The effect of layer-2 store-and-forward devices on per-hop capacity estimation - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societ

نویسندگان

  • Ravi S. Prasad
  • Constantinos Dovrolis
  • Bruce A. Mah
چکیده

Tools such as pathchar, clink, and pchar attempt to measure the capacity of every Layer-3 (L3) hop in a network path. These tools use the same underlying measurement methodology, which we refer to as Variable Packet Size (VPS) probing. The key assumption in VPS is that each L3 hop along a path increases the delay of a packet by a “serialization latency”, which is the ratio of the packet size over that hop’s capacity. Unfortunately, the capacity estimates of VPS tools are sometimes wrong. In this paper, we investigate the source of these errors, and show that the presence of Layer-2 (L2) store-and-forward devices, such as Ethernet switches, have a detrimental effect on the accuracy of VPS tools. Specifically, each L2 store-andforward device introduces an additional serialization latency in a packet’s delay, which results in consistent underestimation of that L3 hop’s capacity. We analyze this negative effect, deriving the measured capacity of an L3 hop as a function of the L2 link capacities at that hop. Experimental results in local, campus, and ISP networks verify the model, illustrating that L2 devices should be expected in networks of diverse type and size. Finally, we characterize some other sources of error in VPS tools, such as queueing delays, limited clock resolution, variation in ICMP generation delays, and error propagation along the measured path.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The effect of layer-2 store-and-forward devices on per-hop capacity estimation

Tools such as pathchar, clink, and pchar attempt to measure the capacity of every Layer-3 (L3) hop in a network path. These tools use the same underlying measurement methodology, which we refer to as Variable Packet Size (VPS) probing. The key assumption in VPS is that each L3 hop along a path increases the delay of a packet by a “serialization latency”, which is the ratio of the packet size ov...

متن کامل

Pricing strategies under heterogeneous service requirements - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societ

This paper analyzes a communication network with heterogeneous customers. We investigate priority queueing as a way to differentiate between these users. Customers join the network as long as their utility (which is a function of the queueing delay) is larger than the price of the service. We focus on the specific situation in which two types of users play a role: one type is delay-sensitive (‘...

متن کامل

An information theoretic view of network management - INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societ

We present an information theoretic framework for network management for recovery from non-ergodic link failures. Building on recent work in the field of network coding, we describe the input-output relations of network nodes in terms of network codes. This very general concept of network behavior as a code provides a fundamental way to quantify essential management information as that needed t...

متن کامل

Multi-objective Measurement Devices Allocation Using State Estimation in Distribution System

Allocation of measurement devices is a necessity of distribution system which is an application of state estimation. In this paper, the problem of active and reactive measurement devices is modeling using a multi-objective method. The objectives of the problem are to minimize the use of measurement devices, increase in state estimation output, improve the state estimation quality and reduce cos...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001