Mathematical models for network card simulation and their empirical validations

Network simulations mostly focus on protocol observation, development, and prediction. However, newly developed protocol will take time to become standard and be implemented on network devices. A faster way of network improvement is to optimize existing network card parameters, because they are generic and protocol-independent. In this paper, we propose mathematical models to represent network card parameters, thus their optimal configuration can be predicted, which then will accelerate the reduced network speed caused by unoptimized network hardware. The simulation gaps that we fulfill are the inclusion of transmission size, packet polling based on timer, and packet polling based on watermark or packet capture threshold. The results generated and their validations show the accuracy of our models.

[1]  Parameswaran Ramanathan,et al.  HIP: hybrid interrupt-polling for the network interface , 2001, OPSR.

[2]  Scott Rixner,et al.  An efficient programmable 10 gigabit Ethernet network interface card , 2005, 11th International Symposium on High-Performance Computer Architecture.

[3]  Ryan K. L. Ko,et al.  Cloud computing vulnerability incidents: a statistical overview , 2013 .

[4]  Matthew Mathis,et al.  The macroscopic behavior of the TCP congestion avoidance algorithm , 1997, CCRV.

[5]  Donald F. Towsley,et al.  Modeling TCP Reno performance: a simple model and its empirical validation , 2000, TNET.

[6]  S. Floyd,et al.  Tcp-friendly unicast rate-based flow control , 1997 .

[7]  Thomas Dreibholz,et al.  Enhancement of the TCP module in the OMNeT++/INET framework , 2010, SimuTools.

[8]  François Baccelli,et al.  Impact of TCP-like congestion control on the throughput of multicast groups , 2002, TNET.

[9]  Matthew Mathis,et al.  The stationary behavior of ideal TCP congestion avoidance , 1996 .

[10]  Fernando Paganini,et al.  Internet congestion control , 2002 .

[11]  Klaus Wehrle,et al.  The Linux networking architecture : design and implementation of network protocols in the Linux kernel , 2005 .

[12]  Sally Floyd,et al.  Simulation-based comparisons of Tahoe, Reno and SACK TCP , 1996, CCRV.

[13]  R. Srikant,et al.  Exponential-RED: a stabilizing AQM scheme for low- and high-speed TCP protocols , 2005, IEEE/ACM Trans. Netw..

[14]  Larry L. Peterson,et al.  Understanding TCP Vegas: a duality model , 2001, JACM.

[15]  Muriel Médard,et al.  Modeling network coded TCP throughput: a simple model and its validation , 2011, VALUETOOLS.

[16]  Marco Ajmone Marsan,et al.  Modeling short-lived TCP connections with open multiclass queuing networks , 2004, Comput. Networks.

[17]  Eitan Altman,et al.  Analysis of two competing TCP/IP connections , 2002, Perform. Evaluation.