SlideShare a Scribd company logo
Empirically Characterizing the
Buffer Behaviour of Real
Devices
Luis Sequeira
Julián Fernández-Navajas
Jose Saldana
Luis Casadesus
Communication Technologies Group (GTC)
Aragón Institute of Engineering Research (I3A)
University of Zaragoza, Spain
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Introduction and Related Works
• Packet size varies for different Internet
services and applications:
• VoIP, web, FTP, video streaming, online games, etc.

• Traffic behaviour has to be taken into account
for the design of network devices:
• Constant bit rate traffic
• Bursty traffic
• Different number of frames into each burst
Introduction and Related Works
• In access network capabilities are lower than
the ones available in the backbone; this
implies that some network points become
critical bottlenecks
• Bottlenecks may also appear at critical points
of high-performance networks.
Introduction and Related Works
• Mid and low-end routers normally do not implement
advanced traffic management techniques.
• They always use buffers as a traffic regulation
mechanism.
• Buffer size becomes an important design parameter
• Buffer can be measured in different ways:
• Maximum number of packets it can store
• Amount of bytes
• Queuing time limit (ms)
Introduction and Related Works
• Most Internet routers use FIFO, but there exist
other techniques to manage drop-tail buffers,
e.g. Random Early Detection (RED).
• These techniques, in conjunction with buffer
size, mainly define the buffer behaviour and
how traffic is affected by it.
Introduction and Related Works
• Relationship between router buffer size and
link utilization:
Excessive amount of memory

latency increase

Small amount of memory

packet loss increase

• Characterization of buffer behaviour is
interesting when trying to improve link
utilization.
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Test Procedure

It may be a device
or a network
Test Procedure
UDP Packets of different size are used
to determine if buffer size is in bytes or
in packets

to produce a buffer overflow in
the SUT

All packets have a
unique ID
Test Procedure

Traffic is captured here
Test Procedure
Input rate
Buffer of the
“System Under Test”

Input rate > output rate

Output rate
Test Procedure
Input rate
Buffer of the
“System Under Test”

Input rate > output rate

Buffer fills

Output rate
Test Procedure
Filling the buffer

Input rate
i

2
1

Output rate
Test Procedure
Time to fill the buffer

First loss

Input rate
i

2
1

Packet i leaves the
buffer

Error
Time to fill and to
emtpy the buffer

Output rate
Methodology
• Physical Access:
Counting the
number of
packets in the
queue in the
moment that a
packet arrives to
the buffer.

Traffic may be captured here

packet delay
packet loss
interarrival packet time
input and output buffer rate
filling buffer rate

captures

script

BUFFER SIZE
Methodology
• Remote Access:
If the delay of a
packet in the
buffer can be
determined, then
the variations of
this delay can
give us useful
information for
estimating buffer
size.

Traffic may be captured here

packet delay
packet loss
interarrival packet time
input and output buffer rate
filling buffer rate

captures

script

BUFFER SIZE
Methodology
Input rate

Method 1: Physical Access

Time when the packet
i arrived to the buffer

i

2

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

1

Output rate
Methodology
Input rate

Method 1: Physical Access

Buffer gets empty

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Input rate

Method 1: Physical Access

Time when the
packet i leaves
the buffer

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Input rate

Method 1: Physical Access

Queue

Count packets

Queue

• Buffer size is determined for each packet as follows: for
all packets in out-capture, a shell script looks for the
incoming time in in-capture and counts in out-capture
the number of packets between incoming time and the
time stamp registered in out- capture, finally the buffer
size is estimated as the average of all these values.

i

Output rate
Methodology
Method 2: Remote Access

It will completly
fill the buffer

Input rate
i

2
1

Dropped
packets

Output rate
Methodology
Method 2: Remote Access

Input rate

It will completly
fill the buffer

i

2

𝑅 𝑓𝑖𝑙𝑙

1

Output rate
Time to fill the buffer
Methodology
Method 2: Remote Access

Input rate

Time to fill and
empty the buffer
𝑅 𝑜𝑢𝑡

𝑅 𝑓𝑖𝑙𝑙

i

Output rate
It appears in the
receiver
Methodology
Estimation of the size:
Time to fill
the buffer

Time to fill and to
empty the buffer
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Wired Scenario
• In this case we want to test
the accuracy of our method
when there is no possibility
of physical access to the
SUT.
• We obtained the buffer size
using method 1 with
physical access. Next, the
estimations obtained using
method 2 are compared
with previous results, and
the relative error is
obtained.
Wired Scenario
A Particular buffer behaviour:

Linksys WAP54G

Groups of dropped packets

3COM 4500
Wired Scenario
A Particular buffer behaviour:

• It has been observed in the wired
and wireless tested:
• when the buffer is completely full, no
more packets are accepted, it will be
called upper limit.
• The buffer does not accept new
packets until a certain amount of
memory is available, it will be called
lower limit.
• In this moment the filling process
begins again.

• Although this behaviour has some
similarities with Random Early
Detection (RED) but it is not the
same:
• There is not probability for dropping
an incoming packet.
Wired Scenario
• Three different amounts of
bandwidth have been used in
order to flood the buffer.
• We see that the accuracy of the
buffer size estimation using the
method 2 is high. In addition, the
error diminishes as input rate
grows.

• The results are less accurate but
they are still acceptable.
• The results using smaller packets
are less accurate so we have not
presented them.
(packet size = 1500 bytes)
Wireless Scenario
• Variations of the output
rate in wireless network
generate error growth.
• While filling rate is relatively
constant, the emptying rate
shows variations for the
highest bandwidths.

The WiFi access point
switches from higher to
lower speeds depending on
the status of the radio
channel
Wireless Scenario
• We have compared the two
methods when there is
physical access to the SUT.
• The presented results are
the ones obtained using
packets of 1500 bytes, since
they are the most accurate.
• Method 1 is the most
accurate estimation so it
has been used to compare
with method 2.
Index
I. Introduction and Related Works
II. Test Methodology
• Test Procedure
• Methodology

III. Experimental Results
• Wired Scenario
• Wireless Scenario

IV. Conclusions
Conclusions
• Two methods have been presented in order to analyze the
technical and functional characteristics of commercial buffers of
different devices, or even networks.
• This characterization is important, taking into account that the
buffer may modify traffic characteristics, and may also drop
packets.
• The methodology can be used if there is physical access to the
“System Under Test”, but it is also useful, with certain limitations,
for measuring a remote system.
• Tests using commercial devices have been deployed in two
different scenarios, using wired and wireless networks.
Conclusions
• A particular buffer behaviour has been observed for a device: once
the buffer is full, it does not accept new packets until a certain
space is again available.
• The results show that accurate results of the buffer size can be
obtained when there is physical access to the “System Under Test”.
• In case of having no direct access to the system, an acceptable
estimation can also be obtained if the input rate is more than three
times the output rate. In this case, big packets have to be used for
the tests.
• As future work the method has to be improved in order to
minimize the error, especially when measuring wireless devices.

More Related Content

PDF
tcpcongest
PDF
Wireshark ppt
DOC
A new, efficiet coordinated checkpointing protocol combined with selective se...
PDF
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
PDF
Tutorial: Network State Awareness Troubleshooting
PPT
Wireshark Basics
PDF
Transport layer
PDF
Feature selection for detection of peer to-peer botnet traffic
tcpcongest
Wireshark ppt
A new, efficiet coordinated checkpointing protocol combined with selective se...
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Tutorial: Network State Awareness Troubleshooting
Wireshark Basics
Transport layer
Feature selection for detection of peer to-peer botnet traffic

What's hot (20)

PDF
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PPTX
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
PDF
Network Analysis Using Wireshark -10- arp and ip analysis
PPTX
Network Packet Analysis with Wireshark
PDF
Wireshark - Basics
PPTX
PPTX
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
PPTX
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
PPT
Michael Freyberger Sophomore Independent Work
PPTX
Tcp(no ip) review part1
PPTX
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
PPSX
Adaptation of tcp window
PPTX
PPTX
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
PPTX
Wireshark
PPTX
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
PDF
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
PDF
Frenetic: A Programming Language for OpenFlow Networks
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Network Analysis Using Wireshark -10- arp and ip analysis
Network Packet Analysis with Wireshark
Wireshark - Basics
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Michael Freyberger Sophomore Independent Work
Tcp(no ip) review part1
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Adaptation of tcp window
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Wireshark
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Frenetic: A Programming Language for OpenFlow Networks
Ad

Viewers also liked (7)

PDF
Alternative Network Deployments
PPT
Το μουσείο του μέλλοντος
PDF
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
PDF
Menu restaurant higia lunch (4)
PDF
Menu à la Carte - Restaurante Mozart - English
PDF
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
PDF
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Alternative Network Deployments
Το μουσείο του μέλλοντος
Influence of Online Games Traffic Multiplexing and Router Buffer on Subjectiv...
Menu restaurant higia lunch (4)
Menu à la Carte - Restaurante Mozart - English
,Dana info=www.blackwell synergy.com+j.1601-1546.2005.00129
Bandwidth Efficiency Improvement for Online Games by the use of Tunneling, Co...
Ad

Similar to Empirically Characterizing the Buffer Behaviour of Real Devices (20)

PPT
Availability or downtime of the servers can be found out
PPTX
Computer Networks Packet Switchings.pptx
PDF
Availability Computer Communication Network .pdf
PDF
Reproducible Network Research With High-­Fidelity Emulation
PDF
Impact of le arrivals and departures on buffer
PDF
The Utility of Characterizing Packet Loss as a Function of Packet Size in Com...
PDF
4) sizing router buffers
PPT
Fundamental of computer network
PDF
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
PPT
PDF
Communication Performance Over A Gigabit Ethernet Network
PDF
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
PDF
Example problems
PDF
RIPE 80: Buffers and Protocols
PPT
Chapter02
PDF
Computer Network Performance Evaluation Based on Different Data Packet Size U...
PPT
PDF
Neal-DeignReport
Availability or downtime of the servers can be found out
Computer Networks Packet Switchings.pptx
Availability Computer Communication Network .pdf
Reproducible Network Research With High-­Fidelity Emulation
Impact of le arrivals and departures on buffer
The Utility of Characterizing Packet Loss as a Function of Packet Size in Com...
4) sizing router buffers
Fundamental of computer network
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Communication Performance Over A Gigabit Ethernet Network
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google ...
Example problems
RIPE 80: Buffers and Protocols
Chapter02
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Neal-DeignReport

More from Jose Saldana (20)

PPTX
Pint of science Patinete as a Service
PDF
Mejorar tu empleabilidad como ingeniero
PDF
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
PDF
Cómo se conectan los ordenadores y los móviles
PDF
La bala que dobló la esquina: el problema de los videojuegos online
PDF
Entretenimiento online. Una perspectiva cristiana
PDF
¿Por qué el WiFi se va y se viene?
PDF
Wi-5: Advanced Features for Low-cost Wi-Fi APs
PDF
Header compression and multiplexing in LISP
PDF
Simplemux traffic optimization
PPTX
Online games: a real-time problem for the network
PDF
Improving Network Efficiency with Simplemux
PDF
GAIA and Alternative Networks
PDF
Bar-BoF session about Simplemux at IETF93, Prague
PDF
Simplemux: a generic multiplexing protocol
PDF
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
PDF
TCM-TF 2014
PDF
Can We Multiplex ACKs without Harming the Performance of TCP?
PDF
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
PDF
Online games traffic characterization and network support
Pint of science Patinete as a Service
Mejorar tu empleabilidad como ingeniero
POUZ Universidad de Zaragoza - Telecomunicación 2º y 3º
Cómo se conectan los ordenadores y los móviles
La bala que dobló la esquina: el problema de los videojuegos online
Entretenimiento online. Una perspectiva cristiana
¿Por qué el WiFi se va y se viene?
Wi-5: Advanced Features for Low-cost Wi-Fi APs
Header compression and multiplexing in LISP
Simplemux traffic optimization
Online games: a real-time problem for the network
Improving Network Efficiency with Simplemux
GAIA and Alternative Networks
Bar-BoF session about Simplemux at IETF93, Prague
Simplemux: a generic multiplexing protocol
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
TCM-TF 2014
Can We Multiplex ACKs without Harming the Performance of TCP?
The Effect of Multiplexing Delay on MMORPG TCP Traffic Flows
Online games traffic characterization and network support

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
master seminar digital applications in india
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Classroom Observation Tools for Teachers
PDF
Complications of Minimal Access Surgery at WLH
PDF
01-Introduction-to-Information-Management.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
History, Philosophy and sociology of education (1).pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Computing-Curriculum for Schools in Ghana
master seminar digital applications in india
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Weekly quiz Compilation Jan -July 25.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
History, Philosophy and sociology of education (1).pptx

Empirically Characterizing the Buffer Behaviour of Real Devices

  • 1. Empirically Characterizing the Buffer Behaviour of Real Devices Luis Sequeira Julián Fernández-Navajas Jose Saldana Luis Casadesus Communication Technologies Group (GTC) Aragón Institute of Engineering Research (I3A) University of Zaragoza, Spain
  • 2. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 3. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 4. Introduction and Related Works • Packet size varies for different Internet services and applications: • VoIP, web, FTP, video streaming, online games, etc. • Traffic behaviour has to be taken into account for the design of network devices: • Constant bit rate traffic • Bursty traffic • Different number of frames into each burst
  • 5. Introduction and Related Works • In access network capabilities are lower than the ones available in the backbone; this implies that some network points become critical bottlenecks • Bottlenecks may also appear at critical points of high-performance networks.
  • 6. Introduction and Related Works • Mid and low-end routers normally do not implement advanced traffic management techniques. • They always use buffers as a traffic regulation mechanism. • Buffer size becomes an important design parameter • Buffer can be measured in different ways: • Maximum number of packets it can store • Amount of bytes • Queuing time limit (ms)
  • 7. Introduction and Related Works • Most Internet routers use FIFO, but there exist other techniques to manage drop-tail buffers, e.g. Random Early Detection (RED). • These techniques, in conjunction with buffer size, mainly define the buffer behaviour and how traffic is affected by it.
  • 8. Introduction and Related Works • Relationship between router buffer size and link utilization: Excessive amount of memory latency increase Small amount of memory packet loss increase • Characterization of buffer behaviour is interesting when trying to improve link utilization.
  • 9. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 10. Test Procedure It may be a device or a network
  • 11. Test Procedure UDP Packets of different size are used to determine if buffer size is in bytes or in packets to produce a buffer overflow in the SUT All packets have a unique ID
  • 12. Test Procedure Traffic is captured here
  • 13. Test Procedure Input rate Buffer of the “System Under Test” Input rate > output rate Output rate
  • 14. Test Procedure Input rate Buffer of the “System Under Test” Input rate > output rate Buffer fills Output rate
  • 15. Test Procedure Filling the buffer Input rate i 2 1 Output rate
  • 16. Test Procedure Time to fill the buffer First loss Input rate i 2 1 Packet i leaves the buffer Error Time to fill and to emtpy the buffer Output rate
  • 17. Methodology • Physical Access: Counting the number of packets in the queue in the moment that a packet arrives to the buffer. Traffic may be captured here packet delay packet loss interarrival packet time input and output buffer rate filling buffer rate captures script BUFFER SIZE
  • 18. Methodology • Remote Access: If the delay of a packet in the buffer can be determined, then the variations of this delay can give us useful information for estimating buffer size. Traffic may be captured here packet delay packet loss interarrival packet time input and output buffer rate filling buffer rate captures script BUFFER SIZE
  • 19. Methodology Input rate Method 1: Physical Access Time when the packet i arrived to the buffer i 2 • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. 1 Output rate
  • 20. Methodology Input rate Method 1: Physical Access Buffer gets empty • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 21. Methodology Input rate Method 1: Physical Access Time when the packet i leaves the buffer • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 22. Methodology Input rate Method 1: Physical Access Queue Count packets Queue • Buffer size is determined for each packet as follows: for all packets in out-capture, a shell script looks for the incoming time in in-capture and counts in out-capture the number of packets between incoming time and the time stamp registered in out- capture, finally the buffer size is estimated as the average of all these values. i Output rate
  • 23. Methodology Method 2: Remote Access It will completly fill the buffer Input rate i 2 1 Dropped packets Output rate
  • 24. Methodology Method 2: Remote Access Input rate It will completly fill the buffer i 2 𝑅 𝑓𝑖𝑙𝑙 1 Output rate Time to fill the buffer
  • 25. Methodology Method 2: Remote Access Input rate Time to fill and empty the buffer 𝑅 𝑜𝑢𝑡 𝑅 𝑓𝑖𝑙𝑙 i Output rate It appears in the receiver
  • 26. Methodology Estimation of the size: Time to fill the buffer Time to fill and to empty the buffer
  • 27. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 28. Wired Scenario • In this case we want to test the accuracy of our method when there is no possibility of physical access to the SUT. • We obtained the buffer size using method 1 with physical access. Next, the estimations obtained using method 2 are compared with previous results, and the relative error is obtained.
  • 29. Wired Scenario A Particular buffer behaviour: Linksys WAP54G Groups of dropped packets 3COM 4500
  • 30. Wired Scenario A Particular buffer behaviour: • It has been observed in the wired and wireless tested: • when the buffer is completely full, no more packets are accepted, it will be called upper limit. • The buffer does not accept new packets until a certain amount of memory is available, it will be called lower limit. • In this moment the filling process begins again. • Although this behaviour has some similarities with Random Early Detection (RED) but it is not the same: • There is not probability for dropping an incoming packet.
  • 31. Wired Scenario • Three different amounts of bandwidth have been used in order to flood the buffer. • We see that the accuracy of the buffer size estimation using the method 2 is high. In addition, the error diminishes as input rate grows. • The results are less accurate but they are still acceptable. • The results using smaller packets are less accurate so we have not presented them. (packet size = 1500 bytes)
  • 32. Wireless Scenario • Variations of the output rate in wireless network generate error growth. • While filling rate is relatively constant, the emptying rate shows variations for the highest bandwidths. The WiFi access point switches from higher to lower speeds depending on the status of the radio channel
  • 33. Wireless Scenario • We have compared the two methods when there is physical access to the SUT. • The presented results are the ones obtained using packets of 1500 bytes, since they are the most accurate. • Method 1 is the most accurate estimation so it has been used to compare with method 2.
  • 34. Index I. Introduction and Related Works II. Test Methodology • Test Procedure • Methodology III. Experimental Results • Wired Scenario • Wireless Scenario IV. Conclusions
  • 35. Conclusions • Two methods have been presented in order to analyze the technical and functional characteristics of commercial buffers of different devices, or even networks. • This characterization is important, taking into account that the buffer may modify traffic characteristics, and may also drop packets. • The methodology can be used if there is physical access to the “System Under Test”, but it is also useful, with certain limitations, for measuring a remote system. • Tests using commercial devices have been deployed in two different scenarios, using wired and wireless networks.
  • 36. Conclusions • A particular buffer behaviour has been observed for a device: once the buffer is full, it does not accept new packets until a certain space is again available. • The results show that accurate results of the buffer size can be obtained when there is physical access to the “System Under Test”. • In case of having no direct access to the system, an acceptable estimation can also be obtained if the input rate is more than three times the output rate. In this case, big packets have to be used for the tests. • As future work the method has to be improved in order to minimize the error, especially when measuring wireless devices.