This paper evaluates the performance of data transmission using the ordinary PC both for large sized data transmission and for the actual application. As an actual application, this paper picks up the DV (Digital Video) transmission. This is because the Digital Video will be a common and widely used application media in the emerging internet. Also, the video contents requires the secured and reliable data transmission. For large sized data, when we apply the authentication (AH) and encryption (ESP), the throughput degrades to 1/9 comparing with the throughput without AH nor ESP. With AH and ESP, we obtains about 10 Mbps for UDP data transmission and about 6 Mbps for a simple TCP transmission. As for the DV transmission, the end-to-end throughput was again about 10Mbps. With 10 Mbps end-to-end throughput, the 1/10 of video information can be successfully transferred from the source node to the destination node to obtain a sufficient quality of DV transmission.
1. Introduction
As the Internet moves forward
into the next century, the Internet transits to an information infrastructure
for everyone from the information infrastructure only for scientists or
professionals. The next generation Internet has to achieve the scalable
and reliable data transmission. The IPv6 (IP version 6) [4] and IPSec (IP
Security) [1] is a core protocol suite for it. IPv6 has a 128bit address
space that is enough to cover all worldwide networks and equipment, and
IPSec technology provides a essential functions for reliable and secured
data exchange over the Internet.
The purpose of this paper
is a performance evaluation of data transmission with the IPSec over IPv6
networks using an ordinary PC platform. People wants to perform a high
speed multimedia communications, such as high quality video communications,
with a low cost PC platform. Also, when we go to the production level of
multimedia services over the Internet, we have to apply the authentication
and encryption to protect themselves and the information exchanged among
them.
This paper evaluates the
performance of data transmission using the ordinary PC both for large sized
data transmission and for the actual application. As the actual application,
this paper picks up the DV (Digital Video) transmission, since the secured
and reliable DV applications will be commonly used by the most of the people
in the next generation Internet.
For large sized data, when
we apply the authentication (AH) [2] and encryption (ESP) [3], the throughput
degrades to 1/9 comparing with the throughput without AH nor ESP. With
AH and ESP, we obtains about 10 Mbps for UDP data transmission and about
6 Mbps for TCP transmission. Also, the throughout was compared with the
data transmission with IPv4. The degradation of throughput at the end system,
due to the use of IPv6 instead of IPv4, was significantly small.
The performance evaluation in this paper shows ;
Section 2 discusses the rough overview of IPSec, section 3 describes
the performance evaluation of bulk data transmission over TCP and UDP.
Section 4 describes the performance evaluation of DV data transmission
with applying the IPSec. Finally, section 5 gives a brief conclusion.
2. IPSec (IP Security)
RFC 2401 [1] describes the
architecture framework of IPSec (IP Security). IPSec protocol suite provides
the functional suite for secured and reliable data exchange over the Internet.
IPSec has the following two functions, i.e., Authentication and Encryption.
3. Performance Evaluation of Bulk Data Transmission
In this section, we evaluate the performance of bulk data transmission. The performance is evaluated with the STREAM data transmission and with the REQUEST/RESONSE data transmission. Regarding the transport protocol, both TCP and UDP are applied to.
3.1 Evaluation System
The end-to-end throughput
was evaluated using the netperf (http://www.netperf.org/)
with the KAME IPv6 protocol stack. The patch for to use netperf 2.1pl3
with KAME IPv6 stack is available through the following ftp directory.
The end-to-end throughput is evaluated in the following cases.
3.2 Evaluation Results
3.2.1 TCP STREAM
Figure 2 shows the end-to-end
throughput using IPv4, and figure 3 shows that using IPv6. Here, the MTU
size is 4,096 Bytes, the socket size is 57,344 Bytes and is 32,768 Bytes.
The end-to-end throughput is degraded by the processing of IPSec. With the AH, the end-to-end throughput degrades to about 1/2 With the ESP, the end-to-end throughput degrades to about 1/4. With both the AH and the ESP, the end-to-end throughput is slightly less than with only ESP.
Regarding the IP version, the end-to-end throughput with IPv6 is almost the same as that with IPv4.
3.2.2 UDP STREAM
Figure 4 shows the end-to-end
throughput using IPv4, and figure 5 shows that using IPv6. Here, the MTU
size is 4,096 Bytes and is 1,024 bytes, and the socket size is 32,768 Bytes.
The end-to-end throughput is degraded by the processing of IPSec. With the AH, the end-to-end throughput degrades to about 1/3. With the ESP, the end-to-end throughput degrades to about 1/9. With both the AH and the ESP, the end-to-end throughput is slightly less than with only ESP. Also, when the MTU size is larger, the end-to-end throughput is slightly improved. Again, regarding the IP version, the end-to-end throughput with IPv6 is almost the same as that with IPv4.
3.2.3 REQUEST/RESPONSE
Figure 6 shows the end-to-end
throughput using IPv4, and figure 7 shows that using IPv6.
With TCP_RR and UDP_RR.1, the throughput with ESP is larger than the
throughput with AH. With UDP_RR.2
(i.e., large message size), the throughput with ESP is smaller than
the throughput with AH. And, again, regarding the IP version, the
end-to-end throughput with IPv6 is almost the same as that with IPv4.
3.2.4 Discussion
3.2.4.1 STREAM Data Transmission
By the AH and ESP processing
at the end hosts, the end-to-end throughput degrades, when we use the IPSec.
AH performs the hash function, and ESP performs encryption.
Without applying the IPSec,
the end-to-end throughput over TCP is less than the end-to-end throughput
over UDP. This is because the TCP requires larger processing than the UDP
does. However, when we use the IPSec, the end-to-end throughput over
TCP and over UDP is almost the same. This is the simple proof, that
the processing for IPSec is far larger then that for TCP and UDP.
When we compare the end-to-end
throughput with AH and with ESP, the throughput with AH is about twice
larger than that with ESP. This is because, with STREAM data transmission,
the packet size is large enough than the header length
(basic IP header field and AH field), and the required processing for
ESP is far larger than that for AH. As shown in figures 4 and
5, when the MTU size becomes larger, the end-to-end throughput degrades.
The degradation with ESP is smaller than with AH, since the AH uses IP
packet header field and the ESP uses a whole of payload in IP packet.
Also, since the processing for ESP is large enough than that for AH, the
performance degradation from only ESP system to ESP/AH system is not large.
In summary, for large sized
data (i.e., STREAM data transmission), when we apply the authentication
(AH) and encryption (ESP), the throughput degrades to 1/9 comparing
with the throughput without AH nor ESP. With AH and ESP, we obtains
about 10 Mbps for UDP data transmission and about 6 Mbps for TCP transmission.
Also, the throughout was compared with the data transmission with IPv4.
The degradation of throughput at the end system, due to the use of IPv6
instead of IPv4, was significantly small.
3.2.4.2 REQUEST/RESPONSE Data Transmission
With the REQUEST/RESPONSE
data transmission, the end-to-end throughput degradation by applying the
IPSec is less than that with the STREAM data transmission. This is
because the processing overhead for request messages is not significantly
small, compared to the processing overhead for IPSec, and because the packet
size is not large.
4. Performance Evaluation of DV Data Transmission
In this section, we
evaluate the end-to-end DV data transmission over IPv6 network. The
reason why we pick up the DV transmission is that the DV will be a common
and widely used application media in the emerging internet. Also,
the video contents requires the secured and reliable data transmission.
4.1 Evaluation System
Figure 8 shows
the system configuration of evaluation system. The end host are connected
through the three routers and wide area high speed ATM links. Nodes
have the fast Ethernet interfaces and the ATM interfaces. The followings
are the specification of hosts and routers. In order to send and
receive the DV data, we use the DVTS developed by Keio University [6].
The end-to-end throughput is evaluated in the following cases.
4.2 Evaluation Results
Figures 9 and 10 shows the
end-to-end throughput using the experimental network shown in figure 8.
Figure 9. Performance of DV data transmission using IPSec (packets)
Figure10. Performance of DV data transmission using IPSec (MBytes)
As for the DV transmission,
the end-to-end throughput was about 7 Mbps to 17 Mbps with
IPSec. With 10 Mbps, we can not transmit the full rate quality
of DV data. However, we can transfer the DV data with reducing
the sending frame rate. The DVTS, that is DV transmission and
receiving software module, can control the frame rate sent out from
the sender node. With the evaluation result, the 1/10 of
video frames are transferred from the source node to the destination
node, so as to the required bandwidth is around 10Mbps. Even
with 1/10 of video frame rate, we can not obtain a fine quality of
video transmission. However, we can obtain a sufficient video
quality for many applications, such as video conferencing, with this
reduced frame rate.
The result above shows that the existing ordinary PC platform could handle the high quality video transmission using the DV technology, without any special hardware assistance. This is even when we apply the IPsec technology to provide the secured and reliable multimedia communication over the Internet. The current ordinary PC platform can not handle the plain DV data with the full frame rate while applying the IPSec functions. However, due to the fast technological improvement for the PC components (e.g., CPU), it would be expected the ordinary PC platform can handle the full frame rate DV data without any special hardware.
References
[1] S.Kent, R.Atkinson, "Security Architecture for the Internet Protocol",
IETF RFC2401, November 1998.
[2] S.Kent, R.Atkinson, "IP Authentication Header", IETF RFC2402, November
1998.
[3] S.Kent, R.Atkinson, "IP Encapsulation Security Payload (ESP)",
IETF RFC2403, November 1998.
[4] S.Deering, R.Hinden, "Internet Protocol version 6 Specification",
IETF RFC2460, November 1998.
[5] J.Postel, "Internet Protocol", IETF RFC791, September, 1981.
[6] DVTS, http://www.sfc.wide.ad.jp/DVTS/