SlideShare a Scribd company logo
1 of 36
Download to read offline
Empirically Characterizing the
Buffer Behaviour of Real
Devices
Luis Sequeira
Julián Fernández-Navajas
Jose Saldana
Luis Casadesus
Communication Technologies Group (GTC)
Aragón Institute of Engineering Research (I3A)
University of Zaragoza, Spain
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Introduction and Related Works
• Packet size varies for different Internet
services and applications:
• VoIP, web, FTP, video streaming, online games, etc.

• Traffic behaviour has to be taken into account
for the design of network devices:
• Constant bit rate traffic
• Bursty traffic
• Different number of frames into each burst
Introduction and Related Works
• In access network capabilities are lower than
the ones available in the backbone; this
implies that some network points become
critical bottlenecks
• Bottlenecks may also appear at critical points
of high-performance networks.
Introduction and Related Works
• Mid and low-end routers normally do not implement
advanced traffic management techniques.
• They always use buffers as a traffic regulation
mechanism.
• Buffer size becomes an important design parameter
• Buffer can be measured in different ways:
• Maximum number of packets it can store
• Amount of bytes
• Queuing time limit (ms)
Introduction and Related Works
• Most Internet routers use FIFO, but there exist
other techniques to manage drop-tail buffers,
e.g. Random Early Detection (RED).
• These techniques, in conjunction with buffer
size, mainly define the buffer behaviour and
how traffic is affected by it.
Introduction and Related Works
• Relationship between router buffer size and
link utilization:
Excessive amount of memory

latency increase

Small amount of memory

packet loss increase

• Characterization of buffer behaviour is
interesting when trying to improve link
utilization.
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Test Procedure

It may be a device
or a network
Test Procedure
UDP Packets of different size are used
to determine if buffer size is in bytes or
in packets

to produce a buffer overflow in
the SUT

All packets have a
unique ID
Test Procedure

Traffic is captured here
Test Procedure
Input rate
Buffer of the
“System Under Test”

Input rate > output rate

Output rate
Test Procedure
Input rate
Buffer of the
“System Under Test”

Input rate > output rate

Buffer fills

Output rate
Test Procedure
Filling the buffer

Input rate
i

2
1

Output rate
Test Procedure
Time to fill the buffer

First loss

Input rate
i

2
1

Packet i leaves the
buffer

Error
Time to fill and to
emtpy the buffer

Output rate
Methodology
• Physical Access:
Counting the
number of
packets in the
queue in the
moment that a
packet arrives to
the buffer.

Traffic may be captured here

packet delay
packet loss
interarrival packet time
input and output buffer rate
filling buffer rate

captures

script

BUFFER SIZE
Methodology
• Remote Access:
If the delay of a
packet in the
buffer can be
determined, then
the variations of
this delay can
give us useful
information for
estimating buffer
size.

Traffic may be captured here

packet delay
packet loss
interarrival packet time
input and output buffer rate
filling buffer rate

captures

script

BUFFER SIZE
Methodology
Input rate

Method 1: Physical Access

Time when the packet
i arrived to the buffer

i

2

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

1

Output rate
Methodology
Input rate

Method 1: Physical Access

Buffer gets empty

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Input rate

Method 1: Physical Access

Time when the
packet i leaves
the buffer

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Input rate

Method 1: Physical Access

Queue

Count packets

Queue

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Method 2: Remote Access

It will completly
fill the buffer

Input rate
i

2
1

Dropped
packets

Output rate
Methodology
Method 2: Remote Access

Input rate

It will completly
fill the buffer

i

2

𝑅 𝑓𝑖𝑙𝑙

1

Output rate
Time to fill the buffer
Methodology
Method 2: Remote Access

Input rate

Time to fill and
empty the buffer
𝑅 𝑜𝑢𝑡

𝑅 𝑓𝑖𝑙𝑙

i

Output rate
It appears in the
receiver
Methodology
Estimation of the size:
Time to fill
the buffer

Time to fill and to
empty the buffer
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Wired Scenario
• In this case we want to test
the accuracy of our method
when there is no possibility
of physical access to the
SUT.
• We obtained the buffer size
using method 1 with
physical access. Next, the
estimations obtained using
method 2 are compared
with previous results, and
the relative error is
obtained.
Wired Scenario
A Particular buffer behaviour:

Linksys WAP54G

Groups of dropped packets

3COM 4500
Wired Scenario
A Particular buffer behaviour:

• It has been observed in the wired
and wireless tested:
• when the buffer is completely full, no
more packets are accepted, it will be
called upper limit.
• The buffer does not accept new
packets until a certain amount of
memory is available, it will be called
lower limit.
• In this moment the filling process
begins again.

• Although this behaviour has some
similarities with Random Early
Detection (RED) but it is not the
same:
• There is not probability for dropping
an incoming packet.
Wired Scenario
• Three different amounts of
bandwidth have been used in
order to flood the buffer.
• We see that the accuracy of the
buffer size estimation using the
method 2 is high. In addition, the
error diminishes as input rate
grows.

• The results are less accurate but
they are still acceptable.
• The results using smaller packets
are less accurate so we have not
presented them.
(packet size = 1500 bytes)
Wireless Scenario
• Variations of the output
rate in wireless network
generate error growth.
• While filling rate is relatively
constant, the emptying rate
shows variations for the
highest bandwidths.

The WiFi access point
switches from higher to
lower speeds depending on
the status of the radio
channel
Wireless Scenario
• We have compared the two
methods when there is
physical access to the SUT.
• The presented results are
the ones obtained using
packets of 1500 bytes, since
they are the most accurate.
• Method 1 is the most
accurate estimation so it
has been used to compare
with method 2.
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Conclusions
• Two methods have been presented in order to analyze the
technical and functional characteristics of commercial buffers of
different devices, or even networks.
• This characterization is important, taking into account that the
buffer may modify traffic characteristics, and may also drop
packets.
• The methodology can be used if there is physical access to the
“System Under Test”, but it is also useful, with certain limitations,
for measuring a remote system.
• Tests using commercial devices have been deployed in two
different scenarios, using wired and wireless networks.
Conclusions
• A particular buffer behaviour has been observed for a device: once
the buffer is full, it does not accept new packets until a certain
space is again available.
• The results show that accurate results of the buffer size can be
obtained when there is physical access to the “System Under Test”.
• In case of having no direct access to the system, an acceptable
estimation can also be obtained if the input rate is more than three
times the output rate. In this case, big packets have to be used for
the tests.
• As future work the method has to be improved in order to
minimize the error, especially when measuring wireless devices.

More Related Content

What's hot

PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPratik Narang
 
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimePerformance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimeAkmal
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Yoram Orzach
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Syuan Wang
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Dhananja Kariyawasam
 
Michael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAzeem Iqbal
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp windowpriya Nithya
 
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamOWASP Delhi
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Syuan Wang
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Suemi Iarussi
 
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksFrenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksOpen Networking Summits
 

What's hot (20)

PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
 
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimePerformance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Rtp
RtpRtp
Rtp
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
 
Rtp
RtpRtp
Rtp
 
Michael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent Work
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
Rtp
RtpRtp
Rtp
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 
RTP & RTCP
RTP & RTCPRTP & RTCP
RTP & RTCP
 
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
 
Wireshark
WiresharkWireshark
Wireshark
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
 
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksFrenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow Networks
 

Viewers also liked

Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network DeploymentsJose Saldana
 
Το μουσείο του μέλλοντος
Το μουσείο του μέλλοντοςΤο μουσείο του μέλλοντος
Το μουσείο του μέλλοντοςΗΡΩ ΧΑΤΖΑΣΚΟΥ
 
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...Jose Saldana
 
Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)Asclepios9
 
Menu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - EnglishMenu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - EnglishGrupoForte
 
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129ibugesic1234
 
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...Jose Saldana
 

Viewers also liked (7)

Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network Deployments
 
Το μουσείο του μέλλοντος
Το μουσείο του μέλλοντοςΤο μουσείο του μέλλοντος
Το μουσείο του μέλλοντος
 
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
 
Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)Menu restaurant higia lunch (4)
Menu restaurant higia lunch (4)
 
Menu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - EnglishMenu à la Carte - Restaurante Mozart - English
Menu à la Carte - Restaurante Mozart - English
 
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
 
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
 

Similar to Empirically Characterizing the Buffer Behaviour of Real Devices

CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfMayankRaj687571
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfShivakrishnan18
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- finalTaymoor Nazmy
 
Performance Enhancement with Pipelining
Performance Enhancement with PipeliningPerformance Enhancement with Pipelining
Performance Enhancement with PipeliningAneesh Raveendran
 
Internet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsInternet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsSumanth Bhat
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1Aman Jaiswal
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet workingTharuniDiddekunta
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxssuserec53e73
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdfDr. Shivashankar
 

Similar to Empirically Characterizing the Buffer Behaviour of Real Devices (20)

Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
WEEK-01.pdf
WEEK-01.pdfWEEK-01.pdf
WEEK-01.pdf
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Performance Enhancement with Pipelining
Performance Enhancement with PipeliningPerformance Enhancement with Pipelining
Performance Enhancement with Pipelining
 
Internet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsInternet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problems
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptx
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
 

More from Jose Saldana

Pint of science Patinete as a Service
Pint of science Patinete as a ServicePint of science Patinete as a Service
Pint of science Patinete as a ServiceJose Saldana
 
Mejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingenieroMejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingenieroJose Saldana
 
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3ºPOUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3ºJose Saldana
 
Cómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móvilesCómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móvilesJose Saldana
 
La bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos onlineLa bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos onlineJose Saldana
 
Entretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristianaEntretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristianaJose Saldana
 
¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?Jose Saldana
 
Wi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APsWi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APsJose Saldana
 
Header compression and multiplexing in LISP
Header compression and multiplexing in LISPHeader compression and multiplexing in LISP
Header compression and multiplexing in LISPJose Saldana
 
Simplemux traffic optimization
Simplemux traffic optimizationSimplemux traffic optimization
Simplemux traffic optimizationJose Saldana
 
Online games: a real-time problem for the network
Online games: a real-time problem for the networkOnline games: a real-time problem for the network
Online games: a real-time problem for the networkJose Saldana
 
Improving Network Efficiency with Simplemux
Improving Network Efficiency with SimplemuxImproving Network Efficiency with Simplemux
Improving Network Efficiency with SimplemuxJose Saldana
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative NetworksJose Saldana
 
Bar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, PragueBar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, PragueJose Saldana
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolJose Saldana
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined NetworksJose Saldana
 
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Jose Saldana
 
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic FlowsThe Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic FlowsJose Saldana
 
Online games traffic characterization and network support
Online games traffic characterization and network supportOnline games traffic characterization and network support
Online games traffic characterization and network supportJose Saldana
 

More from Jose Saldana (20)

Pint of science Patinete as a Service
Pint of science Patinete as a ServicePint of science Patinete as a Service
Pint of science Patinete as a Service
 
Mejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingenieroMejorar tu empleabilidad como ingeniero
Mejorar tu empleabilidad como ingeniero
 
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3ºPOUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
 
Cómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móvilesCómo se conectan los ordenadores y los móviles
Cómo se conectan los ordenadores y los móviles
 
La bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos onlineLa bala que dobló la esquina: el problema de los videojuegos online
La bala que dobló la esquina: el problema de los videojuegos online
 
Entretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristianaEntretenimiento online. Una perspectiva cristiana
Entretenimiento online. Una perspectiva cristiana
 
¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?¿Por qué el WiFi se va y se viene?
¿Por qué el WiFi se va y se viene?
 
Wi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APsWi-5: Advanced Features for Low-cost Wi-Fi APs
Wi-5: Advanced Features for Low-cost Wi-Fi APs
 
Header compression and multiplexing in LISP
Header compression and multiplexing in LISPHeader compression and multiplexing in LISP
Header compression and multiplexing in LISP
 
Simplemux traffic optimization
Simplemux traffic optimizationSimplemux traffic optimization
Simplemux traffic optimization
 
Online games: a real-time problem for the network
Online games: a real-time problem for the networkOnline games: a real-time problem for the network
Online games: a real-time problem for the network
 
Improving Network Efficiency with Simplemux
Improving Network Efficiency with SimplemuxImproving Network Efficiency with Simplemux
Improving Network Efficiency with Simplemux
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative Networks
 
Bar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, PragueBar-BoF session about Simplemux at IETF93, Prague
Bar-BoF session about Simplemux at IETF93, Prague
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocol
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
 
TCM-TF 2014
TCM-TF 2014TCM-TF 2014
TCM-TF 2014
 
Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?Can We Multiplex ACKs without Harming the Performance of TCP?
Can We Multiplex ACKs without Harming the Performance of TCP?
 
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic FlowsThe Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
 
Online games traffic characterization and network support
Online games traffic characterization and network supportOnline games traffic characterization and network support
Online games traffic characterization and network support
 

Recently uploaded

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Empirically Characterizing the Buffer Behaviour of Real Devices

  • 1. Empirically Characterizing the Buffer Behaviour of Real Devices Luis Sequeira Julián Fernández-Navajas Jose Saldana Luis Casadesus Communication Technologies Group (GTC) Aragón Institute of Engineering Research (I3A) University of Zaragoza, Spain
  • 2. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 3. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 4. Introduction and Related Works • Packet size varies for different Internet services and applications: • VoIP, web, FTP, video streaming, online games, etc. • Traffic behaviour has to be taken into account for the design of network devices: • Constant bit rate traffic • Bursty traffic • Different number of frames into each burst
  • 5. Introduction and Related Works • In access network capabilities are lower than the ones available in the backbone; this implies that some network points become critical bottlenecks • Bottlenecks may also appear at critical points of high-performance networks.
  • 6. Introduction and Related Works • Mid and low-end routers normally do not implement advanced traffic management techniques. • They always use buffers as a traffic regulation mechanism. • Buffer size becomes an important design parameter • Buffer can be measured in different ways: • Maximum number of packets it can store • Amount of bytes • Queuing time limit (ms)
  • 7. Introduction and Related Works • Most Internet routers use FIFO, but there exist other techniques to manage drop-tail buffers, e.g. Random Early Detection (RED). • These techniques, in conjunction with buffer size, mainly define the buffer behaviour and how traffic is affected by it.
  • 8. Introduction and Related Works • Relationship between router buffer size and link utilization: Excessive amount of memory latency increase Small amount of memory packet loss increase • Characterization of buffer behaviour is interesting when trying to improve link utilization.
  • 9. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 10. Test Procedure It may be a device or a network
  • 11. Test Procedure UDP Packets of different size are used to determine if buffer size is in bytes or in packets to produce a buffer overflow in the SUT All packets have a unique ID
  • 12. Test Procedure Traffic is captured here
  • 13. Test Procedure Input rate Buffer of the “System Under Test” Input rate > output rate Output rate
  • 14. Test Procedure Input rate Buffer of the “System Under Test” Input rate > output rate Buffer fills Output rate
  • 15. Test Procedure Filling the buffer Input rate i 2 1 Output rate
  • 16. Test Procedure Time to fill the buffer First loss Input rate i 2 1 Packet i leaves the buffer Error Time to fill and to emtpy the buffer Output rate
  • 17. Methodology • Physical Access: Counting the number of packets in the queue in the moment that a packet arrives to the buffer. Traffic may be captured here packet delay packet loss interarrival packet time input and output buffer rate filling buffer rate captures script BUFFER SIZE
  • 18. Methodology • Remote Access: If the delay of a packet in the buffer can be determined, then the variations of this delay can give us useful information for estimating buffer size. Traffic may be captured here packet delay packet loss interarrival packet time input and output buffer rate filling buffer rate captures script BUFFER SIZE
  • 19. Methodology Input rate Method 1: Physical Access Time when the packet i arrived to the buffer i 2 • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. 1 Output rate
  • 20. Methodology Input rate Method 1: Physical Access Buffer gets empty • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 21. Methodology Input rate Method 1: Physical Access Time when the packet i leaves the buffer • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 22. Methodology Input rate Method 1: Physical Access Queue Count packets Queue • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 23. Methodology Method 2: Remote Access It will completly fill the buffer Input rate i 2 1 Dropped packets Output rate
  • 24. Methodology Method 2: Remote Access Input rate It will completly fill the buffer i 2 𝑅 𝑓𝑖𝑙𝑙 1 Output rate Time to fill the buffer
  • 25. Methodology Method 2: Remote Access Input rate Time to fill and empty the buffer 𝑅 𝑜𝑢𝑡 𝑅 𝑓𝑖𝑙𝑙 i Output rate It appears in the receiver
  • 26. Methodology Estimation of the size: Time to fill the buffer Time to fill and to empty the buffer
  • 27. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 28. Wired Scenario • In this case we want to test the accuracy of our method when there is no possibility of physical access to the SUT. • We obtained the buffer size using method 1 with physical access. Next, the estimations obtained using method 2 are compared with previous results, and the relative error is obtained.
  • 29. Wired Scenario A Particular buffer behaviour: Linksys WAP54G Groups of dropped packets 3COM 4500
  • 30. Wired Scenario A Particular buffer behaviour: • It has been observed in the wired and wireless tested: • when the buffer is completely full, no more packets are accepted, it will be called upper limit. • The buffer does not accept new packets until a certain amount of memory is available, it will be called lower limit. • In this moment the filling process begins again. • Although this behaviour has some similarities with Random Early Detection (RED) but it is not the same: • There is not probability for dropping an incoming packet.
  • 31. Wired Scenario • Three different amounts of bandwidth have been used in order to flood the buffer. • We see that the accuracy of the buffer size estimation using the method 2 is high. In addition, the error diminishes as input rate grows. • The results are less accurate but they are still acceptable. • The results using smaller packets are less accurate so we have not presented them. (packet size = 1500 bytes)
  • 32. Wireless Scenario • Variations of the output rate in wireless network generate error growth. • While filling rate is relatively constant, the emptying rate shows variations for the highest bandwidths. The WiFi access point switches from higher to lower speeds depending on the status of the radio channel
  • 33. Wireless Scenario • We have compared the two methods when there is physical access to the SUT. • The presented results are the ones obtained using packets of 1500 bytes, since they are the most accurate. • Method 1 is the most accurate estimation so it has been used to compare with method 2.
  • 34. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 35. Conclusions • Two methods have been presented in order to analyze the technical and functional characteristics of commercial buffers of different devices, or even networks. • This characterization is important, taking into account that the buffer may modify traffic characteristics, and may also drop packets. • The methodology can be used if there is physical access to the “System Under Test”, but it is also useful, with certain limitations, for measuring a remote system. • Tests using commercial devices have been deployed in two different scenarios, using wired and wireless networks.
  • 36. Conclusions • A particular buffer behaviour has been observed for a device: once the buffer is full, it does not accept new packets until a certain space is again available. • The results show that accurate results of the buffer size can be obtained when there is physical access to the “System Under Test”. • In case of having no direct access to the system, an acceptable estimation can also be obtained if the input rate is more than three times the output rate. In this case, big packets have to be used for the tests. • As future work the method has to be improved in order to minimize the error, especially when measuring wireless devices.