SlideShare a Scribd company logo
1 of 36
Download to read offline
Empirically Characterizing the
Buffer Behaviour of Real
Devices
Luis Sequeira
Julián Fernández-Navajas
Jose Saldana
Luis Casadesus
Communication Technologies Group (GTC)
Aragón Institute of Engineering Research (I3A)
University of Zaragoza, Spain
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Introduction and Related Works
• Packet size varies for different Internet
services and applications:
• VoIP, web, FTP, video streaming, online games, etc.

• Traffic behaviour has to be taken into account
for the design of network devices:
• Constant bit rate traffic
• Bursty traffic
• Different number of frames into each burst
Introduction and Related Works
• In access network capabilities are lower than
the ones available in the backbone; this
implies that some network points become
critical bottlenecks
• Bottlenecks may also appear at critical points
of high-performance networks.
Introduction and Related Works
• Mid and low-end routers normally do not implement
advanced traffic management techniques.
• They always use buffers as a traffic regulation
mechanism.
• Buffer size becomes an important design parameter
• Buffer can be measured in different ways:
• Maximum number of packets it can store
• Amount of bytes
• Queuing time limit (ms)
Introduction and Related Works
• Most Internet routers use FIFO, but there exist
other techniques to manage drop-tail buffers,
e.g. Random Early Detection (RED).
• These techniques, in conjunction with buffer
size, mainly define the buffer behaviour and
how traffic is affected by it.
Introduction and Related Works
• Relationship between router buffer size and
link utilization:
Excessive amount of memory

latency increase

Small amount of memory

packet loss increase

• Characterization of buffer behaviour is
interesting when trying to improve link
utilization.
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Test Procedure

It may be a device
or a network
Test Procedure
UDP Packets of different size are used
to determine if buffer size is in bytes or
in packets

to produce a buffer overflow in
the SUT

All packets have a
unique ID
Test Procedure

Traffic is captured here
Test Procedure
Input rate
Buffer of the
“System Under Test”

Input rate > output rate

Output rate
Test Procedure
Input rate
Buffer of the
“System Under Test”

Input rate > output rate

Buffer fills

Output rate
Test Procedure
Filling the buffer

Input rate
i

2
1

Output rate
Test Procedure
Time to fill the buffer

First loss

Input rate
i

2
1

Packet i leaves the
buffer

Error
Time to fill and to
emtpy the buffer

Output rate
Methodology
• Physical Access:
Counting the
number of
packets in the
queue in the
moment that a
packet arrives to
the buffer.

Traffic may be captured here

packet delay
packet loss
interarrival packet time
input and output buffer rate
filling buffer rate

captures

script

BUFFER SIZE
Methodology
• Remote Access:
If the delay of a
packet in the
buffer can be
determined, then
the variations of
this delay can
give us useful
information for
estimating buffer
size.

Traffic may be captured here

packet delay
packet loss
interarrival packet time
input and output buffer rate
filling buffer rate

captures

script

BUFFER SIZE
Methodology
Input rate

Method 1: Physical Access

Time when the packet
i arrived to the buffer

i

2

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

1

Output rate
Methodology
Input rate

Method 1: Physical Access

Buffer gets empty

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Input rate

Method 1: Physical Access

Time when the
packet i leaves
the buffer

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Input rate

Method 1: Physical Access

Queue

Count packets

Queue

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Method 2: Remote Access

It will completly
fill the buffer

Input rate
i

2
1

Dropped
packets

Output rate
Methodology
Method 2: Remote Access

Input rate

It will completly
fill the buffer

i

2

𝑅 𝑓𝑖𝑙𝑙

1

Output rate
Time to fill the buffer
Methodology
Method 2: Remote Access

Input rate

Time to fill and
empty the buffer
𝑅 𝑜𝑢𝑡

𝑅 𝑓𝑖𝑙𝑙

i

Output rate
It appears in the
receiver
Methodology
Estimation of the size:
Time to fill
the buffer

Time to fill and to
empty the buffer
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Wired Scenario
• In this case we want to test
the accuracy of our method
when there is no possibility
of physical access to the
SUT.
• We obtained the buffer size
using method 1 with
physical access. Next, the
estimations obtained using
method 2 are compared
with previous results, and
the relative error is
obtained.
Wired Scenario
A Particular buffer behaviour:

Linksys WAP54G

Groups of dropped packets

3COM 4500
Wired Scenario
A Particular buffer behaviour:

• It has been observed in the wired
and wireless tested:
• when the buffer is completely full, no
more packets are accepted, it will be
called upper limit.
• The buffer does not accept new
packets until a certain amount of
memory is available, it will be called
lower limit.
• In this moment the filling process
begins again.

• Although this behaviour has some
similarities with Random Early
Detection (RED) but it is not the
same:
• There is not probability for dropping
an incoming packet.
Wired Scenario
• Three different amounts of
bandwidth have been used in
order to flood the buffer.
• We see that the accuracy of the
buffer size estimation using the
method 2 is high. In addition, the
error diminishes as input rate
grows.

• The results are less accurate but
they are still acceptable.
• The results using smaller packets
are less accurate so we have not
presented them.
(packet size = 1500 bytes)
Wireless Scenario
• Variations of the output
rate in wireless network
generate error growth.
• While filling rate is relatively
constant, the emptying rate
shows variations for the
highest bandwidths.

The WiFi access point
switches from higher to
lower speeds depending on
the status of the radio
channel
Wireless Scenario
• We have compared the two
methods when there is
physical access to the SUT.
• The presented results are
the ones obtained using
packets of 1500 bytes, since
they are the most accurate.
• Method 1 is the most
accurate estimation so it
has been used to compare
with method 2.
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Conclusions
• Two methods have been presented in order to analyze the
technical and functional characteristics of commercial buffers of
different devices, or even networks.
• This characterization is important, taking into account that the
buffer may modify traffic characteristics, and may also drop
packets.
• The methodology can be used if there is physical access to the
“System Under Test”, but it is also useful, with certain limitations,
for measuring a remote system.
• Tests using commercial devices have been deployed in two
different scenarios, using wired and wireless networks.
Conclusions
• A particular buffer behaviour has been observed for a device: once
the buffer is full, it does not accept new packets until a certain
space is again available.
• The results show that accurate results of the buffer size can be
obtained when there is physical access to the “System Under Test”.
• In case of having no direct access to the system, an acceptable
estimation can also be obtained if the input rate is more than three
times the output rate. In this case, big packets have to be used for
the tests.
• As future work the method has to be improved in order to
minimize the error, especially when measuring wireless devices.

More Related Content

What's hot

PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPratik Narang
 
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimePerformance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimeAkmal
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Yoram Orzach
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Syuan Wang
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Dhananja Kariyawasam
 
Michael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAzeem Iqbal
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp windowpriya Nithya
 
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamOWASP Delhi
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Syuan Wang
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Suemi Iarussi
 
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksFrenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksOpen Networking Summits
 

What's hot (20)

PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
 
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimePerformance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Rtp
RtpRtp
Rtp
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
 
Rtp
RtpRtp
Rtp
 
Michael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent Work
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
Rtp
RtpRtp
Rtp
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 
RTP & RTCP
RTP & RTCPRTP & RTCP
RTP & RTCP
 
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
 
Wireshark
WiresharkWireshark
Wireshark
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
 
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksFrenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow Networks
 

Viewers also liked

Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network DeploymentsJose Saldana
 
Το μουσείο του μέλλοντος
Το μουσείο του μέλλοντοςΤο μουσείο του μέλλοντος
Το μουσείο του μέλλοντοςΗΡΩ ΧΑΤΖΑΣΚΟΥ
 
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...Jose Saldana
 
Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)Asclepios9
 
Menu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - EnglishMenu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - EnglishGrupoForte
 
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129ibugesic1234
 
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...Jose Saldana
 

Viewers also liked (7)

Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network Deployments
 
Το μουσείο του μέλλοντος
Το μουσείο του μέλλοντοςΤο μουσείο του μέλλοντος
Το μουσείο του μέλλοντος
 
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
 
Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)
 
Menu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - EnglishMenu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - English
 
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
 
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
 

Similar to Empirically Characterizing the Buffer Behaviour of Real Devices

CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfMayankRaj687571
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfShivakrishnan18
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- finalTaymoor Nazmy
 
Performance Enhancement with Pipelining
Performance Enhancement with PipeliningPerformance Enhancement with Pipelining
Performance Enhancement with PipeliningAneesh Raveendran
 
Internet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsInternet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsSumanth Bhat
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1Aman Jaiswal
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet workingTharuniDiddekunta
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxssuserec53e73
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdfDr. Shivashankar
 

Similar to Empirically Characterizing the Buffer Behaviour of Real Devices (20)

Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
WEEK-01.pdf
WEEK-01.pdfWEEK-01.pdf
WEEK-01.pdf
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Performance Enhancement with Pipelining
Performance Enhancement with PipeliningPerformance Enhancement with Pipelining
Performance Enhancement with Pipelining
 
Internet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsInternet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problems
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptx
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
 

More from Jose Saldana

Pint of science Patinete as a Service
Pint of science Patinete as a ServicePint of science Patinete as a Service
Pint of science Patinete as a ServiceJose Saldana
 
Mejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingenieroMejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingenieroJose Saldana
 
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3ºPOUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3ºJose Saldana
 
Cómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móvilesCómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móvilesJose Saldana
 
La bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos onlineLa bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos onlineJose Saldana
 
Entretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristianaEntretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristianaJose Saldana
 
¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?Jose Saldana
 
Wi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APsWi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APsJose Saldana
 
Header compression and multiplexing in LISP
Header compression and multiplexing in LISPHeader compression and multiplexing in LISP
Header compression and multiplexing in LISPJose Saldana
 
Simplemux traffic optimization
Simplemux traffic optimizationSimplemux traffic optimization
Simplemux traffic optimizationJose Saldana
 
Online games: a real-time problem for the network
Online games: a real-time problem for the networkOnline games: a real-time problem for the network
Online games: a real-time problem for the networkJose Saldana
 
Improving Network Efficiency with Simplemux
Improving Network Efficiency with SimplemuxImproving Network Efficiency with Simplemux
Improving Network Efficiency with SimplemuxJose Saldana
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative NetworksJose Saldana
 
Bar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, PragueBar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, PragueJose Saldana
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolJose Saldana
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined NetworksJose Saldana
 
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Jose Saldana
 
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic FlowsThe Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic FlowsJose Saldana
 
Online games traffic characterization and network support
Online games traffic characterization and network supportOnline games traffic characterization and network support
Online games traffic characterization and network supportJose Saldana
 

More from Jose Saldana (20)

Pint of science Patinete as a Service
Pint of science Patinete as a ServicePint of science Patinete as a Service
Pint of science Patinete as a Service
 
Mejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingenieroMejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingeniero
 
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3ºPOUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
 
Cómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móvilesCómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móviles
 
La bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos onlineLa bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos online
 
Entretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristianaEntretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristiana
 
¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?
 
Wi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APsWi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APs
 
Header compression and multiplexing in LISP
Header compression and multiplexing in LISPHeader compression and multiplexing in LISP
Header compression and multiplexing in LISP
 
Simplemux traffic optimization
Simplemux traffic optimizationSimplemux traffic optimization
Simplemux traffic optimization
 
Online games: a real-time problem for the network
Online games: a real-time problem for the networkOnline games: a real-time problem for the network
Online games: a real-time problem for the network
 
Improving Network Efficiency with Simplemux
Improving Network Efficiency with SimplemuxImproving Network Efficiency with Simplemux
Improving Network Efficiency with Simplemux
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative Networks
 
Bar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, PragueBar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, Prague
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocol
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
 
TCM-TF 2014
TCM-TF 2014TCM-TF 2014
TCM-TF 2014
 
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?
 
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic FlowsThe Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
 
Online games traffic characterization and network support
Online games traffic characterization and network supportOnline games traffic characterization and network support
Online games traffic characterization and network support
 

Recently uploaded

Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 

Recently uploaded (20)

Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 

Empirically Characterizing the Buffer Behaviour of Real Devices

  • 1. Empirically Characterizing the Buffer Behaviour of Real Devices Luis Sequeira Julián Fernández-Navajas Jose Saldana Luis Casadesus Communication Technologies Group (GTC) Aragón Institute of Engineering Research (I3A) University of Zaragoza, Spain
  • 2. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 3. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 4. Introduction and Related Works • Packet size varies for different Internet services and applications: • VoIP, web, FTP, video streaming, online games, etc. • Traffic behaviour has to be taken into account for the design of network devices: • Constant bit rate traffic • Bursty traffic • Different number of frames into each burst
  • 5. Introduction and Related Works • In access network capabilities are lower than the ones available in the backbone; this implies that some network points become critical bottlenecks • Bottlenecks may also appear at critical points of high-performance networks.
  • 6. Introduction and Related Works • Mid and low-end routers normally do not implement advanced traffic management techniques. • They always use buffers as a traffic regulation mechanism. • Buffer size becomes an important design parameter • Buffer can be measured in different ways: • Maximum number of packets it can store • Amount of bytes • Queuing time limit (ms)
  • 7. Introduction and Related Works • Most Internet routers use FIFO, but there exist other techniques to manage drop-tail buffers, e.g. Random Early Detection (RED). • These techniques, in conjunction with buffer size, mainly define the buffer behaviour and how traffic is affected by it.
  • 8. Introduction and Related Works • Relationship between router buffer size and link utilization: Excessive amount of memory latency increase Small amount of memory packet loss increase • Characterization of buffer behaviour is interesting when trying to improve link utilization.
  • 9. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 10. Test Procedure It may be a device or a network
  • 11. Test Procedure UDP Packets of different size are used to determine if buffer size is in bytes or in packets to produce a buffer overflow in the SUT All packets have a unique ID
  • 12. Test Procedure Traffic is captured here
  • 13. Test Procedure Input rate Buffer of the “System Under Test” Input rate > output rate Output rate
  • 14. Test Procedure Input rate Buffer of the “System Under Test” Input rate > output rate Buffer fills Output rate
  • 15. Test Procedure Filling the buffer Input rate i 2 1 Output rate
  • 16. Test Procedure Time to fill the buffer First loss Input rate i 2 1 Packet i leaves the buffer Error Time to fill and to emtpy the buffer Output rate
  • 17. Methodology • Physical Access: Counting the number of packets in the queue in the moment that a packet arrives to the buffer. Traffic may be captured here packet delay packet loss interarrival packet time input and output buffer rate filling buffer rate captures script BUFFER SIZE
  • 18. Methodology • Remote Access: If the delay of a packet in the buffer can be determined, then the variations of this delay can give us useful information for estimating buffer size. Traffic may be captured here packet delay packet loss interarrival packet time input and output buffer rate filling buffer rate captures script BUFFER SIZE
  • 19. Methodology Input rate Method 1: Physical Access Time when the packet i arrived to the buffer i 2 • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. 1 Output rate
  • 20. Methodology Input rate Method 1: Physical Access Buffer gets empty • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 21. Methodology Input rate Method 1: Physical Access Time when the packet i leaves the buffer • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 22. Methodology Input rate Method 1: Physical Access Queue Count packets Queue • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 23. Methodology Method 2: Remote Access It will completly fill the buffer Input rate i 2 1 Dropped packets Output rate
  • 24. Methodology Method 2: Remote Access Input rate It will completly fill the buffer i 2 𝑅 𝑓𝑖𝑙𝑙 1 Output rate Time to fill the buffer
  • 25. Methodology Method 2: Remote Access Input rate Time to fill and empty the buffer 𝑅 𝑜𝑢𝑡 𝑅 𝑓𝑖𝑙𝑙 i Output rate It appears in the receiver
  • 26. Methodology Estimation of the size: Time to fill the buffer Time to fill and to empty the buffer
  • 27. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 28. Wired Scenario • In this case we want to test the accuracy of our method when there is no possibility of physical access to the SUT. • We obtained the buffer size using method 1 with physical access. Next, the estimations obtained using method 2 are compared with previous results, and the relative error is obtained.
  • 29. Wired Scenario A Particular buffer behaviour: Linksys WAP54G Groups of dropped packets 3COM 4500
  • 30. Wired Scenario A Particular buffer behaviour: • It has been observed in the wired and wireless tested: • when the buffer is completely full, no more packets are accepted, it will be called upper limit. • The buffer does not accept new packets until a certain amount of memory is available, it will be called lower limit. • In this moment the filling process begins again. • Although this behaviour has some similarities with Random Early Detection (RED) but it is not the same: • There is not probability for dropping an incoming packet.
  • 31. Wired Scenario • Three different amounts of bandwidth have been used in order to flood the buffer. • We see that the accuracy of the buffer size estimation using the method 2 is high. In addition, the error diminishes as input rate grows. • The results are less accurate but they are still acceptable. • The results using smaller packets are less accurate so we have not presented them. (packet size = 1500 bytes)
  • 32. Wireless Scenario • Variations of the output rate in wireless network generate error growth. • While filling rate is relatively constant, the emptying rate shows variations for the highest bandwidths. The WiFi access point switches from higher to lower speeds depending on the status of the radio channel
  • 33. Wireless Scenario • We have compared the two methods when there is physical access to the SUT. • The presented results are the ones obtained using packets of 1500 bytes, since they are the most accurate. • Method 1 is the most accurate estimation so it has been used to compare with method 2.
  • 34. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 35. Conclusions • Two methods have been presented in order to analyze the technical and functional characteristics of commercial buffers of different devices, or even networks. • This characterization is important, taking into account that the buffer may modify traffic characteristics, and may also drop packets. • The methodology can be used if there is physical access to the “System Under Test”, but it is also useful, with certain limitations, for measuring a remote system. • Tests using commercial devices have been deployed in two different scenarios, using wired and wireless networks.
  • 36. Conclusions • A particular buffer behaviour has been observed for a device: once the buffer is full, it does not accept new packets until a certain space is again available. • The results show that accurate results of the buffer size can be obtained when there is physical access to the “System Under Test”. • In case of having no direct access to the system, an acceptable estimation can also be obtained if the input rate is more than three times the output rate. In this case, big packets have to be used for the tests. • As future work the method has to be improved in order to minimize the error, especially when measuring wireless devices.