Enviar pesquisa
Carregar
Riverbed White Paper - Simulated Packet Loss
•
3 gostaram
•
1,565 visualizações
Mohd Syafiq Ramlee
Seguir
Comparing Simulated Packet Loss and Real World Network Congestion
Leia menos
Leia mais
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 6
Recomendados
TLS in manet
TLS in manet
Jay Patel
Delay jitter control for real time communication
Delay jitter control for real time communication
Masud Rana
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
transport protocols
transport protocols
aibad ahmed
PAPR Reduction in OFDM & MC-CDMA System using Nonlinear Companding Techniques
PAPR Reduction in OFDM & MC-CDMA System using Nonlinear Companding Techniques
IDES Editor
Qusetion on ethernet
Qusetion on ethernet
Manivannan Mba
To Study The Phase Noise Effect In OFDM Based Communication System
To Study The Phase Noise Effect In OFDM Based Communication System
Rajeev Kumar
4) sizing router buffers
4) sizing router buffers
Nawal Omani
Recomendados
TLS in manet
TLS in manet
Jay Patel
Delay jitter control for real time communication
Delay jitter control for real time communication
Masud Rana
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
transport protocols
transport protocols
aibad ahmed
PAPR Reduction in OFDM & MC-CDMA System using Nonlinear Companding Techniques
PAPR Reduction in OFDM & MC-CDMA System using Nonlinear Companding Techniques
IDES Editor
Qusetion on ethernet
Qusetion on ethernet
Manivannan Mba
To Study The Phase Noise Effect In OFDM Based Communication System
To Study The Phase Noise Effect In OFDM Based Communication System
Rajeev Kumar
4) sizing router buffers
4) sizing router buffers
Nawal Omani
5G
5G
ali_jasim_ramadan
Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks
Paul Yang
Mini-Fiber Node Technology
Mini-Fiber Node Technology
Xiaolin Lu
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
Mervat AbuElkheir
Congestion detection for video traffic
Congestion detection for video traffic
prasanna9
An Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional Codes
IJERA Editor
Final prentation M.TECH ( PPT )
Final prentation M.TECH ( PPT )
rajasthan technical university kota
Connection technology options
Connection technology options
micailalouise
2 applications.key
2 applications.key
Olivier Bonaventure
Mpls vpn
Mpls vpn
rel comm
Packet hiding methods for preventing selective
Packet hiding methods for preventing selective
veenasraj
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM Algortihms
Siddharth Nawani
860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_test
trilithicweb
internetworking operation
internetworking operation
Srinivasa Rao
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?
Jose Saldana
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3
Brendan Kearns
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Iaetsd Iaetsd
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11n
Steph Cliche
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
Chuka Okoye
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
TELKOMNIKA JOURNAL
Tcp congestion control
Tcp congestion control
Abdo sayed
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance Problems
Riverbed Technology
Mais conteúdo relacionado
Mais procurados
5G
5G
ali_jasim_ramadan
Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks
Paul Yang
Mini-Fiber Node Technology
Mini-Fiber Node Technology
Xiaolin Lu
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
Mervat AbuElkheir
Congestion detection for video traffic
Congestion detection for video traffic
prasanna9
An Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional Codes
IJERA Editor
Final prentation M.TECH ( PPT )
Final prentation M.TECH ( PPT )
rajasthan technical university kota
Connection technology options
Connection technology options
micailalouise
2 applications.key
2 applications.key
Olivier Bonaventure
Mpls vpn
Mpls vpn
rel comm
Packet hiding methods for preventing selective
Packet hiding methods for preventing selective
veenasraj
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM Algortihms
Siddharth Nawani
860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_test
trilithicweb
internetworking operation
internetworking operation
Srinivasa Rao
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?
Jose Saldana
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3
Brendan Kearns
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Iaetsd Iaetsd
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11n
Steph Cliche
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
Chuka Okoye
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
TELKOMNIKA JOURNAL
Mais procurados
(20)
5G
5G
Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks
Mini-Fiber Node Technology
Mini-Fiber Node Technology
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
Congestion detection for video traffic
Congestion detection for video traffic
An Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional Codes
Final prentation M.TECH ( PPT )
Final prentation M.TECH ( PPT )
Connection technology options
Connection technology options
2 applications.key
2 applications.key
Mpls vpn
Mpls vpn
Packet hiding methods for preventing selective
Packet hiding methods for preventing selective
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM Algortihms
860 dspi voip_rtp_mos_test
860 dspi voip_rtp_mos_test
internetworking operation
internetworking operation
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?
Brendan kearns berlin 2012 vn3
Brendan kearns berlin 2012 vn3
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11n
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Mitigation of non-linear four-wave mixing phenomenon in a fully optical commu...
Destaque
Tcp congestion control
Tcp congestion control
Abdo sayed
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance Problems
Riverbed Technology
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
Cisco Canada
Steelhead DX for Datacenter-to-Datacenter optimization
Steelhead DX for Datacenter-to-Datacenter optimization
Riverbed Technology
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
Riverbed Technology
Presentation riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
chanwitcs
F5 Solutions for Service Providers
F5 Solutions for Service Providers
BAKOTECH
Riverbed and HPE Services for Office 365
Riverbed and HPE Services for Office 365
Riverbed Technology
Destaque
(8)
Tcp congestion control
Tcp congestion control
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance Problems
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
Steelhead DX for Datacenter-to-Datacenter optimization
Steelhead DX for Datacenter-to-Datacenter optimization
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
Presentation riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
F5 Solutions for Service Providers
F5 Solutions for Service Providers
Riverbed and HPE Services for Office 365
Riverbed and HPE Services for Office 365
Semelhante a Riverbed White Paper - Simulated Packet Loss
TCP for Wireless Environments
TCP for Wireless Environments
INFOGAIN PUBLICATION
pvitwp
pvitwp
Renshou Dai
pvitwp
pvitwp
Renshou Dai
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
CSCJournals
VOIP QOS
VOIP QOS
Thomas Mangin
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Baddam Akhil Reddy
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
IJCNCJournal
IR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdf
ChandanPrajwal
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
Alexander Decker
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
Alexander Decker
Privacy preserving and truthful detection
Privacy preserving and truthful detection
jpstudcorner
Shunra university 1 intro to network virtualization
Shunra university 1 intro to network virtualization
Amichai Lesser
Cw25585588
Cw25585588
IJERA Editor
Cp Fu03a
Cp Fu03a
guestb64ed0
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Ranjeet Bidwe
www.ijerd.com
www.ijerd.com
IJERD Editor
network devices, types of delay
network devices, types of delay
university of Gujrat, pakistan
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
ijwmn
Paper id 21201485
Paper id 21201485
IJRAT
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
ijcsity
Semelhante a Riverbed White Paper - Simulated Packet Loss
(20)
TCP for Wireless Environments
TCP for Wireless Environments
pvitwp
pvitwp
pvitwp
pvitwp
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
VOIP QOS
VOIP QOS
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
IR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdf
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
Privacy preserving and truthful detection
Privacy preserving and truthful detection
Shunra university 1 intro to network virtualization
Shunra university 1 intro to network virtualization
Cw25585588
Cw25585588
Cp Fu03a
Cp Fu03a
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
www.ijerd.com
www.ijerd.com
network devices, types of delay
network devices, types of delay
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Paper id 21201485
Paper id 21201485
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOS
Último
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Último
(20)
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Riverbed White Paper - Simulated Packet Loss
1.
Comparing Simulated Packet
Loss and Real- World Network Congestion November 2010
2.
Simulated Packet Loss
and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 1 COMPARING SIMULATED PACKET LOSS AND REAL-WORLD NETWORK CONGESTION Executive Summary WAN simulators are useful for testing the impact of latency and bandwidth constraints; however, caution should be used when using WAN simulation devices to generate packet loss. Many WAN simulators are incapable of accurately simulating the most common type of packet loss found in real-life networks—congestive packet loss, which is characterized by bursty loss patterns. Rather, the more simplistic WAN simulators assign a fixed probability of loss to each individual packet, leading to loss patterns that are more characteristically caused by bit errors in the transmission media. While Forward Error Correction (FEC) and other parity checking techniques can be effective when applied to single-drop patterns resulting from transmission bit errors and simplistic WAN simulators, these error correction techniques are much less effective when applied to bursty consecutive-loss patterns that are far more prevalent in IP networks. To avoid misleading and skewed test results, Riverbed recommends avoiding use of low-end WAN simulators that are incapable of accurately simulating the bursty packet loss patterns resulting from network congestion. Using such devices to simulate packet loss will not lead to an accurate assessment of the performance and behavior of the devices in a real-life network environment. Types of Packet Loss Packet loss results whenever the network fails to deliver a packet to its intended destination. The causes and types of packet loss--their impacts on network performance--have been extensively analyzed and modeled in a number of different studies.123 These studies generally characterize the two primary causes of packet loss in IP-based networks, which are: • Congestive loss: Results when the network is unable to support the amount of traffic that it receives. Router buffers become full, forcing it to drop packets. Rarely is just a single packet dropped—usually congestion-related packet loss is characterized by patterns consisting of sequences of consecutive dropped packets. Furthermore, loss levels (as measured in loss percentage) tend to increase when network utilization increases and decrease when network utilization decreases. • Loss due to transmission bit errors: Bit errors result from transmission channel noise, distortion, signal weakness, bit synchronization, or attenuation. Packet loss resulting from bit errors is characterized by low-density individual packet drops at random intervals. Unlike the case with congestive loss, packet loss resulting from transmission bit errors (as measured in loss percentage) usually remains constant and does not change with the level of network utilization. The above two types of packet loss result in very different network behaviors. To illustrate the difference between them, let’s suppose we have two WAN links—one is afflicted with misconfigured telecom equipment resulting in a steady bit error rate, while another is simply an over-subscribed and over-utilized WAN link for a short instant in time. While both WAN links might be afflicted with so-called 1% packet loss, nevertheless their behavioral characteristics are very different. To transmit a given file carried in 10,000 packets, both WAN links will drop 100 packets. But the WAN link with the bit error will drop a single packet at an average interval of roughly every 100 packets, while the congested WAN link may drop 5-10 consecutive packets each on roughly a dozen instances for the duration of the file transfer. Although both WAN links drop the same number of packets and exhibit the same level of reliability as far as their ability to deliver packets, nevertheless a technique designed to address the type of packet loss behavior in the first link won’t necessarily work in addressing the packet loss behavior for the other WAN link. It’s important to realize that loss due to bit errors is very rare among terrestrial WAN links commercially provided by telecommunications vendors. Fiber-optic technology now affords the ability to achieve extremely low bit error rates of 10-12 to 10-15 1 Haβlinger, G., Hohlfeld, O. The Gilbert-Elliot Model for Packet Loss. In Real Time Services on the Internet. 2007. 2 Bolot, J. End-to-End Delay and Loss Behavior in the Internet. In SIGCOMM Symposium on Communications Architectures and Protocols (San Francisco, Sept. 1993), pp. 289–298. 3 Barakat, C., Altman, E. Bandwidth Tradeoff between TCP and Link-level FEC. Computer Networks 39, 2002.
3.
Simulated Packet Loss
and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 2 for virtually error-free data transmission.4 Furthermore, most telecom transmission equipment overlay additional parity checking capabilities at the physical layer through Forward Error Correction (FEC) techniques5 (more on this later), which further reduce or eliminate packet loss resulting from these already-low bit error rates. Due to the rarity of bit-error related packet loss, almost all packet loss encountered in terrestrial IP networks will most likely be a result of network congestion. And as described earlier, congestive packet loss patterns are characterized by consecutive losses in sequence. This is vividly illustrated in a study by Raghavendra,6 who measured (a) packet loss and (b) loss lengths in a typical residential broadband network. Loss length refers to the number of consecutive packets that are dropped by the network in each packet loss incident. The cumulative distribution function (CDF) measured by Raghavendra shows that although the packet loss rate (graph a) was below 1% for about 90% of the time, the median loss length (CDF = 0.5) was about 5 consecutive lost packets for wired broadband, and about 15 consecutive lost packets for wireless broadband (graph b). More importantly, graph (b) indicates that in the observed residential broadband network, single isolated packet drops are very rare, occurring with a probability of far less than 0.1. (Raghavendra, 2009) 2009 study measured median loss lengths (i.e., consecutive packet drops) of 5 and 15 packets respectively for wired and wireless residential broadband networks. The measured probability for a single isolated lost packet is very small (less than 0.1 probability) Use caution when using WAN simulators to simulate packet loss Use of WAN simulators is an understandable approach for customers evaluating various WAN optimization solutions. They allow for convenient and accurate measurement on the impact of bandwidth constraints and WAN latency, without having to deploy a live proof-of-concept (POC) trial. Most WAN simulators also have the capability of generating packet loss. But before using a WAN simulator to test packet loss, it is important to understand what types of packet loss the WAN simulator is capable of generating. Just about every WAN simulator --including a simple Network Nightmare--is capable of generating packet loss behavior that assigns a fixed probability of loss to each individual packet in the test stream. The result is a low-density packet loss pattern is representative of loss caused by a bit error, as described in the previous section. On the other hand, only the more sophisticated WAN simulators are capable of generating “bursty” loss patterns that more accurately simulate the effects of network congestion. Such devices are available from vendors such as Shunra and Packet Storm. Only in the most extreme cases is it appropriate to test with a simplistic WAN simulator that generates packet loss by assigning fixed drop probabilities to individual packets. As discussed previously, packet loss resulting from bit errors is very 4 Goff, D., Hansen, K., Stull, M. Fiber Optic Video Transmission: The Complete Guide. Focal Press, 2003. See Chapter 14, page 205. 5 Telecom Standards Newsletter, May 2005, page 3. 6 Raghavendra, R. Belding, E. Characterizing High-bandwidth Real-time Video Traffic in Residential Broadband Networks. Department of Computer Science, University of California Santa Barbara, 2009.
4.
Simulated Packet Loss
and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 3 rare in commercial-grade WAN links. Unless this is a known problem in the WAN environment, use of such a WAN simulation device may lead to skewed test results that do not accurately reflect the performance for WAN optimization devices deployed in the real-life network environment. Rather, if it is necessary to test the effects of congestive packet loss, it’s important that bursty packet loss patterns (including consecutive packet drops) be generated as part of the test. This can be done through use of a load generator such as IP Perf or LoadSim to source additional traffic flows that congest a bandwidth-constrained simulated WAN link. Alternatively, use of more sophisticated WAN simulation devices may be considered as long as they are specifically configured to generate bursty packet loss patterns that drop multiple consecutive packets. Why Forward Error Correction (FEC) is inappropriate for congestive packet loss As with any significant technical challenge, it’s important that the chosen solution is appropriate for the problem. Earlier in this document we discussed how FEC can be effective for packet loss resulting from bit errors in the transmission media. However, some vendors have naively attempted to extend the application of FEC beyond its original intended purpose, claiming that FEC can be useful for any and all types of packet loss, including loss resulting from network congestion. But there are serious problematic issues with these dubious claims. FEC is a technique where additional traffic for parity information is injected into the traffic stream. As long as no more than one packet is lost within each protected interval, the lost packet can be regenerated through a calculation using the parity data. Forward Error Correction (FEC) is a technique that injects parity information into the original traffic stream. As long as no more than one packet is lost within the protection interval, the surviving packets can be compared to the added parity data in order to re-generate the lost packet. The scheme is analogous to a RAID-protected computer system, where multiple disks are used to provide high availability of the disk-resident data. However, if more than one packet is lost within the FEC protection interval, then the FEC mechanism fails to achieve its objective. In this case, the lost packets cannot be regenerated, and the additional parity overhead information simply adds to the network utilization, worsening the congestion problem. Such a failure is analogous to a failure of more than one disk in a RAID-5 protected computer system. Applying FEC to simplistic loss patterns generated by a WAN simulator leads to deceptively superior results compared to actual results that would be achieved with the same levels of congestive packet loss in a real-life network. It is important that the correct type of packet loss be simulated. Because almost all packet loss in real-life networks is congestion- related loss, then it is important that bursty packet loss patterns be generated when testing the effects of a product’s FEC capabilities.
5.
Simulated Packet Loss
and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 4 Congestive packet loss is characterized by bursty loss patterns where multiple consecutive packets are lost. FEC is ineffective when applied to bursty packet loss patterns. Finally, it’s important to realize that use of FEC is not without cost; using FEC involves adding overhead traffic through the parity information injected into the original traffic stream, which consumes bandwidth that otherwise would have been available to deliver additional data. The amount of parity data injected depends on the level of packet loss anticipated in the network. For example, protecting against an anticipated 5% packet loss requires an additional ~5.26% overhead in additional parity data, while protecting against an anticipated 20% packet loss requires 25% overhead. What about “adaptive” FEC? But the vendor advocating FEC may claim that the additional traffic overhead is not a problem, because their implementation of FEC “adapts” to the appropriate level of packet loss. When there is little or no packet loss in the network, their FEC ratchets down the protection level, thereby reducing the amount of traffic overhead. When packet loss increases, their implementation of FEC increases the protection level, which of course increases the amount of traffic overhead. The main problem with “adaptive” FEC is that its behavior is exactly the opposite of what is necessary to deal with congestion- related packet loss. As discussed earlier, congestive packet loss tends to increase with higher network utilization levels. But if a vendor’s “adaptive” FEC reacts to congestive packet loss by increasing the amount of overhead traffic, then the congestive packet loss problem can become worse. In severe instances, such behavior can potentially contribute to a congestion collapse scenario such as those that were common in the early days of the Internet, before the widespread adoption of Van Jacobson’s TCP congestion control mechanisms. In fact, section 5 of RFC 29147 specifically warns that an adaptive FEC mechanism that dynamically adjusts its protection level to the amount of measured packet loss is especially destructive to the integrity of the IP network. Other tools for addressing packet loss There are a number of other tools available to address congestive packet loss; unlike the FEC approach, these other tools do not generate additional traffic overhead, and they generally do not worsen the network congestion that may be causing the packet loss in the first place. In the Riverbed Steelhead product, these tools include MX-TCP, LTTS, TCP-Westwood, and TCP-Vegas, each of which engage various approaches to avoid performance drop-off due to TCP congestion avoidance and slow start processes. Of these, MX-TCP is the most aggressive in its behavior to sustain transmission throughputs despite the occurrence of packet loss. 7 Floyd, S. Congestion Control Principles. RFC 2914, September 2000.
6.
Simulated Packet Loss
and Real-World Network Congestion © 2010 Riverbed Technology. All rights reserved. 5 Summary Network congestion is by far, the most common cause of packet loss in real-life IP networks. Congestive packet loss is characterized by loss of multiple consecutive packets. But many WAN simulators are not equipped to simulate this type of packet loss; rather, when configured to inject loss, most simulators will simply assign a fixed probability of loss to each individual packet in the test stream. Because such a packet loss pattern rarely occurs in real-life, the test results will not reflect real-life performance and behavior when the packet loss is applied to WAN optimization devices. Forward Error Correction (FEC) techniques can be effectively applied to recover bit-error related packet loss. However, FEC is ineffective—and potentially harmful—when applied to packet loss that results from network congestion. Properly testing a product’s FEC capabilities requires that bursty packet loss patterns—the type of packet loss prevalent in real-life IP networks--be used in the simulation test. About Riverbed Riverbed Technology is the IT infrastructure performance company. The Riverbed family of wide area network (WAN) optimization solutions liberates businesses from common IT constraints by increasing application performance, enabling consolidation, and providing enterprise-wide network and application visibility – all while eliminating the need to increase bandwidth, storage or servers. Thousands of companies with distributed operations use Riverbed to make their IT infrastructure faster, less expensive and more responsive. Additional information about Riverbed (NASDAQ: RVBD) is available at www.riverbed.com. Riverbed Technology, Inc. 199 Fremont Street San Francisco, CA 94105 Tel: (415) 247-8800 www.riverbed.com Riverbed Technology Ltd. Farley Hall, London Rd., Level 2 Binfield Bracknell. Berks RG424EU Tel: +44 1344 354910 Riverbed Technology Pte. Ltd. 391A Orchard Road #22-06/10 Ngee Ann City Tower A Singapore 238873 Tel: +65 6508-7400 Riverbed Technology K.K. Shiba-Koen Plaza Building 9F 3-6-9, Shiba, Minato-ku Tokyo, Japan 105-0014 Tel: +81 3 5419 1990