An IP-based multimedia traffic generator

Slides:



Advertisements
Similar presentations
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Advertisements

Transmission Control Protocol (TCP) Basics
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Process-to-Process Delivery:
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Protocols and the TCP/IP Suite
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Mukesh N. Tekwani Elphinstone College Mumbai
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
University of the Western Cape Chapter 12: The Transport Layer.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Streaming Media Control n The protocol components of the streaming n RTP/RTCP n RVSP n Real-Time Streaming Protocol (RTSP)
Data Communications and Networks
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Internet multimedia: simplest approach audio, video not streamed: r no, “pipelining,” long delays until playout! r audio or video stored in file r files.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Internet Architecture. 2 INTRODUCTION INTERNET developed by a community of researchers centered around the Defense Advanced Research Projects Agency (DARPA)
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Introduction to Networks
Chapter 5 Network and Transport Layers
The Transport Layer Implementation Services Functions Protocols
Chapter 3 TCP and IP Chapter 3 TCP and IP.
Chapter 5 Network and Transport Layers
Transport Layer.
Introduction and Overview of Network and Telecommunications (contd.)
Chapter 14 User Datagram Program (UDP)
Understand the OSI Model Part 2
Chapter 6 The Transport Layer.
Networking for Home and Small Businesses – Chapter 6
Introduction to Networks
Networking for Home and Small Businesses – Chapter 6
Chapter 2 Introduction Application Requirements VS. Transport Services
Chapter 25 Multimedia TCP/IP Protocol Suite
Transport Layer Unit 5.
Communication Networks NETW 501 Tutorial 3
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
I. Basic Network Concepts
Multimedia and Networks
Process-to-Process Delivery:
Networking Theory (part 2)
Net 323 D: Networks Protocols
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Networking for Home and Small Businesses – Chapter 6
The Transport Layer Chapter 6.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
The TCP/IP Model.
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Networking Theory (part 2)
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Networking Theory (part 2)
Presentation transcript:

An IP-based multimedia traffic generator Faculdade de Tecnologia - UNICAMP An IP-based multimedia traffic generator Fernando L. Pinotti * Tito R. B. Oliveira Edson L. Ursini Varese S. Timóteo * Supported by CAPES

Outline - Introduction - Traffic Model - Distribution Function - Architecture - Simulation and Emulation - Final Remarks

Introduction - In this work we present an real time IP based multimedia traffic generator that creates packets with given patterns based on well known traffic distributions. - A multimedia service is obtained by creating two or more instances providing different traffic profiles. - In our approach, the multimedia traffic is emulated instead of simulated. - Results are compared with the ARENA simulator software for validation. In this work we present an real time IP based multimedia traffic generator that creates packets with given patterns based on well known traffic distributions. - A multimedia service is obtained by creating two or more instances providing different traffic profiles. By using stream and elastic traffic patterns. - The Multimedia Traffic Generator results are compared with the ARENA simulation software to ensure the efficiency . - It is important to note that, in our approach, the multimedia traffic is emulated instead of simulated, since we generate, and send over the network, real IP packets. We use the IP headers, type of service (IPv4), traffic class and flow (IPv6) to distinguish the information type inside the packet. Which allows a multimedia gateway to separate the traffic.

Traffic Model - Elastic Traffic: Accounts for non-interactive applications, like file transfer, e-mail, internet browsing, where the critical point is the integrity of the information, and delays don’t compromise the services and applications. For this propose we use the TCP protocol. Data FTP SMTP, Etc. - Stream Traffic: Accounts for interactive applications that require real-time delivery. The stream denomination is due to the characteristic of data packet flow that are nearly constant during a given traffic period. For this propose we use the UPD protocol. Video Voice Audio, Etc. - Elastic Traffic: accounts for non-interactive applications, like file transfer, e-mail, internet browsing, where the critical point is the integrity of the information, and delays don’t compromise the services and applications. In this case, the transmission control protocol (TCP) is used to ensure the delivery of the data and to perform the retransmission of segments in case of packet loss. Some extra delay is added in exchange of the guarantee that the packets will be delivered. - Stream Traffic: accounts for interactive applications that require real-time delivery. The stream denomination is due to the characteristic of data packet flow that are nearly constant during a given traffic period. It is also known as inelastic traffic, due to the fact that it doesn’t support the delay variations as the elastic traffic does. To reduce the package transmission interval time, the User Datagram Protocol (UDP) is used, since there is no connection established between sender and receiver. Therefore, this protocol doesn’t guarantee the delivery of the packets, but this kind of service is more sensitive to packet loss than delay. The real time transfer protocol (RTP) can then be used to enhance the packet transmission.

Distribution Functions - Exponential –Most used to analyze the interval between events. - Log-Normal – Most used for a time estimative of fault repair.

Architecture Service Selection: New services are initiated. Traffic Profiling: Provides information about the type of traffic that will be generated for each service. Packet Generation: The final state of the state machine, where the packets are built and sent.

Architecture Packet Building The TCP packet size depends on the amount of available bandwidth. For UDP, the segment is filled with information and its size depends on the codec rate. In order to obtain some preliminary multimedia traffic, we considered the IP packet to be created through a socket. Once the system is calibrated for the basic services, the socket interface will be replaced by a full TCP/IP stack integrated in our system. Then we will be able to use the fields of the IP header, in particular, the Type of Service (Ipv4), Traffic Class (IPv6) and Flow Label (IPv6) to separate traffic by service (class) and by logic channel (flow).

Simulation and Emulation - For the propose of testing the traffic profiling module of the traffic generator, the transmission was made using Loop-back in Scenario 1 and Ethernet in Scenario 2. - The inter-arrival service process and its duration were estimated using the exponential distribution function, but other types of distributions could be used. - In order to validate our emulations, we used the ARENA simulator for comparing the results. - For the propose of testing the traffic profiling module of the traffic generator, the transmission was made using Loop-back in Scenario 1 and Ethernet in Scenario 2. - The inter-service arrival process and its duration and size were estimated using the exponential distribution function, but other types of distributions could be used. according to the network behavior that one wants to emulate. We can use simulations to perform a preliminary study of the network behavior, and translate it into a distribution function that better represent the packet flow and services of the network we want to emulate. The distributions are then selected in the emulator that will generate the packets accordingly. - In order to validate our emulations, we used the ARENA simulator for comparing the results. Arena was developed for discrete event simulations and consists of modular blocks where we are able to specify distribution parameters and simulate the same service environment that we set in the traffic generator.

Simulation and Emulation Scenario 1 -Bandwidth fixed at 384 kbps. - Loop-Back. - 10 hours of emulation. - Exponential distribution. Comparison between ARENA simulator and Traffic Generator results. Number of generated services.

Simulation and Emulation Scenario 2 - Bandwidth fixed at 4000 kbps. - Ethernet - 10 hours - Exponential distribution Comparison between ARENA simulator and Traffic Generator results. Number of generated services.

Simulation - Scenario 3 -Bandwidth fixed at 384kbps. At scenario 3, the Arena simulations were performed for video services, in order to observe their behavior as the traffic variables change.

Simulation – Scenario 3 When the mean inter-arrival time increases, the number of both completed and the rejected services decreases as expected. The mean service duration is set to 900 seconds. The figure shows the number of total, completed and rejected services as a function of the mean service inter-arrival time for a fixed mean service duration and maximum number of simultaneous services. When the mean inter-arrival time increases, the number of both completed and the rejected services decreases as expected

Final Remarks Thanks you! - The next version of the multimedia traffic generator will contain an integrated TCP/IP stack. In order to: Remove the time spent by the socket interface. To allow the manipulation of the IP header. Thanks you!