Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2014, 2(2), 14-22
DOI: 10.12691/jcsa-2-2-1
Open AccessArticle

Network Performance Evaluation Based on Three Processes

Karima Velásquez1 and Eric Gamess2,

1Laboratorio de Comunicación y Redes, Central University of Venezuela, Caracas, Venezuela

2Escuela de Computación, Central University of Venezuela, Caracas, Venezuela

Pub. Date: May 20, 2014

Cite this paper:
Karima Velásquez and Eric Gamess. Network Performance Evaluation Based on Three Processes. Journal of Computer Sciences and Applications. 2014; 2(2):14-22. doi: 10.12691/jcsa-2-2-1

Abstract

Network performance evaluation has traditionally been done following the client/server model, using two processes to carry out the evaluation. In this paper we present a different approach. We propose an enhancement to the classical performance evaluation by using three processes: client, server, and a middle process that reports additional gauges which allow users to more accurately and rapidly detect network anomalies. For this third process we wrote two versions: one for PC-based routers, and the other for off-the-shelf wireless routers. The former version was presented in one of our previous works. In this paper, we present our experience in writing and porting our application to wireless routers. Additionally, we perform different experiments to validate the correctness of the results reported. Furthermore, we present additional experiments that illustrate another possible uses for our tool.

Keywords:
benchmarking tools performance evaluation network monitoring

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  K. Velásquez and E. Gamess. “3bench: A Benchmarking Tool based on Three Processes”. Journal of Convergence Information Technology. Volume 8, Number 14. pp. 55-68. September 2013.
 
[2]  V. Kemerlis, E. Stefanis, G. Xylomenos, and G. Polyzos. “Throughput Unfairness in TCP over WiFi”. In Proceedings of the 3rd Annual Conference on Wireless On Demand Network Systems and Services (WONS 2006). Les Ménuires, France. January 2006.
 
[3]  J. Pacheco, H. Veiga, C. Ribeiro, and A. Reis. “Comparative Performance Evaluation of Wi-Fi IEEE 802.11 A,G WEP PTP Links”. In Proceedings of the World Congress on Engineering 2012 Vol II (WCE 2012). London, U.K. July 2012.
 
[4]  J. Pacheco de Carvalho, H. Veiga, N. Marques, C. Ribeiro Pacheco, and A. Reis. “Laboratory Performance of Wi-Fi IEEE 802.11 B,G WPA2 Point-to-Point Links: a Case Study”. In Proceedings of the World Congress on Engineering 2011 Vol II (WCE 2011). London, U.K. July 2011.
 
[5]  I. Qazi and P. Gandhi. “Performance Evaluation of Wireless Network Coding under Practical Settings”. Department of Computer Science University of Pittsburgh. Technical Report TR-07-150. Pittsburgh, USA, May 2007.
 
[6]  S. Wang, Y. Chen, T. Lee, and A. Helmy. “Performance Evaluations for Hybrid IEEE 802.11b and 802.11g Wireless Networks”. In Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC 2005). New York, USA. April 2005.
 
[7]  M. Heusse, F. Rousseau, G. Berger-Sabbatel, and A. Duda. “Performance Anomaly of 802.11b”. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003). Grenoble, France. April 2003.
 
[8]  S. Narayan, T, Feng, X. Xu, and S. Ardham. “Impact of Wireless IEEE802.11n Encryption Methods on Network Performance of Operating Systems”. In Proceedings of the Second International Conference on Emerging Trends in Engineering and Technology (ICETET-09). Nagpur, India. December 2009.
 
[9]  S. Kolahi, S. Narayan, D. Nguyen, Y. Sunarto, and P. Mani. “The Impact of Wireless LAN Security on Performance of Different Windows Operating Systems”. In Proceedings of the Symposium on Computers and Communications (ISCC 2008). Marrakech, Morocco. July 2008.
 
[10]  K. Velásquez and E. Gamess. “A Survey of Network Benchmark Tools”. Machine Learning and System Engineering. pp. 465-480. Springer. 2010.
 
[11]  S. Avallone, A. Botta, A. Dainotti, W. de Donato, and A. Pescapé. “D-ITG V. 2.6.1d Manual”. May 2008.
 
[12]  P. Asadoorian and L. Pesce. Linksys WRT54G Ultimate Hacking. Syngress. July 2007.
 
[13]  C. Hallinan. Embedded Linux Primer: A Practical Real-World Approach. 2nd ed. Prentice Hall. November 2010.
 
[14]  S. Hemminger. “Network Emulation with NetEm”. In Proceedings of Australia's 6th National Linux Conference. Canberra, Australia. April 2005.
 
[15]  K. Velásquez and E. Gamess. “A Comparative Analysis of WAN Emulators”. In Proceedings of Latin American Networking Conference (LANC’2012). Medellin, Colombia. October 2012.
 
[16]  S. Bradner and J. McQuaid. Benchmarking Methodology for Network Interconnect Devices. RFC 2544. March 1999.