Optimizing bulk data transfer performance: a packet train model
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Measured capacity of an Ethernet: myths and reality
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
The experimental literature of the internet: an annotated bibliography
ACM SIGCOMM Computer Communication Review
Improving the efficiency of the OSI checksum calculation
ACM SIGCOMM Computer Communication Review
Evaluation of retransmission strategies in a local area network environment
SIGMETRICS '89 Proceedings of the 1989 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Traffic characterization of the NSFNET national backbone
SIGMETRICS '90 Proceedings of the 1990 ACM SIGMETRICS conference on Measurement and modeling of computer systems
Network locality at the scale of processes
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
Network locality at the scale of processes
ACM Transactions on Computer Systems (TOCS)
Measured capacity of an Ethernet: myths and reality
ACM SIGCOMM Computer Communication Review - Special twenty-fifth anniversary issue. Highlights from 25 years of the Computer Communication Review
Passive NFS Tracing of Email and Research Workloads
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Passive NFS tracing of email and research workloads
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Hi-index | 0.00 |
This study analyzes the communication traffic on a medium- size Ethernet local area network that connects file servers to diskless workstations. Our measurements differ from those of other studies in two important aspects. First, the Ethernet traffic is much higher than any previous ones. For each packet, all the protocol information was extracted and recorded on tapes along with the packet arrival time. Less than one percent of the total number of packets was lost. The clock used to timestamp the packet records had a one-microsecond resolution. In this paper we describe the measurement methodology, present the traffic statistics, and compare our traffic characteristics with those reported in a 1979 study by Shoch and Hupp. We detail the behavior of each of the protocols responsible for a significant proportion of the total traffic. Our study suggests that protocol behavior is sup-optimal. Traffic patterns are highly skewed: a single client workstation, under normal usage, can generate for and request from a file and paging server data amounting to more than 20 percent of the total raw Ethernet bandwidth. In addition, protocol timers cause numerous, unnecessary retransmissions.