Essay, Research Paper: Packet Generator
Engineering
Free Engineering research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page
was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Engineering, use the professional writing service offered by our company.
When it comes to real-world
network throughput, there are as many opinions about network performance as
there are network installations. Every network site is unique, and the
performance of the network is a function of the number of stations contending
for access to the Ethernet, the type of hardware in use (station interfaces,
switches), the layout of the cables (are they the right type, right length, and
do they meet the configuration guidelines?), the quality of the cable
installation and the mix of applications. However, with the ever-increasing
number of networks, the traffic over the Internet is going to be saturated and
performance will be down. In light of this problem, the testing, simulating and
troubleshooting of a network device become very important. Therefore, in order
to develop a more efficient and effective method, the project's goals is · To
provide the users more functions and flexibility in terms of the packet arrival
pattern and the packet size generation. · To assess network or the network
component's ability to support the given traffic load in terms of packet loss,
delay, delay jitters etc. · To source and sink real-time multicast/unicast UDP/IP
traffic flows with optional support for operation with ISI's "rsvpd".
· To transmit, receive and log time-stamped, sequence numbered packets. · To
provide a traffic controller using the Leaky Bucket method. INTRODUCTION
Informations Technology personnel often look to network benchmark tests to
measure monitor and predict the performance of the LANs. This is especially
valuable in the case of high-performance backbones that continually support a
large number of users and consistently high traffic volumes. However, the
current technology of packet generator is very limited in functionality and
usage. The project will aim to increase the flexibility of the packet generator
in the following areas: · Increase the range of options and flexibility with
regards to the packet transmission pattern. · Instead of just specifying the
packet size, the user would be able to specify the distribution function he/she
wants to be implemented. · Add a traffic controller module to control the
number of generated packets that is being sent to the network. · Implementing
the leaky bucket method and combining it with the dropping method for the
traffic controller. HIGHER-LEVEL BLOCK DIAGRAM OF SYSTEM CONCEPT OF LEAKY BUCKET
DROPPING METHOD LEAKY BUCKET ALGORITHM Background Our project was actually
spawned from the idea of MGEN. It was actually designed and developed by The
Naval Research Laboratory (NRL). Multi-Generator or MGEN is currently running on
most operating systems, namely SunOS 4.1.x, Solaris 2.x, Intel-based Linux,
NetBSD, etc. Furthermore, MGEN is a specific set of software that provides the
ability to generate and receive packets through the network base on an input
script file. However, the MGEN script is very limited in terms of its
flexibility and functionality. For example, packet arrival generation can only
be set to either a Periodic or a Poisson Distribution. Therefore, in order to
exploit the MGEN's full capability, a Data Flow On command can be further
developed. These two distributions do not represent the real time traffic flow
in the network. Therefore, our project will involved developing this MGEN code
and coding it in C language so that its packet generator pattern will have few
more distributions that better represent a network flow. Among the distribution
functions we will include are Exponential, Uniform Distribution, Gamma
Distribution etc. In addition, the packet size is to be changed from a fixed
value to a varying amount of packet sizes. Also, we have to include the Traffic
controller so that we will be able to control the new traffic flow generated by
different distributions. As a result, the implementation of leaky bucket will be
necessary in order to achieve this goal. Strategic Plan Proposed Approach Our
first objective is to work on the packet generator module, study and develop the
MGEN code, which was coded in C program. We will choose to run and develop our
project on SunOS machines. Using the inputs specified by the users, MGEN will
generates packets pattern to the network. The second step is to introduce
different distribution functions and add them to the source code in the form of
modules. So far, the Exponential and Uniform distribution are the two
distributions to be added. Depending upon the progress of the project, we might
implement more distributions like gamma and normal. At the same time, the code
will be written such that users can control and change packet sizes accordingly.
The flexibility on packet size is essential because packet size is not constant
in the real time traffic flow. As for the traffic controller, a leaky bucket
algorithm will be applied to control the amount of packet that is to be sent
into the network. After the maximum allowable packet quota has been reached, any
packets arriving after will be dropped out. Additionally, shaping and marking
capabilities will also be considered. Both the Packet generator and Traffic
controller will run simultaneously on the SunOS station and the output will be
monitored through the Sun machine itself. System Requirement SunOS 2 stations
Network LANs Software Requirement · Generate packets based on the following
variable inputs · Distribution function · Packet size · Transmission rate ·
Starting and ending period · Control the amount of packet flowing to the
network · Drop any excess packets if necessary (or mark or shape to
conformance) · Monitor the packet receiving rate · Gathering of transmit and
receive statistics, e.g. number of packets marked, shaping delay, end-to-end
delay etc. Equipment and Fabrication Needs We will be using SunOS workstations
in networking laboratory to run the test on our codes. The networking equipments
that we need are available in the lab. They include routers and switches which
need to be configured to be able to test our program.
Bibliography
http://www.seas.upenn.edu/~tcom502/
http://manimac.itd.nrl.navy.mil/MGEN
network throughput, there are as many opinions about network performance as
there are network installations. Every network site is unique, and the
performance of the network is a function of the number of stations contending
for access to the Ethernet, the type of hardware in use (station interfaces,
switches), the layout of the cables (are they the right type, right length, and
do they meet the configuration guidelines?), the quality of the cable
installation and the mix of applications. However, with the ever-increasing
number of networks, the traffic over the Internet is going to be saturated and
performance will be down. In light of this problem, the testing, simulating and
troubleshooting of a network device become very important. Therefore, in order
to develop a more efficient and effective method, the project's goals is · To
provide the users more functions and flexibility in terms of the packet arrival
pattern and the packet size generation. · To assess network or the network
component's ability to support the given traffic load in terms of packet loss,
delay, delay jitters etc. · To source and sink real-time multicast/unicast UDP/IP
traffic flows with optional support for operation with ISI's "rsvpd".
· To transmit, receive and log time-stamped, sequence numbered packets. · To
provide a traffic controller using the Leaky Bucket method. INTRODUCTION
Informations Technology personnel often look to network benchmark tests to
measure monitor and predict the performance of the LANs. This is especially
valuable in the case of high-performance backbones that continually support a
large number of users and consistently high traffic volumes. However, the
current technology of packet generator is very limited in functionality and
usage. The project will aim to increase the flexibility of the packet generator
in the following areas: · Increase the range of options and flexibility with
regards to the packet transmission pattern. · Instead of just specifying the
packet size, the user would be able to specify the distribution function he/she
wants to be implemented. · Add a traffic controller module to control the
number of generated packets that is being sent to the network. · Implementing
the leaky bucket method and combining it with the dropping method for the
traffic controller. HIGHER-LEVEL BLOCK DIAGRAM OF SYSTEM CONCEPT OF LEAKY BUCKET
DROPPING METHOD LEAKY BUCKET ALGORITHM Background Our project was actually
spawned from the idea of MGEN. It was actually designed and developed by The
Naval Research Laboratory (NRL). Multi-Generator or MGEN is currently running on
most operating systems, namely SunOS 4.1.x, Solaris 2.x, Intel-based Linux,
NetBSD, etc. Furthermore, MGEN is a specific set of software that provides the
ability to generate and receive packets through the network base on an input
script file. However, the MGEN script is very limited in terms of its
flexibility and functionality. For example, packet arrival generation can only
be set to either a Periodic or a Poisson Distribution. Therefore, in order to
exploit the MGEN's full capability, a Data Flow On command can be further
developed. These two distributions do not represent the real time traffic flow
in the network. Therefore, our project will involved developing this MGEN code
and coding it in C language so that its packet generator pattern will have few
more distributions that better represent a network flow. Among the distribution
functions we will include are Exponential, Uniform Distribution, Gamma
Distribution etc. In addition, the packet size is to be changed from a fixed
value to a varying amount of packet sizes. Also, we have to include the Traffic
controller so that we will be able to control the new traffic flow generated by
different distributions. As a result, the implementation of leaky bucket will be
necessary in order to achieve this goal. Strategic Plan Proposed Approach Our
first objective is to work on the packet generator module, study and develop the
MGEN code, which was coded in C program. We will choose to run and develop our
project on SunOS machines. Using the inputs specified by the users, MGEN will
generates packets pattern to the network. The second step is to introduce
different distribution functions and add them to the source code in the form of
modules. So far, the Exponential and Uniform distribution are the two
distributions to be added. Depending upon the progress of the project, we might
implement more distributions like gamma and normal. At the same time, the code
will be written such that users can control and change packet sizes accordingly.
The flexibility on packet size is essential because packet size is not constant
in the real time traffic flow. As for the traffic controller, a leaky bucket
algorithm will be applied to control the amount of packet that is to be sent
into the network. After the maximum allowable packet quota has been reached, any
packets arriving after will be dropped out. Additionally, shaping and marking
capabilities will also be considered. Both the Packet generator and Traffic
controller will run simultaneously on the SunOS station and the output will be
monitored through the Sun machine itself. System Requirement SunOS 2 stations
Network LANs Software Requirement · Generate packets based on the following
variable inputs · Distribution function · Packet size · Transmission rate ·
Starting and ending period · Control the amount of packet flowing to the
network · Drop any excess packets if necessary (or mark or shape to
conformance) · Monitor the packet receiving rate · Gathering of transmit and
receive statistics, e.g. number of packets marked, shaping delay, end-to-end
delay etc. Equipment and Fabrication Needs We will be using SunOS workstations
in networking laboratory to run the test on our codes. The networking equipments
that we need are available in the lab. They include routers and switches which
need to be configured to be able to test our program.
Bibliography
http://www.seas.upenn.edu/~tcom502/
http://manimac.itd.nrl.navy.mil/MGEN
0
0
Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Help other users to find the good and worthy free term papers and trash the bad ones.
Get a Custom Paper on Engineering:
Free papers will not meet the guidelines of your specific project. If you need a custom essay on Engineering: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.
Related essays:
2
0
Engineering / Polypropylene Fibers
According to major supplies, “Use of synthetic fibers for reinforcing concrete
is continuously, increasing. The increase has been considerable since 1980, but
slowed somewhat in 1990, a year of substa...
0
0
Engineering / Space Propulsion
The following is a research project on Space Vehicle Propulsion. It shall
consist of four sections, each discussing specific topics. Section One lays out
the basic ideas of rocketry. Section Two compa...
2
0
Engineering / Strain Transformation
The following report will be on Strain Transformation. Strain transformation is
similar to stress transformation, so that many of the techniques and derivations
used for stress can be used for strain....