SlideShare a Scribd company logo
1 of 14
Download to read offline
Project Report ITMO 540 Spring 2016 IIT Chicago
A Comparison of Streaming Media and
Real-Time Media Applications
With reference to their use of network resources
Jigisha Aryya
A20373382
25th April, 2016
jaryya@hawk.iit.edu 1
Project Report ITMO 540 Spring 2016 IIT Chicago
Abstract
Streaming media and real-time communication over the Internet are very popular now-a-days.
Users under different network conditions access these applications for their regular use. It is
important that we observe the nature of these applications in terms of network resource
consumption and underlying protocols that determine their behavior.
This paper is a culmination of the series of experiments on two streaming and two real-time
multimedia applications, to study the actual protocols that come into play on running these
applications on a particular type of hardware and network setup. We compare and contrast the
streaming and real-time media applications to see the differences in the protocols and data
exchange patterns. The obtained results and insights can guide in building better network
applications that deal with data streams. We do not provide an alternative design for any
multimedia application based on these results.
jaryya@hawk.iit.edu 2
Project Report ITMO 540 Spring 2016 IIT Chicago
Table of Contents
A Comparison of Streaming Media and ...........................................................................1
Real-Time Media Applications ..........................................................................................1
With reference to their use of network resources ............................................................1
Abstract..............................................................................................................................2
Introduction........................................................................................................................4
Test Environment..............................................................................................................5
First Test – The Baseline of the Test Environment...........................................................6
Experiments with Streaming media applications..............................................................7
Second Test – YouTube Video.................................................................................7
Third Test – BlackBoard Video ................................................................................8
Experiments with Real-time media applications...............................................................9
Fourth Test – Skype Call..........................................................................................9
1. Audio and Video Skype call with two participants................................................9
2. Only Audio Skype call with two participants.......................................................10
3. Audio and Video Skype Call with three participants...........................................10
Fifth Test – Google+ Hangout................................................................................10
1. Google+ Hangout Video conversation with two participants..............................11
2. Google+ Hangout Audio conversation with two participants..............................11
Observations, Analysis and Conclusions.......................................................................12
References......................................................................................................................12
Appendices..................................................................................................................13
jaryya@hawk.iit.edu 3
Project Report ITMO 540 Spring 2016 IIT Chicago
Introduction
Real-time media applications are quite different from streaming media applications in the sense
that there is a greater need for low latency, efficient exchange of data with the peer hosts.
Streaming media too needs fast network in order to make the delivery good enough for the end
user. However, real-time communication needs instant exchange of packets with minimum
losses so that the communication is useful. This is what motivates us to carry out these
experiments and provide a detailed analysis of the protocols, data packets and participating hosts
while running these applications. The Wireshark tool provides traces of the frames captured on
the test machine, the primary source of information for our analysis.
We tested two streaming media applications viz. Youtube and BlackBoard and two real-time
media applications – Skype and Google+ Hangout. Since the real-time media provide for both
audio and video and allow more than two people to join a conversation, we tested for those
variations and noted the results.
The network communication process is a seamless handover of data from one layer to the next.
It is important that we see how in real life these protocols are carrying the data that we send and
request for. Though data link layer, network layer and application layer protocols are studied, we
put special emphasis on the transport layer protocols – TCP and UDP that have a very important
role to play in multimedia applications.
The streaming and real-time communication media have the fundamental difference that the
former is a one way data delivery service, while the other one is a two way communication.
The traces that we have captured will reveal in a way what really matters for each to provide
data that is free from latency issues and loss of data.
The Wireshark traces not only give the complete frame information, but also all the relevant
statistics that are needed to see how a network application behaves. The packet sizes, ports and
IP addresses, bit rates and distribution of the data across the different protocols provide abundant
information to see what really takes place when we request for a one-way or two-way
communication.
jaryya@hawk.iit.edu 4
Project Report ITMO 540 Spring 2016 IIT Chicago
Test Environment
We perform the tests in a private apartment with Wireless network available through routers that
are connected to a local Indian ISP via 3G wireless Mobile broadband (provided by
Bharati Airtel) and wired broadband ( Gatik Broadband, a DOT registered class “B” ISP). The
computing device, however, is the same throughout all the experiments.
Computing Device and Router
The OS is a 64-bit Linux Ubuntu 12.04 LTS on a Dell laptop with 3.7 GB available RAM, Intel
Core i3 2.40 GHz quadcore processor and 480 GB hard disk. The routers are Alcatel OneTouch
Tablet with Qualcomm processor and Android OS that provides a WPA2 PSK portable Wi-Fi
hotspot and the latter a D-Link 524 model wireless router.
IP Addresses
The IP addresses are 192.168.43.85 or 192.168.0.102 (or similar).
The default gateway addresses were 192.168.43.1 and 192.168.0.1. These are private IP
addresses.
Network Speed
The upload and download speed for both the network environments are comparable at most
times. However, it is seen that during peak hours of network traffic, the speed in Configuration
#1 drops drastically. Hence, during a couple of experiments, the upload and download speeds
were far below what is expected from a 3G or 4G connection.
The mobile Internet on an average provides around 7 Mbps download speed and 2.5 Mbps
upload speed. With G broadband, the computing device receives an average download speed of
8 Mbps and upload speed of 6.5 Mbps. The tool used to measure the speed is www.speedtest.net
Google Chrome and Chromium browsers are used for the Youtube, Blackboard and Google
Hangout experiments. Skype was tested with its Linux client.
We install Wireshark for capturing the protocol traces and statistics of data exchange.
For reverse loopup of IP addresses to determine the servers host machines, we use
www.ipgeek.net
Network setup
The diagrams below illustrate the two different network configurations for the test environment:
Configuration 1:
IEEE 802.11 IEEE 802.11 Radio Signals
)))))))))))))))))))))) )))))))))))))))))))) )))))))))))))))))))
Dell Laptop Alcatel Tab with Wifi Hotspot Mobile Tower Wireless ISP
jaryya@hawk.iit.edu 5
Project Report ITMO 540 Spring 2016 IIT Chicago
Configuration 2:
IEEE 802.11
))))))))))))))))))))))) ____Cable___
Dell Laptop D-Link 524 Wireless Router Local ISP
First Test – The Baseline of the Test Environment
Introduction and Purpose
The test bed or the computing device is the pod where all the experiments are performed. It is
important that we learn how the computing device behaves when connected to a network of a
particular configuration. The baseline trace of the quiescent state of the test bed tells us about the
packet exchanges between the computing device and the network when no applications are
running. This is the reference against which other traces captured are compared when media
applications are analyzed. Hence it is important that we keep a note of the various protocols and
packet types of this trace.
Observations
The baseline trace captured in Configuration #1 as illustrated in diagram 1, shows only DNS,
ARP and MDNS protocols in the stack exchanged with the default router after 35 seconds of
duration between the first and last packet captured. This shows very little activity over the
network when no active network application is running.
The baseline trace captured later with Configuration #2 however showed a couple of other
protocols in the stack viz. LLC (layer 2) and RPL (Layer 2).BACnet APDUs in the stack, carry
the Application Layer parameters. The trace also showed NetBIOS, HPExt programs and SNA
protocol stack. The bytes from the computing device to the network was three times the number
of bytes received by the device.
Nearly nine times the number of frames in Configuration #1 trace, is seen in Configuration #2
for the same duration. This shows that the type of router and network might play a role in the
network activity. This is a critical factor when it comes to media applications.
During the experiments when the computing device runs a multimedia application, we study the
behavior at two main stages viz. the connecting state and the steady-state. These refer to the time
when the client machine has just initiated a connection with the remote server versus when the
application has already been running for a while. The traces captured during these two stages
give us valuable information about the protocols that come in play when such an application
needs to run on our test machine.
jaryya@hawk.iit.edu 6
Project Report ITMO 540 Spring 2016 IIT Chicago
Experiments with Streaming media applications
Second Test – YouTube Video
Introduction and Purpose
The first multimedia streaming application in the project, Youtube, which a very popular video
database site, is a streaming media application where the user requests for a video. It is tested
from the computing device during the connecting and steady state meaning, at the time of
connecting to the Youtube server from the browser for playing a hosted video and after it has
played from some time.
Analysis of the connecting and steady states
The traces show that TCP, TLS, SSL and IPv4 protocols were dominant in bytes exchanged.
Others were ARP, UDP and DNS.
TCP has carried 99% of the bytes to and from the client machine. (See Appendices)
The following diagram is a sample of the TCP connection flow from create connection till close:
Client (Chrome browser) Server(Youtube)
(192.168.0.101:40786- host machine) ( 173.194.134.46:https – Google/Youtube)
1. s=socket bind(s) listen(s)
2. s=socket connect(s) ---------SYN------> ns=accept(s)
<---SYN/ACK-----
---------ACK------>
3. read(s) <----ACK/DATA-- send(ns)
---------SYN------>
<----ACK/DATA-- send(ns)
---------ACK------>
4. close(s) -------FIN/ACK--->
<---------ACK------
<-----FIN/ACK----- close(ns)
5. close(s)
Statistics from the steady state trace:
• Average Bytes per packet : 919.00
• Average Bytes per packet from the Server: 1457.12
• Average Bytes per packet from test bed to the server: 76.83
• Number of TCP conversations: 30
• Number of UDP conversations: 3
jaryya@hawk.iit.edu 7
Project Report ITMO 540 Spring 2016 IIT Chicago
Observations and Conclusion
The steady state trace starts with the 3 way handshake with flags : SYN, SYN/ACK and ACK.
We further that the presence of a TLS secure communication application, involving Client Hello,
a Server Hello and exchange of Cipher Spec information, apart from Application Data. It is seen
that the TCP messages that contain the maximum bytes have the SYN flag set. This is next to
Application data sent over the network. The number of packets from server far exceeded those to
the server from client and also the average number of bytes per packet. This proves that the
streaming media server sends large amount of data in TCP and TLS packets while the HTTP
client (host machine) sends smaller packets mainly for Acknowledgement of the data sent by the
server. Also it is seen that the number of TCP conversations always far exceeded the UDP
number. UDP is an alternative to TCP that is meant for low latency loss tolerating connections.
Third Test – BlackBoard Video
Introduction and Purpose
This experiment is performed on IIT, Chicago's online video lecture portal – BlackBoard.
Numerous online lecture videos are posted to this portal from time to time to be accessed by
students. This part is similar to the Youtube experiment where data is exchanged with the server
which in this case is my.iit.edu (IP address with most HTTP conversations: 216.47.143.50).
This experiment confirms what has been already observed during the Youtube experiment.
Statistics from the steady state trace:
• Number of HTTP conversations: 98
• Number of client packets with most TCP conversations: 0 bytes
• Number of server packets with most TCP conversations: 2854 bytes
• Average size of packets exchanged with the most communicated server: 972 bytes
• Average Bytes per packet from server exchanging most bytes with test bed: 1433 bytes
• Average Bytes per packet from test bed to the server exchanging most bytes: 66 bytes
Observations and Conclusion
The numbers clearly indicate that the my.iit.edu server has sent most of the data that was
rendered through the BlackBoard video. (See Appendices)
jaryya@hawk.iit.edu 8
Project Report ITMO 540 Spring 2016 IIT Chicago
Experiments with Real-time media applications
Fourth Test – Skype Call
Introduction and Purpose
This is the first experiment to test the network activity while using a real-time media application,
Skype, a highly popular application for text, audio and video communication over the Internet.
Skype is an overlay network that works very efficiently in identifying the destination user with
its sophisticated algorithm and node-super node network architecture. The login server contains
the user credentials and is used for identifying a user [3]. The application also provides for group
conversations or video conferencing where more than two people can communicate seamlessly
in text, audio and video mode.
This experiment will reveal the nature of packet exchange between our test computing device,
skype server and the communicating nodes (connected machines). The protocols that come in
play and the volume of data that move to and from our device. The experiments are done in three
different modes viz. both audio and video communication, only audio communication and a
group of three people in an audio/video conference call. We will compare and contrast these
three different situations and provide insight.
1. Audio and Video Skype call with two participants
Analysis of the connecting and steady states
The skype call placed between the test device and a participant starts with initial 3 way TCP
handshake of SYN, SYN/ACK and ACK. Soon after, it is seen that the trace gets flooded with
only UDP frames. Hence the main protocols in the trace are UDP, TCP and ARP. There are 14
UDP conversations versus 5 TCP conversations during the session that lasted for 23 seconds.
The UDP socket with which most bytes are exchanged belongs to a host within the same
network as the test device and turns out to be the machine to which the skype call was made
(socket: 192.168.43.83:21815). The bytes exchanged, average bit rate to and from the test
machine, and average packet size were all of comparable value. (See Appendices)
In the steady state, just 1 TCP and 1 UDP conversations are seen. The host sent and received
most UDP packets with the same host as mentioned above (socket: 192.168.43.83:50891).
The TCP protocol carries much lesser data (1251 bytes versus 3624234 bytes). Bytes sent from
the Microsoft server ( 15.55.56.159:40036) with which maximum data was exchanged was
approximately 5 times lesser than sent from the test device. So is the average packet size and bit
rate.
Observation and Conclusion
It is clearly seen that UDP data volume is dominant during the chat session and exchanged the
participant host. This layer 4 protocols allows for simple connectionless communication, unlike
TCP, which is needed for fast, efficient communication vital for real-time media.
(See Appendices)
jaryya@hawk.iit.edu 9
Project Report ITMO 540 Spring 2016 IIT Chicago
2. Only Audio Skype call with two participants
Analysis of the connecting and steady states
The results are similar in this case, except for the total data exchanged that was 4 times lesser.
The predominant protocols were UDP, TCP, IPv4 and IPv6. There are 15 UDP conversations
and 5 TCP as expected during the connecting phase. In the steady state too there are 4 TCP and
UDP conversations with UDP carrying nearly 70 times the data as TCP for a short duration of 15
seconds.
Observation and Conclusion
As the numbers indicate, for audio only communication also UDP is the protocol chosen for
optimal performance.
3. Audio and Video Skype Call with three participants
Analysis of the connecting and steady states
In a group communication, also at the connecting phase has 24 UDP conversations versus 7 for
TCP. Apart from this IPv4 conversations were seen. In the UDP statistics, the maximum bytes
were exchanged with two hosts in this case in almost equal proportion. This shows the presence
of two hosts unlike one other participant in the previous case. The bytes exchanged are more
than 15 times lesser for TCP as compared to UDP as expected.
In the steady state, the same host IP addresses were seen in 6 UDP and 6 TCP conversations.
IPv4 was the other prominent protocol in the trace. The bytes carried by UDP is 28 times that by
TCP as expected. The data bytes exchanged between the two hosts as seen is almost the same as
in the connecting phase.
Observation and Conclusion
For a group communication also UDP is the preferred protocol for data exchange.
One of the participant was within the network where the test device is located and the other was
outside. But the packet distribution in UDP and TCP was equal. This shows the efficiency of the
Skype network architecture.
Fifth Test – Google+ Hangout
Introduction and Purpose
Google+ Hangout is another popular video telephony system on the Internet that provides audio
and video conversation from the device it is accessible from. Its architecture unlike other
providers like iChat and Skype is server-centric. It sends and receives data from a dedicated
proxy. No peer to peer communication is possible [1]. It is important that we observe the packet
exchange pattern of a test device like ours to see if at all it is different in any way from Skype in
terms of speed, performance or protocol use over the network.
jaryya@hawk.iit.edu 10
Project Report ITMO 540 Spring 2016 IIT Chicago
In this experiment, we test for two situations. First for video and audio conversation between
two participants and the next without video. W see if there is any variation in the network
activity apart from the volume of data.
1. Google+ Hangout Video conversation with two participants
Analysis of the connecting and steady states
The main protocols as we have seen from all the previous experiments stands to be UDP and
TCP. The others in trace were LLC, IPv4 and STUN which are important, but majority of the
data exchange and the quality of communication is determined by these two Layer 4 protocols.
Same is the case for Google+ Hangout and we see 4 UDP conversations each for the connecting
and steady state phases and 18 and 14 for TCP; UDP packets carrying more than 7 and 18 times
the number of bytes are transported via TCP. (See Appendices)
Another fact is that, majority of the bytes have been exchanged via the Google server that
reflects from the UDP frames where the test device has sent and received data from socket
74.125.23.127:19305 in a server owned by Google at Mountain View, California, USA.
Only the TCP conversations have taken place with the participant host. In the connecting state,
maximum of the data has be received than sent. This is an interesting point in UDP since it is the
other way round in case of TCP. In the steady-state however, the packets are almost the same.
This is an expected behavior.
Observation and Conclusion
What we see in the data of this experiment is completely in line with what we may expect from a
real-time multimedia application to behave like in a test bed like ours. UDP carried majority of
the data due to its efficiency in serving fast data requests and low latency requirements. Coupled
with that is the server-centric architecture of Google+ where a Google proxy server dedicated to
our session sends and receives our data, rather than a peer computer.
2. Google+ Hangout Audio conversation with two participants
Analysis of the connecting and steady states
UDP and TCP had 5 and 13 conversations during the connecting phase and 5 and 10 during the
steady-state. The data as before is around 4 times greater in case of UDP compared to TCP in
both the phases. Protocols are also the same as seen before. The data bytes in connecting state
from test device to other host is double as that received via TCP. But in UDP it is comparable.
This pattern is seen in the steady-state as well. Like the previous case of Video conversation, this
also showed UDP data exchange with a Google proxy server.
Observation and Conclusion
The audio version of Google+ Hangout session was almost the same as Video conversation.
UDP is major data carrier. And the peer host is seen only in the TCP frames.
jaryya@hawk.iit.edu 11
Project Report ITMO 540 Spring 2016 IIT Chicago
Observations, Analysis and Conclusions
• Firstly, the network setup plays an important role in the quality of the service received
from these multimedia applications irrespective of whether they are streaming or real-
time. Local wired broadband is the preferable source of Internet for a host like the test
device in a location like India, where proxy servers are many a times located far away
geographically, which may lead to further latency, when network traffic is high in the
popular ISPs.
• The main difference in the data exchange pattern in streaming and real-time
communication applications is that, in the former case we hardly send over data to the
server, and in the latter case we send and receive huge amount of data peer to peer or to
and from a server.
• UDP is the dominant protocol for real-time communication due to its connectionless
nature and greater efficiency compared to TCP. But in case of Streaming media 99% of
the data is carried by TCP, which is a connection-oriented protocol.
• In the Real-time media communication, it is seen that TCP packets are sent much more in
number and in greater average packet size than the receiving ones or the other way
round. But in case of UDP it is always of comparable number and packet size.
• Though Skype has a P2P network architecture different from Google+ Hangout that has a
server-centric approach, it is still seen that Google+ had sent and received almost the
same or greater bytes of data than Skype. Google+ however had issues with screen
sharing and group video calls as experiences during the experiments that makes Skype a
better choice.
Open issue:
In the BlackBoard experiment, HTTP conversations were seen in a huge number in the trace but
that was not the case for Youtube in our setup.
References
[1] Yang Xu, Student Member, IEEE, Chenguang Yu, Jingjiang Li, and Yong Liu, Member,
IEEE, ACM, “Video Telephony for End-Consumers: Measurement Study of Google+, iChat,
and Skype” , IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 3, JUNE
2014
[2] http://www.ibm.com/support/knowledgecenter/
[3] Salman A. Baset and Henning Schulzrinne Department of Computer Science Columbia
University, ”An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol”.
jaryya@hawk.iit.edu 12
Project Report ITMO 540 Spring 2016 IIT Chicago
Appendices
The following snapshot shows the Protocol Hierarchy and distribution of the bytes captured in
steady-state of the Youtube experiment:
The following snapshot shows the protocol distribution in the data exchange in steady state of
BlackBoard experiment:
The following snapshot shows the protocol distribution during audio/video communicate with
two participants in the steady state Skype experiment:
jaryya@hawk.iit.edu 13
Project Report ITMO 540 Spring 2016 IIT Chicago
The following snapshot shows the packet distribution between the two other participating hosts
in a group conversation in the connecting phase in Skype call:
Below is the snapshot of the protocol hierarchy in steady-state of Google+ Video chat:
jaryya@hawk.iit.edu 14

More Related Content

What's hot

Extending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerExtending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport Layer
Scientific Review
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
visor999
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly...
Optimizing of Bloom Filters by Automatic Bloom Filter Updating  and Instantly...Optimizing of Bloom Filters by Automatic Bloom Filter Updating  and Instantly...
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly...
International Journal of Engineering Inventions www.ijeijournal.com
 

What's hot (16)

IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLP
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet InspectionWhitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspection
 
KANSA: high interoperability e-KTP decentralised database network using distr...
KANSA: high interoperability e-KTP decentralised database network using distr...KANSA: high interoperability e-KTP decentralised database network using distr...
KANSA: high interoperability e-KTP decentralised database network using distr...
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Extending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerExtending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport Layer
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
 
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly...
Optimizing of Bloom Filters by Automatic Bloom Filter Updating  and Instantly...Optimizing of Bloom Filters by Automatic Bloom Filter Updating  and Instantly...
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly...
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
 

Similar to Final Project Report - Real-Time Media Apps

1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
jackiewalcutt
 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
herbertwilson5999
 
Service Level Comparison for Online Shopping using Data Mining
Service Level Comparison for Online Shopping using Data MiningService Level Comparison for Online Shopping using Data Mining
Service Level Comparison for Online Shopping using Data Mining
IIRindia
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
Miles Priar
 
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...
IJCNCJournal
 
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
IJCNCJournal
 

Similar to Final Project Report - Real-Time Media Apps (20)

1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
1. Software-Defined Networks (SDN) is a new paradigm in network ma.docx
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONCONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
EE281FINALREPORT
EE281FINALREPORTEE281FINALREPORT
EE281FINALREPORT
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Service Level Comparison for Online Shopping using Data Mining
Service Level Comparison for Online Shopping using Data MiningService Level Comparison for Online Shopping using Data Mining
Service Level Comparison for Online Shopping using Data Mining
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTTSERVERS AND CL...
 
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
 
Mcse question
Mcse questionMcse question
Mcse question
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Final Project Report - Real-Time Media Apps

  • 1. Project Report ITMO 540 Spring 2016 IIT Chicago A Comparison of Streaming Media and Real-Time Media Applications With reference to their use of network resources Jigisha Aryya A20373382 25th April, 2016 jaryya@hawk.iit.edu 1
  • 2. Project Report ITMO 540 Spring 2016 IIT Chicago Abstract Streaming media and real-time communication over the Internet are very popular now-a-days. Users under different network conditions access these applications for their regular use. It is important that we observe the nature of these applications in terms of network resource consumption and underlying protocols that determine their behavior. This paper is a culmination of the series of experiments on two streaming and two real-time multimedia applications, to study the actual protocols that come into play on running these applications on a particular type of hardware and network setup. We compare and contrast the streaming and real-time media applications to see the differences in the protocols and data exchange patterns. The obtained results and insights can guide in building better network applications that deal with data streams. We do not provide an alternative design for any multimedia application based on these results. jaryya@hawk.iit.edu 2
  • 3. Project Report ITMO 540 Spring 2016 IIT Chicago Table of Contents A Comparison of Streaming Media and ...........................................................................1 Real-Time Media Applications ..........................................................................................1 With reference to their use of network resources ............................................................1 Abstract..............................................................................................................................2 Introduction........................................................................................................................4 Test Environment..............................................................................................................5 First Test – The Baseline of the Test Environment...........................................................6 Experiments with Streaming media applications..............................................................7 Second Test – YouTube Video.................................................................................7 Third Test – BlackBoard Video ................................................................................8 Experiments with Real-time media applications...............................................................9 Fourth Test – Skype Call..........................................................................................9 1. Audio and Video Skype call with two participants................................................9 2. Only Audio Skype call with two participants.......................................................10 3. Audio and Video Skype Call with three participants...........................................10 Fifth Test – Google+ Hangout................................................................................10 1. Google+ Hangout Video conversation with two participants..............................11 2. Google+ Hangout Audio conversation with two participants..............................11 Observations, Analysis and Conclusions.......................................................................12 References......................................................................................................................12 Appendices..................................................................................................................13 jaryya@hawk.iit.edu 3
  • 4. Project Report ITMO 540 Spring 2016 IIT Chicago Introduction Real-time media applications are quite different from streaming media applications in the sense that there is a greater need for low latency, efficient exchange of data with the peer hosts. Streaming media too needs fast network in order to make the delivery good enough for the end user. However, real-time communication needs instant exchange of packets with minimum losses so that the communication is useful. This is what motivates us to carry out these experiments and provide a detailed analysis of the protocols, data packets and participating hosts while running these applications. The Wireshark tool provides traces of the frames captured on the test machine, the primary source of information for our analysis. We tested two streaming media applications viz. Youtube and BlackBoard and two real-time media applications – Skype and Google+ Hangout. Since the real-time media provide for both audio and video and allow more than two people to join a conversation, we tested for those variations and noted the results. The network communication process is a seamless handover of data from one layer to the next. It is important that we see how in real life these protocols are carrying the data that we send and request for. Though data link layer, network layer and application layer protocols are studied, we put special emphasis on the transport layer protocols – TCP and UDP that have a very important role to play in multimedia applications. The streaming and real-time communication media have the fundamental difference that the former is a one way data delivery service, while the other one is a two way communication. The traces that we have captured will reveal in a way what really matters for each to provide data that is free from latency issues and loss of data. The Wireshark traces not only give the complete frame information, but also all the relevant statistics that are needed to see how a network application behaves. The packet sizes, ports and IP addresses, bit rates and distribution of the data across the different protocols provide abundant information to see what really takes place when we request for a one-way or two-way communication. jaryya@hawk.iit.edu 4
  • 5. Project Report ITMO 540 Spring 2016 IIT Chicago Test Environment We perform the tests in a private apartment with Wireless network available through routers that are connected to a local Indian ISP via 3G wireless Mobile broadband (provided by Bharati Airtel) and wired broadband ( Gatik Broadband, a DOT registered class “B” ISP). The computing device, however, is the same throughout all the experiments. Computing Device and Router The OS is a 64-bit Linux Ubuntu 12.04 LTS on a Dell laptop with 3.7 GB available RAM, Intel Core i3 2.40 GHz quadcore processor and 480 GB hard disk. The routers are Alcatel OneTouch Tablet with Qualcomm processor and Android OS that provides a WPA2 PSK portable Wi-Fi hotspot and the latter a D-Link 524 model wireless router. IP Addresses The IP addresses are 192.168.43.85 or 192.168.0.102 (or similar). The default gateway addresses were 192.168.43.1 and 192.168.0.1. These are private IP addresses. Network Speed The upload and download speed for both the network environments are comparable at most times. However, it is seen that during peak hours of network traffic, the speed in Configuration #1 drops drastically. Hence, during a couple of experiments, the upload and download speeds were far below what is expected from a 3G or 4G connection. The mobile Internet on an average provides around 7 Mbps download speed and 2.5 Mbps upload speed. With G broadband, the computing device receives an average download speed of 8 Mbps and upload speed of 6.5 Mbps. The tool used to measure the speed is www.speedtest.net Google Chrome and Chromium browsers are used for the Youtube, Blackboard and Google Hangout experiments. Skype was tested with its Linux client. We install Wireshark for capturing the protocol traces and statistics of data exchange. For reverse loopup of IP addresses to determine the servers host machines, we use www.ipgeek.net Network setup The diagrams below illustrate the two different network configurations for the test environment: Configuration 1: IEEE 802.11 IEEE 802.11 Radio Signals )))))))))))))))))))))) )))))))))))))))))))) ))))))))))))))))))) Dell Laptop Alcatel Tab with Wifi Hotspot Mobile Tower Wireless ISP jaryya@hawk.iit.edu 5
  • 6. Project Report ITMO 540 Spring 2016 IIT Chicago Configuration 2: IEEE 802.11 ))))))))))))))))))))))) ____Cable___ Dell Laptop D-Link 524 Wireless Router Local ISP First Test – The Baseline of the Test Environment Introduction and Purpose The test bed or the computing device is the pod where all the experiments are performed. It is important that we learn how the computing device behaves when connected to a network of a particular configuration. The baseline trace of the quiescent state of the test bed tells us about the packet exchanges between the computing device and the network when no applications are running. This is the reference against which other traces captured are compared when media applications are analyzed. Hence it is important that we keep a note of the various protocols and packet types of this trace. Observations The baseline trace captured in Configuration #1 as illustrated in diagram 1, shows only DNS, ARP and MDNS protocols in the stack exchanged with the default router after 35 seconds of duration between the first and last packet captured. This shows very little activity over the network when no active network application is running. The baseline trace captured later with Configuration #2 however showed a couple of other protocols in the stack viz. LLC (layer 2) and RPL (Layer 2).BACnet APDUs in the stack, carry the Application Layer parameters. The trace also showed NetBIOS, HPExt programs and SNA protocol stack. The bytes from the computing device to the network was three times the number of bytes received by the device. Nearly nine times the number of frames in Configuration #1 trace, is seen in Configuration #2 for the same duration. This shows that the type of router and network might play a role in the network activity. This is a critical factor when it comes to media applications. During the experiments when the computing device runs a multimedia application, we study the behavior at two main stages viz. the connecting state and the steady-state. These refer to the time when the client machine has just initiated a connection with the remote server versus when the application has already been running for a while. The traces captured during these two stages give us valuable information about the protocols that come in play when such an application needs to run on our test machine. jaryya@hawk.iit.edu 6
  • 7. Project Report ITMO 540 Spring 2016 IIT Chicago Experiments with Streaming media applications Second Test – YouTube Video Introduction and Purpose The first multimedia streaming application in the project, Youtube, which a very popular video database site, is a streaming media application where the user requests for a video. It is tested from the computing device during the connecting and steady state meaning, at the time of connecting to the Youtube server from the browser for playing a hosted video and after it has played from some time. Analysis of the connecting and steady states The traces show that TCP, TLS, SSL and IPv4 protocols were dominant in bytes exchanged. Others were ARP, UDP and DNS. TCP has carried 99% of the bytes to and from the client machine. (See Appendices) The following diagram is a sample of the TCP connection flow from create connection till close: Client (Chrome browser) Server(Youtube) (192.168.0.101:40786- host machine) ( 173.194.134.46:https – Google/Youtube) 1. s=socket bind(s) listen(s) 2. s=socket connect(s) ---------SYN------> ns=accept(s) <---SYN/ACK----- ---------ACK------> 3. read(s) <----ACK/DATA-- send(ns) ---------SYN------> <----ACK/DATA-- send(ns) ---------ACK------> 4. close(s) -------FIN/ACK---> <---------ACK------ <-----FIN/ACK----- close(ns) 5. close(s) Statistics from the steady state trace: • Average Bytes per packet : 919.00 • Average Bytes per packet from the Server: 1457.12 • Average Bytes per packet from test bed to the server: 76.83 • Number of TCP conversations: 30 • Number of UDP conversations: 3 jaryya@hawk.iit.edu 7
  • 8. Project Report ITMO 540 Spring 2016 IIT Chicago Observations and Conclusion The steady state trace starts with the 3 way handshake with flags : SYN, SYN/ACK and ACK. We further that the presence of a TLS secure communication application, involving Client Hello, a Server Hello and exchange of Cipher Spec information, apart from Application Data. It is seen that the TCP messages that contain the maximum bytes have the SYN flag set. This is next to Application data sent over the network. The number of packets from server far exceeded those to the server from client and also the average number of bytes per packet. This proves that the streaming media server sends large amount of data in TCP and TLS packets while the HTTP client (host machine) sends smaller packets mainly for Acknowledgement of the data sent by the server. Also it is seen that the number of TCP conversations always far exceeded the UDP number. UDP is an alternative to TCP that is meant for low latency loss tolerating connections. Third Test – BlackBoard Video Introduction and Purpose This experiment is performed on IIT, Chicago's online video lecture portal – BlackBoard. Numerous online lecture videos are posted to this portal from time to time to be accessed by students. This part is similar to the Youtube experiment where data is exchanged with the server which in this case is my.iit.edu (IP address with most HTTP conversations: 216.47.143.50). This experiment confirms what has been already observed during the Youtube experiment. Statistics from the steady state trace: • Number of HTTP conversations: 98 • Number of client packets with most TCP conversations: 0 bytes • Number of server packets with most TCP conversations: 2854 bytes • Average size of packets exchanged with the most communicated server: 972 bytes • Average Bytes per packet from server exchanging most bytes with test bed: 1433 bytes • Average Bytes per packet from test bed to the server exchanging most bytes: 66 bytes Observations and Conclusion The numbers clearly indicate that the my.iit.edu server has sent most of the data that was rendered through the BlackBoard video. (See Appendices) jaryya@hawk.iit.edu 8
  • 9. Project Report ITMO 540 Spring 2016 IIT Chicago Experiments with Real-time media applications Fourth Test – Skype Call Introduction and Purpose This is the first experiment to test the network activity while using a real-time media application, Skype, a highly popular application for text, audio and video communication over the Internet. Skype is an overlay network that works very efficiently in identifying the destination user with its sophisticated algorithm and node-super node network architecture. The login server contains the user credentials and is used for identifying a user [3]. The application also provides for group conversations or video conferencing where more than two people can communicate seamlessly in text, audio and video mode. This experiment will reveal the nature of packet exchange between our test computing device, skype server and the communicating nodes (connected machines). The protocols that come in play and the volume of data that move to and from our device. The experiments are done in three different modes viz. both audio and video communication, only audio communication and a group of three people in an audio/video conference call. We will compare and contrast these three different situations and provide insight. 1. Audio and Video Skype call with two participants Analysis of the connecting and steady states The skype call placed between the test device and a participant starts with initial 3 way TCP handshake of SYN, SYN/ACK and ACK. Soon after, it is seen that the trace gets flooded with only UDP frames. Hence the main protocols in the trace are UDP, TCP and ARP. There are 14 UDP conversations versus 5 TCP conversations during the session that lasted for 23 seconds. The UDP socket with which most bytes are exchanged belongs to a host within the same network as the test device and turns out to be the machine to which the skype call was made (socket: 192.168.43.83:21815). The bytes exchanged, average bit rate to and from the test machine, and average packet size were all of comparable value. (See Appendices) In the steady state, just 1 TCP and 1 UDP conversations are seen. The host sent and received most UDP packets with the same host as mentioned above (socket: 192.168.43.83:50891). The TCP protocol carries much lesser data (1251 bytes versus 3624234 bytes). Bytes sent from the Microsoft server ( 15.55.56.159:40036) with which maximum data was exchanged was approximately 5 times lesser than sent from the test device. So is the average packet size and bit rate. Observation and Conclusion It is clearly seen that UDP data volume is dominant during the chat session and exchanged the participant host. This layer 4 protocols allows for simple connectionless communication, unlike TCP, which is needed for fast, efficient communication vital for real-time media. (See Appendices) jaryya@hawk.iit.edu 9
  • 10. Project Report ITMO 540 Spring 2016 IIT Chicago 2. Only Audio Skype call with two participants Analysis of the connecting and steady states The results are similar in this case, except for the total data exchanged that was 4 times lesser. The predominant protocols were UDP, TCP, IPv4 and IPv6. There are 15 UDP conversations and 5 TCP as expected during the connecting phase. In the steady state too there are 4 TCP and UDP conversations with UDP carrying nearly 70 times the data as TCP for a short duration of 15 seconds. Observation and Conclusion As the numbers indicate, for audio only communication also UDP is the protocol chosen for optimal performance. 3. Audio and Video Skype Call with three participants Analysis of the connecting and steady states In a group communication, also at the connecting phase has 24 UDP conversations versus 7 for TCP. Apart from this IPv4 conversations were seen. In the UDP statistics, the maximum bytes were exchanged with two hosts in this case in almost equal proportion. This shows the presence of two hosts unlike one other participant in the previous case. The bytes exchanged are more than 15 times lesser for TCP as compared to UDP as expected. In the steady state, the same host IP addresses were seen in 6 UDP and 6 TCP conversations. IPv4 was the other prominent protocol in the trace. The bytes carried by UDP is 28 times that by TCP as expected. The data bytes exchanged between the two hosts as seen is almost the same as in the connecting phase. Observation and Conclusion For a group communication also UDP is the preferred protocol for data exchange. One of the participant was within the network where the test device is located and the other was outside. But the packet distribution in UDP and TCP was equal. This shows the efficiency of the Skype network architecture. Fifth Test – Google+ Hangout Introduction and Purpose Google+ Hangout is another popular video telephony system on the Internet that provides audio and video conversation from the device it is accessible from. Its architecture unlike other providers like iChat and Skype is server-centric. It sends and receives data from a dedicated proxy. No peer to peer communication is possible [1]. It is important that we observe the packet exchange pattern of a test device like ours to see if at all it is different in any way from Skype in terms of speed, performance or protocol use over the network. jaryya@hawk.iit.edu 10
  • 11. Project Report ITMO 540 Spring 2016 IIT Chicago In this experiment, we test for two situations. First for video and audio conversation between two participants and the next without video. W see if there is any variation in the network activity apart from the volume of data. 1. Google+ Hangout Video conversation with two participants Analysis of the connecting and steady states The main protocols as we have seen from all the previous experiments stands to be UDP and TCP. The others in trace were LLC, IPv4 and STUN which are important, but majority of the data exchange and the quality of communication is determined by these two Layer 4 protocols. Same is the case for Google+ Hangout and we see 4 UDP conversations each for the connecting and steady state phases and 18 and 14 for TCP; UDP packets carrying more than 7 and 18 times the number of bytes are transported via TCP. (See Appendices) Another fact is that, majority of the bytes have been exchanged via the Google server that reflects from the UDP frames where the test device has sent and received data from socket 74.125.23.127:19305 in a server owned by Google at Mountain View, California, USA. Only the TCP conversations have taken place with the participant host. In the connecting state, maximum of the data has be received than sent. This is an interesting point in UDP since it is the other way round in case of TCP. In the steady-state however, the packets are almost the same. This is an expected behavior. Observation and Conclusion What we see in the data of this experiment is completely in line with what we may expect from a real-time multimedia application to behave like in a test bed like ours. UDP carried majority of the data due to its efficiency in serving fast data requests and low latency requirements. Coupled with that is the server-centric architecture of Google+ where a Google proxy server dedicated to our session sends and receives our data, rather than a peer computer. 2. Google+ Hangout Audio conversation with two participants Analysis of the connecting and steady states UDP and TCP had 5 and 13 conversations during the connecting phase and 5 and 10 during the steady-state. The data as before is around 4 times greater in case of UDP compared to TCP in both the phases. Protocols are also the same as seen before. The data bytes in connecting state from test device to other host is double as that received via TCP. But in UDP it is comparable. This pattern is seen in the steady-state as well. Like the previous case of Video conversation, this also showed UDP data exchange with a Google proxy server. Observation and Conclusion The audio version of Google+ Hangout session was almost the same as Video conversation. UDP is major data carrier. And the peer host is seen only in the TCP frames. jaryya@hawk.iit.edu 11
  • 12. Project Report ITMO 540 Spring 2016 IIT Chicago Observations, Analysis and Conclusions • Firstly, the network setup plays an important role in the quality of the service received from these multimedia applications irrespective of whether they are streaming or real- time. Local wired broadband is the preferable source of Internet for a host like the test device in a location like India, where proxy servers are many a times located far away geographically, which may lead to further latency, when network traffic is high in the popular ISPs. • The main difference in the data exchange pattern in streaming and real-time communication applications is that, in the former case we hardly send over data to the server, and in the latter case we send and receive huge amount of data peer to peer or to and from a server. • UDP is the dominant protocol for real-time communication due to its connectionless nature and greater efficiency compared to TCP. But in case of Streaming media 99% of the data is carried by TCP, which is a connection-oriented protocol. • In the Real-time media communication, it is seen that TCP packets are sent much more in number and in greater average packet size than the receiving ones or the other way round. But in case of UDP it is always of comparable number and packet size. • Though Skype has a P2P network architecture different from Google+ Hangout that has a server-centric approach, it is still seen that Google+ had sent and received almost the same or greater bytes of data than Skype. Google+ however had issues with screen sharing and group video calls as experiences during the experiments that makes Skype a better choice. Open issue: In the BlackBoard experiment, HTTP conversations were seen in a huge number in the trace but that was not the case for Youtube in our setup. References [1] Yang Xu, Student Member, IEEE, Chenguang Yu, Jingjiang Li, and Yong Liu, Member, IEEE, ACM, “Video Telephony for End-Consumers: Measurement Study of Google+, iChat, and Skype” , IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 3, JUNE 2014 [2] http://www.ibm.com/support/knowledgecenter/ [3] Salman A. Baset and Henning Schulzrinne Department of Computer Science Columbia University, ”An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol”. jaryya@hawk.iit.edu 12
  • 13. Project Report ITMO 540 Spring 2016 IIT Chicago Appendices The following snapshot shows the Protocol Hierarchy and distribution of the bytes captured in steady-state of the Youtube experiment: The following snapshot shows the protocol distribution in the data exchange in steady state of BlackBoard experiment: The following snapshot shows the protocol distribution during audio/video communicate with two participants in the steady state Skype experiment: jaryya@hawk.iit.edu 13
  • 14. Project Report ITMO 540 Spring 2016 IIT Chicago The following snapshot shows the packet distribution between the two other participating hosts in a group conversation in the connecting phase in Skype call: Below is the snapshot of the protocol hierarchy in steady-state of Google+ Video chat: jaryya@hawk.iit.edu 14