SlideShare uma empresa Scribd logo
1 de 6
Comparing Simulated Packet Loss and Real-
World Network Congestion
November 2010
Simulated Packet Loss and Real-World Network Congestion
© 2010 Riverbed Technology. All rights reserved. 1
COMPARING SIMULATED PACKET LOSS AND REAL-WORLD NETWORK
CONGESTION
Executive Summary
WAN simulators are useful for testing the impact of latency and bandwidth constraints; however, caution should be used when
using WAN simulation devices to generate packet loss. Many WAN simulators are incapable of accurately simulating the most
common type of packet loss found in real-life networks—congestive packet loss, which is characterized by bursty loss patterns.
Rather, the more simplistic WAN simulators assign a fixed probability of loss to each individual packet, leading to loss patterns
that are more characteristically caused by bit errors in the transmission media.
While Forward Error Correction (FEC) and other parity checking techniques can be effective when applied to single-drop patterns
resulting from transmission bit errors and simplistic WAN simulators, these error correction techniques are much less effective
when applied to bursty consecutive-loss patterns that are far more prevalent in IP networks.
To avoid misleading and skewed test results, Riverbed recommends avoiding use of low-end WAN simulators that are incapable
of accurately simulating the bursty packet loss patterns resulting from network congestion. Using such devices to simulate packet
loss will not lead to an accurate assessment of the performance and behavior of the devices in a real-life network environment.
Types of Packet Loss
Packet loss results whenever the network fails to deliver a packet to its intended destination. The causes and types of packet
loss--their impacts on network performance--have been extensively analyzed and modeled in a number of different studies.123
These studies generally characterize the two primary causes of packet loss in IP-based networks, which are:
• Congestive loss: Results when the network is unable to support the amount of traffic that it receives. Router buffers
become full, forcing it to drop packets. Rarely is just a single packet dropped—usually congestion-related packet loss is
characterized by patterns consisting of sequences of consecutive dropped packets. Furthermore, loss levels (as
measured in loss percentage) tend to increase when network utilization increases and decrease when network
utilization decreases.
• Loss due to transmission bit errors: Bit errors result from transmission channel noise, distortion, signal weakness, bit
synchronization, or attenuation. Packet loss resulting from bit errors is characterized by low-density individual packet
drops at random intervals. Unlike the case with congestive loss, packet loss resulting from transmission bit errors (as
measured in loss percentage) usually remains constant and does not change with the level of network utilization.
The above two types of packet loss result in very different network behaviors. To illustrate the difference between them, let’s
suppose we have two WAN links—one is afflicted with misconfigured telecom equipment resulting in a steady bit error rate, while
another is simply an over-subscribed and over-utilized WAN link for a short instant in time. While both WAN links might be
afflicted with so-called 1% packet loss, nevertheless their behavioral characteristics are very different. To transmit a given file
carried in 10,000 packets, both WAN links will drop 100 packets. But the WAN link with the bit error will drop a single packet at an
average interval of roughly every 100 packets, while the congested WAN link may drop 5-10 consecutive packets each on roughly
a dozen instances for the duration of the file transfer. Although both WAN links drop the same number of packets and exhibit the
same level of reliability as far as their ability to deliver packets, nevertheless a technique designed to address the type of packet
loss behavior in the first link won’t necessarily work in addressing the packet loss behavior for the other WAN link.
It’s important to realize that loss due to bit errors is very rare among terrestrial WAN links commercially provided by
telecommunications vendors. Fiber-optic technology now affords the ability to achieve extremely low bit error rates of 10-12 to 10-15
1
Haβlinger, G., Hohlfeld, O. The Gilbert-Elliot Model for Packet Loss. In Real Time Services on the Internet. 2007.
2
Bolot, J. End-to-End Delay and Loss Behavior in the Internet. In SIGCOMM Symposium on Communications
Architectures and Protocols (San Francisco, Sept. 1993), pp. 289–298.
3
Barakat, C., Altman, E. Bandwidth Tradeoff between TCP and Link-level FEC. Computer Networks 39, 2002.
Simulated Packet Loss and Real-World Network Congestion
© 2010 Riverbed Technology. All rights reserved. 2
for virtually error-free data transmission.4 Furthermore, most telecom transmission equipment overlay additional parity checking
capabilities at the physical layer through Forward Error Correction (FEC) techniques5 (more on this later), which further reduce or
eliminate packet loss resulting from these already-low bit error rates.
Due to the rarity of bit-error related packet loss, almost all packet loss encountered in terrestrial IP networks will most likely be a
result of network congestion. And as described earlier, congestive packet loss patterns are characterized by consecutive losses
in sequence. This is vividly illustrated in a study by Raghavendra,6 who measured (a) packet loss and (b) loss lengths in a typical
residential broadband network. Loss length refers to the number of consecutive packets that are dropped by the network in each
packet loss incident. The cumulative distribution function (CDF) measured by Raghavendra shows that although the packet loss
rate (graph a) was below 1% for about 90% of the time, the median loss length (CDF = 0.5) was about 5 consecutive lost packets
for wired broadband, and about 15 consecutive lost packets for wireless broadband (graph b). More importantly, graph (b)
indicates that in the observed residential broadband network, single isolated packet drops are very rare, occurring with a
probability of far less than 0.1.
(Raghavendra, 2009)
2009 study measured median loss lengths (i.e., consecutive packet drops) of 5 and 15 packets respectively for wired and wireless
residential broadband networks. The measured probability for a single isolated lost packet is very small (less than 0.1 probability)
Use caution when using WAN simulators to simulate packet loss
Use of WAN simulators is an understandable approach for customers evaluating various WAN optimization solutions. They allow
for convenient and accurate measurement on the impact of bandwidth constraints and WAN latency, without having to deploy a
live proof-of-concept (POC) trial.
Most WAN simulators also have the capability of generating packet loss. But before using a WAN simulator to test packet loss, it
is important to understand what types of packet loss the WAN simulator is capable of generating. Just about every WAN
simulator --including a simple Network Nightmare--is capable of generating packet loss behavior that assigns a fixed probability of
loss to each individual packet in the test stream. The result is a low-density packet loss pattern is representative of loss caused
by a bit error, as described in the previous section. On the other hand, only the more sophisticated WAN simulators are capable
of generating “bursty” loss patterns that more accurately simulate the effects of network congestion. Such devices are available
from vendors such as Shunra and Packet Storm.
Only in the most extreme cases is it appropriate to test with a simplistic WAN simulator that generates packet loss by
assigning fixed drop probabilities to individual packets. As discussed previously, packet loss resulting from bit errors is very
4
Goff, D., Hansen, K., Stull, M. Fiber Optic Video Transmission: The Complete Guide. Focal Press, 2003. See Chapter 14, page
205.
5 Telecom Standards Newsletter, May 2005, page 3.
6 Raghavendra, R. Belding, E. Characterizing High-bandwidth Real-time Video Traffic in Residential Broadband Networks.
Department of Computer Science, University of California Santa Barbara, 2009.
Simulated Packet Loss and Real-World Network Congestion
© 2010 Riverbed Technology. All rights reserved. 3
rare in commercial-grade WAN links. Unless this is a known problem in the WAN environment, use of such a WAN simulation
device may lead to skewed test results that do not accurately reflect the performance for WAN optimization devices deployed in
the real-life network environment. Rather, if it is necessary to test the effects of congestive packet loss, it’s important that bursty
packet loss patterns (including consecutive packet drops) be generated as part of the test. This can be done through use of a
load generator such as IP Perf or LoadSim to source additional traffic flows that congest a bandwidth-constrained simulated WAN
link. Alternatively, use of more sophisticated WAN simulation devices may be considered as long as they are specifically
configured to generate bursty packet loss patterns that drop multiple consecutive packets.
Why Forward Error Correction (FEC) is inappropriate for congestive packet loss
As with any significant technical challenge, it’s important that the chosen solution is appropriate for the problem. Earlier in this
document we discussed how FEC can be effective for packet loss resulting from bit errors in the transmission media. However,
some vendors have naively attempted to extend the application of FEC beyond its original intended purpose, claiming that FEC
can be useful for any and all types of packet loss, including loss resulting from network congestion. But there are serious
problematic issues with these dubious claims.
FEC is a technique where additional traffic for parity information is injected into the traffic stream. As long as no more than one
packet is lost within each protected interval, the lost packet can be regenerated through a calculation using the parity data.
Forward Error Correction (FEC) is a technique that injects parity information into the original traffic stream. As long as no more
than one packet is lost within the protection interval, the surviving packets can be compared to the added parity data in order to
re-generate the lost packet. The scheme is analogous to a RAID-protected computer system, where multiple disks are used to
provide high availability of the disk-resident data.
However, if more than one packet is lost within the FEC protection interval, then the FEC mechanism fails to achieve its objective.
In this case, the lost packets cannot be regenerated, and the additional parity overhead information simply adds to the network
utilization, worsening the congestion problem. Such a failure is analogous to a failure of more than one disk in a RAID-5 protected
computer system.
Applying FEC to simplistic loss patterns generated by a WAN simulator leads to deceptively superior results compared
to actual results that would be achieved with the same levels of congestive packet loss in a real-life network. It is
important that the correct type of packet loss be simulated. Because almost all packet loss in real-life networks is congestion-
related loss, then it is important that bursty packet loss patterns be generated when testing the effects of a product’s FEC
capabilities.
Simulated Packet Loss and Real-World Network Congestion
© 2010 Riverbed Technology. All rights reserved. 4
Congestive packet loss is characterized by bursty loss patterns where multiple consecutive packets are lost. FEC is ineffective
when applied to bursty packet loss patterns.
Finally, it’s important to realize that use of FEC is not without cost; using FEC involves adding overhead traffic through the parity
information injected into the original traffic stream, which consumes bandwidth that otherwise would have been available to deliver
additional data. The amount of parity data injected depends on the level of packet loss anticipated in the network. For example,
protecting against an anticipated 5% packet loss requires an additional ~5.26% overhead in additional parity data, while protecting
against an anticipated 20% packet loss requires 25% overhead.
What about “adaptive” FEC?
But the vendor advocating FEC may claim that the additional traffic overhead is not a problem, because their implementation of
FEC “adapts” to the appropriate level of packet loss. When there is little or no packet loss in the network, their FEC ratchets down
the protection level, thereby reducing the amount of traffic overhead. When packet loss increases, their implementation of FEC
increases the protection level, which of course increases the amount of traffic overhead.
The main problem with “adaptive” FEC is that its behavior is exactly the opposite of what is necessary to deal with congestion-
related packet loss. As discussed earlier, congestive packet loss tends to increase with higher network utilization levels. But if a
vendor’s “adaptive” FEC reacts to congestive packet loss by increasing the amount of overhead traffic, then the congestive packet
loss problem can become worse. In severe instances, such behavior can potentially contribute to a congestion collapse scenario
such as those that were common in the early days of the Internet, before the widespread adoption of Van Jacobson’s TCP
congestion control mechanisms. In fact, section 5 of RFC 29147 specifically warns that an adaptive FEC mechanism that
dynamically adjusts its protection level to the amount of measured packet loss is especially destructive to the integrity of the IP
network.
Other tools for addressing packet loss
There are a number of other tools available to address congestive packet loss; unlike the FEC approach, these other tools do not
generate additional traffic overhead, and they generally do not worsen the network congestion that may be causing the packet
loss in the first place. In the Riverbed Steelhead product, these tools include MX-TCP, LTTS, TCP-Westwood, and TCP-Vegas,
each of which engage various approaches to avoid performance drop-off due to TCP congestion avoidance and slow start
processes. Of these, MX-TCP is the most aggressive in its behavior to sustain transmission throughputs despite the occurrence
of packet loss.
7
Floyd, S. Congestion Control Principles. RFC 2914, September 2000.
Simulated Packet Loss and Real-World Network Congestion
© 2010 Riverbed Technology. All rights reserved. 5
Summary
Network congestion is by far, the most common cause of packet loss in real-life IP networks. Congestive packet loss is
characterized by loss of multiple consecutive packets. But many WAN simulators are not equipped to simulate this type of packet
loss; rather, when configured to inject loss, most simulators will simply assign a fixed probability of loss to each individual packet
in the test stream. Because such a packet loss pattern rarely occurs in real-life, the test results will not reflect real-life
performance and behavior when the packet loss is applied to WAN optimization devices.
Forward Error Correction (FEC) techniques can be effectively applied to recover bit-error related packet loss. However, FEC is
ineffective—and potentially harmful—when applied to packet loss that results from network congestion. Properly testing a
product’s FEC capabilities requires that bursty packet loss patterns—the type of packet loss prevalent in real-life IP networks--be
used in the simulation test.
About Riverbed
Riverbed Technology is the IT infrastructure performance company. The Riverbed family of wide area network (WAN) optimization
solutions liberates businesses from common IT constraints by increasing application performance, enabling consolidation, and
providing enterprise-wide network and application visibility – all while eliminating the need to increase bandwidth, storage or
servers. Thousands of companies with distributed operations use Riverbed to make their IT infrastructure faster, less expensive
and more responsive. Additional information about Riverbed (NASDAQ: RVBD) is available at www.riverbed.com.
Riverbed Technology, Inc.
199 Fremont Street
San Francisco, CA 94105
Tel: (415) 247-8800
www.riverbed.com
Riverbed Technology Ltd.
Farley Hall, London Rd., Level 2
Binfield
Bracknell. Berks RG424EU
Tel: +44 1344 354910
Riverbed Technology Pte. Ltd.
391A Orchard Road #22-06/10
Ngee Ann City Tower A
Singapore 238873
Tel: +65 6508-7400
Riverbed Technology K.K.
Shiba-Koen Plaza Building 9F
3-6-9, Shiba, Minato-ku
Tokyo, Japan 105-0014
Tel: +81 3 5419 1990

Mais conteúdo relacionado

Mais procurados

Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks Paul Yang
 
Mini-Fiber Node Technology
Mini-Fiber Node TechnologyMini-Fiber Node Technology
Mini-Fiber Node TechnologyXiaolin Lu
 
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksCall Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksMervat AbuElkheir
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video trafficprasanna9
 
An Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional CodesAn Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional CodesIJERA Editor
 
Connection technology options
Connection technology optionsConnection technology options
Connection technology optionsmicailalouise
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsAnalysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsSiddharth Nawani
 
860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_test860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_testtrilithicweb
 
internetworking operation
internetworking operationinternetworking operation
internetworking operationSrinivasa Rao
 
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Jose Saldana
 
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan Kearns
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
 
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11nIeee interference-measurements-802.11n
Ieee interference-measurements-802.11nSteph Cliche
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...TELKOMNIKA JOURNAL
 

Mais procurados (20)

5G
5G5G
5G
 
Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks
 
Mini-Fiber Node Technology
Mini-Fiber Node TechnologyMini-Fiber Node Technology
Mini-Fiber Node Technology
 
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksCall Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video traffic
 
An Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional CodesAn Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional Codes
 
Final prentation M.TECH ( PPT )
Final prentation  M.TECH ( PPT )Final prentation  M.TECH ( PPT )
Final prentation M.TECH ( PPT )
 
Connection technology options
Connection technology optionsConnection technology options
Connection technology options
 
2 applications.key
2 applications.key2 applications.key
2 applications.key
 
Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsAnalysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM Algortihms
 
860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_test860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_test
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
 
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?
 
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
 
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11nIeee interference-measurements-802.11n
Ieee interference-measurements-802.11n
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
 

Destaque

Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion controlAbdo sayed
 
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance ProblemsExposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance ProblemsRiverbed Technology
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkCisco Canada
 
Steelhead DX for Datacenter-to-Datacenter optimization
Steelhead DX for Datacenter-to-Datacenter optimizationSteelhead DX for Datacenter-to-Datacenter optimization
Steelhead DX for Datacenter-to-Datacenter optimizationRiverbed Technology
 
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionModernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionRiverbed Technology
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010chanwitcs
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service ProvidersBAKOTECH
 
Riverbed and HPE Services for Office 365
Riverbed and HPE Services for Office 365Riverbed and HPE Services for Office 365
Riverbed and HPE Services for Office 365Riverbed Technology
 

Destaque (8)

Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
 
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance ProblemsExposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance Problems
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 
Steelhead DX for Datacenter-to-Datacenter optimization
Steelhead DX for Datacenter-to-Datacenter optimizationSteelhead DX for Datacenter-to-Datacenter optimization
Steelhead DX for Datacenter-to-Datacenter optimization
 
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionModernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service Providers
 
Riverbed and HPE Services for Office 365
Riverbed and HPE Services for Office 365Riverbed and HPE Services for Office 365
Riverbed and HPE Services for Office 365
 

Semelhante a Riverbed White Paper - Simulated Packet Loss

A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno PerformanceA Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno PerformanceCSCJournals
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
 
IR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdfIR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdfChandanPrajwal
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
Shunra university 1 intro to network virtualization
Shunra university 1   intro to network virtualizationShunra university 1   intro to network virtualization
Shunra university 1 intro to network virtualizationAmichai Lesser
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Ranjeet Bidwe
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...ijwmn
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOSCASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOSijcsity
 

Semelhante a Riverbed White Paper - Simulated Packet Loss (20)

TCP for Wireless Environments
TCP for Wireless EnvironmentsTCP for Wireless Environments
TCP for Wireless Environments
 
pvitwp
pvitwppvitwp
pvitwp
 
pvitwp
pvitwppvitwp
pvitwp
 
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno PerformanceA Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
IR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdfIR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdf
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Shunra university 1 intro to network virtualization
Shunra university 1   intro to network virtualizationShunra university 1   intro to network virtualization
Shunra university 1 intro to network virtualization
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
Cp Fu03a
Cp Fu03aCp Fu03a
Cp Fu03a
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
network devices, types of delay
network devices, types of delaynetwork devices, types of delay
network devices, types of delay
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOSCASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Riverbed White Paper - Simulated Packet Loss

  • 1. Comparing Simulated Packet Loss and Real- World Network Congestion November 2010
  • 2. Simulated Packet Loss and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 1 COMPARING SIMULATED PACKET LOSS AND REAL-WORLD NETWORK CONGESTION Executive Summary WAN simulators are useful for testing the impact of latency and bandwidth constraints; however, caution should be used when using WAN simulation devices to generate packet loss. Many WAN simulators are incapable of accurately simulating the most common type of packet loss found in real-life networks—congestive packet loss, which is characterized by bursty loss patterns. Rather, the more simplistic WAN simulators assign a fixed probability of loss to each individual packet, leading to loss patterns that are more characteristically caused by bit errors in the transmission media. While Forward Error Correction (FEC) and other parity checking techniques can be effective when applied to single-drop patterns resulting from transmission bit errors and simplistic WAN simulators, these error correction techniques are much less effective when applied to bursty consecutive-loss patterns that are far more prevalent in IP networks. To avoid misleading and skewed test results, Riverbed recommends avoiding use of low-end WAN simulators that are incapable of accurately simulating the bursty packet loss patterns resulting from network congestion. Using such devices to simulate packet loss will not lead to an accurate assessment of the performance and behavior of the devices in a real-life network environment. Types of Packet Loss Packet loss results whenever the network fails to deliver a packet to its intended destination. The causes and types of packet loss--their impacts on network performance--have been extensively analyzed and modeled in a number of different studies.123 These studies generally characterize the two primary causes of packet loss in IP-based networks, which are: • Congestive loss: Results when the network is unable to support the amount of traffic that it receives. Router buffers become full, forcing it to drop packets. Rarely is just a single packet dropped—usually congestion-related packet loss is characterized by patterns consisting of sequences of consecutive dropped packets. Furthermore, loss levels (as measured in loss percentage) tend to increase when network utilization increases and decrease when network utilization decreases. • Loss due to transmission bit errors: Bit errors result from transmission channel noise, distortion, signal weakness, bit synchronization, or attenuation. Packet loss resulting from bit errors is characterized by low-density individual packet drops at random intervals. Unlike the case with congestive loss, packet loss resulting from transmission bit errors (as measured in loss percentage) usually remains constant and does not change with the level of network utilization. The above two types of packet loss result in very different network behaviors. To illustrate the difference between them, let’s suppose we have two WAN links—one is afflicted with misconfigured telecom equipment resulting in a steady bit error rate, while another is simply an over-subscribed and over-utilized WAN link for a short instant in time. While both WAN links might be afflicted with so-called 1% packet loss, nevertheless their behavioral characteristics are very different. To transmit a given file carried in 10,000 packets, both WAN links will drop 100 packets. But the WAN link with the bit error will drop a single packet at an average interval of roughly every 100 packets, while the congested WAN link may drop 5-10 consecutive packets each on roughly a dozen instances for the duration of the file transfer. Although both WAN links drop the same number of packets and exhibit the same level of reliability as far as their ability to deliver packets, nevertheless a technique designed to address the type of packet loss behavior in the first link won’t necessarily work in addressing the packet loss behavior for the other WAN link. It’s important to realize that loss due to bit errors is very rare among terrestrial WAN links commercially provided by telecommunications vendors. Fiber-optic technology now affords the ability to achieve extremely low bit error rates of 10-12 to 10-15 1 Haβlinger, G., Hohlfeld, O. The Gilbert-Elliot Model for Packet Loss. In Real Time Services on the Internet. 2007. 2 Bolot, J. End-to-End Delay and Loss Behavior in the Internet. In SIGCOMM Symposium on Communications Architectures and Protocols (San Francisco, Sept. 1993), pp. 289–298. 3 Barakat, C., Altman, E. Bandwidth Tradeoff between TCP and Link-level FEC. Computer Networks 39, 2002.
  • 3. Simulated Packet Loss and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 2 for virtually error-free data transmission.4 Furthermore, most telecom transmission equipment overlay additional parity checking capabilities at the physical layer through Forward Error Correction (FEC) techniques5 (more on this later), which further reduce or eliminate packet loss resulting from these already-low bit error rates. Due to the rarity of bit-error related packet loss, almost all packet loss encountered in terrestrial IP networks will most likely be a result of network congestion. And as described earlier, congestive packet loss patterns are characterized by consecutive losses in sequence. This is vividly illustrated in a study by Raghavendra,6 who measured (a) packet loss and (b) loss lengths in a typical residential broadband network. Loss length refers to the number of consecutive packets that are dropped by the network in each packet loss incident. The cumulative distribution function (CDF) measured by Raghavendra shows that although the packet loss rate (graph a) was below 1% for about 90% of the time, the median loss length (CDF = 0.5) was about 5 consecutive lost packets for wired broadband, and about 15 consecutive lost packets for wireless broadband (graph b). More importantly, graph (b) indicates that in the observed residential broadband network, single isolated packet drops are very rare, occurring with a probability of far less than 0.1. (Raghavendra, 2009) 2009 study measured median loss lengths (i.e., consecutive packet drops) of 5 and 15 packets respectively for wired and wireless residential broadband networks. The measured probability for a single isolated lost packet is very small (less than 0.1 probability) Use caution when using WAN simulators to simulate packet loss Use of WAN simulators is an understandable approach for customers evaluating various WAN optimization solutions. They allow for convenient and accurate measurement on the impact of bandwidth constraints and WAN latency, without having to deploy a live proof-of-concept (POC) trial. Most WAN simulators also have the capability of generating packet loss. But before using a WAN simulator to test packet loss, it is important to understand what types of packet loss the WAN simulator is capable of generating. Just about every WAN simulator --including a simple Network Nightmare--is capable of generating packet loss behavior that assigns a fixed probability of loss to each individual packet in the test stream. The result is a low-density packet loss pattern is representative of loss caused by a bit error, as described in the previous section. On the other hand, only the more sophisticated WAN simulators are capable of generating “bursty” loss patterns that more accurately simulate the effects of network congestion. Such devices are available from vendors such as Shunra and Packet Storm. Only in the most extreme cases is it appropriate to test with a simplistic WAN simulator that generates packet loss by assigning fixed drop probabilities to individual packets. As discussed previously, packet loss resulting from bit errors is very 4 Goff, D., Hansen, K., Stull, M. Fiber Optic Video Transmission: The Complete Guide. Focal Press, 2003. See Chapter 14, page 205. 5 Telecom Standards Newsletter, May 2005, page 3. 6 Raghavendra, R. Belding, E. Characterizing High-bandwidth Real-time Video Traffic in Residential Broadband Networks. Department of Computer Science, University of California Santa Barbara, 2009.
  • 4. Simulated Packet Loss and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 3 rare in commercial-grade WAN links. Unless this is a known problem in the WAN environment, use of such a WAN simulation device may lead to skewed test results that do not accurately reflect the performance for WAN optimization devices deployed in the real-life network environment. Rather, if it is necessary to test the effects of congestive packet loss, it’s important that bursty packet loss patterns (including consecutive packet drops) be generated as part of the test. This can be done through use of a load generator such as IP Perf or LoadSim to source additional traffic flows that congest a bandwidth-constrained simulated WAN link. Alternatively, use of more sophisticated WAN simulation devices may be considered as long as they are specifically configured to generate bursty packet loss patterns that drop multiple consecutive packets. Why Forward Error Correction (FEC) is inappropriate for congestive packet loss As with any significant technical challenge, it’s important that the chosen solution is appropriate for the problem. Earlier in this document we discussed how FEC can be effective for packet loss resulting from bit errors in the transmission media. However, some vendors have naively attempted to extend the application of FEC beyond its original intended purpose, claiming that FEC can be useful for any and all types of packet loss, including loss resulting from network congestion. But there are serious problematic issues with these dubious claims. FEC is a technique where additional traffic for parity information is injected into the traffic stream. As long as no more than one packet is lost within each protected interval, the lost packet can be regenerated through a calculation using the parity data. Forward Error Correction (FEC) is a technique that injects parity information into the original traffic stream. As long as no more than one packet is lost within the protection interval, the surviving packets can be compared to the added parity data in order to re-generate the lost packet. The scheme is analogous to a RAID-protected computer system, where multiple disks are used to provide high availability of the disk-resident data. However, if more than one packet is lost within the FEC protection interval, then the FEC mechanism fails to achieve its objective. In this case, the lost packets cannot be regenerated, and the additional parity overhead information simply adds to the network utilization, worsening the congestion problem. Such a failure is analogous to a failure of more than one disk in a RAID-5 protected computer system. Applying FEC to simplistic loss patterns generated by a WAN simulator leads to deceptively superior results compared to actual results that would be achieved with the same levels of congestive packet loss in a real-life network. It is important that the correct type of packet loss be simulated. Because almost all packet loss in real-life networks is congestion- related loss, then it is important that bursty packet loss patterns be generated when testing the effects of a product’s FEC capabilities.
  • 5. Simulated Packet Loss and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 4 Congestive packet loss is characterized by bursty loss patterns where multiple consecutive packets are lost. FEC is ineffective when applied to bursty packet loss patterns. Finally, it’s important to realize that use of FEC is not without cost; using FEC involves adding overhead traffic through the parity information injected into the original traffic stream, which consumes bandwidth that otherwise would have been available to deliver additional data. The amount of parity data injected depends on the level of packet loss anticipated in the network. For example, protecting against an anticipated 5% packet loss requires an additional ~5.26% overhead in additional parity data, while protecting against an anticipated 20% packet loss requires 25% overhead. What about “adaptive” FEC? But the vendor advocating FEC may claim that the additional traffic overhead is not a problem, because their implementation of FEC “adapts” to the appropriate level of packet loss. When there is little or no packet loss in the network, their FEC ratchets down the protection level, thereby reducing the amount of traffic overhead. When packet loss increases, their implementation of FEC increases the protection level, which of course increases the amount of traffic overhead. The main problem with “adaptive” FEC is that its behavior is exactly the opposite of what is necessary to deal with congestion- related packet loss. As discussed earlier, congestive packet loss tends to increase with higher network utilization levels. But if a vendor’s “adaptive” FEC reacts to congestive packet loss by increasing the amount of overhead traffic, then the congestive packet loss problem can become worse. In severe instances, such behavior can potentially contribute to a congestion collapse scenario such as those that were common in the early days of the Internet, before the widespread adoption of Van Jacobson’s TCP congestion control mechanisms. In fact, section 5 of RFC 29147 specifically warns that an adaptive FEC mechanism that dynamically adjusts its protection level to the amount of measured packet loss is especially destructive to the integrity of the IP network. Other tools for addressing packet loss There are a number of other tools available to address congestive packet loss; unlike the FEC approach, these other tools do not generate additional traffic overhead, and they generally do not worsen the network congestion that may be causing the packet loss in the first place. In the Riverbed Steelhead product, these tools include MX-TCP, LTTS, TCP-Westwood, and TCP-Vegas, each of which engage various approaches to avoid performance drop-off due to TCP congestion avoidance and slow start processes. Of these, MX-TCP is the most aggressive in its behavior to sustain transmission throughputs despite the occurrence of packet loss. 7 Floyd, S. Congestion Control Principles. RFC 2914, September 2000.
  • 6. Simulated Packet Loss and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 5 Summary Network congestion is by far, the most common cause of packet loss in real-life IP networks. Congestive packet loss is characterized by loss of multiple consecutive packets. But many WAN simulators are not equipped to simulate this type of packet loss; rather, when configured to inject loss, most simulators will simply assign a fixed probability of loss to each individual packet in the test stream. Because such a packet loss pattern rarely occurs in real-life, the test results will not reflect real-life performance and behavior when the packet loss is applied to WAN optimization devices. Forward Error Correction (FEC) techniques can be effectively applied to recover bit-error related packet loss. However, FEC is ineffective—and potentially harmful—when applied to packet loss that results from network congestion. Properly testing a product’s FEC capabilities requires that bursty packet loss patterns—the type of packet loss prevalent in real-life IP networks--be used in the simulation test. About Riverbed Riverbed Technology is the IT infrastructure performance company. The Riverbed family of wide area network (WAN) optimization solutions liberates businesses from common IT constraints by increasing application performance, enabling consolidation, and providing enterprise-wide network and application visibility – all while eliminating the need to increase bandwidth, storage or servers. Thousands of companies with distributed operations use Riverbed to make their IT infrastructure faster, less expensive and more responsive. Additional information about Riverbed (NASDAQ: RVBD) is available at www.riverbed.com. Riverbed Technology, Inc. 199 Fremont Street San Francisco, CA 94105 Tel: (415) 247-8800 www.riverbed.com Riverbed Technology Ltd. Farley Hall, London Rd., Level 2 Binfield Bracknell. Berks RG424EU Tel: +44 1344 354910 Riverbed Technology Pte. Ltd. 391A Orchard Road #22-06/10 Ngee Ann City Tower A Singapore 238873 Tel: +65 6508-7400 Riverbed Technology K.K. Shiba-Koen Plaza Building 9F 3-6-9, Shiba, Minato-ku Tokyo, Japan 105-0014 Tel: +81 3 5419 1990