Matthew K. Mukerjee. Eliminating Adverse Control Plane Interactions

Total Page:16

File Type:pdf, Size:1020Kb

Matthew K. Mukerjee. Eliminating Adverse Control Plane Interactions Eliminating Adverse Control Plane Interactions in Independent Network Systems Matthew K. Mukerjee May 2018 CMU-CS-18-106 Computer Science Department School of Computer Science Carnegie Mellon University Pittsburgh, PA ¿esis Committee: Srinivasan Seshan, Chair Vyas Sekar Peter Steenkiste Bruce Maggs (Duke; Akamai) Submitted in partial fulllment of the requirements for the degree of Doctor of Philosophy. Copyright © 2018 Matthew K. Mukerjee. ¿is work was supported by the National Science Foundation under grants numbered CNS-1040801, CNS-1314721, CNS-1345305, and CNS-1565343. ¿e views and conclusions contained in this document are those of the author and should not be interpreted as representing the ocial policies, either expressed or implied, of any sponsoring institution, the U.S. government, or any other entity. Keywords: networks, control plane, split control, control competition, information sharing, interfaces, recongurable datacenters, datacenter optics, content brokering, CDNs, live video delivery To Sophie for putting up with this long, crazy ride. iv Abstract Network system operation is typically divided into control and data planes— while the data plane is responsible for processing individual messages or packets, the control plane computes the conguration of devices and optimizes system-wide performance. Unfortunately, the control plane of each network system or protocol layer typically operates independently (e.g., CDNs selecting servers without coordinating with ISPs), resulting in poor interactions between control planes across systems. We can categorize existing systems into one of four general control plane coordination mechanisms that overcome these problems, based on how much information can be shared between control planes. If no information can be shared, control planes simply react to data plane changes as a rudimentary form of coordination (e.g., CDN server selection + ISP trac engineering). If all information can be shared, transparency in decision making can remove most poor interactions (e.g., Coow datacenter ow scheduling). In many scenarios, however, only some information can be shared (e.g., between control planes running in dierent companies). Coordination in these scenarios is more specialized; control planes with separate data plane resources can use priority ranking (i.e., providing a list of preferences for resources without needing to show how these preferences were decided; e.g., BGP routing between ISPs), and control planes with shared data plane resources can use hierarchical partitioning (i.e., making coarse- grained decisions globally, and ne-grained decisions locally; e.g., internet-wide BGP + OSPF routing). While systems utilizing control plane coordination exist today, they have been designed ad hoc. We propose a set of recipes that show when it’s appropriate to use dierent coordination mechanisms, based on key properties (information sharing and shared resources) in varied scenarios (layering, administrative separation, and internet-scale systems). We use these recipes to guide system design in a variety of contexts, as a case study in control plane coordination. First, many systems use layer separation for modularity, but in doing so trade performance for generality. As layered systems have no infor- mation sharing constraints, we argue that transparency (i.e., cross-layer optimization; allowing layers to run specialized code to better use other layers) is the correct tech- nique for regaining performance. We explore this with our emulator Etalon [116], in the context of recongurable datacenters. Second, some systems are administratively separate (i.e., are split across dierent companies), limiting information sharing for business reasons. ¿ese systems may overcome adverse interactions using priority ranking. We explore this with VDX [114, 115], in the context of content brokering. Finally, systems needing internet scalability are increasingly combining a slow central- ized control plane with a fast distributed control plane. Complete information sharing (and thus, transparency) would appear possible, but timescale separation makes this fundamentally impractical. Instead, hierarchical partitioning can overcome the chal- lenges present in this scenario. We explore this with VDN [117], in the context of live video delivery. ¿rough this case study we nd that these coordination mechanism not only solve a variety of problems, but can be eciently implemented. vi Acknowledgments First and foremost I would like to thank my girlfriend Sophie for always encourag- ing me to push forward on what I want to work on and providing innite emotional support. I would also like to thank my family (Mom, Dad, Amanda, and Austin) for their love and emotional support. I would like to thank my advisor, Srini Seshan, for seven years of fun tackling a large variety of interesting problems, as well as giving me the needed encouragement to keep submitting papers until they get in. I would also like to thank the faculty on my committee (Peter Steenkiste, Vyas Sekar, and Bruce Maggs) for all the help and feedback that went into this dissertation, as well as fun collaborations throughout the years. I’d like to thank my undergrad and masters advisors, Andrew Campbell, Tanzeem Choudhury, and Daniel Freedman, for pushing me towards research and eventually a PhD. I’d like to thank my mentors at Google, Ben Greenstein, Mike Piatek, and Matt Welsh, for a fun Summer internship. I’d like to thank the research and support sta in CSD and XIA, Deb Cavlovich, Angie Miller, Kathy McNi, Jenn Landefeld, Angy Malloy, Dan Barrett, and Nitin Gupta, for making sure everything just works and minimizing a lot of the pain of getting a PhD. I would like to thank all my friends, collaborators, and mentors: David Naylor, Nico Feltman, Lili Ehrlich, Susu and Ray Kanemoto, Evan Shimizu, Alex Lloyd and Dana Daugherty, Lauren and Logan Plath, Ravi Choudhuri, Elizabeth, Matt, and Argus Grin, Kris Salada, Mitch Cairns, and Michaela Nachtigall, Yu Zhao, Lindsey and Vince Slaugh, Brian Russman, Richard Wang and Yvonne Yu, Yuchen Wu, Alex Poms, John Wright, Hyeontaek Lim, David Witmer, Junchen Jiang, Bruno Vavala, Ying Jung Chen, Eunjin Lee, Nadi Bozkurt, Conglong Li, Devdeep Ray, Ranysha Ware, Athula Balachandran, George Nychis, Wolf Richter, Raja Sambasivan, Dongsu Han, Justine Sherry, Hui Zhang, Dave Andersen, Michael Kaminsky, George Porter, Alex Snoeren, other people working under XIA, and the CMU systems seminar folks. I apologize if I forgot anyone. Finally, I’dlike to thank the anonymous reviewers for SIGCOMM, NSDI, CoNEXT, and HotNets for their feedback on dra s of the included work. ¿e work presented in this dissertation is based on work in submission to SIGCOMM 2018 [116], appearing in CoNEXT 2017 [115], HotNets 2016 [114], and SIGCOMM 2015 [117], and builds on work appearing in CoNEXT 2015 [98] and ANCS 2017 [95]. viii Contents 1 Introduction1 1.1 Coordination Mechanisms.................................4 1.2 Understanding designs for split control plane systems.................8 1.2.1 Salient features...................................8 1.2.2 Related Work.................................... 11 1.2.3 Design Space.................................... 13 1.3 Common Scenarios..................................... 14 1.4 Recipes for control plane coordination.......................... 16 1.5 Scope............................................. 17 1.6 Goals............................................. 17 1.7 Contributions........................................ 17 2 Control Planes in Dierent Layers: A Case Study in Recongurable Datacenters 19 2.1 Introduction......................................... 20 2.2 Setting............................................. 22 2.2.1 Network Model.................................. 22 2.2.2 Computing Schedules............................... 23 2.2.3 Schedule Execution................................ 23 2.2.4 Challenges..................................... 23 2.3 Etalon............................................. 24 2.3.1 Overview...................................... 24 2.3.2 So ware Switch.................................. 25 2.3.3 Time Dilation................................... 26 2.3.4 Testbed....................................... 26 2.3.5 Validation...................................... 27 2.4 Overcoming rapid bandwidth uctuation with dynamic buer resizing...... 27 2.4.1 Understanding the problem........................... 27 2.4.2 Dynamic buer resizing............................. 29 2.4.3 Experiments.................................... 30 2.4.4 Incorporating explicit network feedback.................... 31 2.4.5 Delay sensitivity analysis............................. 32 2.5 Overcoming poor demand estimation with ADUs................... 32 2.5.1 Understanding problems with demand estimation.............. 32 ix 2.5.2 Using ADUs.................................... 33 2.5.3 Experiments.................................... 34 2.5.4 Cumulative results................................. 35 2.6 Overcoming dicult-to-schedule workloads with application-specic changes................................ 36 2.6.1 HDFS write placement diculties and solutions............... 37 2.6.2 Experiments.................................... 38 2.7 Related work......................................... 40 2.8 Summary........................................... 40 3 Control Planes in Dierent Businesses: A Case Study in Content Brokering 43 3.1 Introduction......................................... 44 3.2 Content Delivery: ¿e Past and
Recommended publications
  • Packet Reordering in Mobile Networks
    This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Schulte, Lennart; Zimmermann, Alexander; Nanjundaswamy, Puneeth; Eggert, Lars; Manner, Jukka I'll be a bit late - Packet reordering in mobile networks Published in: Journal of Communications and Networks DOI: 10.1109/JCN.2017.000108 Published: 01/12/2017 Document Version Peer reviewed version Please cite the original version: Schulte, L., Zimmermann, A., Nanjundaswamy, P., Eggert, L., & Manner, J. (2017). I'll be a bit late - Packet reordering in mobile networks. Journal of Communications and Networks, 19(6), 693-703. [8277337]. https://doi.org/10.1109/JCN.2017.000108 This material is protected by copyright and other intellectual property rights, and duplication or sale of all or part of any of the repository collections is not permitted, except that material may be duplicated by you for your research use or educational purposes in electronic or print form. You must obtain permission for any other use. Electronic or print copies may not be offered, whether for sale or otherwise to anyone who is not an authorised user. Powered by TCPDF (www.tcpdf.org) 1 I’ll be a bit late – Packet Reordering in Mobile Networks Lennart Schulte, Alexander Zimmermann, Puneeth Nanjundaswamy, Lars Eggert, Jukka Manner Abstract: Data transfer in mobile networks has increased signif- icantly over the past years, and the capacity of these networks has grown accordingly. Due to their different set of characteris- tics compared to wired networks, they have also received atten- tion from end-to-end developers on transport and application level.
    [Show full text]
  • Network Test and Monitoring Tools
    ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools................................................................................................................1 Introduction.............................................................................................................................................................3 Link Characterization ...........................................................................................................................................4 Summary.................................................................................................................................................................12 Appendix A: NUTTCP..........................................................................................................................................13 Installing NUTTCP ..........................................................................................................................................13 Using NUTTCP .................................................................................................................................................13 NUTTCP Examples..........................................................................................................................................14 Appendix B: IPERF................................................................................................................................................17
    [Show full text]
  • Cloudstate: End-To-End WAN Monitoring for Cloud-Based Applications
    CLOUD COMPUTING 2013 : The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization CloudState: End-to-end WAN Monitoring for Cloud-based Applications Aaron McConnell, Gerard Parr, Sally McClean, Philip Morrow, Bryan Scotney School of Computing and Information Engineering University of Ulster Coleraine, Northern Ireland Email: [email protected], [email protected], [email protected], [email protected], [email protected] Abstract—Modern data centres are increasingly moving to- It is therefore necessary to have a periodic, automated wards more sophisticated cloud-based infrastructures, where means of measuring the state of the WAN link between servers are consolidated, backups are simplified and where any two addresses relevant to the successful delivery of an resources can be scaled up, across distributed cloud sites, if necessary. Placing applications and data stores across sites has application to end-users. This measurement should be taken a cost, in terms of the hosting at a given site, a cost in terms of periodically, with the time between polls being short enough the migration of application VMs and content across a network, that sudden changes in the quality of the WAN are observed, and a cost in terms of the quality of the end-to-end network but far enough part so as not to flood the network with link between the application and the end-user. This paper details monitoring traffic. Data collected from polls should also be a solution aimed at monitoring all relevant end-to-end network links between VMs, storage and end-users.
    [Show full text]
  • Measure Wireless Network Performance Using Testing Tool Iperf
    Measure wireless network performance using testing tool iPerf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability, but getting a handle on your wireless LAN's ( WLAN 's) performance is important to ensure sufficient capacity and coverage. Here, we describe how to quantify network performance using iPerf, a simple, readily-available tool that measures TCP /UDP throughput, loss, and delay. Getting started iPerf was developed to simplify TCP performance tuning by making it easy to measure maximum throughput and bandwidth. When used with UDP, iPerf can also measure datagram loss and delay (aka jitter). iPerf can be run over any kind of IP network, including local Ethernet LANs, Internet access links, and Wi-Fi networks. To use iPerf, you must install two components: an iPerf server (which listens for incoming test requests) and an iPerf client (which launches test sessions). iPerf is available as open source or executable binaries for many operating systems, including Win32, Linux, FreeBSD, MacOS X, OpenBSD, and Solaris. A Win32 iPerf installer can be found at NLANR , while a Java GUI version (JPerf) is available from SourceForge . To measure Wi-Fi performance, you probably want to install iPerf on an Ethernet host upstream from the access point ( AP ) under test -- this will be your server. Next, install iPerf on one or more Wi-Fi laptops -- these will be your clients. This is representative of a typical application flow between Wi-Fi client and wired server. If your goal is to measure AP performance, place your iPerf server on the same LAN as the AP, connected by Fast or Gigabit Ethernet.
    [Show full text]
  • Performance Testing Tools Jan Bartoň 30/10/2003
    CESNET technical report number 18/2003 Performance Testing Tools Jan Bartoň 30/10/2003 1 Abstract The report describes properties and abilities of software tools for performance testing. It also shows the tools comparison according to requirements for testing tools described in RFC 2544 (Benchmarking Terminology for Network Intercon- nection Devices). 2 Introduction This report is intended as a basic documentation for auxiliary utilities or pro- grams that have been made for the purposes of evaluating transfer performance between one or more PCs in the role of traffic generators and another one on the receiving side. Section 3 3 describes requirements for software testing tools according to RFC 2544. Available tools for performance testing are catalogued by this document in section 4 4. This section also shows the testing tools com- patibility with RFC 2544 and the evaluation of IPv6 support. The summary of supported requirements for testing tools and IPv6 support can be seen in section 5 5. 3 Requirements for software performance testing tools according to RFC-2544 3.1 User defined frame format Testing tool should be able to use test frame formats defined in RFC 2544 - Appendix C: Test Frame Formats. These exact frame formats should be used for specific protocol/media combination (ex. IP/Ethernet) and for testing other media combinations as a template. The frame size should be variable, so that we can determine a full characterization of the DUT (Device Under Test) performance. It might be useful to know the DUT performance under a number of conditions, so we need to place some special frames into a normal test frames stream (ex.
    [Show full text]
  • How to Generate Realistic Network Traffic? Antoine VARET and Nicolas LARRIEU ENAC (French Civil Aviation University) - Telecom/Resco Laboratory
    How to generate realistic network traffic ? Antoine Varet, Nicolas Larrieu To cite this version: Antoine Varet, Nicolas Larrieu. How to generate realistic network traffic ?. IEEE COMPSAC 2014, 38th Annual International Computers, Software & Applications Conference, Jul 2014, Västerås, Swe- den. pp xxxx. hal-00973913 HAL Id: hal-00973913 https://hal-enac.archives-ouvertes.fr/hal-00973913 Submitted on 4 Oct 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. How to generate realistic network traffic? Antoine VARET and Nicolas LARRIEU ENAC (French Civil Aviation University) - Telecom/Resco Laboratory ABSTRACT instance, an Internet Service Provider (ISP) providing access for Network engineers and designers need additional tools to generate software engineering companies manage a different profile of data network traffic in order to test and evaluate, for instance, communications than an ISP for private individuals [2]. However, application performances or network provisioning. In such a there are some common characteristics between both profiles. The context, traffic characteristics are the most important part of the goal of the tool we have developed is to handle most of Internet work. Indeed, it is quite easy to generate traffic, but it is more traffic profiles and to generate traffic flows by following these difficult to produce traffic which can exhibit real characteristics different Internet traffic properties.
    [Show full text]
  • Openss7 IPERF Utility Installation and Reference Manual Version 2.0 Edition 8 Updated 2008-10-31 Package Iperf-2.0.8
    OpenSS7 IPERF Utility Installation and Reference Manual Version 2.0 Edition 8 Updated 2008-10-31 Package iperf-2.0.8 Brian Bidulock <[email protected]> for The OpenSS7 Project <http://www.openss7.org/> Copyright c 2001-2006 OpenSS7 Corporation <http://www.openss7.com/> Copyright c 1997-2000 Brian F. G. Bidulock <[email protected]> All Rights Reserved. Published by OpenSS7 Corporation 1469 Jefferys Crescent Edmonton, Alberta T6L 6T1 Canada This is texinfo edition 8 of the OpenSS7 IPERF Utility documentation, and is consistent with Iperf 2.0. This manual was developed under the OpenSS7 Project and was funded in part by OpenSS7 Corporation. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the con- ditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another lan- guage, under the same conditions as for modified versions. i Short Contents Preface ::::::::::::::::::::::::::::::::::::::::::::::::: 1 Quick Start Guide :::::::::::::::::::::::::::::::::::::::: 9 1 Introduction :::::::::::::::::::::::::::::::::::::::: 15 2 Objective ::::::::::::::::::::::::::::::::::::::::::: 17 3 Reference ::::::::::::::::::::::::::::::::::::::::::: 19 4 Conformance ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Realistic Network Traffic Profile Generation: Theory and Practice
    Realistic Network Traffic Profile Generation : Theory and Practice Antoine Varet, Nicolas Larrieu To cite this version: Antoine Varet, Nicolas Larrieu. Realistic Network Traffic Profile Generation : Theory and Practice. Computer and Information Science, Canadian Center of Science and Education, 2014, 7 (2), pp 1-16. 10.5539/cis.v7n2p1. hal-00955420 HAL Id: hal-00955420 https://hal-enac.archives-ouvertes.fr/hal-00955420 Submitted on 4 Mar 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Realistic network traffic profile generation: theory and practice Antoine Varet1 & Nicolas Larrieu1 1 ENAC Telecom/Resco Laboratory, Toulouse, France Correspondence: Nicolas Larrieu, ENAC, E-mail: [email protected] Abstract Network engineers and designers need additional tools to generate network traffic in order to test and evaluate application performances or network provisioning for instance. In such a context, traffic characteristics are the very important part of the work. Indeed, it is quite easy to generate traffic but it is more difficult to produce traffic which can exhibit real characteristics such as the ones you can observe in the Internet. With the lack of adequate tools to generate data flows with “realistic behaviors” at the network or transport level, we needed to develop our tool entitled “SourcesOnOff”.
    [Show full text]
  • A Tool for Evaluating Network Protocols
    XIOPerf : A Tool For Evaluating Network Protocols John Bresnahan, Rajkumar Kettimuthu and Ian Foster Mathematics and Computer Science Division Argonne National Laboratory Argonne, Illinois 60439 Email: {bresnaha,kettimut,foster}@mcs.anl.gov Abstract— The nature of Grid and distributed computing user typically has one simple question. What protocol is best implies network communication between heterogeneous systems for my needs? over a wide and ever-changing variety of network environments. Answering that question on paper can be a difficult task. Often times large amounts of data is stored in remote locations and must be transmitted in bulk. It is desirable to have the bulk Many factors must be identified and considered. Every proto- data transfers be as fast as possible, however due to the dynamic col has its strengths and could be a potential candidate. There networks involved it is often hard to predict what protocol will is no single fastest protocol for every situation. The best choice provide the fastest service for a given situation. In this paper most often depends on the environment in which the users we present XIOPerf, a network protocol testing and evaluation application exists. The user must consider at a minimum the tool. XIOPerf is a command line program written on top of GlobusXIO with a simple and well defined interface to many following parameters: different protocol implementations. XIOPerf was created to give Network type: Is it a dedicated link, or does some users a way to quickly and easily experiment with an open quality of service guarantee that a portion of the ended set of protocols over real networks to determine which will bandwidth is dedicated to the user? best suit their needs.
    [Show full text]
  • EXPERIMENTS on VIDEO STREAMING OVER COMPUTER NETWORKS Steven Becker University of Nebraska-Lincoln
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Technical reports Computer Science and Engineering, Department of 2012 EXPERIMENTS ON VIDEO STREAMING OVER COMPUTER NETWORKS Steven Becker University of Nebraska-Lincoln Follow this and additional works at: http://digitalcommons.unl.edu/csetechreports Becker, Steven, "EXPERIMENTS ON VIDEO STREAMING OVER COMPUTER NETWORKS" (2012). CSE Technical reports. 156. http://digitalcommons.unl.edu/csetechreports/156 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in CSE Technical reports by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. EXPERIMENTS ON VIDEO STREAMING OVER COMPUTER NETWORKS by Steven Becker A PROJECT REPORT Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Master of Science Major: Computer Science Under the Supervision of Dr. Byrav Ramamurthy Lincoln, Nebraska December, 2012 EXPERIMENTS ON VIDEO STREAMING OVER COMPUTER NETWORKS Steven Becker, M.S. University of Nebraska, 2012 Adviser: Dr. Byrav Ramamurthy Video traffic (including streaming video service) is dominating the Internet traffic today. Video can be streamed using a dedicated server, a content delivery network (CDN), or peer-to-peer (P2P) overlays across a network. Video can be transmitted in multiple formats and at different resolutions. Video is also being distributed to a variety of devices (fixed and mobile). In this project, we investigate the evolution of streaming video standards over time and the corresponding effects on the Internet that have occurred as a direct result of increasing video traffic.
    [Show full text]
  • Vysoke´Ucˇenítechnicke´V Brneˇ
    VYSOKE´ UCˇ ENI´ TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACˇ NI´CH TECHNOLOGII´ U´ STAV INFORMACˇ NI´CH SYSTE´ MU˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS NA´ STROJE PRO TESTOVA´ NI´ PROPUSTNOSTI SI´TEˇ BAKALA´ Rˇ SKA´ PRA´ CE BACHELOR’S THESIS AUTOR PRA´ CE PAVOL LOFFAY AUTHOR BRNO 2013 VYSOKE´ UCˇ ENI´ TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACˇ NI´CH TECHNOLOGII´ U´ STAV INFORMACˇ NI´CH SYSTE´ MU˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS NA´ STROJE PRO TESTOVA´ NI´ PROPUSTNOSTI SI´TEˇ COMPARISON OF OPEN-SOURCE SOFTWARE TOOLS FOR NETWORK DIAGNOSTICS BAKALA´ Rˇ SKA´ PRA´ CE BACHELOR’S THESIS AUTOR PRA´ CE PAVOL LOFFAY AUTHOR VEDOUCI´ PRA´ CE Ing. PETR MATOUSˇ EK, Ph.D. SUPERVISOR BRNO 2013 Abstrakt Cílem této práce je vytvoøit re¹er¹i existujících open source nástrojù, které jsou zaměřeny na diagnostiku síťového provozu pomocí měření propustnosti a dalších základních para- metrù. Práce se věnuje vytvoření metodiky pro testování a vzájemné porovnání nástrojù. Výsledkem práce je doporučení pro běžného uživatele spočívající v doporučení správného nástroje pro měření příslušného parametru síťového provozu. Abstract The aim of this work is to make a research of existing open source tools, which are concerned with the diagnosis of the network transmission in the form of measuring of throughput and other basic parameters. The work is devoted to the construction of methodics for testing and comparing devices between themselves. The result of the
    [Show full text]
  • Technische Universität Berlin Master Thesis Investigating a Reordering
    Technische Universit¨at Berlin Institut f¨ur Telekommunikationssysteme Internet Network Architectures Fakult¨atIV FG INET/MAR 4-4 Marchstr, 23 10587 Berlin http://www.inet.tu-berlin.de Master Thesis Investigating a reordering robust TCP for storage cluster and data center use. Puneeth Nanjundaswamy Matriculation Number: 0359759 01.06.2015 Supervised by: Prof. Dr. Anja Feldmann, Ph.D Dr. Lars Eggert, Ph.D Dr. Alexander Zimmermann, Ph.D NetApp Germany GmbH Sonnenallee 1 85551 Kirchheim bei M¨unchen This dissertation originated in cooperation with the NetApp Germany GmbH. I would like to take this opportunity to thank my supervisor at NetApp, Dr. Lars Eggert for providing me with the wonderful opportunity to work on my master thesis at NetApp, Munich and for all the great support. It was a wonderful experience working with you and I thoroughly enjoyed it. I would also like to thank Dr. Alexander Zimmermann for providing me with all the support and motivation while working on my master thesis. Furthermore, I would also like to thank Dr. Douglas Santry for all the support and helpful advices during my stint at NetApp. Acknowledgement I would like to thank Prof. Anja Feldmann for providing me with the opportunity to work on my master thesis at INET, TU Berlin. I would also like to thank Dr. Prom´eth´e Spathis at UPMC Paris, Nina Reinecke at TU Berlin and all the members of EIT ICT Labs for their continuous support during my Masters program. I would like to dedicate this work to my family for their continuous unwavering support, my best friends Sunil C Ramanarayanan, Nakul Ganesh for being there and helping me and the entire Erasmus group from Paris.
    [Show full text]