Submit Search
Upload
Bandwidth measurement
•
Download as PPT, PDF
•
0 likes
•
1,034 views
J
jeromy fu
Follow
Share some ideas and experience in bandwidth measurement.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 77
Download now
Recommended
Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
Routing and OSPF
Routing and OSPF
arpit
MPLS VPN
MPLS VPN
Shahzaib Mahesar
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
Basim Aly (JNCIP-SP, JNCIP-ENT)
IS-IS Packet Types
IS-IS Packet Types
NetProtocol Xpert
IPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
Chassis Cluster Configuration
Chassis Cluster Configuration
Kashif Latif
Recommended
Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
Routing and OSPF
Routing and OSPF
arpit
MPLS VPN
MPLS VPN
Shahzaib Mahesar
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
Basim Aly (JNCIP-SP, JNCIP-ENT)
IS-IS Packet Types
IS-IS Packet Types
NetProtocol Xpert
IPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
Chassis Cluster Configuration
Chassis Cluster Configuration
Kashif Latif
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
Aci presentation
Aci presentation
Joe Ryan
OSPF v3
OSPF v3
Irsandi Hasan
Introduction to sandvine dpi
Introduction to sandvine dpi
Mohammed Abdallah
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos built
Cumulus Networks
CCNA ppt
CCNA ppt
Sumant Garg
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5 final
KwonSun Bae
IPv6
IPv6
Suman Bose
Segment Routing
Segment Routing
APNIC
Cisco Discovery Protocol
Cisco Discovery Protocol
Naga Ramesh
802.11r Explained.
802.11r Explained.
Ajay Gupta
BGP
BGP
Reza Farahani
Quality of service
Quality of service
Yasser El Harbili
MPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
CCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
ospf routing protocol
ospf routing protocol
Ameer Agel
Understanding TCP/IP
Understanding TCP/IP
matthew_jenkins
CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
Packet tracer
Packet tracer
Imdad Ullah
installasi briker ( VOIP )
installasi briker ( VOIP )
Agus Setyawan
VoIP for networking class-sh
VoIP for networking class-sh
Selamet Hariadi
More Related Content
What's hot
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
Aci presentation
Aci presentation
Joe Ryan
OSPF v3
OSPF v3
Irsandi Hasan
Introduction to sandvine dpi
Introduction to sandvine dpi
Mohammed Abdallah
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos built
Cumulus Networks
CCNA ppt
CCNA ppt
Sumant Garg
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5 final
KwonSun Bae
IPv6
IPv6
Suman Bose
Segment Routing
Segment Routing
APNIC
Cisco Discovery Protocol
Cisco Discovery Protocol
Naga Ramesh
802.11r Explained.
802.11r Explained.
Ajay Gupta
BGP
BGP
Reza Farahani
Quality of service
Quality of service
Yasser El Harbili
MPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
CCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
ospf routing protocol
ospf routing protocol
Ameer Agel
Understanding TCP/IP
Understanding TCP/IP
matthew_jenkins
CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
Packet tracer
Packet tracer
Imdad Ullah
What's hot
(20)
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Aci presentation
Aci presentation
OSPF v3
OSPF v3
Introduction to sandvine dpi
Introduction to sandvine dpi
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos built
CCNA ppt
CCNA ppt
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5 final
IPv6
IPv6
Segment Routing
Segment Routing
Cisco Discovery Protocol
Cisco Discovery Protocol
802.11r Explained.
802.11r Explained.
BGP
BGP
Quality of service
Quality of service
MPLS L3 VPN Deployment
MPLS L3 VPN Deployment
CCNP Security-Secure
CCNP Security-Secure
ospf routing protocol
ospf routing protocol
Understanding TCP/IP
Understanding TCP/IP
CCNA ppt Day 1
CCNA ppt Day 1
Packet tracer
Packet tracer
Viewers also liked
installasi briker ( VOIP )
installasi briker ( VOIP )
Agus Setyawan
VoIP for networking class-sh
VoIP for networking class-sh
Selamet Hariadi
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Management
gopartheredbuff
Bandwidth optimization
Bandwidth optimization
Jeetendra Ahirwar
Lesson 3 bandwidth
Lesson 3 bandwidth
mrcmorrison
Bandwidth utilization
Bandwidth utilization
Rifka Hayati
Tugas akhir mikotik hotspot user manager
Tugas akhir mikotik hotspot user manager
Muhammad Arief Ubaidillah
Data transmission rate and bandwidth
Data transmission rate and bandwidth
Kajal Chaudhari
Bandwidth Presentation
Bandwidth Presentation
Grace=] Penda
Viewers also liked
(9)
installasi briker ( VOIP )
installasi briker ( VOIP )
VoIP for networking class-sh
VoIP for networking class-sh
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Management
Bandwidth optimization
Bandwidth optimization
Lesson 3 bandwidth
Lesson 3 bandwidth
Bandwidth utilization
Bandwidth utilization
Tugas akhir mikotik hotspot user manager
Tugas akhir mikotik hotspot user manager
Data transmission rate and bandwidth
Data transmission rate and bandwidth
Bandwidth Presentation
Bandwidth Presentation
Similar to Bandwidth measurement
Sca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_final
Phuc Anh Tran
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
Vuz Dở Hơi
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
Chaing Ravuth
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
Brk 135 t-ccna_switching
Brk 135 t-ccna_switching
parthasn83
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
PROIDEA
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio Presenation
Mojtaba Esfandiari
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET Journal
A Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET Journal
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Dr. Mohieddin Moradi
Generic network architecture discussion
Generic network architecture discussion
ARCFIRE ICT
Troubleshooting basic networks
Troubleshooting basic networks
Arnold Derrick Kinney
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus SDN/OpenFlow switch
High perf-networking
High perf-networking
mtimjones
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
ICT PRISTINE
cisco-nti-Day18
cisco-nti-Day18
eyad alaa
CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02
Licenciatura en Redes y Sistemas Operativos
Interprocess Message Formats
Interprocess Message Formats
Pathfinder Solutions
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDP
Thomas Graf
Multi Process Message Formats
Multi Process Message Formats
Pathfinder Solutions
Similar to Bandwidth measurement
(20)
Sca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_final
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
Brk 135 t-ccna_switching
Brk 135 t-ccna_switching
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio Presenation
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace Back
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Generic network architecture discussion
Generic network architecture discussion
Troubleshooting basic networks
Troubleshooting basic networks
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
High perf-networking
High perf-networking
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
cisco-nti-Day18
cisco-nti-Day18
CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02
Interprocess Message Formats
Interprocess Message Formats
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDP
Multi Process Message Formats
Multi Process Message Formats
Recently uploaded
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
Hyundai Motor Group
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Recently uploaded
(20)
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Bandwidth measurement
1.
Network
measurement Jeromy Fu Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
2.
Agenda
Why what and how Roadmap Bandwidth measurement Current Implementation Future work Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
3.
Why measurement is
needed A big black cloud No explicit feedback Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
4.
Application area
Congestion control(QoS, transport layer etc) Overlay networks, (relay, overlay route etc) CDNs (select best server) Streaming(adjust encoding rate) And many more… Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
5.
What to measure?
Metrics Tools RTT ping Jitter iperf Packet Loss ping Avail bandwidth Bottleneck Link capacity Throughput iperf Route info traceroute MTU ping Topology GNP , Skitter Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
6.
How to measure?
Using special probing packets or application packets The aim: accuracy, when cross traffic exist non-intrusiveness, do not saturate path timeless Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
7.
Roadmap
Measurement bandwidth using probing packets Link congestion detection using probing packets Congestion group identification based on congestion similarity. Using app packets instead of probing packets Topology(GNP like ordinate system etc) Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
8.
Bandwidth measurement
One packet model and packet pair (train) model link capacity, bottleneck bandwidth, available bandwidth. Lots of experiment tools exist, but none production exist, the most previous tools are using TCP flooding. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
9.
Terminology Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
10.
Terminology
Hop : Link at layer 3 Segment : Link at layer2 Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
11.
Terminology
Link aggregation http://wenku.baidu.com/view/64d752a6f524ccbff12184ca.htm Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
12.
Vuze use Network
Diagnostic Tool http://www.measurementlab.net/measurement-lab-tools#tool1 http://netspeed.stanford.edu/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
13.
uTorrent use M-labs
tool pathload2 http://www.utorrent.com/faq#mlabs http://www.measurementlab.net/measurement-lab-tools#tool4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
14.
Limitation of Tcp
Throughput Other metrics may have significant effect on TCP throughput ( TCP is inefficient in high BDP networks and packet loss link) Other applications and transport protocols (e.g. for video and audio streaming) have different performance characteristics. Too intrusive, place too much additional load on the network. Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
15.
Available bandwidth
Tools pathload, pathchrip, IGI/PTR Method Self-Induced Congestion Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
16.
IGI/PTR insight
Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
17.
IGI/PTR Algorithm Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
18.
Pathload Insight
Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
19.
Pathload Algorithm
Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
20.
(Path or hop)
capacity Tools pathchar, click, etc One packet Model Measures per-hop capacity, using icmp packets, like traceroute Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
21.
One packet Model
Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
22.
One packet Model
Sender set TTL=1, send out the packet, and wait for the ICMP TTL-exceeded packet back. Upon receiving ICMP, estimate the RTT. Estimate the RTT multiple times for various size packets. The minimum RTT of various packets are believed to be the valid sample. The first link capacity is C=1/b , b is slope of RTT graph. Set the TTL=2,3…n, repeat the process of step1 to 3, to Calculate the C=1/ bi – bi-1 Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
23.
One packet Model
Transmission delay is linear with respect to packet size. Most implementation use RTT instead of one-way delay. Using linear regression to filter the queue results. Links are single-channel Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
24.
Drawbacks
Linear regression is expensive (done for every link, need many packets, can alleviate through convergence of result). ACKs may not be sent in timely manner (ICMP packets are often limited or blocked). Some nodes are invisible (such as bridge etc work in layer 2, thus won’t decrease IP TTL and no icmp ack), layer2 effect (underestimate lay3 capacity) Reverse path adds noise. Response packets may come back through a different path. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
25.
Bottleneck bandwidth
Pathrate, capprobe, udt etc Packet pair Model Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
26.
Packet pair Model
Cross traffic Time compression: Other packet queue ahead of the first probe packet when it is downstream of the bottleneck link. This leads to high estimates. Time extension: Other packets delay the second probe packet and extend the spacing between the two probe packets. This leads to low estimates. Only support FIFO-queuing of router Doesn’t support multi-channel links Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
27.
Packet pair Model
Transmission time of L-byte packet at link with capacity C. t = L/C Send two packets ‘back-to-back’ from source to sink/ Measure dispersion of packet pair at receiver. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
28.
Drawbacks
Though simple, Packet pair technique can produce widely varied estimate and erroneous results, mainly due to cross traffic in the path and error in measurement(it relies on high precision timestamp) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
29.
Packet Train Model
Packet train of length N. Source can send N back-to- back packets of size L to sink. Sink measures total dispersion D, computes bandwidth estimate as b = (N-1)L/D. eliminate measurement errors, but more likely to be interfere with cross traffic packets. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
30.
Quick Review
Active probing including three kinds of method, one packet, packet pair and packet train. All assumes store-and-forward behavior of the intermediate node. All works on single channel. Receive based or Sender based. All have their pros and crons. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
31.
Which one is
better Most people said their tool is better than the others. No business product using yet. Do test of those tools by ourselves. We need a benchmark tool first. Here comes iperf. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
32.
Which one is
better Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
33.
Which one is
better Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
34.
Which one is
better After overall test on current implemented tools in various environments including nistnet environment and ADSL environment . Unfortunately, none of them gives reasonable result in both environment. Iperf works well. For more information, pls refer to “iperf.doc” and “bw tech report.docx” Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
35.
Previous implementation
More or less like iperf. measure throughput, but not TCP. Based on UDT, which uses UDP for reliable data transfer . UDT has its own flow/congestion control algorithm which is more efficient for data transfer than TCP. UDT has very flexible design which enable using used defined flow/congestion control algorithm. Good for later optimization, for example, slow down when detecting OWD increasing trend, so not affecting normal traffic. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
36.
Problems remains
Flooding way will affect the normal traffic and interfere the user. UDT is too aggressive, even for constant rate UDP stream. Should review the research materials before to find a better solution. Besides, flooding way is not feasible when we need the metrics about the network most of the time, for example in QoS. Need further research into these area, so new version of netdect in being developed. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
37.
We need better
solution Think a litter about what bandwidth, how bandwidth are limited? Some experiments. Implementation details. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
38.
Physical layer net
bit rate 56 kbit/s Modem / Dialup 1.5 Mbit/s ADSL Lite 11 Mbit/s Wireless 802.11b 54 Mbit/s Wireless 802.11g 100 Mbit/s Fast Ethernet 155 Mbit/s OC3 300 Mbit/s Wireless 802.11n 622 Mbit/s OC12 1 Gbit/s Gigabit Ethernet 2.5 Gbit/s OC48 9.6 Gbit/s OC192 10 Gbit/s 10 Gigabit Ethernet 100 Gbit/s 100 Gigabit Ethernet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
39.
Physical layer net
bit rate Version Common name Downstream rate Upstream rate ADSL ADSL 8.0 Mbit/s 1.0 Mbit/s ADSL ADSL (G.DMT) 12.0 Mbit/s 1.3 Mbit/s ADSL ADSL over POTS 12.0 Mbit/s 1.3 Mbit/s ADSL ADSL over ISDN 12.0 Mbit/s 1.8 Mbit/s ADSL ADSL Lite (G.Lite) 1.5 Mbit/s 0.5 Mbit/s ADSL2 ADSL2 12.0 Mbit/s 1.3 Mbit/s ADSL2 ADSL2 12.0 Mbit/s 3.5 Mbit/s ADSL2 RE-ADSL2 5.0 Mbit/s 0.8 Mbit/s ADSL2 splitterless ADSL2 1.5 Mbit/s 0.5 Mbit/s ADSL2+ ADSL2+ 24.0 Mbit/s 1.3 Mbit/s ADSL2+ ADSL2+M 24.0 Mbit/s 3.3 Mbit/s Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
40.
Bandwidth cap
limits the transfer of a specified amount of data over a period of time. Internet service providers commonly apply a cap when a channel intended to be shared by many users becomes overloaded, or may be overloaded, by a few users. Different approaches exist, including simple limitation of rate on user and sophisticate strategy based on credit. This is what we are interesting. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
41.
What affects user’s
observed throughput The ideal throughput is the physical layer net bit rate. If in Ethernet, it’s 100Mbps. Latency is not directly related to the throughput, but it has effect on specific transport protocol, for example, TCP(TCP’s self-clocking based on RTT). That’s to say congestion control algorithm will affect the throughput. Packet drops affect the throughput. Bottleneck link affect the throughput. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
42.
Two ways of
bandwidth limitation Drop Buffer and then drop Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
43.
How Nistnet works? Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
44.
How Nistnet works? Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
45.
How Nistnet works?
Bandwidth limitation is implemented as adding delay, just like a packet go through a bottleneck link. Determine the amount of time to delay a packet. This is the maximum of two quantities: 1. Probabilistic packet delay time 2. Bandwidth-limitation delay time Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
46.
How Nistnet works?
probdelay = correlatedtabledist(&tableme->ltEntry.lteIDelay); if (hitme->hitreq.bandwidth) { fixed_gettimeofday(&our_time); bandwidthdelay = timeval_diff(&hitme->next_packet, &our_time); if (bandwidthdelay < 0) { bandwidthdelay = 0; hitme->next_packet = our_time; } packettime = (long)skb->len*(MILLION/hitme->hitreq.bandwidth) + ((long)skb->len*(MILLION%hitme->hitreq.bandwidth) + hitme->hitreq.bandwidth/2)/hitme->hitreq.bandwidth; timeval_add(&hitme->next_packet, packettime); bandwidthdelay += packettime; } delay = probdelay > bandwidthdelay ? probdelay : bandwidthdelay; Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
47.
Ping in real
life 124.160.32.248(Netcom office DMZ) ping 216.24.133.8(pc in Denver) Minimum = 210ms, Maximum = 234ms, Average = 213ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
48.
Ping in real
life 218.109.124.61(Huashu Netcom) ping 124.160.32.248(Netcom office DMZ) Minimum = 5ms, Maximum = 90ms, Average = 31ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
49.
Ping in real
life with cross traffic Daisy’s ADSL ping www.google.com, adding TCP upstream cross traffic Minimum = 20ms, Maximum = 151ms, Average = 98ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
50.
Ping in real
life with cross traffic Daisy’s ADSL ping www.google.com, adding 1.5 MB /s UDP upstream cross traffic saturating the link. Minimum = 20ms, Maximum = 705ms, Average = 634ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
51.
Ping in real
life with cross traffic Netcom ADSL 124.90.150.57 ping DMZ 124.160.32.248 , using TCP downstream cross traffic saturating the link. Minimum = 4ms, Maximum = 8ms, Average = 4ms, Loss 0% Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
52.
Ping in real
life with cross traffic Netcom ADSL 124.90.150.57 ping DMZ 124.160.32.248 , using 8 MB/s UDP downstream cross traffic saturating the link. Minimum = 4ms, Maximum = 7ms, Average = 4ms, Loss 0%, UDP loss reported by iperf 74%. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
53.
Clock Skew
This is not a big problem for using increasing OWDs as a hint of congestion. According to the paper of pathload, the typical clock skew is 10-100 us per second(in my test, it's 0.1ms=100us per second) for 1ms precision is used, we should limit the error less than 1ms. So, for 0.1ms per second clock skew, we should collect data in less than10 seconds, if for 10us per second clock skew, we should collect data in 100s. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
54.
Clock Skew
The relative OWDs can be distorted by possible skew between then sender and receiver clocks. Measure from both direction. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
55.
Clock Skew
In the test, the skew between the two different type of machines is 1ms per 10s, that is 0.1ms per second. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
56.
OWD increasing trend
Send rate Rs, Avali bw Ra Buffered_size = Rs* t – Ra * t Delay = buffered_size/Ra = (Rs/Ra -1) t Test in nistnet, set bandwidth limitation 100K with sending rate of 100K Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
57.
OWD and packet
loss in China ADSL DMZ 124.160.32.248 -> Netcom ADSL 124.90.150.57 Sending rate 500KB/s. rcv_rate = 329 KB/s , loss : 32% (158/491) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
58.
Trend algorithm (Pathload)
PCT (Pairwise Comparison Test): measures the fraction of consecutive pairs that are increasing. if there's a strong increasing trend, it approaches one. PDT (Pairwise Difference Test): quantifies how strong is the start-to-end variation, relative to the absolute variations. if there is a strong increasing trend, it approaches one. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
59.
Spearman’s Rank Correlation
Coefficient Spearman’s Rank Correlation Coefficient is used to detect monotonic trend. The value is in range [-1,1], and the more approaches 1, the stronger the increasing trend. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
60.
How to calculate
n raw scores Xi,Yi are converted to ranks xi, yi di = xi – yi Using the formulae. Refer to http://www.wikihow.com/Calculate- Spearman's-Rank-Correlation-Coefficient This web page will do Spearman rank correlation. Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
61.
Compare of the
two spearman : 0.821005081875 PCT: 0.47619047619 PDT: 0.393939393939 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
62.
Work on better
solution Firstly, it should be test and work well in specific nistnet environment. We need reproducible environment. Data should be collected for post- analyze. Should ensure collected data is not twisted by some inefficiency, for example, writing logs or doing calculation. Every abnormal case should be analyze carefully for the root cause, mostly there’re some bugs. Need some tools to help on the analyze. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
63.
Tools developed for
analyzing pingtrend.py – using ping.exe to collect data and record the result into file, pingtrend.py can be used to filter out the ping values and dump them in ‘pingrtt.txt’, which can be used in combination with other tools. trend.py – Give a sequence of values, plot them in a diagram and calculate increasing trend, including PCT, PDT and spearman correlation coefficient. logparser.py – Analyze the log of netdect.exe, Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
64.
Sequence loopback
ISN would better be random. Many protocols and algorithms require the serialization or enumeration of related entities. For example, a communication protocol must know whether some packet comes "before" or "after" some other packet. The IETF RFC 1982 attempts to define "Serial Number Arithmetic" for the purposes of manipulating and comparing these sequence numbers. Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
65.
Feedback
Too many feedbacks will add the processing overload , and will twisted the latency and may slow down the sending rate. The feedback can be timely based or packet based. Timely based feedback won't cost too much reverse traffic but there maybe not enough samples when congestion happens. Which is better is under consideration, currently, for bandwidth measurement, there’s no need to send those feedbacks, all will be calculated at the server side and give the client the result. However it’s needed in other aspects(identify the share bottleneck, make bw measurement tcp friendly) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
66.
Logs
DO NOT use stdout log for it's the performance killer, writing them to file logs. If needed, I think using shared memory and open another process to flush the logs into file will be the best. However, using file logs is enough. Using txt file log which is convenient for later processing. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
67.
Packet size and
probe period Previously mentioned that clock skew would be 1ms per 10s, this won’t be a problem for bw measurement for it’s less than this. The probe period is the less the better. Now the problem becomes how can we collect enough samples in a limited time period, while using a specific sending rate. Let's consider 10KB/s, and 1KB per packet, so there're only 10 packets in one sec, that means 0.001 pkt in 10ms, so we should adjust the pkt size according to the sending rate. Dynamic adjust pkt size to get enough samples. pkt_size = min(t * spd / min_sample_cnt, MTU) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
68.
Cope with packet
loss As mentioned before, some bandwidth cap drops packets without buffer. So, OWD increasing won’t work. How to tell from loss caused by bandwidth cap and other cases Loss rate caused by bandwidth cap shows strong correlation with sending rate. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
69.
Netcom -> Netcom
Pearson similarity: 0.776851619493 spearman : 1.0 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
70.
Netcom -> Telcom
Pearson similarity: -0.233247151714 spearman : 0.155357142857 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
71.
Nistnet 30% packet
loss Pearson similarity: 0.171674559023 spearman : -0.0428571428571 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
72.
Current implementation
Mainly use OWD increasing trend as a hint of congestion. Cope with China ADSL, which drops packets when upper to limitation(Find the tuning point of packet loss increasing, the packet loss will correlation with sending rate when up to the limitation. Support packet pair, but it’s not accurate, in LAN, it measured bw is 5MB/s, nearly half of the capacity. Use packet Train as a hint of avail bw suggestion. Start binary search. Add error recovery. Works well in nistnet env. Can cope with constant UDP cross traffic. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
73.
To-do
Be TCP friendly, it should work if it can detect congestion quicker than TCP, if OWD increase it’s possible(Using feedback packets), but it directly drop, then it will be more complicate. Even flooding method can’t guaranty this. Grouping congestion path. Using APP packets(stream of different type) to identify congestion and groups. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
74.
Reference
Topics in High-Performance Messaging http://www.29west.com/docs/THPM/index.html Spearman Rank-Order Correlation Coefficient http://faculty.vassar.edu/lowry/corr_rank.html http://www.wikihow.com/Calculate-Spearman's-Rank-Correlation- Coefficient http://geographyfieldwork.com/SpearmansRank.htm Correlation and linear regression http://udel.edu/~mcdonald/statregression.html http://www.statisticssolutions.com/methods-chapter/statistical- tests/correlation-pearson-kendall-spearman/ Free Statistical Software http://statpages.org/javasta2.html ISN http://lin-style.javaeye.com/blog/156950 http://www.faqs.org/rfcs/rfc1982.html http://en.wikipedia.org/wiki/Serial_number_arithmetic http://kerneltrap.org/node/4654 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
75.
Test bed
Nistnet used for minic the wide area network enviroment. Spirent (Hardware emulator) which gives more powerful control than nistnet. ADSL env in the Lab PlanetLab (On progress) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
76.
Autotest Tool
Not yet extensible now, but if having more requirements, it will be, can be used by others, not limit to network detect. User register for the test. Set the settings of the test( autorun time, working directory) Autorun, analyzed and generate reports. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
77.
Q and A Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77
Download now