SlideShare a Scribd company logo
1 of 77
Network
          measurement



            Jeromy Fu




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Agenda
            Why what and how
            Roadmap
            Bandwidth measurement
            Current Implementation
            Future work




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Why measurement is needed
            A big black cloud
            No explicit feedback




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Application area
            Congestion control(QoS, transport layer etc)

            Overlay networks, (relay, overlay route etc)

            CDNs (select best server)

            Streaming(adjust encoding rate)

            And many more…



          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
What to measure?

                          Metrics                                                        Tools
                          RTT                                                            ping
                          Jitter                                                         iperf
                          Packet Loss                                                    ping
                          Avail bandwidth
                          Bottleneck
                          Link capacity
                          Throughput                                                     iperf
                          Route info                                                     traceroute
                          MTU                                                            ping
                          Topology                                                       GNP , Skitter


          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                   5
How to measure?

            Using special probing packets or application packets

            The aim:

                  accuracy, when cross traffic exist

                  non-intrusiveness, do not saturate path

                  timeless



          Source: Placeholder for Notes is 14 points
Presentation_ID    © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Roadmap
            Measurement bandwidth using probing packets

            Link congestion detection using probing packets

            Congestion group identification based on congestion
             similarity.

            Using app packets instead of probing packets

            Topology(GNP like ordinate system etc)


          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Bandwidth measurement
            One packet model and packet pair (train) model

            link capacity, bottleneck bandwidth, available bandwidth.

            Lots of experiment tools exist, but none production exist,
             the most previous tools are using TCP flooding.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Terminology




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Terminology
            Hop : Link at layer 3
            Segment : Link at layer2




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Terminology
            Link aggregation
            http://wenku.baidu.com/view/64d752a6f524ccbff12184ca.htm




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Vuze use Network Diagnostic Tool
            http://www.measurementlab.net/measurement-lab-tools#tool1
            http://netspeed.stanford.edu/




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
uTorrent use M-labs tool pathload2
            http://www.utorrent.com/faq#mlabs
             http://www.measurementlab.net/measurement-lab-tools#tool4




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Limitation of Tcp Throughput
            Other metrics may have significant effect on TCP
             throughput ( TCP is inefficient in high BDP networks
             and packet loss link)

            Other applications and transport protocols (e.g. for video
             and audio streaming) have different performance
             characteristics.


            Too intrusive, place too much additional load on the
             network.


          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Available bandwidth
            Tools

                  pathload, pathchrip, IGI/PTR


            Method

                  Self-Induced Congestion




Presentation_ID     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
IGI/PTR insight




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
IGI/PTR Algorithm




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17
Pathload Insight




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   18
Pathload Algorithm




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   19
(Path or hop) capacity
            Tools

                  pathchar, click, etc


            One packet Model

                  Measures per-hop capacity, using icmp packets, like
                  traceroute




Presentation_ID     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   20
One packet Model




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   21
One packet Model
            Sender set TTL=1, send out the packet, and wait for the
             ICMP TTL-exceeded packet back.

            Upon receiving ICMP, estimate the RTT. Estimate the
             RTT multiple times for various size packets. The
             minimum RTT of various packets are believed to be the
             valid sample.

            The first link capacity is C=1/b , b is slope of RTT graph.

            Set the TTL=2,3…n, repeat the process of step1 to 3, to
             Calculate the C=1/ bi – bi-1
          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   22
One packet Model
            Transmission delay is linear with respect to packet size.

            Most implementation use RTT instead of one-way delay.

            Using linear regression to filter the queue results.

            Links are single-channel




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   23
Drawbacks
            Linear regression is expensive (done for every link, need
             many packets, can alleviate through convergence of
             result).

            ACKs may not be sent in timely manner (ICMP packets
             are often limited or blocked).

            Some nodes are invisible (such as bridge etc work in
             layer 2, thus won’t decrease IP TTL and no icmp ack),
             layer2 effect (underestimate lay3 capacity)


            Reverse path adds noise. Response packets may come
             back through a different path.
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   24
Bottleneck bandwidth
            Pathrate,
             capprobe,
             udt etc

            Packet pair
             Model




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   25
Packet pair Model
            Cross traffic

                   Time compression: Other packet queue ahead of the
                  first probe packet when it is downstream of the
                  bottleneck link. This leads to high estimates.

                   Time extension: Other packets delay the second probe
                  packet and extend the spacing between the two probe
                  packets. This leads to low estimates.

            Only support FIFO-queuing of router

            Doesn’t support multi-channel links
Presentation_ID    © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   26
Packet pair Model
            Transmission time of L-byte packet at link with capacity
             C.           t = L/C
            Send two packets ‘back-to-back’ from source to sink/
            Measure dispersion of packet pair at receiver.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   27
Drawbacks
            Though simple, Packet pair technique can produce
             widely varied estimate and erroneous results, mainly
             due to cross traffic in the path and error in
             measurement(it relies on high precision timestamp)




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   28
Packet Train Model
            Packet train of length N. Source can send N back-to-
             back packets of size L to sink.

            Sink measures total dispersion D, computes bandwidth
             estimate as b = (N-1)L/D.

            eliminate measurement errors, but more likely to be
             interfere with cross traffic packets.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   29
Quick Review
            Active probing including three kinds of method, one
             packet, packet pair and packet train.
            All assumes store-and-forward behavior of the
             intermediate node.
            All works on single channel.
            Receive based or Sender based.
            All have their pros and crons.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   30
Which one is better
            Most people said their tool is better than the others.
             No business product using yet.
            Do test of those tools by ourselves.
            We need a benchmark tool first. Here comes iperf.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   31
Which one is better




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   32
Which one is better




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   33
Which one is better
            After overall test on current implemented tools in
             various environments including nistnet environment
             and ADSL environment .
            Unfortunately, none of them gives reasonable result
             in both environment.
            Iperf works well.
            For more information, pls refer to “iperf.doc” and “bw
             tech report.docx”




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   34
Previous implementation
            More or less like iperf. measure throughput, but not
             TCP.
            Based on UDT, which uses UDP for reliable data
             transfer . UDT has its own flow/congestion control
             algorithm which is more efficient for data transfer than
             TCP.


            UDT has very flexible design which enable using
             used defined flow/congestion control algorithm. Good
             for later optimization, for example, slow down when
             detecting OWD increasing trend, so not affecting
             normal traffic.
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   35
Problems remains
            Flooding way will affect the normal traffic and
             interfere the user.
            UDT is too aggressive, even for constant rate UDP
             stream.
            Should review the research materials before to find a
             better solution.
            Besides, flooding way is not feasible when we need
             the metrics about the network most of the time, for
             example in QoS.
            Need further research into these area, so new version
             of netdect in being developed.

Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   36
We need better solution
            Think a litter about what bandwidth, how bandwidth
             are limited?


            Some experiments.


            Implementation details.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   37
Physical layer net bit rate

                         56 kbit/s                                             Modem / Dialup
                         1.5 Mbit/s                                            ADSL Lite
                         11 Mbit/s                                             Wireless 802.11b
                         54 Mbit/s                                             Wireless 802.11g
                         100 Mbit/s                                            Fast Ethernet
                         155 Mbit/s                                            OC3
                         300 Mbit/s                                            Wireless 802.11n
                         622 Mbit/s                                            OC12
                         1 Gbit/s                                              Gigabit Ethernet
                         2.5 Gbit/s                                            OC48
                         9.6 Gbit/s                                            OC192
                         10 Gbit/s                                             10 Gigabit Ethernet
                         100 Gbit/s                                            100 Gigabit Ethernet




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                38
Physical layer net bit rate
                       Version                  Common name                              Downstream rate      Upstream rate

                      ADSL                 ADSL                                     8.0 Mbit/s             1.0 Mbit/s

                      ADSL                 ADSL (G.DMT)                             12.0 Mbit/s            1.3 Mbit/s

                      ADSL                 ADSL over POTS                           12.0 Mbit/s            1.3 Mbit/s


                      ADSL                 ADSL over ISDN                           12.0 Mbit/s            1.8 Mbit/s

                      ADSL                 ADSL Lite (G.Lite)                       1.5 Mbit/s             0.5 Mbit/s

                      ADSL2                ADSL2                                    12.0 Mbit/s            1.3 Mbit/s

                      ADSL2                ADSL2                                    12.0 Mbit/s            3.5 Mbit/s

                      ADSL2                RE-ADSL2                                 5.0 Mbit/s             0.8 Mbit/s

                      ADSL2                splitterless ADSL2                       1.5 Mbit/s             0.5 Mbit/s

                      ADSL2+               ADSL2+                                   24.0 Mbit/s            1.3 Mbit/s

                      ADSL2+               ADSL2+M                                  24.0 Mbit/s            3.3 Mbit/s




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                                        39
Bandwidth cap
            limits the transfer of a specified amount of data over a
             period of time.
            Internet service providers commonly apply a cap
             when a channel intended to be shared by many users
             becomes overloaded, or may be overloaded, by a few
             users.
            Different approaches exist, including simple limitation
             of rate on user and sophisticate strategy based on
             credit.
            This is what we are interesting.



Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   40
What affects user’s observed throughput
            The ideal throughput is the physical layer net bit rate.
             If in Ethernet, it’s 100Mbps.

            Latency is not directly related to the throughput, but it
             has effect on specific transport protocol, for example,
             TCP(TCP’s self-clocking based on RTT). That’s to
             say congestion control algorithm will affect the
             throughput.

            Packet drops affect the throughput.

            Bottleneck link affect the throughput.

Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   41
Two ways of bandwidth limitation


            Drop




            Buffer and then drop




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   42
How Nistnet works?




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   43
How Nistnet works?




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   44
How Nistnet works?
            Bandwidth limitation is implemented as adding delay,
             just like a packet go through a bottleneck link.


            Determine the amount of time to delay a packet. This
             is the maximum of two quantities:
                  1. Probabilistic packet delay time
                  2. Bandwidth-limitation delay time




Presentation_ID    © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   45
How Nistnet works?
            probdelay = correlatedtabledist(&tableme->ltEntry.lteIDelay);

                  if (hitme->hitreq.bandwidth) {
                         fixed_gettimeofday(&our_time);
                         bandwidthdelay = timeval_diff(&hitme->next_packet, &our_time);

                               if (bandwidthdelay < 0) {
                                     bandwidthdelay = 0;
                                     hitme->next_packet = our_time;
                                }

                               packettime = (long)skb->len*(MILLION/hitme->hitreq.bandwidth)

                                    + ((long)skb->len*(MILLION%hitme->hitreq.bandwidth)
                                    + hitme->hitreq.bandwidth/2)/hitme->hitreq.bandwidth;
                               timeval_add(&hitme->next_packet, packettime);
                               bandwidthdelay += packettime;
                  }

                  delay = probdelay > bandwidthdelay ? probdelay : bandwidthdelay;
Presentation_ID       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential     46
Ping in real life
            124.160.32.248(Netcom office DMZ) ping
             216.24.133.8(pc in Denver)
            Minimum = 210ms, Maximum = 234ms, Average =
             213ms




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   47
Ping in real life
            218.109.124.61(Huashu Netcom) ping
             124.160.32.248(Netcom office DMZ)
            Minimum = 5ms, Maximum = 90ms, Average =
             31ms




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   48
Ping in real life with cross traffic
            Daisy’s ADSL ping www.google.com, adding TCP
             upstream cross traffic
            Minimum = 20ms, Maximum = 151ms, Average =
             98ms




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   49
Ping in real life with cross traffic
            Daisy’s ADSL ping www.google.com, adding 1.5 MB /s
             UDP upstream cross traffic saturating the link.
            Minimum = 20ms, Maximum = 705ms, Average = 634ms




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   50
Ping in real life with cross traffic
            Netcom ADSL 124.90.150.57 ping DMZ
             124.160.32.248 , using TCP downstream cross traffic
             saturating the link.
            Minimum = 4ms, Maximum = 8ms, Average = 4ms, Loss
             0%




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   51
Ping in real life with cross traffic
            Netcom ADSL 124.90.150.57 ping DMZ
             124.160.32.248 , using 8 MB/s UDP downstream cross
             traffic saturating the link.
            Minimum = 4ms, Maximum = 7ms, Average = 4ms, Loss
             0%, UDP loss reported by iperf 74%.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   52
Clock Skew
            This is not a big problem for using increasing OWDs
             as a hint of congestion.
            According to the paper of pathload, the typical clock
             skew is 10-100 us per second(in my test, it's
             0.1ms=100us per second)
            for 1ms precision is used, we should limit the error
             less than 1ms.
            So, for 0.1ms per second clock skew, we should
             collect data in less than10 seconds, if for 10us per
             second clock skew, we should collect data in 100s.



Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   53
Clock Skew
            The relative OWDs can be distorted by possible
             skew between then sender and receiver clocks.
            Measure from both direction.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   54
Clock Skew
            In the test, the skew between the two different
             type of machines is 1ms per 10s, that is 0.1ms per
             second.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   55
OWD increasing trend
            Send rate Rs, Avali bw Ra
             Buffered_size = Rs* t – Ra * t
             Delay = buffered_size/Ra = (Rs/Ra -1) t
            Test in nistnet, set bandwidth limitation 100K with
             sending rate of 100K




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   56
OWD and packet loss in China ADSL
            DMZ 124.160.32.248 -> Netcom ADSL 124.90.150.57
            Sending rate 500KB/s.
            rcv_rate = 329 KB/s , loss : 32% (158/491)




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   57
Trend algorithm (Pathload)
            PCT (Pairwise Comparison Test): measures the fraction
             of consecutive pairs that are increasing. if there's a
             strong increasing trend, it approaches one.




            PDT (Pairwise Difference Test): quantifies how strong is
             the start-to-end variation, relative to the absolute
             variations. if there is a strong increasing trend, it
             approaches one.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   58
Spearman’s Rank Correlation Coefficient
            Spearman’s Rank Correlation Coefficient is used to
             detect monotonic trend. The value is in range [-1,1],
             and the more approaches 1, the stronger the
             increasing trend.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   59
How to calculate
            n raw scores Xi,Yi are converted to ranks xi, yi
            di = xi – yi
            Using the formulae.


            Refer to http://www.wikihow.com/Calculate-
             Spearman's-Rank-Correlation-Coefficient
            This web page will do Spearman rank correlation.




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   60
Compare of the two
            spearman : 0.821005081875
            PCT: 0.47619047619
            PDT: 0.393939393939




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   61
Work on better solution
            Firstly, it should be test and work well in specific
             nistnet environment. We need reproducible
             environment.
            Data should be collected for post- analyze.
            Should ensure collected data is not twisted by some
             inefficiency, for example, writing logs or doing
             calculation.
            Every abnormal case should be analyze carefully for
             the root cause, mostly there’re some bugs.
            Need some tools to help on the analyze.


Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   62
Tools developed for analyzing
            pingtrend.py – using ping.exe to collect data and
             record the result into file, pingtrend.py can be used to
             filter out the ping values and dump them in ‘pingrtt.txt’,
             which can be used in combination with other tools.
            trend.py – Give a sequence of values, plot them in a
             diagram and calculate increasing trend, including
             PCT, PDT and spearman correlation coefficient.
            logparser.py – Analyze the log of netdect.exe,




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   63
Sequence loopback
            ISN would better be random.
            Many protocols and algorithms require the
             serialization or enumeration of related entities. For
             example, a communication protocol must know
             whether some packet comes "before" or "after" some
             other packet. The IETF RFC 1982 attempts to define
             "Serial Number Arithmetic" for the purposes of
             manipulating and comparing these sequence
             numbers.




          Source: Placeholder for Notes is 14 points
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   64
Feedback
            Too many feedbacks will add the processing
             overload , and will twisted the latency and may slow
             down the sending rate.
            The feedback can be timely based or packet based.
            Timely based feedback won't cost too much reverse
             traffic but there maybe not enough samples when
             congestion happens.
            Which is better is under consideration, currently, for
             bandwidth measurement, there’s no need to send
             those feedbacks, all will be calculated at the server
             side and give the client the result.
            However it’s needed in other aspects(identify the
             share bottleneck, make bw measurement tcp friendly)
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   65
Logs
            DO NOT use stdout log for it's the performance killer,
             writing them to file logs.
            If needed, I think using shared memory and open
             another process to flush the logs into file will be the
             best.
            However, using file logs is enough.
            Using txt file log which is convenient for later
             processing.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   66
Packet size and probe period
            Previously mentioned that clock skew would be 1ms
             per 10s, this won’t be a problem for bw measurement
             for it’s less than this. The probe period is the less the
             better.
            Now the problem becomes how can we collect
             enough samples in a limited time period, while using a
             specific sending rate.
            Let's consider 10KB/s, and 1KB per packet, so
             there're only 10 packets in one sec, that means 0.001
             pkt in 10ms, so we should adjust the pkt size
             according to the sending rate.
            Dynamic adjust pkt size to get enough samples.
             pkt_size = min(t * spd / min_sample_cnt, MTU)
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   67
Cope with packet loss
            As mentioned before, some bandwidth cap drops
             packets without buffer. So, OWD increasing won’t
             work.
            How to tell from loss caused by bandwidth cap and
             other cases
            Loss rate caused by bandwidth cap shows strong
             correlation with sending rate.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   68
Netcom -> Netcom
            Pearson similarity: 0.776851619493
            spearman : 1.0




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   69
Netcom -> Telcom
            Pearson similarity: -0.233247151714
            spearman : 0.155357142857




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   70
Nistnet 30% packet loss
            Pearson similarity: 0.171674559023
            spearman : -0.0428571428571




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   71
Current implementation
            Mainly use OWD increasing trend as a hint of
             congestion.
            Cope with China ADSL, which drops packets when
             upper to limitation(Find the tuning point of packet loss
             increasing, the packet loss will correlation with
             sending rate when up to the limitation.
            Support packet pair, but it’s not accurate, in LAN, it
             measured bw is 5MB/s, nearly half of the capacity.
            Use packet Train as a hint of avail bw suggestion.
            Start binary search. Add error recovery.
            Works well in nistnet env.
            Can cope with constant UDP cross traffic.
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   72
To-do
            Be TCP friendly, it should work if it can detect
             congestion quicker than TCP, if OWD increase it’s
             possible(Using feedback packets), but it directly drop,
             then it will be more complicate. Even flooding method
             can’t guaranty this.
            Grouping congestion path.
            Using APP packets(stream of different type) to identify
             congestion and groups.




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   73
Reference
            Topics in High-Performance Messaging
             http://www.29west.com/docs/THPM/index.html
            Spearman Rank-Order Correlation Coefficient
             http://faculty.vassar.edu/lowry/corr_rank.html
                      http://www.wikihow.com/Calculate-Spearman's-Rank-Correlation-
             Coefficient
             http://geographyfieldwork.com/SpearmansRank.htm
            Correlation and linear regression
             http://udel.edu/~mcdonald/statregression.html
                     http://www.statisticssolutions.com/methods-chapter/statistical-
             tests/correlation-pearson-kendall-spearman/
            Free Statistical Software
             http://statpages.org/javasta2.html
            ISN
             http://lin-style.javaeye.com/blog/156950
              http://www.faqs.org/rfcs/rfc1982.html
             http://en.wikipedia.org/wiki/Serial_number_arithmetic
                              http://kerneltrap.org/node/4654
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   74
Test bed
            Nistnet used for minic the
             wide area network
             enviroment.

            Spirent (Hardware
             emulator) which gives
             more powerful control
             than nistnet.

            ADSL env in the Lab

            PlanetLab (On progress)

Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   75
Autotest Tool
           Not yet extensible now, but
            if having more
            requirements, it will be, can
            be used by others, not limit
            to network detect.

           User register for the test.

           Set the settings of the
            test( autorun time, working
            directory)

           Autorun, analyzed and
            generate reports.
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   76
Q and A




Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   77

More Related Content

What's hot

Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceBertrand Duvivier
 
Aci presentation
Aci presentationAci presentation
Aci presentationJoe Ryan
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpiMohammed Abdallah
 
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos builtModern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos builtCumulus Networks
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)Hamdamboy (함담보이)
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
Segment Routing
Segment RoutingSegment Routing
Segment RoutingAPNIC
 
Cisco Discovery Protocol
Cisco Discovery ProtocolCisco Discovery Protocol
Cisco Discovery ProtocolNaga Ramesh
 
802.11r Explained.
802.11r Explained. 802.11r Explained.
802.11r Explained. Ajay Gupta
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocolAmeer Agel
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 

What's hot (20)

Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
Aci presentation
Aci presentationAci presentation
Aci presentation
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos builtModern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos built
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
IPv6
IPv6IPv6
IPv6
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
Cisco Discovery Protocol
Cisco Discovery ProtocolCisco Discovery Protocol
Cisco Discovery Protocol
 
802.11r Explained.
802.11r Explained. 802.11r Explained.
802.11r Explained.
 
BGP
BGP BGP
BGP
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
Understanding TCP/IP
Understanding TCP/IPUnderstanding TCP/IP
Understanding TCP/IP
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 

Viewers also liked

installasi briker ( VOIP )
installasi briker ( VOIP )installasi briker ( VOIP )
installasi briker ( VOIP )Agus Setyawan
 
VoIP for networking class-sh
VoIP for networking class-shVoIP for networking class-sh
VoIP for networking class-shSelamet Hariadi
 
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW ManagementMikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Managementgopartheredbuff
 
Lesson 3 bandwidth
Lesson 3   bandwidthLesson 3   bandwidth
Lesson 3 bandwidthmrcmorrison
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilizationRifka Hayati
 
Data transmission rate and bandwidth
Data transmission rate and bandwidth Data transmission rate and bandwidth
Data transmission rate and bandwidth Kajal Chaudhari
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth PresentationGrace=] Penda
 

Viewers also liked (9)

installasi briker ( VOIP )
installasi briker ( VOIP )installasi briker ( VOIP )
installasi briker ( VOIP )
 
VoIP for networking class-sh
VoIP for networking class-shVoIP for networking class-sh
VoIP for networking class-sh
 
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW ManagementMikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Management
 
Bandwidth optimization
Bandwidth optimizationBandwidth optimization
Bandwidth optimization
 
Lesson 3 bandwidth
Lesson 3   bandwidthLesson 3   bandwidth
Lesson 3 bandwidth
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
 
Tugas akhir mikotik hotspot user manager
Tugas akhir mikotik hotspot user managerTugas akhir mikotik hotspot user manager
Tugas akhir mikotik hotspot user manager
 
Data transmission rate and bandwidth
Data transmission rate and bandwidth Data transmission rate and bandwidth
Data transmission rate and bandwidth
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 

Similar to Bandwidth measurement

Sca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_finalSca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_finalPhuc Anh Tran
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3Chaing Ravuth
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switchingparthasn83
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPPROIDEA
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationMojtaba Esfandiari
 
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET Journal
 
A Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace BackA Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET Journal
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDr. Mohieddin Moradi
 
Generic network architecture discussion
Generic network architecture discussionGeneric network architecture discussion
Generic network architecture discussionARCFIRE ICT
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus SDN/OpenFlow switch
 
High perf-networking
High perf-networkingHigh perf-networking
High perf-networkingmtimjones
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18eyad alaa
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPThomas Graf
 

Similar to Bandwidth measurement (20)

Sca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_finalSca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_final
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio Presenation
 
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
 
A Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace BackA Survey On Opportunistic Piggyback Marking For IP Trace Back
A Survey On Opportunistic Piggyback Marking For IP Trace Back
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
 
Generic network architecture discussion
Generic network architecture discussionGeneric network architecture discussion
Generic network architecture discussion
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 
High perf-networking
High perf-networkingHigh perf-networking
High perf-networking
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02
 
Interprocess Message Formats
Interprocess Message FormatsInterprocess Message Formats
Interprocess Message Formats
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDP
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Bandwidth measurement

  • 1. Network measurement Jeromy Fu Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Agenda  Why what and how  Roadmap  Bandwidth measurement  Current Implementation  Future work Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Why measurement is needed  A big black cloud  No explicit feedback Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Application area  Congestion control(QoS, transport layer etc)  Overlay networks, (relay, overlay route etc)  CDNs (select best server)  Streaming(adjust encoding rate)  And many more… Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. What to measure? Metrics Tools RTT ping Jitter iperf Packet Loss ping Avail bandwidth Bottleneck Link capacity Throughput iperf Route info traceroute MTU ping Topology GNP , Skitter Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. How to measure?  Using special probing packets or application packets  The aim: accuracy, when cross traffic exist non-intrusiveness, do not saturate path timeless Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Roadmap  Measurement bandwidth using probing packets  Link congestion detection using probing packets  Congestion group identification based on congestion similarity.  Using app packets instead of probing packets  Topology(GNP like ordinate system etc) Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Bandwidth measurement  One packet model and packet pair (train) model  link capacity, bottleneck bandwidth, available bandwidth.  Lots of experiment tools exist, but none production exist, the most previous tools are using TCP flooding. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Terminology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Terminology  Hop : Link at layer 3  Segment : Link at layer2 Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Terminology  Link aggregation  http://wenku.baidu.com/view/64d752a6f524ccbff12184ca.htm Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Vuze use Network Diagnostic Tool  http://www.measurementlab.net/measurement-lab-tools#tool1  http://netspeed.stanford.edu/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. uTorrent use M-labs tool pathload2  http://www.utorrent.com/faq#mlabs http://www.measurementlab.net/measurement-lab-tools#tool4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Limitation of Tcp Throughput  Other metrics may have significant effect on TCP throughput ( TCP is inefficient in high BDP networks and packet loss link)  Other applications and transport protocols (e.g. for video and audio streaming) have different performance characteristics.  Too intrusive, place too much additional load on the network. Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Available bandwidth  Tools pathload, pathchrip, IGI/PTR  Method Self-Induced Congestion Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. IGI/PTR insight Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. IGI/PTR Algorithm Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Pathload Insight Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Pathload Algorithm Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. (Path or hop) capacity  Tools pathchar, click, etc  One packet Model Measures per-hop capacity, using icmp packets, like traceroute Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. One packet Model Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. One packet Model  Sender set TTL=1, send out the packet, and wait for the ICMP TTL-exceeded packet back.  Upon receiving ICMP, estimate the RTT. Estimate the RTT multiple times for various size packets. The minimum RTT of various packets are believed to be the valid sample.  The first link capacity is C=1/b , b is slope of RTT graph.  Set the TTL=2,3…n, repeat the process of step1 to 3, to Calculate the C=1/ bi – bi-1 Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. One packet Model  Transmission delay is linear with respect to packet size.  Most implementation use RTT instead of one-way delay.  Using linear regression to filter the queue results.  Links are single-channel Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Drawbacks  Linear regression is expensive (done for every link, need many packets, can alleviate through convergence of result).  ACKs may not be sent in timely manner (ICMP packets are often limited or blocked).  Some nodes are invisible (such as bridge etc work in layer 2, thus won’t decrease IP TTL and no icmp ack), layer2 effect (underestimate lay3 capacity)  Reverse path adds noise. Response packets may come back through a different path. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Bottleneck bandwidth  Pathrate, capprobe, udt etc  Packet pair Model Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Packet pair Model  Cross traffic Time compression: Other packet queue ahead of the first probe packet when it is downstream of the bottleneck link. This leads to high estimates. Time extension: Other packets delay the second probe packet and extend the spacing between the two probe packets. This leads to low estimates.  Only support FIFO-queuing of router  Doesn’t support multi-channel links Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Packet pair Model  Transmission time of L-byte packet at link with capacity C. t = L/C  Send two packets ‘back-to-back’ from source to sink/  Measure dispersion of packet pair at receiver. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Drawbacks  Though simple, Packet pair technique can produce widely varied estimate and erroneous results, mainly due to cross traffic in the path and error in measurement(it relies on high precision timestamp) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Packet Train Model  Packet train of length N. Source can send N back-to- back packets of size L to sink.  Sink measures total dispersion D, computes bandwidth estimate as b = (N-1)L/D.  eliminate measurement errors, but more likely to be interfere with cross traffic packets. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Quick Review  Active probing including three kinds of method, one packet, packet pair and packet train.  All assumes store-and-forward behavior of the intermediate node.  All works on single channel.  Receive based or Sender based.  All have their pros and crons. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Which one is better  Most people said their tool is better than the others. No business product using yet.  Do test of those tools by ourselves.  We need a benchmark tool first. Here comes iperf. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Which one is better Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Which one is better Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Which one is better  After overall test on current implemented tools in various environments including nistnet environment and ADSL environment .  Unfortunately, none of them gives reasonable result in both environment.  Iperf works well.  For more information, pls refer to “iperf.doc” and “bw tech report.docx” Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Previous implementation  More or less like iperf. measure throughput, but not TCP.  Based on UDT, which uses UDP for reliable data transfer . UDT has its own flow/congestion control algorithm which is more efficient for data transfer than TCP.  UDT has very flexible design which enable using used defined flow/congestion control algorithm. Good for later optimization, for example, slow down when detecting OWD increasing trend, so not affecting normal traffic. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Problems remains  Flooding way will affect the normal traffic and interfere the user.  UDT is too aggressive, even for constant rate UDP stream.  Should review the research materials before to find a better solution.  Besides, flooding way is not feasible when we need the metrics about the network most of the time, for example in QoS.  Need further research into these area, so new version of netdect in being developed. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. We need better solution  Think a litter about what bandwidth, how bandwidth are limited?  Some experiments.  Implementation details. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Physical layer net bit rate 56 kbit/s Modem / Dialup 1.5 Mbit/s ADSL Lite 11 Mbit/s Wireless 802.11b 54 Mbit/s Wireless 802.11g 100 Mbit/s Fast Ethernet 155 Mbit/s OC3 300 Mbit/s Wireless 802.11n 622 Mbit/s OC12 1 Gbit/s Gigabit Ethernet 2.5 Gbit/s OC48 9.6 Gbit/s OC192 10 Gbit/s 10 Gigabit Ethernet 100 Gbit/s 100 Gigabit Ethernet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Physical layer net bit rate Version Common name Downstream rate Upstream rate ADSL ADSL 8.0 Mbit/s 1.0 Mbit/s ADSL ADSL (G.DMT) 12.0 Mbit/s 1.3 Mbit/s ADSL ADSL over POTS 12.0 Mbit/s 1.3 Mbit/s ADSL ADSL over ISDN 12.0 Mbit/s 1.8 Mbit/s ADSL ADSL Lite (G.Lite) 1.5 Mbit/s 0.5 Mbit/s ADSL2 ADSL2 12.0 Mbit/s 1.3 Mbit/s ADSL2 ADSL2 12.0 Mbit/s 3.5 Mbit/s ADSL2 RE-ADSL2 5.0 Mbit/s 0.8 Mbit/s ADSL2 splitterless ADSL2 1.5 Mbit/s 0.5 Mbit/s ADSL2+ ADSL2+ 24.0 Mbit/s 1.3 Mbit/s ADSL2+ ADSL2+M 24.0 Mbit/s 3.3 Mbit/s Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Bandwidth cap  limits the transfer of a specified amount of data over a period of time.  Internet service providers commonly apply a cap when a channel intended to be shared by many users becomes overloaded, or may be overloaded, by a few users.  Different approaches exist, including simple limitation of rate on user and sophisticate strategy based on credit.  This is what we are interesting. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. What affects user’s observed throughput  The ideal throughput is the physical layer net bit rate. If in Ethernet, it’s 100Mbps.  Latency is not directly related to the throughput, but it has effect on specific transport protocol, for example, TCP(TCP’s self-clocking based on RTT). That’s to say congestion control algorithm will affect the throughput.  Packet drops affect the throughput.  Bottleneck link affect the throughput. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. Two ways of bandwidth limitation  Drop  Buffer and then drop Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. How Nistnet works? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
  • 44. How Nistnet works? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
  • 45. How Nistnet works?  Bandwidth limitation is implemented as adding delay, just like a packet go through a bottleneck link.  Determine the amount of time to delay a packet. This is the maximum of two quantities: 1. Probabilistic packet delay time 2. Bandwidth-limitation delay time Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
  • 46. How Nistnet works?  probdelay = correlatedtabledist(&tableme->ltEntry.lteIDelay); if (hitme->hitreq.bandwidth) { fixed_gettimeofday(&our_time); bandwidthdelay = timeval_diff(&hitme->next_packet, &our_time); if (bandwidthdelay < 0) { bandwidthdelay = 0; hitme->next_packet = our_time; } packettime = (long)skb->len*(MILLION/hitme->hitreq.bandwidth) + ((long)skb->len*(MILLION%hitme->hitreq.bandwidth) + hitme->hitreq.bandwidth/2)/hitme->hitreq.bandwidth; timeval_add(&hitme->next_packet, packettime); bandwidthdelay += packettime; } delay = probdelay > bandwidthdelay ? probdelay : bandwidthdelay; Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
  • 47. Ping in real life  124.160.32.248(Netcom office DMZ) ping 216.24.133.8(pc in Denver)  Minimum = 210ms, Maximum = 234ms, Average = 213ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
  • 48. Ping in real life  218.109.124.61(Huashu Netcom) ping 124.160.32.248(Netcom office DMZ)  Minimum = 5ms, Maximum = 90ms, Average = 31ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
  • 49. Ping in real life with cross traffic  Daisy’s ADSL ping www.google.com, adding TCP upstream cross traffic  Minimum = 20ms, Maximum = 151ms, Average = 98ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
  • 50. Ping in real life with cross traffic  Daisy’s ADSL ping www.google.com, adding 1.5 MB /s UDP upstream cross traffic saturating the link.  Minimum = 20ms, Maximum = 705ms, Average = 634ms Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
  • 51. Ping in real life with cross traffic  Netcom ADSL 124.90.150.57 ping DMZ 124.160.32.248 , using TCP downstream cross traffic saturating the link.  Minimum = 4ms, Maximum = 8ms, Average = 4ms, Loss 0% Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
  • 52. Ping in real life with cross traffic  Netcom ADSL 124.90.150.57 ping DMZ 124.160.32.248 , using 8 MB/s UDP downstream cross traffic saturating the link.  Minimum = 4ms, Maximum = 7ms, Average = 4ms, Loss 0%, UDP loss reported by iperf 74%. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
  • 53. Clock Skew  This is not a big problem for using increasing OWDs as a hint of congestion.  According to the paper of pathload, the typical clock skew is 10-100 us per second(in my test, it's 0.1ms=100us per second)  for 1ms precision is used, we should limit the error less than 1ms.  So, for 0.1ms per second clock skew, we should collect data in less than10 seconds, if for 10us per second clock skew, we should collect data in 100s. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
  • 54. Clock Skew  The relative OWDs can be distorted by possible skew between then sender and receiver clocks.  Measure from both direction. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
  • 55. Clock Skew  In the test, the skew between the two different type of machines is 1ms per 10s, that is 0.1ms per second. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
  • 56. OWD increasing trend  Send rate Rs, Avali bw Ra Buffered_size = Rs* t – Ra * t Delay = buffered_size/Ra = (Rs/Ra -1) t  Test in nistnet, set bandwidth limitation 100K with sending rate of 100K Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
  • 57. OWD and packet loss in China ADSL  DMZ 124.160.32.248 -> Netcom ADSL 124.90.150.57  Sending rate 500KB/s.  rcv_rate = 329 KB/s , loss : 32% (158/491) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
  • 58. Trend algorithm (Pathload)  PCT (Pairwise Comparison Test): measures the fraction of consecutive pairs that are increasing. if there's a strong increasing trend, it approaches one.  PDT (Pairwise Difference Test): quantifies how strong is the start-to-end variation, relative to the absolute variations. if there is a strong increasing trend, it approaches one. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
  • 59. Spearman’s Rank Correlation Coefficient  Spearman’s Rank Correlation Coefficient is used to detect monotonic trend. The value is in range [-1,1], and the more approaches 1, the stronger the increasing trend. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
  • 60. How to calculate  n raw scores Xi,Yi are converted to ranks xi, yi  di = xi – yi  Using the formulae.  Refer to http://www.wikihow.com/Calculate- Spearman's-Rank-Correlation-Coefficient  This web page will do Spearman rank correlation. Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
  • 61. Compare of the two  spearman : 0.821005081875  PCT: 0.47619047619  PDT: 0.393939393939 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
  • 62. Work on better solution  Firstly, it should be test and work well in specific nistnet environment. We need reproducible environment.  Data should be collected for post- analyze.  Should ensure collected data is not twisted by some inefficiency, for example, writing logs or doing calculation.  Every abnormal case should be analyze carefully for the root cause, mostly there’re some bugs.  Need some tools to help on the analyze. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
  • 63. Tools developed for analyzing  pingtrend.py – using ping.exe to collect data and record the result into file, pingtrend.py can be used to filter out the ping values and dump them in ‘pingrtt.txt’, which can be used in combination with other tools.  trend.py – Give a sequence of values, plot them in a diagram and calculate increasing trend, including PCT, PDT and spearman correlation coefficient.  logparser.py – Analyze the log of netdect.exe, Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
  • 64. Sequence loopback  ISN would better be random.  Many protocols and algorithms require the serialization or enumeration of related entities. For example, a communication protocol must know whether some packet comes "before" or "after" some other packet. The IETF RFC 1982 attempts to define "Serial Number Arithmetic" for the purposes of manipulating and comparing these sequence numbers. Source: Placeholder for Notes is 14 points Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
  • 65. Feedback  Too many feedbacks will add the processing overload , and will twisted the latency and may slow down the sending rate.  The feedback can be timely based or packet based.  Timely based feedback won't cost too much reverse traffic but there maybe not enough samples when congestion happens.  Which is better is under consideration, currently, for bandwidth measurement, there’s no need to send those feedbacks, all will be calculated at the server side and give the client the result.  However it’s needed in other aspects(identify the share bottleneck, make bw measurement tcp friendly) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
  • 66. Logs  DO NOT use stdout log for it's the performance killer, writing them to file logs.  If needed, I think using shared memory and open another process to flush the logs into file will be the best.  However, using file logs is enough.  Using txt file log which is convenient for later processing. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
  • 67. Packet size and probe period  Previously mentioned that clock skew would be 1ms per 10s, this won’t be a problem for bw measurement for it’s less than this. The probe period is the less the better.  Now the problem becomes how can we collect enough samples in a limited time period, while using a specific sending rate.  Let's consider 10KB/s, and 1KB per packet, so there're only 10 packets in one sec, that means 0.001 pkt in 10ms, so we should adjust the pkt size according to the sending rate.  Dynamic adjust pkt size to get enough samples. pkt_size = min(t * spd / min_sample_cnt, MTU) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
  • 68. Cope with packet loss  As mentioned before, some bandwidth cap drops packets without buffer. So, OWD increasing won’t work.  How to tell from loss caused by bandwidth cap and other cases  Loss rate caused by bandwidth cap shows strong correlation with sending rate. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
  • 69. Netcom -> Netcom  Pearson similarity: 0.776851619493  spearman : 1.0 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
  • 70. Netcom -> Telcom  Pearson similarity: -0.233247151714  spearman : 0.155357142857 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
  • 71. Nistnet 30% packet loss  Pearson similarity: 0.171674559023  spearman : -0.0428571428571 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
  • 72. Current implementation  Mainly use OWD increasing trend as a hint of congestion.  Cope with China ADSL, which drops packets when upper to limitation(Find the tuning point of packet loss increasing, the packet loss will correlation with sending rate when up to the limitation.  Support packet pair, but it’s not accurate, in LAN, it measured bw is 5MB/s, nearly half of the capacity.  Use packet Train as a hint of avail bw suggestion.  Start binary search. Add error recovery.  Works well in nistnet env.  Can cope with constant UDP cross traffic. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
  • 73. To-do  Be TCP friendly, it should work if it can detect congestion quicker than TCP, if OWD increase it’s possible(Using feedback packets), but it directly drop, then it will be more complicate. Even flooding method can’t guaranty this.  Grouping congestion path.  Using APP packets(stream of different type) to identify congestion and groups. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
  • 74. Reference  Topics in High-Performance Messaging http://www.29west.com/docs/THPM/index.html  Spearman Rank-Order Correlation Coefficient http://faculty.vassar.edu/lowry/corr_rank.html http://www.wikihow.com/Calculate-Spearman's-Rank-Correlation- Coefficient http://geographyfieldwork.com/SpearmansRank.htm  Correlation and linear regression http://udel.edu/~mcdonald/statregression.html http://www.statisticssolutions.com/methods-chapter/statistical- tests/correlation-pearson-kendall-spearman/  Free Statistical Software http://statpages.org/javasta2.html  ISN http://lin-style.javaeye.com/blog/156950 http://www.faqs.org/rfcs/rfc1982.html http://en.wikipedia.org/wiki/Serial_number_arithmetic http://kerneltrap.org/node/4654 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
  • 75. Test bed  Nistnet used for minic the wide area network enviroment.  Spirent (Hardware emulator) which gives more powerful control than nistnet.  ADSL env in the Lab  PlanetLab (On progress) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
  • 76. Autotest Tool  Not yet extensible now, but if having more requirements, it will be, can be used by others, not limit to network detect.  User register for the test.  Set the settings of the test( autorun time, working directory)  Autorun, analyzed and generate reports. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
  • 77. Q and A Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77