skip to main content
10.5555/1268256.1268287guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Dummynet and forward error correction

Published: 15 June 1998 Publication History

Abstract

In this paper we present a couple of tools developed by the author on FreeBSD, and available from the author's Web page in source format. The first one, called dummynet, is a tool designed for the performance evaluation of network protocols and applications. Despite its original design goal, there has been a lot of interest on using dummynet as a bandwidth manager in network servers. dummynet simulates the effect of finite queues, bandwidth limitations, and queueing delays, and is embedded in the protocol stack of the host, allowing even complex experiments to be run on a single machine, using existing applications and protocol implementations.
The second tool is a software implementation of an erasure code especially suited for use in network protocols. Erasure codes are used in Forward Error Correction (FEC) techniques to reduce or remove the need for retransmissions in presence of communiction errors. FEC has been rarely used in network protocols, because of the encoding/decoding overhead, and also because the underlying theory of error correcting codes is generally not well known to network researchers. In this paper we discuss the theory behind a simple erasure code, and provide performance data to show that the encoding/decoding overhead is acceptable for many applications even on low-end machines.

References

[1]
{1} A. Albanese, J. Bloemer, J. Edmonds, M. Luby, M. Sudan, "Priority Encoding Transmission", 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Science Press, 1994.
[2]
{2} R.E. Blahut, "Theory and Practice of Error Control Codes" Addison Wesley, MA, 1984.
[3]
{3} S. Deering, "Multicast Routing in a Datagram Internetwork", PhD Thesis, Stanford University, Dec. 1991.
[4]
{4} A. Heybey, "The network simulator", Technical Report, MIT, Sept.1990.
[5]
{5} C. Huitema, "The Case for packet level FEC", Proc. 5th Workshop on Protocols for High Speed Networks, pp.109-120, sophia Antipolis, France, Oct.1996.
[6]
{6} S. Keshav, "REAL: A Network Simulator", Technical Report 88/472, Dept. of Computer Science, UC Berkeley, 1988. http://netlib.att.com/~Keshav/papers/real.ps.Z, ftp://ftp.research.att.com/dist/qos/REAL.tar
[7]
{7} S. Lin, D.J. Costello, M. Miller, "Automatic-repeat-request error-control schemes", IEEE Comm. Magazine, v.22,n.12, pp.5-17, Dec. 1984.
[8]
{8} M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, and V. Stemann. "Practical loss-resilient codes", Proc. of the Twenty-Ninth Annual ACM Symp. on Theory of Computing, El Paso, Texas, 4-6 May 1997.
[9]
{9} S. McCanne, S. Floyd, ns-LBNL Network Simulator (http://www-nrg.ee.lbl.gov/ns/)
[10]
{10} S. McCanne, V. Jacobson, and M. Vetterli, "Receiver-driven Layered Multicast", ACM SIGCOMM'96, August 1996, Stanford, CA, pp.1-14.
[11]
{11} J. Nonnenmacher, E.W. Biersack, D. Towsley, "Parity-Based Loss Recovery for Reliable Multicast Transmission", SIGCOMM'97, Cannes, France, 14-18 Sep.1997.
[12]
{12} J. Nonnenmacher, E.W. Biersack, "Optimal Multicast Feedback", Proc. of INFOCOM'98, S. Francisco, Mar.29-Apr.2 1998, IEEE.
[13]
{13} "Numerical Recipes in C: the Art of Scientific Computing", Cambridge University Press.
[14]
{14} L. Rizzo, "Dummynet: a simple approach to the evaluation of network protocols", ACM Computer Communication Review, Vol.27, n.1, January 1997, pp.31-41.
[15]
{15} L. Rizzo, Effective erasure codes for reliable computer communication protocols", ACM Computer Communication Review, Vol.27, n.2, April 1997, pp.24-36. http://www.iet.unipi.it/~luigi/fec.ps
[16]
{16} L. Rizzo, L. Vicisano, "RMDP: an FEC-based Reliable Multicast protocol for wireless environments", ACM Mobile Computing and Communications Review, Vol.2, n.2, April 1998.
[17]
{17} E. Schooler, J. Gemmel, "Using Multicast FEC to solve the Midnight Madness Problem", Microsoft Research Tech. Report MSR-TR-97-25.
[18]
{18} L. Vicisano, L. Rizzo, J. Crowcroft, "TCP-like congestion control for layered multicast data transfer", Proc. of INFOCOM'98, S. Francisco, Mar.29-Apr.2 1998, IEEE.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ATEC '98: Proceedings of the annual conference on USENIX Annual Technical Conference
June 1998
476 pages

Publisher

USENIX Association

United States

Publication History

Published: 15 June 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media