Professional Documents
Culture Documents
Bandwidth Metrics
NMWG divide bandwidth into four submetrics: Bandwidth Capacity Achievable Bandwidth Available Bandwidth Bandwidth Utilization
FOR MORE INFO...
http://www-didc.lbl.gov/NMWG http://www-didc.lbl.gov/NMWG/docs/measurements.pdf
Throughput
Throughput is the same as achievable bandwidth.
Each of these metrics can be used to describe the entire path (end-to-end) as well as paths link (hop-by-hop)characteristics.
If a path consists of several links, the link with the minimum transmission rate determines the capacity of the path.
While the link with the minimum unused capacity limits the achievable bandwidth. i.e. at high-speed networks, hardware configuration or software load on the end hosts actually limit the bandwidth delivered to the application.
data per time unit that a link or path can provide, given the current utilization. Utilization is the aggregate capacity currently being consumed on a link or path.
Reference: [2]
Available Bandwidth is the amount of usable bandwidth without affecting cross-traffic, whereas, the BTC is measured by sending as much packets as possible, limiting other traffic. BTC is simulating steady state persistent flow, taking considerable time and overhead.
FOR MORE INFO...
RFC 3148 : A Frame Work for Defining Empirical Bulk Transfer Capacity Metrics
The BTC definition assumes an ideal TCP implementation, actually, this doesnt exist, and what BTC measured is the variant of achievable bandwidth.
RFC 3148 : A Frame Work for Defining Empirical Bulk Transfer Capacity Metrics
Active measurement means that the tool actively sends probing packets into the network. Passive measurement tools monitors the passing traffic without interfering. Passive measurement is appreciated, however, less reliable than active, as it cant extract any data pass through it.
Sender-based technique
Advantage: Flexible deployment. Clock neednt synchronized at two ends.
Disadvantage: ICMP and UDP echo packets usually be rate-limited or filtered out by some routers. Round-trip is much more possibility influenced by cross-traffic than that of one-way delay Response packets may come back through a different path
Receiver-based technique
Advantage: More accurate than sender-based technique. Disadvantage: Difficult to deployment. The clock have to be synchronized at two ends.
Sender sends two same-size packets back-to-back from source to sink. The packets will reach the sink dispersed by the transmission delay of the bottleneck links if there is no cross traffic. Measuring the dispersion can infer the bottleneck link bandwidth capacity.
Note: Bottleneck link can refer to the link with smallest transmission rate, its also can refer to the link with minimum available bandwidth. We refer the bottleneck link to the first case.
If sender sends the packets as one observation sample more than two, called packet train. Tools usually apply robust statistical filtering techniques to find valid samples.
Packet train is more likely to be interfered by cross traffic than packet pair. Packet train can be used to measure the bottleneck link that is multichannel while packet pair cant deal with. Packet train can reduce the limitation of clock resolution. Sophisticated tools apply both methods in their implementation. i.e. Pathrate
Active Active
UDP UDP
Path Per-link
Packet train
Sprobe Active
Packet pair
TCP
Bandwidth capacity
Path
Sender sends series of packets to the sink at the rate of larger than the bottleneck link available bandwidth. Every packets get a timestamp at sender side. Compare the difference of successive packets timestamp and their arrival times to infer the available bandwidth. Rate-adjustment adaptive algorithm to converge to the available bandwidth.
Pathload http://www.cc.gatech.edu/fac/Constantinos.Dovrolis
Step1. Sender set TTL=1, send out the packet, and wait for the ICMP TTL-exceeded packet back. Step2. Upon receiving ICMP, estimate the RTT. Estimate the RTT multiple times for various size packets.The minimum RTT of various packets are believed to be the valid sample. Step3. The first link capacity is C=1/b , b is slope of RTT graph. Set the TTL=2,3n, repeat the process of step1 to 3, to Calculate the C=1/ bi bi-1
Even-odd VPS
The VPS probing technique is not altered, Mathematical trick to improve reliability. For each of the probing sizes, divide the set of samples into even and odd numbers. Calculation is based on even-odd samples. i.e. the even sample of link i, the odd sample of link i+1.
Tailgating Technique
Tailgating technique divides into two phrase: Phase one: Like VPS probing, but for entire path instead of per link. Phase two: (tailgating phase) The largest possible non-fragmented packet followed by a tailgater which is the smallest possible packet size (i.e 40 bytes). This causes the smaller packet always queue behind the larger packet.
Reference: Kevin Lai, Mary Baker Measuring Link Bandwidths Using a Deterministic Model of Packet Delay ACM SIGCOMM 2000
The large packet should not be queued due to cross traffic. The large packet should have a TTL field set to L (1n). The tailgater packet should be queued directly after the large packet on link L. The tailgater packet should not queued after having passing link L.
VPS Technology
Tool Name
bing clink Pchar
Active/ Passive
Active Active Active
Path/Per -link
Path Path Per-link
Bandwidth capacity, loss, delay Bandwidth capacity, Loss Bandwidth capacity, Loss, delay
VPS
Path/Per -link
Per-link
Per-link
TCP simulation operates at two mode : UDP/ICMP with low TTL or ICMP echo/reply. It simulates the TCP of using slow-start algorithm. Path flooding method injects TCP/UDP packets into the net as fast as possible within the specific time. To some degree, both TCP simulation and path flooding are associated with Bulk Transfer Capacity (BTC)metrics.
UDP, ICMP
BTC
Path TCP, flooding UDP Path TCP, flooding UDP Path TCP, flooding UDP
iperf
Netperf Active