Publication number | US20100177643 A1 |

Publication type | Application |

Application number | US 12/730,122 |

Publication date | Jul 15, 2010 |

Priority date | Jun 28, 2002 |

Also published as | US7729268, US20050111487 |

Publication number | 12730122, 730122, US 2010/0177643 A1, US 2010/177643 A1, US 20100177643 A1, US 20100177643A1, US 2010177643 A1, US 2010177643A1, US-A1-20100177643, US-A1-2010177643, US2010/0177643A1, US2010/177643A1, US20100177643 A1, US20100177643A1, US2010177643 A1, US2010177643A1 |

Inventors | Johnny Mikhael Matta, Ravi Kumar Jain |

Original Assignee | Johnny Mikhael Matta, Ravi Kumar Jain |

Export Citation | BiBTeX, EndNote, RefMan |

Patent Citations (4), Referenced by (21), Classifications (24) | |

External Links: USPTO, USPTO Assignment, Espacenet | |

US 20100177643 A1

Abstract

A method of estimating bandwidth capacity, available bandwidth and utilization along a path in an IP network is disclosed. ICMP time-stamp requests are sent from a source host on the edge or inside the network to all routers on the end-to-end path to a desired destination. Differences between time-stamp values are used as indicators of QoS service at each router. The collected measurements are then processed at the sending host to infer QoS parameters in terms of path capacity in bit/sec, available bandwidth in bits/sec, individual link utilization and congestion at each router. These parameters can be combined to infer the QoS service in terms of bandwidth on the end-to-end path.

Claims(4)

probing an end-to-end path to identify capacity of routers on the end-to-end path;

transmitting a ping request to a hop on the path;

receiving a ping reply; and

processing the ping reply to generate a quality of service (QoS) estimate.

probe an end-to-end path to identify capacity of routers on the end-to-end path;

transmit a ping request to a hop on the path;

receive a ping reply; and

process the ping reply to generate a quality of service (QoS) estimate.

Description

- [0001]This application is a continuation of U.S. patent application Ser. No. 10/797,404, entitled “Method and Apparatus for Quality of Service Determination”, which is a continuation-in-part of U.S. patent application Ser. No. 10/185,131, entitled “Catprobe”, filed Jun. 28, 2002.
- [0002]The present patent application claims priority to U.S. provisional patent application Ser. Nos. 60/457,902, entitled “Wirelesscat,” filed on Mar. 27, 2003 and 60/533,186, entitled, “Catprobe,” filed on Dec. 29, 2003, and are hereby incorporated by reference herein.
- [0003]The present invention relates generally to IP communication networks and more particularly to a quality of service estimation method for communication paths on IP networks.
- [0004]The “best-effort” nature of the Internet makes the QoS (Quality of Service) perceived by end users unpredictable and sometimes largely varying. Fast, accurate and efficient tools for estimating QoS performance of IP networks are gaining importance in the networking community. This is because such information can be used to maintain expected user and provider service under the varying conditions inherent to packet networks, especially the Internet. Specific applications include congestion control, real-time streaming and two-way communication, QoS verification, server selection and network administration.
- [0005]QoS estimation can be broadly classified into two categories: passive monitoring and active monitoring. The passive monitoring approach has the advantage of not injecting additional probing traffic into the network. It observes the network as it is, meaning that the measurements are an assessment of true network behavior since this latter is not disturbed by probing traffic intended for those measurements.
- [0006]The monitoring can take different levels of granularity depending on the degree of processing, storage and resources available. Packet monitoring, for example, allows observation of packet-by-packet information such as packet delay variation, packet size distribution, and throughput between host pairs. A higher level, with less overhead, can be achieved by flow level measurements to record the total number of bytes transferred, the flow start and finish time, among others.
- [0007]The main advantage of passive probing techniques is that they do not introduce a load on the network they monitor, which also means they do not distort the network traffic and therefore produce realistic estimates. However, their handicap is that they rely on existing traffic, which is not guaranteed to have desired characteristics for certain measurements. Bottleneck bandwidth measurement techniques, for example, require a certain packet size distribution and inter-packet departure rate often not met. Traffic monitoring consists in passively observing traffic characteristics for the purpose of inferring network performance.
- [0008]SNMP (Simple Network Management Protocol) and RMON (Remote Monitoring) are the most widely adopted standards for passive monitoring and typically consist of management agents or probes installed at various network elements (hosts, routers, switches), a MIB (management information base) containing collected data from the agents, a management station or console, which collects the information from the probes, and a protocol for the exchange of information between stations and probes. MIBs comprise several groups such as statistics collected at the physical or IP layers for packet sizes, CRC errors, and so forth. Traffic monitoring with administrative control requires the transfer of collected information from agents to consoles, thus placing a burden on the network being monitored. Sometimes, sampling of data in MIBs can be used to reduce the amount of traffic exchanged.
- [0009]Active monitoring obtains an inference of network QoS by sending probes across the network and observing the treatment they receive in terms of delay in delivery to the destination, variability in that delay and loss. A large variety of such tools exist to estimate performance in terms of delay, jitter, packet loss, and bandwidth. They generally either use Internet Control Message Protocol (ICMP) error messaging capabilities or packet dispersion techniques.
- [0010]Link capacity estimation in bits/sec has traditionally been achieved through the use of packet dispersion techniques, which consist of the successive transmission of groups of two or more packets. The concept is that packets from the same group will queue one after another at the bottleneck link of the path. With the absence of large interference from competing traffic (i.e. from other sources), the dispersion (i.e. the difference in packet arrival times at the receiver) will be inversely proportional to the bandwidth of the bottleneck. Examples of tools using this approach include Nettimer, Pathrate and Packet Bunch Mode (PBM).
- [0011]Another approach for capacity estimation builds on the ICMP Time Exceeded message option. Pathchar, the precursor of this technique, performs measurements by sending packets with increasing IP Time-to-Live (TTL) values, thereby forcing routers along the path to send back ICMP error messages and revealing themselves. A measurement of round-trip delays to successive hops on the end-to-end path thereby leads to per hop delay estimation. Pathchar also adds the feature of varying packet sizes for each TTL value, thus inferring link capacity as the slope inverse of the line connecting minimum observed delay for each packet size. Other tools exist like Pchar and Clink but they build on the same concepts as Pathchar.
- [0012]Cprobe and Pipechar were tools proposed to estimate available bandwidth on a path. These tools use long packet train dispersion and assume that dispersion of such trains is inversely proportional to the rate available for transmission at the bottleneck hop, i.e., available bandwidth. Recent research, however, has shown that the inverse of such dispersions does not in fact measure available bandwidth but another parameter referred to as ADR (Asymptotic Data Rate).
- [0013]Another tool, Delphi, assumes Internet paths can be modeled by a single queue, which makes it perform badly in the presence of large queuing delays at several links on the path or when the bottleneck capacity and bottleneck available bandwidth links are located at different links.
- [0014]At the present time, there is only one known tool that is capable of estimating available bandwidth, which is Pathload. Pathload operates by performing several iterations, varying the transmission rate at each and observing delay variation at the receiver, with a goal of finding the maximum rate that does not cause delay increase. Pathload builds on the simple principle that the observed end-to-end delay at the receiver increases when the transmission rate at the source exceeds the available bandwidth on the path; a realistic observation knowing that traffic injected onto the path faster than the bottleneck can service will cause queue build up at that hop, hence increasing queuing delay and delay altogether.
- [0015]A method and apparatus for estimating QoS in a network. In one embodiment, the method comprises probing an end-to-end path to identify addresses of all hops on the end-to-end path, generating at least one time-stamp request packet, transmitting the at least one time-stamp request packet to at least one hop on the end-to-end path, generating a time-stamp in response to the time-stamp request packet with the hop, and processing the time-stamp to produce at least one QoS estimate.
- [0016]The present invention will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the invention, which, however, should not be taken to limit the invention to the specific embodiments, but are for explanation and understanding only.
- [0017]
FIG. 1 illustrates an example of an IP network. - [0018]
FIG. 2 is a block diagram of router packet processing. - [0019]
FIG. 3 illustrates an exemplary varying of queue size with incoming rate. - [0020]
FIG. 4 is a flow diagram of one embodiment of a process for generating QoS estimates. - [0021]
FIG. 5 illustrates an exemplary ICMP time-stamp request processing at a desired pair of hops. - [0022]
FIGS. 6 and 7 show a model depicting the behavior of packets arriving at an access router (AR), traveling through a corresponding Access Point (AP), traversing a wireless link and reaching a remote terminal. - [0023]
FIG. 8 illustrates the relationship between variables regarding access points to remote terminal communication. - [0024]
FIG. 9 illustrates a Bernoulli model. - [0025]
FIG. 10 illustrates a Gilbert model. - [0026]
FIG. 11 is a graph depicting average and standard deviation of burst lengths. - [0027]
FIG. 12 illustrates a three-state Markov model. - [0028]
FIG. 13 illustrates a four-state Markov model. - [0029]A method and apparatus for producing QoS estimates for communication paths in IP networks are disclosed. The communication paths may be between two given routers or hosts on an IP network. The QoS estimation technique may be used on a regular basis to poll a desired transmission path. One embodiment of a method of producing estimates comprises first identifying network addresses of all routers or hosts on the end-to-end path of interest and then transmitting pairs of time-stamp requests to each router or host on the end-to-end path. Finally, the time-stamp requests that are returned by the routers or hosts are processed to produce QoS estimates. For the purpose of the present invention, the term “hop” will be used collectively to refer to routers and hosts along the end-to-end path between respective terminals or nodes.
- [0030]In one embodiment, the technique to obtain addresses of hops on the path uses a Traceroute application. In addition, in one embodiment, time-stamp requests are obtained using ICMP time-stamp request/reply options. After using Traceroute to determine the addresses of all hops on the desired path, a group of ICMP time-stamp requests is sent from the source at one end of the path to each router on the desired path. In one embodiment, the group of ICMP time-stamp requests comprise five ICPM time-stamp requests. The first three packets of each group are used to determine initial conditions for the measurement to the corresponding host or router (i.e., hop on the path). The remaining two probing packets of the group of five are used to obtain an estimate of the total time spent by an ICMP request packet at the corresponding hop.
- [0031]Another pair of similar ICMP time-stamp request packets is sent to each hop to similarly estimate the total time spent by an ICMP request packet at each hop. These may be sent at regular intervals. Such successive measurements may be used to infer queuing delay variation at each hop. In one embodiment, the estimates are formed at the originating source or node. In another embodiment, such estimates are formed at the receiver or destination node.
- [0032]In one embodiment, the total service time at each hop and the queuing delay variation are used to estimate the utilization in the direction of the path at each hop, which refers to the fraction of free transmission resources not used by competing traffic at the link. The estimates that are formed are also used to estimate the available bandwidth of each link in the direction of the path, which refers to the rate the link can further sustain without the occurrence of congestion and queue build up at the link. In addition, the estimates are used to estimate the rate of incoming traffic from competing sources to the link.
- [0033]In one embodiment, the technique described herein is performed by an application that resides at one node only that originates the QoS measurement. This node performs the processing required to generate QoS estimates based on collected time-stamp values from the hops. In another embodiment, this application resides at both source and receiver on the path of interest. In that case, the receiver may be in charge of processing the collected time-stamps and processing them. One difference in this embodiment is that ICMP packets sent to routers have an address spoofed to the destination such that replies are sent to the receiver instead of the source, which would have originated the ICMP requests.
- [0034]Further advantages of the present invention will be apparent from the following description, reference being made to the accompanying drawings wherein preferred embodiments of the invention are clearly illustrated.
- [0035]In the following description, numerous details are set forth to provide a more thorough explanation of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
- [0036]Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- [0037]It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- [0038]The present invention also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
- [0039]The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
- [0040]A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable medium includes read only memory (“ROM”); random access memory (“RAM”); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
- [0041]
FIG. 1 is a block diagram of one embodiment of an IP network. Referring toFIG. 1 , an IP network**10**is generally illustrated that includes hosts or routers**12**and at least two terminals or nodes communication with each other through respective hosts or routers**12**on IP network**10**. Information is communicated through the IP network**10**as packets or datagrams. The terms “packet” and “datagram” are used interchangeably herein to refer to a data package having a header. - [0042]The collection of hosts or routers
**12**and terminals or nodes at each end and the links connecting them constitute a path. When transmitting, a packet or datagram will make several hops in order to reach its destination. These hops may be across hosts or routers**12**and, as such, as used herein, the term “hop” should be construed to include both hosts and routers**12**. The transmitting node or terminal can be referred to as a path source (or source, in short) and the receiving node or terminal can be referred to as a path destination (or destination, in short). As illustrated, source terminals can either be remote terminals**14**or fixed terminals**16**. Likewise, destination terminals can be either remote terminals**18**or fixed terminals**20**. - [0043]In one embodiment, fixed terminals
**16**and**20**directly connect through a fixed link to a respective router**12**, remote terminals**14**and**18**connect through a wireless link**22**to an access point**24**. An access point may include a wireless communication tower**26**and a router**12**. Alternatively, an access point**24**may include a wireless local area network (WLAN) compliant access point**26**, such as an IEEE 802.11 access point with our without an associated router**12**. - [0044]Remote terminals
**14**and**18**are illustrated as wireless telephones, but those skilled in the art would recognize that other remote terminals such as personal digital assistants (PDA), laptops, or the like might be used on the wireless IP network**10**. As such, the depiction of a wireless telephone inFIG. 1 should be viewed in an illustrative sense and not as a limitation of the present invention. As further illustrated inFIG. 1 , each router**12**is connected to at least one other router**12**to enable IP packet transmission among terminals across the IP network**10**. - [0045]
FIG. 2 is a block diagram of one embodiment of IP packet processing in a router**12**. Referring toFIG. 2 , IP packets arrive at multiple ingress line cards**30**and enter an IP processing stage**32**. Packets are then typically placed in an input queue**34**or an output queue**36**, depending on the specific implementation of the router**12**. A switch fabric**38**directs packets to an appropriate egress line card**40**. Queuing can be at either the input to switch fabric**38**or the output (although most modern routers implement input queuing). However, it always occurs after IP processing**32**. As set forth in greater detail below, in the case of use of the ICMP time-stamp option, the time-stamp retrieved by the ICMP time-stamp request records the time before entry into input queues**34**or output queues**36**. The IP processing time is small since packets are usually handled at wire speed at that stage so that waiting time and the actual processing time for IP processing stage**32**are negligible compared to the queuing in switch fabric**38**and the transmission time at egress line cards**40**. Queuing of a packet after IP processing**32**is due to the waiting time of other packets to reach their turn for transmission. Queuing latency directly relates to the size of the queue upon arrival of the packet under consideration and the transmission speed of the link; the packet needs to wait for the queue ahead to empty before it can be transmitted. - [0046]In the discussion set forth below, the following notations are used and refer to the following items: t
_{n }or n in short is the continuous time at which an event is recorded; Q_{i}(n) is the size in bits of the queue in link i at time n; B_{i }the capacity of link i in bits/sec; R_{i}(n) is the sum of all incoming flow rates to the queue in link i in bits/sec at time n; q_{i}(n) is the queuing delay in router i at time n; u_{i}(n) is the utilization of link i at time n; and m is the packet size in bits. - [0047]For a packet entering the queue at time n, the size of the queue ahead of it is Q
_{i}(n). The queuing delay q_{i}(n) of that packet is the time required to empty the queue in link i at rate B_{i }(i.e., the queuing delay of the packet), which can be represented as: - [0000]
$\begin{array}{cc}{q}_{i}\ue8a0\left(n\right)=\frac{{Q}_{i}\ue8a0\left(n\right)}{{B}_{i}}& \left(1\right)\end{array}$ - [0000]The rate B
_{i }is referred to as capacity, the total bit forwarding speed of a link. In other words, it is the transmission rate of the link. This value is therefore fixed for a given router**12**and network wire configuration. - [0048]
FIG. 3 depicts the change in queue size (hence, queuing time) with the variation of incoming flow rates. As long as R_{i }is less than the speed B_{i }at which the link can serialize bits on output linecard**40**, the queue size will not increase. However, because of the bursty nature of Internet traffic, it is possible that R_{i }may exceed the capacity B_{i}, thereby causing queue build up. For the purpose of the present invention, the utilization of link i at time n is defined by: - [0000]

*u*_{i}(*n*)=*R*_{i}(*n*)/*B*_{i}(2) - [0000]Referring to
FIG. 3 , the following equation can be obtained: - [0000]
$\begin{array}{cc}{Q}_{i}\ue8a0\left(n\right)=\mathrm{max}\ue89e\left\{\sum _{r=1}^{n}\ue89e\left[{R}_{i}\ue8a0\left(r\right)-{B}_{i}\right]\ue89e\left({t}_{r}-{t}_{r-1}\right),0\right\}& \left(3\right)\end{array}$ - [0049]or:
- [0000]

*Q*_{i}(*n*)=max{[*R*_{i}(*n*)−*B*_{i}](*t*_{n}*−t*_{n−1})+*Q*_{i}(*n−*1),0} (4) - [0000]where, for simplicity, it is assumed that upon network initialization at time zero, the queue at all links is empty, hence Q
_{i}(0)=0, ∀i. - [0050]Note that the time interval (t
_{r−1}, t_{r}) is not set to unity since this interval will be varied later. Using equations (1) and (3): - [0000]
$\begin{array}{cc}{q}_{i}\ue8a0\left(n\right)=\frac{\mathrm{max}\ue89e\left\{\sum _{r=1}^{n}\ue89e\left[{R}_{i}\ue8a0\left(r\right)-{B}_{i}\right]\ue89e\left({t}_{r}-{t}_{r-1}\right),0\right\}}{{B}_{i}}& \left(5\right)\end{array}$ - [0000]Using equations (1) and (4):
- [0000]
$\begin{array}{cc}{q}_{i}\ue8a0\left(n\right)=\mathrm{max}\ue89e\left\{\frac{\left[{R}_{i}\ue8a0\left(n\right)-{B}_{i}\right]\ue89e\left({t}_{n}-{t}_{n-1}\right)}{{B}_{i}}+{q}_{i}\ue8a0\left(n-1\right),0\right\}& \left(6\right)\end{array}$ - [0000]Substituting equation (2) in (6) results in:
- [0000]

*q*_{i}(*n*)=max{[*u*_{i}(*n*)−1](*t*_{n}*−t*_{n−1})+*q*_{i}(*n−*1),0} (7) - [0051]
$\begin{array}{cc}{u}_{i}\ue8a0\left(n\right)=\mathrm{max}\ue89e\left\{\frac{\left[{q}_{i}\ue8a0\left(n\right)-{q}_{i}\ue8a0\left(n-1\right)\right]}{\left({t}_{n}-{t}_{n-1}\right)}+1,0\right\}& \left(8\right)\end{array}$ - [0052]The traversing time T
_{i}(n) is the time needed for a chunk of m bits to traverse a link at time n, namely: - [0000]
$\begin{array}{cc}{T}_{i}\ue8a0\left(n\right)=\frac{m}{{B}_{i}}+{q}_{i}\ue8a0\left(n\right)& \left(9\right)\end{array}$ - [0000]The quantity m/B
_{i }is also referred to as transmission time of the link; traversing time as defined herein is therefore the sum of transmission and queuing delays while neglecting propagation and processing delays. Using equation (7) in (9): - [0000]
${T}_{i}\ue8a0\left(n\right)=\frac{m}{{B}_{i}}+\mathrm{max}\ue89e\left\{\left[{u}_{i}\ue8a0\left(n\right)-1\right]\times \left({t}_{n}-{t}_{n-1}\right)+{q}_{i}\ue8a0\left(n-1\right),0\right\}$ - [0053]
$\begin{array}{cc}{B}_{i}=\frac{m}{{T}_{i}\ue8a0\left(n\right)-\mathrm{max}\ue89e\left\{\left[{u}_{i}\ue8a0\left(n\right)-1\right]\ue89e\left({t}_{n}-{t}_{n-1}\right)+{q}_{i}\ue8a0\left(n-1\right),0\right\}}& \left(10\right)\end{array}$ - [0000]Then, substituting equation (2) in (10):
- [0000]
$\begin{array}{cc}{R}_{i}=\frac{{u}_{i}\ue8a0\left(n\right)\ue89em}{{T}_{i}\ue8a0\left(n\right)-\mathrm{max}\ue89e\left\{\left[{u}_{i}\ue8a0\left(n\right)-1\right]\ue89e\left({t}_{n}-{t}_{n-1}\right)+{q}_{i}\ue8a0\left(n-1\right),0\right\}}& \left(11\right)\end{array}$ - [0054]Available bandwidth for a new flow is the rate a link can support such that the queue size (i.e., queuing delay) does not increase. In other words, available bandwidth is the fraction of the capacity B of the link that is not used by competing flows with sum of rates R:
- [0000]

*AvBw*_{i}(*n*)=*B*_{i}*−R*_{i}(*n*) (12) - [0000]Substituting equation (2) in (12) yields:
- [0000]

*AvBw*_{i}(*n*)=*B*_{i}[1*−u*_{i}(*n*)] - [0000]

*u*_{i}(*n*)≦1 (13) - [0000]AvBw
_{i}(n) is the available bandwidth of link i at time n. - [0055]The available bandwidth metric can be used to assess the margin of additional input flows the path can take before congestion starts building up, hence leading to increased delay and jitter. Bandwidth requirements for voice coders, for example, are in terms of available bandwidth.
- [0056]Throughput is usually measured by observing the time required to get a certain amount of bits across a link or path. As such, throughput is the ratio of bits to total time to get them through. Throughput of link i as measured at the receiver can therefore be written as follows:
- [0000]
$\begin{array}{cc}{\mathrm{ThrBw}}_{i}\ue8a0\left(n,k\right)=\frac{k}{\frac{k}{{B}_{i}}+{q}_{i}\ue8a0\left(n\right)}& \left(14\right)\end{array}$ - [0000]where ThrBw
_{i}(n,k) is throughput in bits/sec in link i at time n, k the size in bits of the data packets observed, which is also referred to as a data chunk (possibly composed of packets of different sizes), B_{i }the link capacity and q_{i }the queuing delay of the k bits chunk at the link. - [0057]Over a path comprised of several links, and using equation (14) the throughput equation becomes:
- [0000]
$\begin{array}{cc}\begin{array}{c}{\mathrm{ThrBw}}_{\mathrm{path}}\ue8a0\left(n,k\right)=\ue89e\frac{k}{\sum _{i\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\varepsilon \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\mathrm{path}}\ue89e\left[k/{B}_{i}+{q}_{i}\ue8a0\left(n\right)\right]}\\ =\ue89e\frac{1}{\sum _{i\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\varepsilon \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\mathrm{path}}\ue89e\frac{1}{{\mathrm{ThrBw}}_{i}\ue8a0\left(n,k\right)}}\end{array}& \left(15\right)\end{array}$ - [0000]The denominator on the right-hand side of equation (15) actually corresponds to the delay needed to traverse a link and path respectively. Throughput is therefore a good indicator of delay conditions in the network. As such, throughput does not in itself describe capacity or available bandwidth of the links or path as defined herein. It does relate to those metrics, however, in the following way:
- [0058]Equations (2) and (5) in the continuous domain also give:
- [0000]
${q}_{i}\ue8a0\left(n\right)=\mathrm{max}\ue89e\left\{{\int}_{{t}_{0}}^{{t}_{n}}\ue89e\left[{u}_{i}\ue8a0\left(r\right)-1\right]\ue89e\phantom{\rule{0.2em}{0.2ex}}\ue89e\uf74cr,0\right\}$ - [0000]Then, using equation (13):
- [0000]
${q}_{i}\ue8a0\left(n\right)=\mathrm{max}\ue89e\left\{-{\int}_{{t}_{0}}^{{t}_{n}}\ue89e\frac{{\mathrm{AvBw}}_{i}\ue8a0\left(r\right)}{{B}_{i}}\ue89e\uf74cr,0\right\}$ - [0000]Finally, this result in equation (14) gives:
- [0000]
$\begin{array}{cc}{\mathrm{ThrBw}}_{i}\ue8a0\left(n,k\right)=\mathrm{max}\ue89e\left\{\frac{{B}_{i}}{1-\frac{1}{k}\ue89e{\int}_{{t}_{0}}^{{t}_{n}}\ue89e{\mathrm{AvBw}}_{i}\ue8a0\left(r\right)\ue89e\phantom{\rule{0.2em}{0.2ex}}\ue89e\uf74cr},{B}_{i}\right\}& \left(16\right)\end{array}$ - [0059]
FIG. 4 is a general flow diagram of one embodiment of a process for generating QoS estimates. The process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both. The essence of the process consists of estimating the variation in queuing delay at successive hops. Then, equations (2), (10), (11) and (12) above are used to deduce the capacity B, available bandwidth AvBw, sum of incoming competing flow rates R and utilization u. - [0060]As depicted in
FIG. 4 , the process begins by processing logic identifying network addresses of all routers**12**(hops) along the path from path source**14**and**16**to path destination**18**and**20**(processing block**40**). In one embodiment, this is achieved using a Traceroute application. Next, processing logic obtains a first estimate of the queuing delay at each hop on the path (processing logic**42**). Processing blocks**40**and**42**form an initialization or bootstrap phase**44**of the processor. From then on, pairs of ICMP time-stamp requests are sent to each router**12**on a regular interval. This allows monitoring queuing delay variation**46**at routers**12**using the equations described above (processing block**48**). In one embodiment, each ICMP time-stamp request produces one estimate for each router**12**of the QoS parameters capacity, available bandwidth and throughput, which is illustrated as QoS estimates**50**inFIG. 4 . In addition, link utilization and size of competing traffic is estimated. Processing blocks**46**,**48**and**50**form a measurement phase (**52**). - [0061]In one embodiment, measurement begins by invoking Traceroute application to destination sources
**18**and**20**to identify all the hops on the end-to-end path. Once the list of hops is obtained, pairs of ICMP time-stamp requests are used to obtain the variation delay at each of the hops. Below is a discussion of how this is achieved for one hop, the procedure is identical for the remaining hops on the path. - [0062]
FIG. 5 depicts one embodiment of the processing of a pair of ICMP time-stamp requests**60**and**62**at consecutive routers**12**. Upon arrival at a router**64**, packet**60**receives a time-stamp from an IP processing unit**66**. Then, in one embodiment, packet**60**returns to its originator through a return queue**68**of router**64**. Packet**62**continues through a forward queue**70**through a link**72**and arrives at the IP processing unit**66**of router**74**where it receives a time-stamp. Then, in one embodiment, packet**62**returns to its originator through return queue**68**of the router**74**. - [0063]To obtain the queuing delay variation at the link from router
**64**to the router**74**depicted inFIG. 5 , two ICMP time-stamp requests are sent one after another with no time difference between the transmission of the last bit of the first packet and that of the first bit of the second packet. The ICMP request of the first packet is directed towards the first router**64**, while that of the second packet is sent to the second router**74**. Packets of the same pair are identified using an Identifier or Sequence Number field in the ICMP packet. - [0064]The time-stamp at the first router
**64**of the first packet of the pair is denoted by Θ_{i}^{1}; and that of the second packet of the same pair at the second router**74**by Θ_{i+1}^{2}. For the purpose of identifying different measurements on a time-scale and without loss of generality, it is assumed that the time-stamps reported by ICMP time-stamp requests of the same pair are both recorded at the time that the second packet of the pair receives its time-stamp. This is equivalent to the notation Θ_{i}^{1}(j) and Θ_{i+1}^{2}(j), meaning that both time-stamps are collected at the same time instant j. The following relation gives the difference between these two time-stamps: - [0000]
${\Theta}_{i+1}^{2}\ue8a0\left(j\right)-{\Theta}_{i}^{1}\ue8a0\left(j\right)=\frac{m}{{B}_{i}}+{q}_{i}\ue8a0\left(j\right)+{d}_{i\to i+1}\ue8a0\left(j\right)$ - [0000]where m is the size of the ICMP time-stamp request packet (namely 40 bytes; 20 bytes for each of ICMP and IP), q
_{i}(j) is the queuing delay of the packet pair j waiting to be transmitted from the first router**64**to the second router**74**, and d_{i→i+1}(j) is the propagation delay between the two routers. - [0065]In one embodiment, one assumption that is made is that the time-stamp of the first packet not only denotes the time at which the packet is leaving the IP processing stage at router
**64**, but also that of the second packet at the same stage. This assumption requires the two ICMP packets to arrive after the other at router**64**, i.e., no interfering traffic between the two packets until they reach router**64**to be queried. - [0066]Neglecting propagation and processing delay, the equation obtained is:
- [0000]
$\begin{array}{cc}{\Theta}_{i+1}^{2}\ue8a0\left(j\right)-{\Theta}_{i}^{1}\ue8a0\left(j\right)=\frac{m}{{B}_{i}}+{q}_{i}\ue8a0\left(j\right)& \left(17\right)\end{array}$ - [0000]Equation (17) above is the same as equation (9), i.e., it defines the traversing time across the link
**72**from router**64**to router**74**, taking into account the transmission and queuing times at that link and neglecting propagation and processing delays. - [0067]After the transmission of the first pair, the sender waits for a user-defined delay a before sending the next pair. In turn, the measurements collected are Θ
_{i}^{1}(j+1) and Θ_{i+1}^{2}(j+1). Therefore, the queuing delay variation is deduced as follows: - [0000]

[Θ_{i+1}^{2}(*j+*1)−Θ_{i+1}^{2}(*j*)]+[Θ_{i}^{1}(*j*)−Θ_{i}^{1}(*j+*1)]=*q*_{i}(*j+*1)−*q*_{i}(*j*) (18) - [0068]Now using equation (8):
- [0000]
$\begin{array}{cc}{u}_{i}\ue8a0\left(j+1\right)=\mathrm{max}\ue89e\left\{\frac{\left[{q}_{i}\ue8a0\left(j+1\right)-{q}_{i}\ue8a0\left(j\right)\right]}{\left[{\Theta}_{i+1}^{2}\ue8a0\left(j+1\right)-{\Theta}_{i+1}^{2}\ue8a0\left(j\right)\right]}+1,0\right\}\ue89e\text{}\ue89e{u}_{i}\ue8a0\left(j+1\right)=\mathrm{max}\ue89e\left\{\frac{\begin{array}{c}\left[{\Theta}_{i+1}^{2}\ue89e\left(j+1\right)-{\Theta}_{i}^{1}\ue8a0\left(j+1\right)\right]-\\ \left[{\Theta}_{i+1}^{2}\ue89e\left(j\right)-{\Theta}_{i}^{1}\ue8a0\left(j\right)\right]\end{array}}{{\Theta}_{i+1}^{2}\ue8a0\left(j+1\right)-{\Theta}_{i+1}^{2}\ue8a0\left(j\right)}+1,0\right\}& \left(19\right)\end{array}$ - [0000]where u
_{i}(j+1) is the utilization at link i**72**between router**64**and router**74**as observed between the two measurement pairs j and j+1 at time t_{j}, respectively. In addition: - [0000]
${\Theta}_{i}^{2}\ue8a0\left(j+1\right)-{\Theta}_{i}^{2}\ue8a0\left(j\right)=\alpha +\sum _{1\le k\le i}\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\Delta \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{q}_{k}\ue8a0\left(j\right)$ - [0069]From equation above,
- [0000]
$\sum _{1\le k\le i}\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\Delta \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{q}_{k}\ue8a0\left(j\right)$ - [0000]is the queuing delay variation happening at all upstreaming nodes before measured node i. As a result, the queuing delay set {Δq
_{k}(j),kε[1,l]} can only be solved iteratively. At first, the queuing delay at first node, Δq_{i}(j), is solved by - [0000]

Δ*q*_{1}(*j*)=Θ_{1}^{2}(*j+*1)−Θ_{1}^{2}(*j*)−α. - [0070]Next, assume, for any k<=N node, Δq
_{k}(j) is known, Δq_{N+1}(j) is calculated according to - [0000]
$\Delta \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{q}_{N+1}\ue8a0\left(j\right)={\Theta}_{N+1}^{2}\ue8a0\left(j+1\right)-{\Theta}_{N+1}^{2}\ue8a0\left(j\right)-\alpha -\stackrel{N}{\sum _{k=1}}\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\Delta \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{q}_{k}\ue8a0\left(j\right).$ - [0000]Now, the capacity B
_{i }can be determined using equation (17): - [0000]
$\begin{array}{cc}{B}_{i}=\frac{m}{{\Theta}_{i}^{2}\ue8a0\left(j\right)-{\Theta}_{i}^{1}\ue8a0\left(j\right)-{q}_{i}\ue8a0\left(j\right)}& \left(20\right)\end{array}$ - [0000]The unknown variable in equation (20) is the queuing delay at time t
_{j }in router**64**. However, it is known that: - [0000]

*q*_{i}(*j*)=*q*_{i}(*j−*1)+Δ*q*_{i}(*j−*1*,j*) (21) - [0000]where Δq
_{i}(j−1,j) is the variation in the queuing delay at router**64**as observed between packet pairs j−1 and j. Hence: - [0000]
$\begin{array}{cc}{q}_{i}\ue8a0\left(j\right)=\sum _{r=1}^{j}\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e\Delta \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{q}_{i}\ue8a0\left(r-1,r\right)+{q}_{i}\ue8a0\left(0\right)& \left(22\right)\end{array}$ - [0071]In equation (22), q
_{i}(0) is an estimate of the queuing delay encountered by packets of the first pair sent at the start of the measurement. An estimate of the first queuing delay q_{i}(0) at router**64**is obtained at the very start of the measurement process; first, by sending three consecutive ICMP time-stamp requests, the first one to router**64**and the next two to router**74**. This will lead to the following: - [0000]
${\Theta}_{i+1}^{3}\ue8a0\left(0\right)-{\Theta}_{i+1}^{2}\ue8a0\left(0\right)=\frac{m}{{B}_{i}\ue8a0\left(0\right)}$ - [0000]Hence, an estimate of the capacity B
_{i }at time 0 of the link from the first router**64**to the second router**74**is obtained: - [0000]
$\begin{array}{cc}{B}_{i}\ue8a0\left(0\right)=\frac{m}{{\Theta}_{i+1}^{3}\ue8a0\left(0\right)-{\Theta}_{i+1}^{2}\ue8a0\left(0\right)}& \left(23\right)\end{array}$ - [0072]The estimate of the capacity Bi will later be refined as the measurements progress as described below. However, the equation (17) at time 0 can also be written:
- [0000]
${\Theta}_{i+1}^{2}\ue8a0\left(0\right)-{\Theta}_{i}^{1}\ue8a0\left(0\right)=\frac{m}{{B}_{i}\ue8a0\left(0\right)}+{q}_{i}\ue8a0\left(0\right)$ - [0000]which, when plugged in to equation (23):
- [0000]

*q*_{i}(0)=2×Θ_{i+1}^{2}(0)−Θ_{i}^{1}(0)−Θ_{i+1}^{3}(0) (24) - [0000]This initial estimate of the queuing delay at link i can be used throughout the measurement process in equation (22). An estimate of the queuing delay can also be repeated at every measurement event through the same procedure of sending three consecutive ICMP packets to obtain a better estimate for use in equation (22).
- [0073]Once an estimate of q
_{i}(j) is obtained, it is used in equation (20) to estimate link capacity B_{i}. Hence, B_{i }can be estimated using equations (20), (22) and (24). Now, the sum of all incoming competing flows R, can be estimated using equations (2), (19), (20), (22) and (24). This is achieved by first estimating capacity B_{i}, then using equation (19) to estimate utilization and equation (2) to find R_{i}. In addition, available bandwidth AvBw_{i }can be estimated by using equations (2), (12), (19), (20), (22) and (24) through the same process. - [0074]In one embodiment, all routers
**12**are probed regularly and at the same frequency. In another embodiment, certain routers**12**can be probed more or less often based on queuing delay variation rate of those routers**12**. - [0075]In one embodiment, the path hop addresses are identified first before ICMP pair transmission begins. In another embodiment, such pair transmission begins for each hop as soon as that hop is identified.
- [0076]In one embodiment, ICMP time-stamp requests are the standard size as defined for ICMP protocol. In another embodiment, dummy data can be added in the IP payload field thereby increasing transmission time at the router, a useful feature for very fast links.
- [0077]In one embodiment, path identification and time-stamp requests are sent from either source or destination hosts. In another embodiment, different time-stamp requests and path identification can be sent from either source or receiver or other hosts on the network simultaneously. In addition, processing of measurements can be achieved at any, some or all hosts on the network including source and destination hosts.
- [0078]A further extension to the technique described herein includes avoiding the transmission of time-stamp request pairs beyond the slowest link on a path. This is to avoid dispersion between time-stamps as they arrive at the link of interest. To achieve this, probing takes place from either source or destination such that the bottleneck link is avoided. In one embodiment, observing the rate of variation of the different links identifies the bottleneck link. Another extension to the method is to further refine the precision of measurements by taking into account propagation delay on the links. This is achieved using a propagation delay estimate.
- [0079]A method and apparatus for estimating an end-to-end path packet loss rate in a network is described. In one embodiment, the method includes probing an end-to-end path to identify queue capacity of all routers on the end-to-end path, transmitting a ping request packet to a hop on the path, and processing a ping reply to produce a QoS estimate. In another embodiment, a method and operations for calculating a QoS value for a wireless link of an end-to-end network path includes measuring an average packet loss value for a wired portion of the network, and calculating a packet loss value for the wireless link as a function of the packet loss value for the wired portion of the network. The discussion of the present invention set forth below describes an embodiment for use with a wireless link
**22**, and is referred to herein as WirelessCAT. - [0080]Referring to
FIG. 1 , methods that assess network congestion across IP network**10**(such as by observing queuing delay variation at routers**12**along a desired path allow the estimation of available bandwidth AvBw. Although these techniques are used with wired networks, where congestion is solely due to queue build up at routers**12**, in a wireless link**22**, however, packet congestion may be due to several other factors, in addition to queuing congestion. These include contention for the medium in shared media technologies such as IEEE 802.11, GSM, PCS, and the like. Furthermore, packet congestion in a wireless network may be due to retransmission delay caused by random packet losses on the wireless link. - [0081]A method for measuring available wireless bandwidth is described for use with an illustrative wireless hop of an IEEE 802.11b wireless LAN. The method may be used with other technologies, and the use of an IEEE 802.11b wireless LAN (WLAN) for illustration herein is not intended to limit the invention claimed herein. The raw transmission rate at the physical layer in IEEE 802.11b changes dynamically between four rates: 1 Mbps, 2 Mbps, 5.5 Mbps and 11 Mbps. The selected rate varies according to the perceived Frame Error Rate (FER). The thresholds on FER for switching to a higher or lower rate are implementation-specific.
- [0082]In one embodiment, the first step for estimating available wireless bandwidth is obtaining the current total raw capacity of the wireless link. After obtaining the current raw capacity of the wireless link, the next step is to estimate packet congestion to assess how much of the raw link capacity is available.
- [0083]The wireless link raw capacity BPHY at the physical layer may be determined by software generally provided to users by manufacturers of WLAN devices. For example, Cisco Systems provides Aironet “350” client utility software for Windows CE 2.11. The Aironet “350” client utility software includes a site survey function whereby a client adapter may read the status of a wireless link every 250 msec. The Aironet “350” client utility software includes two operational modes: passive and active. In the passive mode, no additional RF traffic is generated by the utility, only actual traffic is monitored and a raw capacity BPHY is estimated. In the active mode, the software allows for setting the characteristics of active probing streams that will be transmitted to estimate performance. Such characteristics include the number of packets to be transmitted, packet size, packet inter-departure delay and raw transmission rate, which, in one embodiment, may be 1, 2, 5.5 or 11 Mbps.
- [0084]Packets traversing wireless links suffer from additional delays as compared to packets traversing wired links. On wired links, packets typically experience processing, transmission, congestion and propagation delays. On wireless links, packets may additionally experience contention and retransmission delays. As used herein, contention delay refers to the time required for a packet to “grab” a wireless channel, due to the shared nature of the medium. As used herein, retransmission delay refers to the time required to successfully transmit a packet across a lossy wireless link, which may require several attempts. Packet transmission on wireless links may be modeled as described below.
- [0085]
FIGS. 6 and 7 show a model depicting the behavior of packets arriving at an access router (AR)**12**, traveling through a corresponding Access Point (AP)**24**, traversing the wireless link**22**and reaching the remote terminal**18**. - [0086]One of packets
**126**destined for the remote terminal**18**first reaches the access router**12**where it experiences a queuing delay q_{congestion }in congestion queue**122**waiting for other of packets**126**ahead arriving from other routers**12**to be transmitted. Each of packets**126**emerge from the congestion queue**122**one after the other to enter into contention queue**124**. When one of packets**126**comes to the head of the line in congestion queue**122**, it experiences a contention delay waiting for the wireless link**22**to become available for transmission. The contention delay is caused by the shared nature of the transmission medium in technologies such as IEEE802.11b. - [0087]Each of packets
**126**becomes the head of the line in the contention queue**124**, it is transmitted across wireless link**22**. In case of failure, it reenters contention queue**124**from the tail. This is repeated until the packet is successfully received at remote terminal**18**. However, there is a limit n on the number of times one of packet**126**is retransmitted beyond which the packet is simply dropped. In effect, a packet**126**entering the tail of congestion queue**122**on access router**12**experiences a total queuing delay q^{k }until it reaches remote terminal**18**. This delay is given by the equation following: - [0000]
$\begin{array}{cc}{q}^{k}={q}_{\mathrm{congestion}}^{k}+{A}^{k}\ue89e{t}_{x}^{k}+\left({A}^{k}-1\right)\ue89e\tau +\sum _{i=1}^{{A}^{k}}\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{B}_{i}^{k}+{t}_{\mathrm{propagation}}^{k}& \left(25\right)\end{array}$ - [0000]where:
- [0088]A
^{k }is the total number of transmissions for one packet k at the head of contention queue**124**at access router**12**; - [0089]B
_{i}^{k }is the contention time for the i^{th }retransmission of the packet k at the head of the contention queue**124**at access router**12**; - [0090]τ is the timeout delay before a retransmission of the packet ahead is decided; this includes the roundtrip propagation delay and the transmission of the acknowledgement packet and processing at the remote terminal
**18**; - [0091]t
_{x}^{k }is the transmission delay of packet k over wireless link**22**; - [0092]t
_{propagation}^{k }is the propagation delay of packet k across wireless link**22**; - [0000]and
- [0093]q
_{congestion}^{k }is the time spent by the packet ahead of packet k in both congestion queue**122**and contention queue**124**at access router**12**. - [0094]Equation (25) can be rewritten in term of averages and ignoring propagation delay (which is around 0.5 μsec for a typical 100 m wireless link
**22**) as the following equation: - [0000]

q ^{k}*=*q _{congestion}^{k}*+Ā*^{k}*t*_{x}^{k}+(*Ā*^{k}−1)τ+*Ā*^{k}B ^{k}(26) - [0000]Since any packet will be retransmitted up to n times before it is dropped:
- [0000]

A^{k}≦n,∀k (27) - [0000]where n is typically equal to 7 in most implementations of IEEE802.11b.
- [0095]Two embodiments for estimating the number of transmissions A
^{k }are discussed herein. The first embodiment builds on information provided by the client utility of access point, while the second embodiment uses packet loss estimates. - [0096]Turning to the first embodiment, existing utilities for remote terminals
**18**or access points**24**typically accumulate information from Table 1 the moment the driver of the client utility of the access point is loaded or the moment wireless link**22**is established until the driver is unloaded or wireless link**22**is terminated. For example, the client utility for a Cisco Aironet “350” WLAN card accumulates the following data in real-time: - [0000]
TABLE 1 Access Point to Remote Terminal a = number of frames transmitted successfully. b = number of frames retransmitted. c = number of frames that exceed maximum number of retries. d = average contention time.

The specific relationship among these variables is further illustrated inFIG. 8 . - [0097]This accumulated data may be written into a text file. The text file may then be probed at specific time intervals T to calculate variations on each of the variables: Δa, Δb, Δc. The total number of packets handled during interval T is a+c. The total number of transmissions is:
- [0000]
$\left[a-\left(b-c\right)\right]\xb71+\mathrm{cn}+\sum _{k=1}^{b-c}\ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89e{A}^{k}\le \left[a-\left(b-c\right)\right]+\mathrm{cn}+\left(b-c\right)\ue89en=\left[a-\left(b-c\right)\right]+\mathrm{bn}$ - [0000]On average for one packet k:
- [0000]
$\begin{array}{cc}{\stackrel{\_}{A}}^{k}\le \frac{\mathrm{bn}+a-b+c}{a+c}& \left(28\right)\end{array}$ - [0000]and also:
- [0000]

B ^{k}=d - [0000]Using (26), the following is obtained:
- [0000]
$\begin{array}{cc}{\stackrel{\_}{q}}^{k}\le {\stackrel{\_}{q}}_{\mathrm{congestion}}^{k}+\frac{\mathrm{bn}+a-b+c}{a+c}\ue89e{t}_{x}^{k}+\left(\frac{\mathrm{bn}+a-b+c}{a+c}-1\right)\ue89e\tau +\frac{\left(\mathrm{bn}+a-b+c\right)\ue89ed}{a+c}& \left(29\right)\end{array}$ - [0000]where:
- [0000]
$\begin{array}{cc}{t}_{x}^{k}=\frac{{m}_{k}}{{B}_{\mathrm{PHY}}}& \left(30\right)\end{array}$ - [0000]where k is the size of an 802.11b frame. The timeout delay r is implementation specific, and
q _{congestion}^{k }is obtained using WiredCAT congestion estimation described above. - [0098]The second embodiment for estimating the number of transmissions A will now be described. Let p be the probability of packet loss on wireless link
**22**. The number of transmissions experienced by packet k is a random variable A^{k }where the probabilities for the occurrence of each value of A^{k }is shown in Table 2 below: - [0000]
TABLE 2 # trans- #retrans- A ^{k}missions missions #losses #success probability 1 1 0 0 1 p ^{0}(1 − p)2 1 1 1 1 p ^{1}(1 − p)3 1 2 2 1 p ^{2}(1 − p)j 1 j − 1 j − 1 1 p ^{j−1}(1 − p)n − 1 1 n − 2 n − 2 1 p ^{n−2}(1 − p)n 1 n − 1 n − 1 0 P ^{n−1}(1 − p) + p^{n} - [0099]On average, the number of transmissions required for successful transmission of packet k across wireless link
**22**is given by: - [0000]
${\stackrel{\_}{A}}^{k}=\Sigma \ue89e\phantom{\rule{0.3em}{0.3ex}}\ue89ei\xb7\mathrm{probability}\ue8a0\left(i\right)=\sum _{i=1}^{n}\ue89e{\mathrm{ip}}^{i-1}\ue8a0\left(1-p\right)+{\mathrm{np}}^{n}$ $i.e.,{\stackrel{\_}{A}}^{k}=\frac{1-p}{p}\ue89e\sum _{i=1}^{n}\ue89e{\mathrm{ip}}^{i}+{\mathrm{np}}^{n}={\mathrm{np}}^{n}+\frac{{\mathrm{np}}^{n+2}-\left(n+1\right)\ue89e{p}^{n+1}+p}{{p\ue8a0\left(1-p\right)}^{2}}$ - [0100]Again referring to (26):
- [0000]
${\stackrel{\_}{q}}^{k}={\stackrel{\_}{q}}_{\mathrm{cengestion}}^{k}+{\mathrm{np}}^{n}+\frac{{\mathrm{np}}^{n+2}-\left(n+1\right)\ue89e{p}^{n+1}+p}{{p\ue8a0\left(1-p\right)}^{2}}\ue89e{t}_{x}^{k}+\left({\mathrm{np}}^{n}+\frac{{\mathrm{np}}^{n+2}-\left(n+1\right)\ue89e{p}^{n+1}+p}{{p\ue8a0\left(1-p\right)}^{2}}-1\right)\ue89e\tau +{\mathrm{np}}^{n}+\frac{{\mathrm{np}}^{n+2}-\left(n+1\right)\ue89e{p}^{n+1}+p}{{p\ue8a0\left(1-p\right)}^{2}}\ue89ed$ - [0101]The fixed terminals
**16**of the IP network**10**transmits to remote terminal**18**, packets**126**traverse both wired and wireless hops. Therefore, end-to-end packet loss monitoring is not sufficient to infer wireless packet loss. In this scenario, a packet loss observed from the endpoints may be due to either a loss on the wired link because of congestion, or due to a loss on the wireless link because of congestion or random loss and does not correspond to the packet loss of wireless link**22**. - [0102]A number of implementations may be used to infer wireless packet loss at the network layer. Two such embodiments estimate the loss on the wired hop and then infer behavior on the wireless link from knowledge of end-to-end packet loss through RTCP and packet loss models described below. Both of the embodiments infer wired packet loss via functionality implemented at the path endpoints, in this case fixed terminals
**16**and remote terminal**18**. These embodiments are performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both. - [0103]In one embodiment, processing logic starts by inferring loss on the wired link alone for a system where software or hardware for QoS estimation is only deployed at the path edges. There are proposals to estimate QoS by deploying dedicated software on a router
**12**of an access point**24**. However, at least one embodiment of the present invention eliminates the requirement for dedicated software on a router**12**of an access point**24**. - [0104]In another embodiment, processing logic infers wired packet loss at the network layer using ping packets. The essence of this embodiment is to trigger a response from router
**12**of access point**24**and infer wired hop packet loss without actually deploying specialized software at the router**12**. For that purpose, ping packets are interleaved within a voice packet stream. These pings target router**12**which is revealed by a Traceroute operation on the path. The rate of ping packets interleaving is preferentially set in such a way as to capture packet loss behavior while not exceeding a given overhead to the traffic. - [0105]For example, sending one ping every twenty voice packets effectively results in an overhead of five percent in packet count. Since packet loss in wired networks occurs in bursts, observing the loss of ping packets may provide a good approximation of the overall voice packets loss rate. The time interval between ping values is set or varied in order to capture the burstiness of packet loss; as such, it is not a regular interval. The interval may vary in order to capture the behavior of a wired network packet loss model. Exemplary packet loss models are described below under the heading “Packet Loss Models.”
- [0106]The second embodiment infers wired packet loss via additional functionality at the path endpoints. This additional functionality may be implemented as a third stage added to a wired links embodiments described above, in addition to the initialization and measurement stage described above. This new stage is dubbed “router buffer estimation.” In one embodiment, the new stage operates as follows. With knowledge of available bandwidth on wired links, the sender transmits a stream of ICMP time-stamp pairs such as is described above at a rate higher than the estimated available bandwidth to each router
**12**on the wired hop from fixed terminal**16**to access point**24**. The queuing delay at each router is inferred and monitored until ICMP packets start getting lost at the targeted router**12**due to queue overflow. For each router**12**number i, the last observed queuing delay value q_{max,i }is recorded. Then, the queue capacity at each router**12**number i is estimated as being: - [0000]

Q_{i}=q_{max,i}B_{i}(31) - [0000]where B
_{i }values are wired link i raw capacity that has been measured. This router buffer estimation stage may occur only once at the start of the measurement process. Thereafter, WiredCAT may keep repeating the measurement stage until the real-time measurement is ended. The path may be probed every T seconds. An estimate of wired packet loss p_{d }during the probe interval T is derived, with the assumption of constant conditions during interval T, as follows:

If R_{i}(T)<B_{i }then: - [0000]

p_{d}=0 during T. - [0000]If R
_{i}(T)>B_{i }then: - [0000]
${p}_{d}=\frac{R+r-B}{R+r}\ue89e\phantom{\rule{0.8em}{0.8ex}}\ue89e\mathrm{during}\ue89e\phantom{\rule{0.8em}{0.8ex}}\ue89eT\ue89e\text{-}\ue89e\mathrm{Fi}\ue8a0\left(T\right);\mathrm{and}$ ${p}_{d}=0\ue89e\phantom{\rule{0.8em}{0.8ex}}\ue89e\mathrm{during}\ue89e\phantom{\rule{0.8em}{0.8ex}}\ue89e\mathrm{Fi}\ue8a0\left(T\right).$ - [0107]
$\begin{array}{cc}{p}_{d}=\frac{T-{F}_{i}\ue8a0\left(T\right)}{T}\times \frac{R+r-B}{R+r}\ue89e\phantom{\rule{0.8em}{0.8ex}}\ue89e\mathrm{during}\ue89e\phantom{\rule{0.8em}{0.8ex}}\ue89eT.& \left(32\right)\end{array}$ - [0000]where:
- [0000]
$\begin{array}{cc}{F}_{i}\ue8a0\left(T\right)=\frac{{Q}_{i}-{q}_{i}\ue8a0\left(T\right)\ue89e{B}_{i}}{{R}_{i}\ue8a0\left(T\right)-{B}_{i}}& \left(33\right)\end{array}$ - [0000]where Q is in bits, q is in seconds, B and R are in bits/second; R is the total background traffic entering the queue and r is the traffic rate of the application. F
_{i}(T) is the time needed to fill up the queue assuming R remains constant during T. - [0108]A method to combine wired and wireless packet loss p
_{d }and p_{w }respectively to produce path packet loss p_{t }will now be described. This expression provides a method for inferring p_{w }after calculating p_{d }and given a knowledge of p_{i }using the methods discussed above. Good models for packet loss in IP networks include the Bernoulli random loss model, the 2-state Markov chain model (or Gilbert model) and the more complex k^{th }order Markov chains model. Embodiment of the present invention makes use of the former two models, which are described in the following paragraphs. - [0109]The Bernoulli model is a two-state Markov chain model that can be used to model random and independent packet losses.
FIG. 9 below illustrates a Bernoulli model where “0” represents a state of successful packet transmission and “1” represents a loss. The transition probability from state “0” to “1” is denoted by p, and the transition probability from state “1” to “0” is denoted by q. The relation between q and p is as follows: - [0000]

*q=*1*−p*(34) - [0110]The Gilbert model, on the other hand, is a two-state Markov chain model that may represent the burstiness of packet loss due to congestion in IP networks.
FIG. 10 illustrates a Gilbert model where “0” represents a state of successful packet transmission and “1” indicates a packet loss. The transition probability from state “0” to “1” is denoted by p, and the transition probability from state “1” to “0” is q. To incorporate the effect of burstiness, q and p do not sum to one as in the case of the Bernoulli model. Instead, the following equation holds: - [0000]
$\begin{array}{cc}p=\frac{\mathrm{rq}}{1-r}& \left(35\right)\end{array}$ - [0000]where r is the total average packet loss.
- [0111]The average and standard deviation of burst lengths for the Gilbert model are illustrated in
FIG. 11 . The burstiness of packet losses Bl relates to the parameters of the model by: - [0000]
$\begin{array}{cc}\mathrm{Bl}=\sum _{n=0}^{\infty}\ue89e{\mathrm{np}\ue8a0\left(1-q\right)}^{n-1}& \left(36\right)\end{array}$ - [0112]Next, path packet loss will be described in order to derive a relation between measured packet losses on the wired and wireless hops and the end-to-end loss that characterizes the entire path. The derivation of the model is divided into two steps. First packet loss models are derived separately for the wireless and wired hops. Then, these two models are combined into a single model.
- [0113]For the wired hops of the path, the Gilbert packet loss model is used. It is assumed that losses on the wireless hop are due to both congestion at access point
**24**and to random losses on wireless link**22**. Again, the Gilbert model is used to handle congestion at access point**24**, while the Bernoulli model is used to account for random packet losses on wireless link**22**. An expression is then derived to relate end-to-end packet loss p_{t }on a path between endpoints**1**and**2**to the wired hop loss information. - [0114]Packet losses on the wireless hop can be due to either congestion at the access point
**24**or bit errors at wireless link**22**. These two stages are modeled separately as a and b.FIG. 12 illustrates a 3-state Markov model that represents the losses on the wireless hop for a single packet experiencing both congestion at access point**24**and random loss on wireless link**22**. - [0115]In
FIG. 12 , p_{a,s }is the conditional packet loss due to congestion, p_{b,s }is the unconditional packet loss due to random effects, and q_{a,s }reflects the unconditional packet loss due to congestion. Parameters relating to congestion are noted with the subscript notation a and parameters pertaining to random losses have the subscript notation b. All of the parameters have the subscript s to show their relation to wireless link**22**. - [0116]The representation in
FIG. 12 uses three states. A value of “0” indicates no loss and a value of “1” signifies a loss. State (a,b) reflects the conditions of transmission (loss or success) at the congestion stage or wireless link**22**stage, respectively. The state (1,1) is effectively the same as (1,0) since a packet lost on the wired hop will not continue to the wireless hop. The three-state model shown inFIG. 12 may be completely described by the following transition probability matrix: - [0000]
$\begin{array}{cc}{\stackrel{\_}{P}}_{s}=\uf605\begin{array}{ccc}\left(1-{p}_{a,s}\right)\ue89e\left(1-{p}_{b,s}\right)& \left(1-{p}_{a,s}\right)\ue89e{p}_{b,s}& {p}_{a,s}\\ \left(1-{p}_{a,s}\right)\ue89e\left(1-{p}_{b,s}\right)& \left(1-{p}_{a,s}\right)\ue89e{p}_{b,s}& {p}_{a,s}\\ {q}_{a,s}\ue8a0\left(1-{p}_{b,s}\right)& {q}_{a,s}\ue8a0\left(1-{p}_{b,s}\right)& \left(1-{q}_{a,s}\right)\end{array}\uf606& \left(37\right)\end{array}$ - [0117]To obtain P
_{0,0}, P_{0,1}, and P_{1,1}, the system is solved as follows: - [0000]
$\begin{array}{cc}\left\{\begin{array}{c}\left[\begin{array}{c}{P}_{0,0}\\ {P}_{0,1}\\ {P}_{1,1}\end{array}\right]=\left[\begin{array}{c}{P}_{0,0}\\ {P}_{0,1}\\ {P}_{1,1}\end{array}\right]\\ {P}_{0,0}+{P}_{0,1}+{P}_{1,1}=1\end{array}\right\}& \left(38\right)\end{array}$ - [0118]The end-to-end path average packet loss p
_{t }wireless link average packet loss is then given by: - [0000]

*r*_{s}*=P*_{0,1}*+P*_{1,1}(39) - [0119]Equation 39 assumes that packet loss on separate hops is independent. The model does, however, take into account correlation in packet losses on the same link from packet to packet.
- [0120]The packet loss model for the entire path, including the wired and wireless hops, is obtained by combining the three state model of
FIG. 12 with the Gilbert model, as shown inFIG. 13 . InFIG. 13 , p_{d }is the conditional packet loss on the wired hop and q_{d }reflects the unconditional packet loss on the wired hop. Parameters with the subscript d relate to the wired hop and those with s to the wireless hop. Additionally: - [0000]

α_{1}=β_{2}=(1*−p*_{d})(1*−p*_{a,s})(1*−p*_{b,s}) - [0000]

α_{2}=β_{1}=(1*−p*_{d})(1*−p*_{a,s})*p*_{b,s } - [0000]

α_{3}=β_{3}=(1*−p*_{d})*p*_{a,s } - [0000]

α_{4}=β_{4}=δ_{2}=p_{d } - [0000]

δ_{1}=(1*−p*_{d})(1*−p*_{a,s}) - [0000]

δ_{3}=(1*−p*_{d})*q*_{a,s}*p*_{b,s } - [0000]

δ_{4}=(1*−p*_{d})*q*_{a,s}*p*_{b,s } - [0000]

φ_{t}=1*−q*_{d } - [0000]

φ_{2}*=q*_{d}(1*−q*_{a,s}) - [0000]

φ_{3}=q_{d}q_{a,s}p_{b,s } - [0000]

φ_{4}*=q*_{d}*q*_{a,s}(1*−p*_{b,s}) (40) - [0121]The model shown in
FIG. 13 uses four states, where each state describes the conditions on the wired and wireless hops. A “0” value means no loss and a “1” signifies a loss. State (d,a,b) reflects the conditions of a transmission as a loss or a success at the wired hop, congestion stage of the wireless hop, or wireless hop stage, respectively. The state (0,1,1) is effectively the same as (0,1,0) since a packet lost on the wired hop will not continue to the wireless hop. Similarly, states (1,1,1), (1,0,0), (1,1,0) and (1,0,1) are identical. - [0122]The four-state model shown in
FIG. 13 may be completely described by the following transition probability matrix: - [0000]
$\begin{array}{cc}{\stackrel{\_}{P}}_{t}=\uf605\begin{array}{cccc}{\alpha}_{1}& {\alpha}_{2}& {\alpha}_{3}& {\alpha}_{4}\\ {\beta}_{1}& {\beta}_{2}& {\beta}_{3}& {\beta}_{4}\\ {\delta}_{1}& {\delta}_{2}& {\delta}_{3}& {\delta}_{4}\\ {\varphi}_{1}& {\varphi}_{2}& {\varphi}_{3}& {\varphi}_{4}\end{array}\uf606& \left(41\right)\end{array}$ - [0000]To obtain P
_{0,0,0}, P_{0,0,1}, P_{0,1,1}, and P_{1,1,1}, the matrix is solved yielding: - [0000]
$\begin{array}{cc}\left\{\begin{array}{c}\left[\begin{array}{c}{P}_{0,0,0}\\ {P}_{0,0,1}\\ {P}_{0,1,1}\\ {P}_{1,1,1}\end{array}\right]=\left[\begin{array}{c}{P}_{0,0,0}\\ {P}_{0,0,1}\\ {P}_{0,1,1}\\ {P}_{1,1,1}\end{array}\right]\\ {P}_{0,0,0}+{P}_{0,0,1}+{P}_{0,1,1}+{P}_{1,1,1}=1\end{array}\right\}& \left(42\right)\end{array}$ - [0000]Where the end-to-end path average packet loss p
_{i }is given by: - [0000]

*p*_{t}*=P*_{0,0,1}*+P*_{0,1,1}*+P*_{1,1,1}(43) - [0123]Equation (43) assumes that packet loss on separate hops is independent. The model does, however, take into account correlation in packet losses on the same link from packet to packet.
- [0124]The four-state Markov chain model shown in
FIG. 13 may be used to calculate p_{t }from measured average packet losses on the wired and wireless hops r_{d }and r_{s}, respectively. To calculate p_{t }using the model, the first step is to calculate p_{d}, q_{d}, p_{a,s}, p_{b,s }and q_{a,s}. A value for q_{d }and q_{a,s }may be obtained by maintaining a measurement of average packet burst length and using equation (36) and the graph shown inFIG. 11 , as described above. A starting value for both q_{d }and q_{a,s }may be 0.9, corresponding to an average loss of 1.11 packets/burst and standard deviation of 0.35 packets/burst. (SeeFIG. 11 ). These values have been shown to be the most probable for Internet, currently. As the Internet evolves, other starting values may be preferred. - [0125]From equation (35), p
_{d }may be obtained as follows: - [0000]
${P}_{d}=\frac{{r}_{d}\ue89e{q}_{d}}{1-r}$ - [0126]The value of p
_{a,s }may be obtained by solving the following system of three equations and two unknowns {p_{a,s}; p_{b,s}}: - [0000]
$\begin{array}{cc}{r}_{s}={P}_{0,1}+{P}_{1,1}\ue89e\text{}\ue89e\left\{\begin{array}{c}\left[\begin{array}{c}{P}_{0,0}\\ {P}_{0,1}\\ {P}_{1,1}\end{array}\right]=\stackrel{\_}{P}\ue89es\ue8a0\left[\begin{array}{c}{P}_{0,0}\\ {P}_{0,1}\\ {P}_{1,1}\end{array}\right]\\ {P}_{0,0}+{P}_{0,1}+{P}_{1,1}=1\end{array}\right\}\ue89e\text{}\ue89e{\stackrel{\_}{P}}_{s}=\uf605\begin{array}{ccc}\left(1-{p}_{a,s}\right)\ue89e\left(1-{p}_{b,s}\right)& \left(1-{p}_{a,s}\right)\ue89e{p}_{b,s}& {p}_{a,s}\\ \left(1-{p}_{a,s}\right)\ue89e\left(1-{p}_{b,s}\right)& \left(1-{p}_{a,s}\right)\ue89e{p}_{b,s}& {p}_{a,s}\\ {q}_{a,s}\ue8a0\left(1-{p}_{b,s}\right)& {q}_{a,s}\ue8a0\left(1-{p}_{b,s}\right)& \left(1-{q}_{a,s}\right)\end{array}\uf606,& \left(45\right)\end{array}$ - [0000]where r
_{s }is the measured average packet loss on the wireless link, q_{a,s }is calculated as described above. Once the values of p_{d}, q_{d}, p_{a,s}, p_{b,s }and q_{a,s }are known, equation (42) may be solved for P_{0,0,0}, P_{0,0,1}, P_{0,1,1}, and P_{1,1,1 }Finally, plugging the values for P_{0,0,0}, P_{0,0,1}, P_{0,1,1}, and P_{1,1,1 }plugging into equation (43) will yield the end-to-end path average packet loss p_{t}. - [0127]Whereas many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description, it is to be understood that any particular embodiment shown and described by way of illustration is in no way intended to be considered limiting. Therefore, references to details of various embodiments are not intended to limit the scope of the claims which in themselves recite only those features regarded as essential to the invention.

Patent Citations

Cited Patent | Filing date | Publication date | Applicant | Title |
---|---|---|---|---|

US20020177910 * | Aug 14, 2001 | Nov 28, 2002 | Quarterman John S. | Performance measurement system for large computer network |

US20030214905 * | May 10, 2003 | Nov 20, 2003 | Eitan Solomon | Dynamic update of quality of service (QoS) parameter set |

US20060209701 * | Jun 2, 2006 | Sep 21, 2006 | Microsoft Corporation | Peer-To-Peer Method of Quality of Service (QoS) Probing and Analysis and Infrastructure Employing Same |

US20080008089 * | Sep 20, 2007 | Jan 10, 2008 | Akamai Technologies, Inc. | Optimal route selection in a content delivery network |

Referenced by

Citing Patent | Filing date | Publication date | Applicant | Title |
---|---|---|---|---|

US8064444 | Jan 12, 2007 | Nov 22, 2011 | Wi-Lan Inc. | Wireless broadcasting system |

US8130664 * | Apr 17, 2008 | Mar 6, 2012 | Wi-Lan, Inc. | Macro-diversity region rate modification |

US8351331 * | Jun 22, 2010 | Jan 8, 2013 | Microsoft Corporation | Resource allocation framework for wireless/wired networks |

US8526366 | Mar 8, 2011 | Sep 3, 2013 | Wi-Lan, Inc. | Method and apparatus for a scheduler for a macro-diversity portion of a transmission |

US8548520 | Jan 26, 2007 | Oct 1, 2013 | Wi-Lan Inc. | Multiple network access system and method |

US8705493 | Dec 21, 2007 | Apr 22, 2014 | Wi-Lan, Inc. | Method and apparatus for service identification in a wireless communication system |

US8711833 | Apr 16, 2008 | Apr 29, 2014 | Wi-Lan, Inc. | Base station synchronization for a single frequency network |

US8767726 | Oct 18, 2010 | Jul 1, 2014 | Wi-Lan, Inc. | Convergence sublayer for use in a wireless broadcasting system |

US8774229 | Jan 12, 2007 | Jul 8, 2014 | Wi-Lan, Inc. | Multidiversity handoff in a wireless broadcast system |

US8817632 * | Nov 24, 2009 | Aug 26, 2014 | Fujitsu Limited | Method of measuring packet loss rate, packet loss rate measuring device and storage medium |

US20080170490 * | Jan 12, 2007 | Jul 17, 2008 | Connors Dennis P | Multidiversity handoff in a wireless broadcast system |

US20080170530 * | Jan 12, 2007 | Jul 17, 2008 | Connors Dennis P | Wireless broadcasting system |

US20080182616 * | Jan 26, 2007 | Jul 31, 2008 | Connors Dennis P | Multiple network access system and method |

US20080259849 * | Apr 17, 2008 | Oct 23, 2008 | Nextwave Broadband, Inc. | Macro-diversity region rate modification |

US20080259879 * | Dec 21, 2007 | Oct 23, 2008 | Connors Dennis P | Method and apparatus for service identification in a wireless communication system |

US20080259905 * | Apr 16, 2008 | Oct 23, 2008 | Nextwave Broadband, Inc. | Base station synchronization for a single frequency network |

US20090238561 * | Mar 19, 2008 | Sep 24, 2009 | Tellabs Vienna, Inc. | Method and apparatus for measuring quality of traffic performance in a passive optical network (PON) |

US20100135180 * | Nov 24, 2009 | Jun 3, 2010 | Fujitsu Limited | Method of measuring packet loss rate, packet loss rate measuring device and storage medium |

US20110116500 * | Oct 18, 2010 | May 19, 2011 | Wi-Lan Inc. | Convergence sublayer for use in a wireless broadcasting system |

US20110310735 * | Dec 22, 2011 | Microsoft Corporation | Resource Allocation Framework for Wireless/Wired Networks | |

US20130163414 * | Sep 13, 2012 | Jun 27, 2013 | Fujitsu Limited | Distribution route construction method and terminal device |

Classifications

U.S. Classification | 370/248 |

International Classification | H04L12/26, H04L12/24, H04L12/56, H04W24/00, H04J3/14 |

Cooperative Classification | H04L43/0888, H04L41/0896, H04L43/10, H04L43/0852, H04L43/087, H04L43/106, H04L43/12, H04L43/0829, H04W24/00, H04L12/2602, H04L41/5009, H04L41/5038, H04L43/00 |

European Classification | H04L43/00, H04L41/08G, H04L41/50F, H04L12/26M, H04W24/00 |

Rotate