Packet Generator 8528 - Essay Example

When it comes to real-world

We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU

For Only $13.90/page


order now

network throughput, there are as many opinions about network performance as

there are network installations. Every network site is unique, and the

performance of the network is a function of the number of stations contending

for access to the Ethernet, the type of hardware in use (station interfaces,

switches), the layout of the cables (are they the right type, right length, and

do they meet the configuration guidelines?), the quality of the cable

installation and the mix of applications. However, with the ever-increasing

number of networks, the traffic over the Internet is going to be saturated and

performance will be down. In light of this problem, the testing, simulating and

troubleshooting of a network device become very important. Therefore, in order

to develop a more efficient and effective method, the project’s goals is · To

provide the users more functions and flexibility in terms of the packet arrival

pattern and the packet size generation. · To assess network or the network

component’s ability to support the given traffic load in terms of packet loss,

delay, delay jitters etc. · To source and sink real-time multicast/unicast UDP/IP

traffic flows with optional support for operation with ISI’s “rsvpd”.

· To transmit, receive and log time-stamped, sequence numbered packets. · To

provide a traffic controller using the Leaky Bucket method. INTRODUCTION

Informations Technology personnel often look to network benchmark tests to

measure monitor and predict the performance of the LANs. This is especially

valuable in the case of high-performance backbones that continually support a

large number of users and consistently high traffic volumes. However, the

current technology of packet generator is very limited in functionality and

usage. The project will aim to increase the flexibility of the packet generator

in the following areas: · Increase the range of options and flexibility with

regards to the packet transmission pattern. · Instead of just specifying the

packet size, the user would be able to specify the distribution function he/she

wants to be implemented. · Add a traffic controller module to control the

number of generated packets that is being sent to the network. · Implementing

the leaky bucket method and combining it with the dropping method for the

traffic controller. HIGHER-LEVEL BLOCK DIAGRAM OF SYSTEM CONCEPT OF LEAKY BUCKET

DROPPING METHOD LEAKY BUCKET ALGORITHM Background Our project was actually

spawned from the idea of MGEN. It was actually designed and developed by The

Naval Research Laboratory (NRL). Multi-Generator or MGEN is currently running on

most operating systems, namely SunOS 4.1.x, Solaris 2.x, Intel-based Linux,

NetBSD, etc. Furthermore, MGEN is a specific set of software that provides the

ability to generate and receive packets through the network base on an input

script file. However, the MGEN script is very limited in terms of its

flexibility and functionality. For example, packet arrival generation can only

be set to either a Periodic or a Poisson Distribution. Therefore, in order to

exploit the MGEN’s full capability, a Data Flow On command can be further

developed. These two distributions do not represent the real time traffic flow

in the network. Therefore, our project will involved developing this MGEN code

and coding it in C language so that its packet generator pattern will have few

more distributions that better represent a network flow. Among the distribution

functions we will include are Exponential, Uniform Distribution, Gamma

Distribution etc. In addition, the packet size is to be changed from a fixed

value to a varying amount of packet sizes. Also, we have to include the Traffic

controller so that we will be able to control the new traffic flow generated by

different distributions. As a result, the implementation of leaky bucket will be

necessary in order to achieve this goal. Strategic Plan Proposed Approach Our

first objective is to work on the packet generator module, study and develop the

MGEN code, which was coded in C program. We will choose to run and develop our

project on SunOS machines. Using the inputs specified by the users, MGEN will

generates packets pattern to the network. The second step is to introduce

different distribution functions and add them to the source code in the form of

modules. So far, the Exponential and Uniform distribution are the two

distributions to be added. Depending upon the progress of the project, we might

implement more distributions like gamma and normal. At the same time, the code

will be written such that users can control and change packet sizes accordingly.

The flexibility on packet size is essential because packet size is not constant

in the real time traffic flow. As for the traffic controller, a leaky bucket

algorithm will be applied to control the amount of packet that is to be sent

into the network. After the maximum allowable packet quota has been reached, any

packets arriving after will be dropped out. Additionally, shaping and marking

capabilities will also be considered. Both the Packet generator and Traffic

controller will run simultaneously on the SunOS station and the output will be

monitored through the Sun machine itself. System Requirement SunOS 2 stations

Network LANs Software Requirement · Generate packets based on the following

variable inputs · Distribution function · Packet size · Transmission rate ·

Starting and ending period · Control the amount of packet flowing to the

network · Drop any excess packets if necessary (or mark or shape to

conformance) · Monitor the packet receiving rate · Gathering of transmit and

receive statistics, e.g. number of packets marked, shaping delay, end-to-end

delay etc. Equipment and Fabrication Needs We will be using SunOS workstations

in networking laboratory to run the test on our codes. The networking equipments

that we need are available in the lab. They include routers and switches which

need to be configured to be able to test our program.

Bibliography

http://www.seas.upenn.edu/~tcom502/

http://manimac.itd.nrl.navy.mil/MGEN