SlideShare a Scribd company logo
Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 66
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue6)
Available online at www.ijariit.com
Multiport Network Ethernet Performance Improvement
Techniques
Tanaji Shankar Nalawade
Dhole Patil College of Engineering Pune, Maharashtra
Department of Electronics & Telecommunication
Engineering
tanmaynalawade@gmail.com
V. L. Jogdand
Dhole Patil College of Engineering Pune, Maharashtra
Department of Electronics & Telecommunication
Engineering
varshajogdand29@gmail.com
Abstract: An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The real-
time technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Keywords: Multi-port, Ethernet; Symmetric Network; VLAN; Asymmetric Network; CPU Utilization, Bandwidth.
I. INTRODUCTION
In network wired network i.e. Ethernet is one of the important technology for data exchanges at data centers and businesses.
Initially it was designed for simple file transmission between two points, but later on extended to supports the real-time video and
voice data. Ethernet is used to transfer the packet data over the Ethernet cables.
Network interface cards (NICs) also called as network interface controllers are evolving to add more features and intelligence
to boost network performance, including jumbo frames, offload capabilities, buffer and spacing tweaks. Network interfaces use
the data structures available with the Kernel to register with the kernel and processes the packet data to exchange with the external
world. Network device drivers are used to initialize the device, configure the device data including the memory assignment,
network addresses, and other parameters to maintaining traffic. It is working on interrupt based or polling based mechanism. An
interrupt will be generated to the processor for each and every packet received on the interface. In case of the multi-port systems,
interfaces will receive lots of packets per second. This data load needs to process in the same context, but due to large packet load,
it may cause to drop in overall performance of the system, but it is not the desired mode of network operation. The system should
process data packets effectively in any case.
This topic will discuss the Networking throughput measurement techniques, in brief, technical research on efficient network
bandwidth utilization, data security and configuration decisions for multi-port systems. Section two will describe the techniques
for advanced network performance measurement and related issues. Section three and four contain the main point of the draft i.e.
technical research on efficient network bandwidth utilization with Virtual LAN and the symmetric routing of network data in the
multi-port system and final are acknowledge and references.
Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 67
II. MULTIPORT NETWORK ISSUES
This topic will describe the tools and different techniques used to evaluate the network performance. The network performance
will depend on the type of applications, system configurations, how the hosts handle for these running applications on networking
devices and system design of the network as a complete solution. The hardware, as well as software configuration, are important
factors in networking. Even the small change in the software configuration may create a hardware capacity problem. The typical
data flow involves a logical OSI layered model. The data flow can be graphically represented as below figure.
Fig. 1 End-to-end network packet data flow
The network performance can be measured with different techniques such as single point and multi-point traffic-measurement.
In single-point traffic-measurement, the information is captured by equipment and displayed in Real-time traffic graphs. It can
help to categories based on the location they are used in the network. Host-monitoring is used to measure the traffic coming into
or going out for the particular point, this is also called as host system monitoring. The promiscuous mode will allow capturing all
the network traffic at the interface. It uses the different parameters as packets passed counter, packet size, packets dropped counter
over a predefined time. The single port network traffic-measurement has issues such as:
 The resource with slowest first byte
 The Resources that needs longest load time
 Network request initiation and terminations
Multi-point traffic-measurement technique helps to overcome the above drawbacks. It also helps to add more accuracy and
help to draw the spatial differences as it measures the data at different points. It provides the data counts and also the
measurements of the data flow dynamics. It helps to isolates issues in both time and space. Its focuses on the outcome and adds
excellent diagnostic power for the end customers.
III. VIRTUAL NETWORK
In networking, a layer-2 network may be virtually partitioned to create multiple distinct domains. These are mutually isolated
so, the packets can pass through the one or multiple routers. This term is referred as a virtual local area network. VLAN allows
multiple bridged networks to share the same physical link without leakage of information over the networks.
The main purpose of formatting the VLAN is to provide the compatible interconnections. It defines the principles of operation
with the VLAN aware bridge and also identifies the functions to be performed. It provides an architectural model of the operation
of a VLAN in terms of processes and Entities. It specifies the frame format which allows a VLAN Identifier (VID) and carried out
the priority information for the user data frames. VLAN can be set up with the rules to govern the addition or removal of VLAN
tags and forms user data frames. In the simple form, the devices support only partitioning on a hardware at the port level. It uses
the VLAN ID port tag in order to connect the transported data for multiple VLANs across the Network. In a traditional LAN, the
workstations are interconnected to each other by the multi-port network switches or hubs. These devices are used to propagate any
incoming data to the connected network. The workstations, hubs, and switches together form a LAN segment. This allows the
LAN area within which broadcasts or multi-casts are configured. Thus a LAN can consist of one or more LAN segments. The
logical view of Virtual LAN is as shown in below Fig. 2. It describes the protocols and procedures that are necessary to support
inter-operation between networks.
Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 68
Fig. 2 Physical view of a Virtual LAN
VLAN's can have many different IP subnets as they are not based on IP’s and does not encapsulate the original frame. VLAN
adds a 32-bit field in the packet header between the source MAC address and the Ether Type/Length of the original frame. Fig. 3
shows a Virtual LAN 32-bit field packet header.
Fig. 3 Virtual LAN Packet Header
IV.SYMMETRIC ROUTING AND BALANCING THE NETWORK
In the networking, data is uploaded to the network as well as downloaded from the network. The up-link data rates and
downlink data rates are showing a huge difference. In many cases, data need to be transmitted in both directions simultaneously.
In such scenario, the performance may be severely degraded, as low as 22 - 25%. This thesis will discuss an analysis of how
window-based method combined with queuing helps to improve the bi-directional network performance across network links.
Following scenario illustrate the bi-directional traffic across an asymmetric link with the default sized buffers. If a user is
streaming a video with a typical network link, and in the middle of the video, the user decides to download some movie clip from
other network sites. During the same period that movie clip is getting downloaded, the quality of the video is degraded even to the
point where it is not viewable. The default performance can be observed as shown below.
Fig. 4 Network performance with default buffers configurations
If the bi-directional network data traffic is present in the system, the up-link side throughput may be degraded by about 25%.
So, it is clear that buffer size plays an important role in determining performance for bi-directional network traffic. With these
examples, it is also clear that this problem has real significance in networks.
The network data asymmetry occurs when the data rates in both directions of a path are unequal. This type of configurations is
common in access networks. The problem of the performance of bi-directional TCP traffic across network links remains widely
unsolved. This gets even worst in case of multi-port scenario. The window-based buffer approach will help in a packet switched
systems. It requires buffers to store packets during processing network data. Process time can be comprised of with other things as
Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 69
security functions, table look-ups, traffic classification and queuing delays. The proper configurations of the buffers play a critical
role in order to prevent packet loss. It also helps to maintain efficient throughput for traffic.
In IP based equipment the buffers are typically implemented with full-size IP packets. That is a buffer is broken up into
segments of 1500 bytes long. This creates the packets less than or equal to the full size to be stored in the window buffer. The
buffers that are managed in 1500 bytes allow more efficient use of the time and space. Variable size packets can be placed in a
queue with variable offsets based on packet size. The memory efficiency of the buffer can be increased with this model, therefore
a dynamic list of memory pointers need to be maintained.
These buffers contain a couple of main components, the physical memory, and the software to controls the memory. The
memory that is allocated to the buffers must be with sufficient speed to match the line rate with the transceivers being used in the
network element. In general, high-speed DRAM and SRAM are used as a buffer memory. The system scalability becomes an
issue when the line rates begin to exceed memory speeds. Furthermore, as data rates increase, the amounts of virtual memory
required is also get increased but doesn't affect the cost as much due to virtual memory.
The sizing of the buffers in the network elements has evolved with capacity and utilization. The improved performance can be
observed as shown below.
Fig.5 Window based buffered network communication
CONCLUSION
The multi-port network architecture can be optimized to achieve the good performance over the existing infrastructure. There
are different theoretical techniques to achieve. Here, below two techniques are considered as the scope of this thesis:
 Port VLAN
 Symmetric port speed for balance network
The software techniques such as Virtual LAN and symmetric network configuration play a vital role for the Network
throughput and device performance. The Ethernet performance can be improved approx. 30% in multi-port network systems.
ACKNOWLEDGMENT
I would like to express my sincere gratitude to my guide Prof. V. L. Jogdand for the continuous support of my master’s study
and related research, for her patience, motivation, and immense knowledge. Her guidance helped me in all the time of research
and writing of this thesis. I could not have imagined having a better advisor and mentor for my master study.
REFERENCES
[1] IEEE 802.1Q-2011,”IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and
virtual bridged local area networks,” August 2011. http://standards.ieee.org/getieee802/download/802.1Q-2011.pdf
[2] IEEE 802.1aq-2012, “IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and
virtual bridged local area networks – Amendment 20: Shortest path bridging,” June 2012.
http://standards.ieee.org/getieee802/download/802.1aq-2012.pdf
[3] IEEE 802.1Qbc-2011, “IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and
virtual bridged local area networks – Amendment 16: Provider bridging: Remote customer service interfaces,” September
2011. http://standards.ieee.org/getieee802/download/802.1Qbc-2011.pdf
[4] IEEE 802.1Qbe-2011, “IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and
virtual bridged local area networks – Amendment 15: Multiple I-SID registration protocols,” September 2011.
http://standards.ieee.org/getieee802/download/802.1Qbe-2011.pdf
[5] E. Decker, P. Langille, A. Rijsinghani, K. McCloghrie, “Definitions of Managed Objects for Bridges,” IETF RFC1493, July
1993
[6] E. Bell, A. Smith, P. Langille, A. Rijhsinghani, K. McCloghrie, “Definitions of Managed Objects for Bridges with Traffic
Classes, Multicast Filtering and Virtual LAN Extensions,” IETF RFC2674, August 1999
[7] H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications,” IETF
RFC3550, July 2003
Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 70
[8] M. Heusse, T. X. Brown, T. Schwengler, and A. Duda, “A new look at bidirectional tcp connections over asymmetric links,"
Research Report RR-LIG-002, LIG, Grenoble, France, 2010.
[9] L. L. Peterson and B. S. Davie, Computer Networks: A Systems Approach. Morgan Kaufmann, 4th ed., 2007.
[10] L. Kalampoukas, A. Varma, and K. K. Ramakrishnan, “Two-way tcp traffic over rate controlled channels: effects and
analysis," IEEE/ACM Trans. Netw., vol. 6, 1998.
[11] F. Louati, C. Barakat, and W. Dabbous Handling two-way TCP traffic in asymmetric net- works," High-Speed Networks and
Multimedia Communications.
[12] S. Iyer, R. Kompella, and N. McKeown, “Analysis of a memory architecture for fast packet buffers," Proceedings of IEEE
High-Performance Switching and Routing, 2001.
[13] IEEE Std 802.2 “Part 2: Logical Link Control,” https://standards.ieee.org/about/get/802/802.2.html
[14] IEEE Std 802.3.1™-2013 “IEEE Standard for Management Information Base (MIB) Definitions for Ethernet,”
https://standards.ieee.org/getieee802/download/802.3.1-2013.pdf

More Related Content

What's hot

Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
Chong Yee Er
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
MdmArfah Baharudin
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
Osi model
Osi modelOsi model
Osi model
GLIM Digital
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
Sweta Kumari Barnwal
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
IJERA Editor
 
Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communication
N. A. Sutisna
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networksevelyn
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
Sweta Kumari Barnwal
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
Md. Mashiur Rahman
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
Michel Chamat
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
Satyendra Mohan
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
Romeo Alonzo
 
What is computer network
What is computer networkWhat is computer network
What is computer network
Mir Imad
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
Pokala Sai
 

What's hot (20)

Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
Networks
Networks   Networks
Networks
 
Osi model
Osi modelOsi model
Osi model
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communication
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
What is computer network
What is computer networkWhat is computer network
What is computer network
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 

Similar to Multi port network ethernet performance improvement techniques

Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
Jennifer Wood
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
IJERA Editor
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1nixon
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
ammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
Rodel Morales
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
Patricia Viljoen
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
Kimberly Jones
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
ChinmayWaingankar3
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 

Similar to Multi port network ethernet performance improvement techniques (20)

Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 

Recently uploaded

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

Multi port network ethernet performance improvement techniques

  • 1. Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 66 ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue6) Available online at www.ijariit.com Multiport Network Ethernet Performance Improvement Techniques Tanaji Shankar Nalawade Dhole Patil College of Engineering Pune, Maharashtra Department of Electronics & Telecommunication Engineering tanmaynalawade@gmail.com V. L. Jogdand Dhole Patil College of Engineering Pune, Maharashtra Department of Electronics & Telecommunication Engineering varshajogdand29@gmail.com Abstract: An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The real- time technologies such as video on demand and Voice over IP operations demand the network devices with efficient network data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context. And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port network system performance significantly over the currently existing infrastructure. This performance improvement includes CPU utilization and bandwidth in the heavy network loads. Keywords: Multi-port, Ethernet; Symmetric Network; VLAN; Asymmetric Network; CPU Utilization, Bandwidth. I. INTRODUCTION In network wired network i.e. Ethernet is one of the important technology for data exchanges at data centers and businesses. Initially it was designed for simple file transmission between two points, but later on extended to supports the real-time video and voice data. Ethernet is used to transfer the packet data over the Ethernet cables. Network interface cards (NICs) also called as network interface controllers are evolving to add more features and intelligence to boost network performance, including jumbo frames, offload capabilities, buffer and spacing tweaks. Network interfaces use the data structures available with the Kernel to register with the kernel and processes the packet data to exchange with the external world. Network device drivers are used to initialize the device, configure the device data including the memory assignment, network addresses, and other parameters to maintaining traffic. It is working on interrupt based or polling based mechanism. An interrupt will be generated to the processor for each and every packet received on the interface. In case of the multi-port systems, interfaces will receive lots of packets per second. This data load needs to process in the same context, but due to large packet load, it may cause to drop in overall performance of the system, but it is not the desired mode of network operation. The system should process data packets effectively in any case. This topic will discuss the Networking throughput measurement techniques, in brief, technical research on efficient network bandwidth utilization, data security and configuration decisions for multi-port systems. Section two will describe the techniques for advanced network performance measurement and related issues. Section three and four contain the main point of the draft i.e. technical research on efficient network bandwidth utilization with Virtual LAN and the symmetric routing of network data in the multi-port system and final are acknowledge and references.
  • 2. Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 67 II. MULTIPORT NETWORK ISSUES This topic will describe the tools and different techniques used to evaluate the network performance. The network performance will depend on the type of applications, system configurations, how the hosts handle for these running applications on networking devices and system design of the network as a complete solution. The hardware, as well as software configuration, are important factors in networking. Even the small change in the software configuration may create a hardware capacity problem. The typical data flow involves a logical OSI layered model. The data flow can be graphically represented as below figure. Fig. 1 End-to-end network packet data flow The network performance can be measured with different techniques such as single point and multi-point traffic-measurement. In single-point traffic-measurement, the information is captured by equipment and displayed in Real-time traffic graphs. It can help to categories based on the location they are used in the network. Host-monitoring is used to measure the traffic coming into or going out for the particular point, this is also called as host system monitoring. The promiscuous mode will allow capturing all the network traffic at the interface. It uses the different parameters as packets passed counter, packet size, packets dropped counter over a predefined time. The single port network traffic-measurement has issues such as:  The resource with slowest first byte  The Resources that needs longest load time  Network request initiation and terminations Multi-point traffic-measurement technique helps to overcome the above drawbacks. It also helps to add more accuracy and help to draw the spatial differences as it measures the data at different points. It provides the data counts and also the measurements of the data flow dynamics. It helps to isolates issues in both time and space. Its focuses on the outcome and adds excellent diagnostic power for the end customers. III. VIRTUAL NETWORK In networking, a layer-2 network may be virtually partitioned to create multiple distinct domains. These are mutually isolated so, the packets can pass through the one or multiple routers. This term is referred as a virtual local area network. VLAN allows multiple bridged networks to share the same physical link without leakage of information over the networks. The main purpose of formatting the VLAN is to provide the compatible interconnections. It defines the principles of operation with the VLAN aware bridge and also identifies the functions to be performed. It provides an architectural model of the operation of a VLAN in terms of processes and Entities. It specifies the frame format which allows a VLAN Identifier (VID) and carried out the priority information for the user data frames. VLAN can be set up with the rules to govern the addition or removal of VLAN tags and forms user data frames. In the simple form, the devices support only partitioning on a hardware at the port level. It uses the VLAN ID port tag in order to connect the transported data for multiple VLANs across the Network. In a traditional LAN, the workstations are interconnected to each other by the multi-port network switches or hubs. These devices are used to propagate any incoming data to the connected network. The workstations, hubs, and switches together form a LAN segment. This allows the LAN area within which broadcasts or multi-casts are configured. Thus a LAN can consist of one or more LAN segments. The logical view of Virtual LAN is as shown in below Fig. 2. It describes the protocols and procedures that are necessary to support inter-operation between networks.
  • 3. Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 68 Fig. 2 Physical view of a Virtual LAN VLAN's can have many different IP subnets as they are not based on IP’s and does not encapsulate the original frame. VLAN adds a 32-bit field in the packet header between the source MAC address and the Ether Type/Length of the original frame. Fig. 3 shows a Virtual LAN 32-bit field packet header. Fig. 3 Virtual LAN Packet Header IV.SYMMETRIC ROUTING AND BALANCING THE NETWORK In the networking, data is uploaded to the network as well as downloaded from the network. The up-link data rates and downlink data rates are showing a huge difference. In many cases, data need to be transmitted in both directions simultaneously. In such scenario, the performance may be severely degraded, as low as 22 - 25%. This thesis will discuss an analysis of how window-based method combined with queuing helps to improve the bi-directional network performance across network links. Following scenario illustrate the bi-directional traffic across an asymmetric link with the default sized buffers. If a user is streaming a video with a typical network link, and in the middle of the video, the user decides to download some movie clip from other network sites. During the same period that movie clip is getting downloaded, the quality of the video is degraded even to the point where it is not viewable. The default performance can be observed as shown below. Fig. 4 Network performance with default buffers configurations If the bi-directional network data traffic is present in the system, the up-link side throughput may be degraded by about 25%. So, it is clear that buffer size plays an important role in determining performance for bi-directional network traffic. With these examples, it is also clear that this problem has real significance in networks. The network data asymmetry occurs when the data rates in both directions of a path are unequal. This type of configurations is common in access networks. The problem of the performance of bi-directional TCP traffic across network links remains widely unsolved. This gets even worst in case of multi-port scenario. The window-based buffer approach will help in a packet switched systems. It requires buffers to store packets during processing network data. Process time can be comprised of with other things as
  • 4. Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 69 security functions, table look-ups, traffic classification and queuing delays. The proper configurations of the buffers play a critical role in order to prevent packet loss. It also helps to maintain efficient throughput for traffic. In IP based equipment the buffers are typically implemented with full-size IP packets. That is a buffer is broken up into segments of 1500 bytes long. This creates the packets less than or equal to the full size to be stored in the window buffer. The buffers that are managed in 1500 bytes allow more efficient use of the time and space. Variable size packets can be placed in a queue with variable offsets based on packet size. The memory efficiency of the buffer can be increased with this model, therefore a dynamic list of memory pointers need to be maintained. These buffers contain a couple of main components, the physical memory, and the software to controls the memory. The memory that is allocated to the buffers must be with sufficient speed to match the line rate with the transceivers being used in the network element. In general, high-speed DRAM and SRAM are used as a buffer memory. The system scalability becomes an issue when the line rates begin to exceed memory speeds. Furthermore, as data rates increase, the amounts of virtual memory required is also get increased but doesn't affect the cost as much due to virtual memory. The sizing of the buffers in the network elements has evolved with capacity and utilization. The improved performance can be observed as shown below. Fig.5 Window based buffered network communication CONCLUSION The multi-port network architecture can be optimized to achieve the good performance over the existing infrastructure. There are different theoretical techniques to achieve. Here, below two techniques are considered as the scope of this thesis:  Port VLAN  Symmetric port speed for balance network The software techniques such as Virtual LAN and symmetric network configuration play a vital role for the Network throughput and device performance. The Ethernet performance can be improved approx. 30% in multi-port network systems. ACKNOWLEDGMENT I would like to express my sincere gratitude to my guide Prof. V. L. Jogdand for the continuous support of my master’s study and related research, for her patience, motivation, and immense knowledge. Her guidance helped me in all the time of research and writing of this thesis. I could not have imagined having a better advisor and mentor for my master study. REFERENCES [1] IEEE 802.1Q-2011,”IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and virtual bridged local area networks,” August 2011. http://standards.ieee.org/getieee802/download/802.1Q-2011.pdf [2] IEEE 802.1aq-2012, “IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and virtual bridged local area networks – Amendment 20: Shortest path bridging,” June 2012. http://standards.ieee.org/getieee802/download/802.1aq-2012.pdf [3] IEEE 802.1Qbc-2011, “IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and virtual bridged local area networks – Amendment 16: Provider bridging: Remote customer service interfaces,” September 2011. http://standards.ieee.org/getieee802/download/802.1Qbc-2011.pdf [4] IEEE 802.1Qbe-2011, “IEEE standard for local and metropolitan area networks: Media access control (MAC) bridges and virtual bridged local area networks – Amendment 15: Multiple I-SID registration protocols,” September 2011. http://standards.ieee.org/getieee802/download/802.1Qbe-2011.pdf [5] E. Decker, P. Langille, A. Rijsinghani, K. McCloghrie, “Definitions of Managed Objects for Bridges,” IETF RFC1493, July 1993 [6] E. Bell, A. Smith, P. Langille, A. Rijhsinghani, K. McCloghrie, “Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN Extensions,” IETF RFC2674, August 1999 [7] H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications,” IETF RFC3550, July 2003
  • 5. Nalawade Tanaji Shankar, Jogdand V. L., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 70 [8] M. Heusse, T. X. Brown, T. Schwengler, and A. Duda, “A new look at bidirectional tcp connections over asymmetric links," Research Report RR-LIG-002, LIG, Grenoble, France, 2010. [9] L. L. Peterson and B. S. Davie, Computer Networks: A Systems Approach. Morgan Kaufmann, 4th ed., 2007. [10] L. Kalampoukas, A. Varma, and K. K. Ramakrishnan, “Two-way tcp traffic over rate controlled channels: effects and analysis," IEEE/ACM Trans. Netw., vol. 6, 1998. [11] F. Louati, C. Barakat, and W. Dabbous Handling two-way TCP traffic in asymmetric net- works," High-Speed Networks and Multimedia Communications. [12] S. Iyer, R. Kompella, and N. McKeown, “Analysis of a memory architecture for fast packet buffers," Proceedings of IEEE High-Performance Switching and Routing, 2001. [13] IEEE Std 802.2 “Part 2: Logical Link Control,” https://standards.ieee.org/about/get/802/802.2.html [14] IEEE Std 802.3.1™-2013 “IEEE Standard for Management Information Base (MIB) Definitions for Ethernet,” https://standards.ieee.org/getieee802/download/802.3.1-2013.pdf