Caliper: Precise and Responsive Traffic Generation using NetThreads∗

نویسندگان

  • Monia Ghobadi
  • Geoffrey Salmon
  • Martin Labrecque
  • Yashar Ganjali
  • J. Gregory Steffan
چکیده

This paper presents (i) Caliper, a highly-accurate packet injection tool, and (ii) NetThreads, a new platform that dramatically simplifies the development of low-level network applications on the NetFPGA board. NetThreads provides a familiar environment to software developers where multithreaded C programs can be compiled and run on the NetFPGA. On top of NetThreads, we have built Caliper, a precise and responsive traffic generator that takes packets generated on a host computer and transmits them onto a gigabit Ethernet network with precise inter-transmission times. For packet injection, existing software traffic generators rely on generic Network Interface Cards which, as we demonstrate, do not provide high-precision timing guarantees. Hence performing valid and convincing experiments becomes difficult or impossible in the context of time-sensitive network experiments. Our evaluation shows that Caliper is able to reproduce packet inter-transmission times from a given arbitrary distribution while capturing the closed-loop feedback of TCP sources. Specifically, we demonstrate that Caliper provides three orders of magnitude better precision compared to commodity NIC: with requested traffic rates up to the line rate, Caliper incurs an error of 8 ns or less in packet transmission times. Furthermore, we explore Caliper’s ability to integrate with existing network simulators to project simulated traffic characteristics into a real network environment. Caliper and NetThreads are both freely available online [1].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Precise and Closed-loop Traffic Generation with Caliper

There are many challenges associated with performing valid experiments in network testbeds. Generating realistic and responsive traffic that reflects different network conditions and topologies is one of such key challenges. To perform network experiments, researchers often use a collection of commodity Linux machines as traffic generators. However, creating a large number of connections in ord...

متن کامل

NetFPGA-based Precise Traffic Generation

Generating realistic network traffic that reflects different network conditions and topologies is crucial for performing valid experiments in network testbeds. Towards this goal, this paper presents Precise Traffic Generator (PTG), a new tool for highly accurate packet injections using NetFPGA. PTG is implemented using the NetThreads platform, an environment familiar to a software developer whe...

متن کامل

The Role of Leading Professors and Responsive Teaching on Development of Third Generation University and Presenting a Model in Mazandaran University of Medical Sciences

Background and purpose: Educating capable, committed and responsive graduates to the needs of patients and the health system can be considered as the most important mission of medical universities in the country. The aim of this study was to examine the role of leading professors and responsive education on development of Third Generation University in order to present a model in Mazandaran Uni...

متن کامل

Advanced OR and AI Methods in Transportation AN INTERMODAL TRAFFIC CONTROL STRATEGY FOR PRIVATE VEHICLE AND PUBLIC TRANSPORT

This paper proposes a traffic-responsive urban traffic control strategy allowing a real time passive public transport priority. The proposed strategy is based on a store and forward modeling of both of the private vehicle and Public transport traffic. The regulator is designed using the linear quadratic, which allows a traffic responsive co-ordinated control for wide-area networks. The objectiv...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010