Professional Documents
Culture Documents
Evaluation of TCP and UDP Traffic Over Software-Defined Networking
Evaluation of TCP and UDP Traffic Over Software-Defined Networking
Evaluation of TCP and UDP Traffic Over Software-Defined Networking
7
suggests reliable transmission framework schemes topologies are available today, such as single topology,
provide applications and this scheme analyzed packet linear topology, bus topology, tree topology, and star
format transformations, packet buffering, and topology.
retransmission mechanisms on switches. Analyzing TCP and UDP traffic are used the three
Diyar et al [4] observed the traffic and measured the different topologies to determine the performance of the
network traffic statistics from network devices in the SDN infrastructure. Testing and evaluation of topologies
SDN. To obtain traffic statistics offered a mechanism by are as follows:
using OpenFlow characteristics and investigated the effect Firstly, the single topology described in figure 1,
of the querying frequency on the information accurate and consists of 12 hosts (h1, h2, h3, …, h12), 1 OpenFlow
network load. In paper [5], the authors presented that switch (s1), and an OpenFlow SDN controller (c0)
maximum throughput and minimum delay to achieve for controlling the switch. To create a single topology, we use
the non-saturated case. the command “mn --topo single,12 --mac --switch ovsk --
Al-Somaidai et al [6] reviewed five different versions controller remote,ip=127.0.0.1” as in figure 1.
of OpenFlow switch standard including 1.0 to 1.4, four
different platforms for simulation and emulation of SDN
containing Mininet, EstiNet, NS-3 and Trema, seven
brands of controllers including NOX, POX, Beacon, Ryu,
Mul, Floodlight, OpenDaylight, and also various switch
software and tools. They discussed floodlight and
OpenDaylight as the controllers with good documentation
and adaptability.
Orebaugh et al [7] introduced the network analysis and
provided an understanding of Wireshark and its features
and also supported troubleshooting over network
architecture. Wang et al [8] introduced the characteristics
and functions of Wireshark, and explained the analysis of
Wireshark and described the various applications in the
TCP/IP protocol by some specific examples.
3. Experimental Setup
Figure 1. Single Topology
The experimental setup for the evaluation of traffic
analysis is using the specifications shown in Table 1. Secondly, the linear topology illustrated in figure 2,
consists of 12 hosts (h1, h2, h3, …, h12), 12 OpenFlow
Table 1. Experiment Specifications switches (s1, s2, s3, …, s12), and an OpenFlow SDN
controller (c0) controlling every switch. The command
“mn --topo linear,12 --mac --switch ovsk --controller
Type Description
remote,ip=127.0.0.1” in figure 2 create the linear
Laptop (Physical Intel(R) Core (TM) i5-5200U CPU topology.
Machine) @ 2.20GHz 2.19GHz with
Microsoft Windows 8.1 Pro 64bits
OS, HP Laptop PC and 12 GB
memory.
VirtualBox (Virtual Oracle VirtualBox 6.0 hypervisor
Machine on Laptop) software (Ubuntu 16.04, 8 GB
RAM, 64bits OS).
Mininet [9] To emulate virtual SDN networks.
ONOS Controller [10] Java-based controller running on
controller port 6633.
OpenFlow Protocol Communication interface:
[11] between the control and data
plane of an SDN architecture.
8
Finally, the custom tree topology exhibited in figure 3, over Mininet and save it into the PCAP file to evaluate
consists of 12 hosts (h1, h2, h3, … h12), five OpenFlow the difference between TCP and UDP traffic.
switches (s1, s2, s3, s4, s5), and an OpenFlow SDN
controller (c0) controlling every switch. The custom Table 2. Parameter Value
topology is provided with 5 switches and 12 hosts by
Parameter Test I Test II
running “topo-5sw-12hosts.py” script in the Mininet
terminal. Payload 100 M Bytes 100 M Bytes
Window Size (TCP) 85.3 Kbytes 85.3 Kbytes
Window Size (UDP) 208 Kbytes 208 Kbytes
Interval 1 second 1 second
Time 20 seconds 30 seconds
9
Table 3. Shell script file for the iperf-server1 Table 4. Shell script file for the iperf-client1
(10.0.0.1) (10.0.0.7)
#!/bin/bash #!/bin/bash
… …
base_port=6000 base_port=6000
… …
10
𝑇ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡 = 𝑊𝑖𝑛𝑑𝑜𝑤 𝑆𝑖𝑧𝑒 ∗ 𝑅𝑇𝑇 (1) 4.2. Packet Loss
where, the window size is the packet size of TCP and The packet cannot arrive at the destination due to
UDP traffic, and round-trip time (RTT) is the amount of including timeout errors and traffic congestions. In this
time for a packet to travel from source to destination and section, packet loss of both TCP and UDP traffic is
then back to the source. discussed for three different network topologies, which
After the two testings, the default TCP buffer length is evaluation results as shown in figure 8. Also, the
85.3 Kbytes and the UDP buffer length is 208 Kbytes. following formula is used to determine the packet loss.
According to the packet size, the throughput of both TCP 𝑃𝑎𝑐𝑘𝑒𝑡 𝐿𝑜𝑠𝑠 = 𝛴 𝑃𝑠𝑒𝑛𝑡 - 𝑃𝑟𝑒𝑐𝑒𝑖𝑣𝑒 (2)
and UDP traffic is described for three different network
topologies which simulation results as shown in figure 7. Notably, 𝑃𝑠𝑒𝑛𝑡 stands for the total number of the
The throughput fell off dramatically during the retransmit transmitted packets and 𝑃𝑟𝑒𝑐𝑒𝑖𝑣𝑒 stands for the total
sequence. By analyzing the simulation results, throughput number of received packets.
is changing depending on different payload sizes with a TCP must surely for no packet loss because TCP is a
time interval for both traffic flow. connection-oriented and reliable data transfer protocol.
According to the evaluation results, as shown in Table 5,
some UDP traffic has the datagram out of order.
However, the single topology didn't occur the datagram
out of order, the linear topology is increased in datagram
out of analyzes, and also the custom tree topology has
some packet loss.
TCP TCP
UDP UDP
(a) (b)
TCP TCP
UDP UDP
(c) (d)
TCP TCP
UDP UDP
(e) (f)
Figure 7. Comparison of Throughput (a) Test I single topology, (b) Test II single topology, (c) Test I
linear topology, (d) Test II linear topology, and, (e) Test I custom tree topology, (f) Test II custom tree
topology
11
Table 5. Comparison of UDP Packet Loss (Clients is sending parallel UDP Packets for 20 seconds and
30 seconds testing with every interval 1 second)
Custom Custom
Single Linear Single Linear
Tree Tree
Topology Topology Topology Topology
Packet Loss Topology Topology
(20 sec) (20 sec) (30 sec) (30 sec)
(clients connect to (20 sec) (30 sec)
servers with UDP) UDP UDP UDP UDP UDP UDP
Server 4 <==> Client 4 0/178 13/ 178 1/178 0/267 57/267 0/267
5. Conclusion
[4] Diyar, H.J, Khirota, Y.G, Okumus, I.T. Getting traffic
This paper mainly focuses on TCP vs UDP traffic statistics from network devices in an SDN environment
flows over SDN architecture. The emulation results using OpenFlow. Information Technology and Systems.
obtained from the TCP and UDP traffic flows for three Sep:951-6, 2015.
different topologies with different parameter settings. It is
also monitoring the traffic flow scenario (i.e. how the [5] Umeh, O.A., Akpado, K.A., Okechukwu, G.N.,
packet flows from source host to the destination host) by Ejiofor, H.C. Throughput and delay analysis in a real-time
capturing from the Wireshark network protocol analyzer network. Int. J. Eng. Appl. Sci. (IJEAS), 2, 27–34, 2015.
generated from iPerf while analyzing throughput and
packet loss. According to the evaluation results, the [6] Al-Somaidai MB, Yahya EB. Survey of software
throughput of TCP falls off dramatically during the components to emulate OpenFlow protocol as an SDN
retransmission sequence. It has also been observed that implementation. American Journal of Software
throughput is changing according to varying the packet Engineering and Applications; 3(6):74-82, Dec 2014.
size (payload size) with a different buffer size of TCP and
UDP traffic. [7] Orebaugh A, Ramirez G, Beale J. Wireshark &
In future work, we will further investigate to provide Ethereal network protocol analyzer toolkit. Elsevier; 18-
the performance of the traffic flows to handle the different Dec-2006.
traffic load based on the traffic flow pattern especially
TCP and UDP traffic to provide availability and [8] Wang S, Xu D, Yan S. Analysis and application of
reliability. Wireshark in TCP/IP protocol teaching. In2010
International Conference on E-Health Networking Digital
Ecosystems and Technologies (EDT), Vol. 2, pp. 269-
6. References 272, IEEE, 17-April-2010.
[1] B. Underdahl, G. Kinghorn, Software Defined [9] Mininet Network Emulator, http://mininet.org.
Networking For Dummies, Cisco Special Edition, John
Wiley & Sons, Inc., Hoboken, New Jersey, 2015. [10] ONOS Controller, http://www.onosproject.org.
[2] Lai, Y.-C., Ali, A., Hossain, M.S., Lin, Y.-D. [11] OpenFlow Switch Specification, version 1.3.5,
Performance modeling and analysis of TCP and UDP https://www.opennetworking.org/, 26-March-2015.
flows over software-defined networks. J. Netw. Comput.
Appl. 130, 76–88, 2019. [12] IPerf, https://www.iperf.fr/.
[3] Wang, M.H., Chen, L.W., Chi, P.W. and Lei, C.L. [13] Wireshark, https://www.wireshark.org/.
SDUDP: A reliable UDP-based transmission protocol
over SDN. IEEE Access, 5, pp.5904-5916, 2017.
12