required, for example by imposing specific traffic relations among the input/output ports. The output of the methodology will be a set of traces, satisfying the constraints imposed by the selected scenario. Our approach tries to establish the best mapping among
2 a s i... j d A+B) C+D) Flow Aggregates A) B) C) IP Flows Packet Sniffer Edge Router D) Measured Aggregated Traffic t External Servers Internal Clients Fig. 2. Internet traffic at different levels of aggregation Fig. 1. Internet traffic abstraction model (on the top) and measure setup (on the bottom). source-destination IP addresses and input-output ports of the switch (i.e., and ), in order synthetic traces that can be re- input links of the switch under to generate a total of played, i.e. fed to the analysis. The traffic relations are described by a traffic matrix, of size, expressing the normalized average offered load between any input and output ports. Additional constraints must be met in order to keep the statistical behavior of the original traffic trace, e.g., to keep the packet time correlation among the IP packets having the same source and destination addresses. This problem is intuitively not trivial, given the number of constraints that must be satisfied. To better discuss the synthesis problem, we introduce the notation used throughout the rest of the paper, then formalize the problem, and solve it using a greedy heuristic. A. Preliminary Definitions When traffic is routed on a network, it is possible to focus the attention on different level of aggregations namely IP packet, IP Flow, and Flow Aggregate levels. In particular, we define: IP Flow: An IP flow aggregates all IP packets having the same IP source address! and IP destination address "$#. We state its size expressed in bytes with %'&)(, and its normalized load * &)(,+ % &)(.- /10' % /3. This is a natural aggregation level which entails that IP packets routed from to will follow the same route, closely mimicking Internet behavior. Flow Aggregate: We define a flow aggregate ;: as the aggregation of all packets having source address and destination address B=#DCE@F#. We <=!?>@A! will choose address sets such that!?>) and #DC are partitions of! and # respectively. The flow aggregate 6 287G4H: represents the traffic crossing the switch from input to output. Let us denote the address-2-port mapping function with A2P ) ; then, for any source address tied to a specific input we have JKL M=!?>, as well as for any destination ad- A2P I + dress it holds A2P + IK?EN#DC for a specific output port. Fig. 2 reports an example of the previous classification: at the bottom there is the original traffic trace, which is composed by four IP flows (labeled A,B,C,D). Then two flow aggregates are generated, considering the union of A,B, and C,D respectively. B. Traffic Matrix Generation The mapping of the IP flows to a given traffic matrix establishes a binding among IP addresses and switch ports. More formally, this binding can be thought as a generalization of the OEPRQTSVUW optimization problem of scheduling jobs over identical parallel machines[4], and its formalization is provided in Fig. 3, in which element ẌJY of matrix Z is denoted by Z$>C, the -th row by ZE> and the -th column by Z [ C, being Z [ the transpose matrix of Z. The normalized IP flows load matrix \,=] ^5_J`a acbla is the input of the optimization problem, in which each IP flow represents a job of size * &)( which have to be scheduled without deadline. A fixed number ed of machines are available, each corresponding to an input output couple of the switch; each machine is assigned a target completion time, i.e., the target (normalized) traffic matrix fg] ^5_Jìhbh, which can be exceeded without penalty. Matrices jk ^5_I 'hbla a and lm ^5_I.a acbh are the output of the problem, i.e., the mapping of jobs to machines, or, in our case, the mapping of source IP addresses to switch input ports and destination IP addresses to switch output ports respectively. The objective is to minimize the maximum error committed in the approximation, i.e., the maximum deviance from the target traffic matrix. The first two system constraints lower bound the error nj>xc with the absolute difference among the approximated jy>\ol"[ C mapping and
3 š š p qres set n>c5ukj _v)wxxxl N s.t. nj>c t jy>\ol"[ CBy?>C5uKJ nj>c t L>XC y jy>\ol"[ C ukj C j & C + _vukl > lz> ("+ _v{k? Fig. 3. The optimization problem the target L>C completion time. With respect to the classic OEP QHS}UW formulation, two additional constraints are present: once an IP destination address has been mapped to a particular switch output port, then all IP flows with the same destination IP address must be mapped to the same output port, as we assume that only one path is used to route packets. The same applies for IP source addresses and switch input ports. Therefore, each flow source will use just one row of the machine grid and each flow destination will use just one column, as enforced by the last two constraints. Since the well known OEP QHS}UW optimization problem [4] is known to be strongly NP-hard, its bidimensional extension cannot have a polynomial time solution. Moreover, due to the size of our problem, we look for a simple and fast approximation of the optimal solution: among all the possible strategies, a greedy approach has been selected due to its extreme simplicity. C. Greedy Partitioning Algorithm In this section, we will briefly highlight some of the main features of the greedy adopted strategy, whose pseudo-code is shown in Fig. 4. The intuition at the base of the algorithm is to try to map the heaviest (un-mapped) IP flow to the freest port pair Y, and then force all flows having the same IP source address to enter from the same switch input port, while flows having the same destination address will be force to exits from the same switch output port. This is done by updating the approximated traffic matrix ~, whose elements account for the size of IP flows assigned to that particular port pair. This is repeated until all the IP flows have been mapped. In the context of a greedy solution, the choice to accommodate at each step the heaviest remaining IP flow which simply yields to process IP flows in a reversed sorted order is quite intuitive. However, this not the case for the port pair selection; indeed, we tried several policies, and tested their performance under different traffic scenarios. For example: the port pair corresponding to the globally largest element in y ~, i.e. ẌJY;. ƒ p I 8S ˆ LS y ~ S Š ; the row-wise largest element, i.e. the largest element of the largest row }. ƒ p I 8S 3 LS 3 y ~ S 3, Œ Žo " o v X while( R. štœ ž9ÿ i5 J V Jª Œ Ž ž9«œ;ž Œ;Ž1 ž9 X J V Jª Œ Ž Œ Ž // select freer ports and heaviest IP flow if( '±²³. 5 if( '±²³. ), ±²³. 5 Ÿ ), ±²³I // set address-to-port mapping if unset // update involving already mapped dests foreach( already mapped µ if( š œ ) && ( R±²³. Yµ ¹ " ¹ a2pº šr» a2pº š»š¼ // update involving already mapped sources foreach( already mapped µ if( štœ ) && ( R±²³. ½ µ a2pº» " ½ a2pº» ¼ š š Fig. 4. The greedy algorithm ¾. ƒ p. 8 ŠẌL> y ~ > Š or, symmetrically, the column-wise largest; the coupled (row,column)-wise largest element, that is the element that lies at the intersection of the largest row and column, i.e. }. ƒ p I 8S 3?Sz 3 y ~ S 3, ¾. ƒ p. 8 Š 3 3 y ~ 3 Š. All the former approaches gave similar results only with uniform target matrix ; in the other cases the global approach gave the best results, even when compared to the coupled (row,column)-wise. Indeed, the global approach tries to minimize the maximum error among the target and approximated traffic matrix~ at a local level, i.e. for a specific input/output pair. Other strategies try to minimize respectively the error on either the input ports (row-wise strategy) or the average error (coupled strategy), explaining thus the relatively worse performances. A. Measurement setup III. PERFORMANCE STUDY In order to collect traffic traces, we observed the data flow on the Internet access link of our institution, i.e., we focus on the data flow between the edge router of our campus LAN and the access router of GARR/B-TEN, the Italian and European Research network. Since our university hosts mainly act as clients, we recorded only the traffic flows originated by external servers reaching internal clients (i.e., the direction highlighted in Fig. 1). The trace has been sampled during a busy period of six hours, by collecting data on 28 million of packets and IP flows. The time window has been chosen such
4 that the overall traffic is tested to be stationary both for the first and second order statistics. The property of real traffic that we mainly take into account is the long range dependency which is well known to be responsible of buffer performance degradation. It is not the topic of this paper to provide a statistical analysis of the traffic measured at our institution router but it is relevant to highlight that the measured traffic exhibit LRD [5] properties from the scales of hundreds of milliseconds to the entire length of the data trace with the Hurst parameter in the range of [6]. B. The switching architectures under study An IP switch/router is a very complex system [7], composed by several functionalities: here we focus our attention only on the performance of switching systems. We consider a simple model of the switching architecture, based on the one described in [8]. The incoming, variable size, IP packets are chopped into fixed size cells which are sent to the internal switch, where they are transferred to output port, and then reassembled into the original packets before being sent across the output link. The internal switch, which operates in a time slotted fashion, can be input queued (IQ), output queued (OQ) or a combined solution, depending of the available bandwidth inside the switching fabric. IQ switches are usually considered scaling better than OQ switches with the line speed, and for this reason they are considered in practical implementations of high speed switches. Input queues are organized into the well known virtual output queue (VOQ) structure, necessary to maximize the throughput. One disadvantage of IQ switches is that they require a scheduling algorithm to coordinate the transfer of the packets across the switching fabric; the performance of an IQ switch, in terms of delays and throughput, is very sensible to the adopted scheduling algorithm and depends also on the traffic matrix considered. Scheduling algorithms can work either in cell mode or in packet mode [8]. In cell mode, cells are transferred individually. In packet mode, cells belonging to the same IP packet are transferred as a train of cells, in subsequent time slots; hence, the scheduling decision is correlated to the packet size. In the past, the performance of several scheduling algorithms have been compared [8], [9] under Bernoulli or correlated on/off traffic. Here we compare the performance of maximum weight matching (MWM) [10] and islip [11] scheduling algorithms under different traffic models. We selected MWM as example of theoretical optimal algorithm which is too complex to be implemented, whereas islip was chosen as example of practical implementation with suboptimal performance. We consider a B À switch, with internal cell format of 64 bytes. In the IQ switch, buffers are set equal to Mean delay [time slots] Mean delay [time slots] Fig. 5. Mean packet delay under PT and P3 scenarios for cell mode policies Fig. 6. Mean packet delay under PT and P3 scenarios for packet mode policies. ^.^I^ cells per VOQ, i.e. about 320 KBytes per VOQ and about wx MBytes per input port which is a reasonable amount of high-speed memory available today in an input card. In the OQ switch, buffers are set equal to Â.^.^I^.^ cells (+ ^I^.^E e ) to compare fairly with the IQ switch. C. Traffic scenarios For the sake of space, we present our results only for uniform traffic, i.e.?>c +Äà -, where à (between ^xx_ and ^x Å ) is the average input load, normalized to the link speed. We consider two scenarios, depending on the process of packet generation. Packet trace (PT). Packets are generated according to the trace, following the methodology of traffic synthesis we presented in Sec. II-B. Packet trimodal (P3). Packet generation is modulated by an on/off process, satisfying the traffic matrix. Packet lengths are generated according to a trimodal distribution, which approximates the distribution observed in our trace. This can be considered a traditional good synthetic model, tuned according to the features of the real trace. D. Simulation results Figs. 5 and 6 plot the average delay as a function of the normalized load for tree configurations: OQ switch, IQ switch with MWM scheduler and IQ switch with islip
5 Æ Throughput per port Fig. 7. Throughput under PT and P3 scenarios for cell mode policies. scheduler. The first graph refers to cell mode (CM) schedulers for IQ, the second to packet mode (PM) schedulers for IQ. In all cases, the delays experienced under Packet Trace model are much larger than in the case of trimodal traffic. This holds true not only for high load, but also at low load the effect of the LRD traffic causes much higher delay. Note also that the performance of CM and PM are almost the same in both scenarios; this is reasonable, since the estimated coefficient of variation of the packet length distribution is _vx ^ and, according to the approximate model in [8], CM and PM should behave the same. Fig. 7 shows the throughput achieved in both scenarios considering CM policies (PM behave the same). Because of the LRD property of the input traffic, the queue occupation under PT is much larger than P3 causing higher loss probability and reduced throughput. The most surprising result is that the relative behavior of the three schedulers changes from P3 to PT. Indeed, OQ, IQ-MWM an IQ-iSLIP give almost the same performance with the traditional traffic model, while a degradation in the throughput curves is present considering the Packet Trace model (up to 10% reduction) and an increase in delays. Moreover, IQ-MWM behaves the worse considering the delay metric, which depends mainly on metric based on queue length [8]; islip on the contrary shows shorter delays than OQ: one partial explanation of this is that, for high loads, islip is experiencing larger losses than OQ under PT (larger than IQ-MWM for instance), as Fig. 7 shows. Finally, the most important fact is that OQ is penalized in terms of average delay: the shared buffer at output queue allow much longer queues to build up, therefore degrading the delay performance because of the Weibull tail [12]. These results underline that traffic models traditionally adopted to assess switching performance are not capable of showing real world figures. IV. CONCLUSION This work proposed a novel and flexible methodology to synthesize realistic traffic traces to evaluate the performance of switches and, in general, of controlled queuing networks. Packets are generated from a single packet trace from which different synthetic traffic traces are obtained fulfilling a desired scenario, e.g., a traffic matrix. Additional constraints are imposed to maintain the original traffic characteristics, mimicking the behavior imposed by Internet routing. We compared the performance of a switch adopting different queuing and scheduling strategies, under two scenarios: the synthetic traffic of our methodology and traditional traffic models. We observed that not only absolute values of throughput and delays can change considerably from one scenario to the other, but also their relative behaviors. This fact highlights the importance of some design aspects (e.g., the buffer management) which are traditionally treated separately. These results show new behavioral aspects of the queuing and scheduling in switches, which requires more insight in the future. REFERENCES [1] W.E. Leland, M.S. Taqqu, W. Willinger and V. Wilson, On the Self-Similar Nature of Ethernet Traffic, IEEE/ACM Transaction on Networking, Vol.2, No. 1, pp. 1 15, Jan [2] A. Feldmann, A.C. Gilbert and W. Willinger, Data Networks as Cascades: Investigating the Multifractal Nature of Internet WAN Traffic, ACM SIGCOMM 98, Boston, Ma, pp , Sep [3] I. Norros, A storage model with self-similar input, Queueing Systems, Vol. 16, pp , [4] S. Graves et al. (eds.), Handbook in Operations Research and Management Science: Logistics of Production and Inventory, North-Holland, [5] M.S. Taqqu, Fractional Brownian Motion and Long Range Dependence, Theory and Application of Long-Range Dependence P.Doukhan, G. Oppenheim, M.S. Taqqu Editors, [6] L.Muscariello, M.Mellia, M.Meo, R.Lo Cigno, M.Ajmone Marsan, A Simple Markovian Approach to Model Internet Traffic at Edge Routers, COST279, Technical Document, TD(03)032, May 2003 [7] H. J. Chao, Next generation routers, Proceedings of the IEEE, Vol. 90, No. 9, pp , Sep. 2002, [8] M. Ajmone Marsan, A. Bianco, P. Giaccone, E. Leonardi and F. Neri, Packet-mode scheduling in input-queued cell-based switches, IEEE/ACM Transactions on Networking, Vol. 10, No. 5, pp , Oct [9] N. McKeown and T. E. Anderson, A Quantitative Comparison of Scheduling Algorithms for Input-Queued Switches, Computer Networks and ISDN Systems, Vol. 30, No. 24, pp , Dec [10] N. McKeown, A. Mekkittikul, V. Anantharam and J.Walrand, Achieving 100% Throughput in an Input-Queued Switch, IEEE Transactions on Communications, Vol. 47, No. 8, pp , Aug. 1999, [11] N.McKeown, The islip scheduling algorithm for input-queued switches, IEEE/ACM Transactions on Networking, vol.7, n.2, Aug.1999, pp [12] B. V. Rao, K. R. Krishnan, and D. P. Heyman, Performance of Finite Buffer Queues under Traffic with Long-Range Dependence, Proc. IEEE Globecom, Vol. 1, pp , Nov
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Connection-level Analysis and Modeling of Network Traffic
ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
gloser og kommentarer til Macbeth ( sidetal henviser til "Illustrated Shakespeare") GS 96
side 1! " # $ % &! " '! ( $ ) *! " & +! '!, $ #! "! - % " "! &. / 0 1 & +! '! ' & ( ' 2 ) % $ 2 3 % # 2! &. 2! ' 2! '! $ $! " 2! $ ( ' 4! " 3 & % / ( / ( ' 5! * ( 2 & )! 2 5! 2 &! # '! " & +! '! ' & &!
VoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia [email protected] QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Threshold-based Exhaustive Round-robin for the CICQ Switch with Virtual Crosspoint Queues
Threshold-based Exhaustive Round-robin for the CICQ Switch with Virtual Crosspoint Queues Kenji Yoshigoe Department of Computer Science University of Arkansas at Little Rock Little Rock, AR 7224 [email protected]
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Performance Analysis of a Practical Load Balanced Switch
Performance Analysis of a Practical Balanced Switch Yanming Shen, Shivendra S Panwar, H Jonathan Chao Department of Electrical and Computer Engineering Polytechnic University Abstract The load balanced
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: [email protected] Helmut E. Bez Department of Computer
Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs
Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs Mahdi Ghamkhari and Hamed Mohsenian-Rad Department of Electrical Engineering University of California at Riverside,
Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani
Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology August 2011 Page2 Executive Summary HP commissioned Network Test to assess the performance of Intelligent Resilient
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Adaptive Batch Scheduling for Packet Switching with Delays
1 Adaptive Batch Scheduling for Packet Switching with Delays Kevin Ross and Nicholas Bambos 1 University of California Santa Cruz, [email protected] Stanford University, [email protected] We discuss
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
TCP and UDP Performance for Internet over Optical Packet-Switched Networks
TCP and UDP Performance for Internet over Optical Packet-Switched Networks Jingyi He S-H Gary Chan Department of Electrical and Electronic Engineering Department of Computer Science Hong Kong University
Switch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
Optical interconnection networks with time slot routing
Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
IEEE/ACM TRANSACTIONS ON NETWORKING 1 1063-6692/$26.00 2009 IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Feedback-Based Scheduling for Load-Balanced Two-Stage Switches Bing Hu, Student Member, IEEE, and Kwan L. Yeung, Senior Member, IEEE Abstract A framework for designing
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
OpenFlow Switching: Data Plane Performance
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings OpenFlow : Data Plane Performance Andrea Bianco,
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
Planning Networks for VOIP. An Introduction
Planning Networks for VOIP An Introduction Planning Networks for VOIP Page 2/10 Contents 1 Introduction...3 2 Voice Quality Requirements...3 3 Codecs...4 4 Network Layout...5 5 Planning Capacity...6 5.1
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering
Analysis of VDI Workload Characteristics
Analysis of VDI Workload Characteristics Jeongsook Park, Youngchul Kim and Youngkyun Kim Electronics and Telecommunications Research Institute 218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Republic of
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.
Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February
Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.
Title Maximizing the number of users in an interactive video-ondemand system Author(s) Bakiras, S; Li, VOK Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. 281-292 Issued Date 2002 URL
Reordering of IP Packets in Internet
Reordering of IP Packets in Internet Xiaoming Zhou and Piet Van Mieghem Delft University of Technology Faculty of Electrical Engineering, Mathematics, and Computer Science P.O. Box 5031, 2600 GA Delft,
On the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
Network Performance Measurement and Analysis
Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling
Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,
Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers
1 Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Switching Architectures for Cloud Network Designs
Overview Networks today require predictable performance and are much more aware of application flows than traditional networks with static addressing of devices. Enterprise networks in the past were designed
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Policy Distribution Methods for Function Parallel Firewalls
Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,
