SelfConfiguring Network Traffic Generation - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

SelfConfiguring Network Traffic Generation

Description:

... results ... of the richness and diversity of packet streams observed in the live Internet ... The result is byte/packet/flow traffic at the first hop ... – PowerPoint PPT presentation

Number of Views:52
Avg rating:3.0/5.0
Slides: 22
Provided by: csU66
Category:

less

Transcript and Presenter's Notes

Title: SelfConfiguring Network Traffic Generation


1
Self-Configuring Network Traffic Generation
J. Sommers and P. Barford University of
Wisconsin-Madison
Proceedings of the 4th ACM SIGCOMM conference on
Internet measurement 2004
Presented by Luis Ortiz
Department of Computer Science The University of
Texas at San Antonio
2
Outline
  • Introduction
  • Related Work
  • Architecture
  • Implementation
  • Results
  • Conclusions

3
Introduction
  • A persistent need to evaluate new algorithms,
    systems and protocols using tools that
  • create a range of test conditions similar to
    those experienced in live deployment
  • ensure reproducible results
  • Tools for generating scalable, tunable, and
    representative network traffic is therefore of
    fundamental importance
  • Current best practices for traffic generation
    have focused on either
  • simple packet streams
  • recreation of a single application-specific
    behaviour

4
Introduction (cont.)
  • Packet streaming methods
  • consist of sequences of packets separated by a
    constant interval
  • form the basis for standard router performance
    tests
  • lack nearly all of the richness and diversity of
    packet streams observed in the live Internet
  • examples iperf, infinite FTP

5
Contribution
  • Description and evaluation of a network traffic
    generator capable of recreating IP traffic flows
    representative of those observed at routers in
    the Internet
  • IP flow
  • a unidirectional series of IP packets of a given
    protocol travelling between a source and a
    destination IP/port pair within a certain period
    of time

6
Contribution (cont.)
  • This model has been realized in a tool called
    Harpoon which consists of two components
  • client threads
  • that make file transfer requests
  • server threads
  • that transfer the requested files using either
    TCP or UDP
  • The result is byte/packet/flow traffic at the
    first hop router (from the perspective of the
    server)

7
Related Work
  • Most successful models of traffic
  • focus on the correlation structure
    (self-similarity) that appears over large time
    scales
  • Flow-level network traffic models used to study
  • fairness
  • response times
  • queue lengths
  • loss probabilities
  • This work differs
  • focus on building a flow-level model based on
    combining empirical distribution of
    characteristics that can be measured at a router
    in live network

8
Architecture
  • The design objectives of Harpoon are
  • generate application-independent network traffic
    at the IP flow level
  • to be easily parameterized to create traffic that
    is statistically identical to traffic measured at
    a given point in the Internet

Flow record data contains IP/port pairs, packet
and byte counts, flow start and end times,
protocol information, and a bitwise OR of TCP
flags for all packets of a flow
9
Architecture (cont.)
  • The Harpoon flow model
  • two level architecture

Harpoon sessions are divided into either TCP or
UDP types
10
Architecture (cont.)
  • TCP sessions
  • the Harpoon model is made up of a combination of
    5 distributional models
  • (1) file size, (2) inter-connection time, (3)
    source and (4) destination IP ranges, and (5)
    number of active sessions
  • UDP sessions
  • made up of a combination of 3 distributional
    models
  • (1) constant bit-rate, (2) periodic ping-pong,
    and (3) exponential ping-pong
  • These models enable the workload generated by
    Harpoon to be
  • application independent
  • tuned to a specific application

11
Implementation
  • Key feature Self-Configuring
  • packet traces are used for parameterization
    without any intermediate modelling step
  • takes flow records as input and generates the
    necessary parameters for traffic generation
  • the key parameters are distributional estimates
    of
  • file sizes
  • inter-connection times
  • source and destination IP addresses
  • number of active sessions
  • divide the input flow records into a series of
    intervals of equal duration to generate the
    number of active sessions in order to match
    average byte, packet, and flow volumes of the
    original data over each interval

12
Implementation (cont.)
  • File Sizes
  • a first approximation
  • ByteCount PacketCount 40
  • practical complications
  • some routers do not record TCP flags in flow
    records
  • large storage and high processing requirements of
    maintaining flow records

13
Implementation (cont.)
  • Inter-connection Times
  • for each source and destination IP address pair
    encountered, create an ordered list of start
    times
  • the collection of differences between consecutive
    start times for each address pair constitutes the
    inter-connection time empirical distribution

14
Implementation (cont.)
  • Source and Destination IP Addresses
  • extract the empirical frequency distributions of
    source and destination IP addresses
  • map the resulting rank-frequency distributions
    onto source and destination address pools

15
Implementation (cont.)
  • Number of Active Sessions
  • each source and destination IP address pair
    contributes to the overall load during one or
    more intervals
  • for each pair find the earliest flow start time
    and latest end time and spread a value
    proportional to the lifetime of that session over
    the corresponding intervals

16
Implementation (cont.)
  • Number of Active Sessions

17
Implementation (cont.)
  • Interval Duration
  • The time granularity over which byte, packet,
    and flow volumes between the originally measured
    flow data and Harpoon are matched

18
Implementation (cont.)
  • Traffic generation
  • Harpoon is implemented as a Client-Server
    application

19
Results
20
Results (cont.)
21
Conclusions
  • Harpoon is a tool for generating representative
    IP traffic based on 8 distributional
    characteristics of TCP and UDP flows
  • Parameters for these distributions can be
    automatically extracted from data collected from
    live router
  • Generates statistically representative traffic
    workloads that are independent of any specific
    application
  • Assumes all sources are well behaved (future
    work)
Write a Comment
User Comments (0)
About PowerShow.com