Structure and Performance of Open Access Networks - Case Lappeenranta Model
Structure and Performance of Open Access Networks - Case Lappeenranta Model
Abstract
Lappeenranta Model is a framework for building open operator neutral access networks with local services. The
focus is in locality: to provide an easy local network connection available to everyone and to encourage people
on developing their knowledge and abilities on networking. This publication describes the operating principle,
structure and different implementation options and analyzes the performance of Lappeenranta Model.
Keywords
Lappeenranta Model, Open Access Network, Operator Neutral Network
1. Introduction
The trend in modern WLAN networks is changing from closed single-ISP networks towards
inter-network roaming and public access systems that allow multiple ISPs, service providers
and users to share the same access medium. These open access networks bring savings for the
network builder and enables better service level and lower connection fees for end users.
Open access networks differ from traditional closed network in the sense that ISPs can no
longer reach monopolistic position in the market, which reduces the overall service level and
raises the costs for end users. Open access will most likely change the networking future as it
will bring new technical, business and service opportunities as reaching the end users is no
longer as problematic and expensive as it has been. Overall network building costs will come
down as open access reduces the need for multiple overlapping networks.
Recommended reading on open access networks is (Battiti et al., 2005) where the concept of
open access is described and examples of current open access networks and research projects
are given. Also business models and technical challenges of open access systems are studied.
There are several open access systems in the world. Individuals are building community
networks in order to communicate with each other and share the access network for common
good. As community networks have their drawbacks especially in commercial use (see
(Juutilainen et al., 2004) for more information), there are several undergoing research projects
concentrating on centrally managed open access systems. There are also some commercial
“open access” networks. For example Mälarenergi Stadsnät AB has built one such network in
Sweden in order to provide a bundle of commercial services for people living in the area.
Lappeenranta model has similarities with other open access systems, like StockholmOpen.net
(StockholmOpen.net Web Site, 2006), but the main difference is in the locality. Open access
networks usually concentrate on sharing the access network between multiple ISPs and
allowing true competition between the service providers. Lappeenranta model does the same
but unlike most of the other open access systems it also allows direct local communication
between end users and true local services. More information on differences between different
WLAN network models can be found in (Juutilainen et al., 2004).
The main goal of Lappeenranta Model is to open the local access network or everyone and
allow a new concept of locality and local services. The local access network is operator
neutral meaning that everyone can provide services in the network with equal terms. The main
benefit of local services is that they are usable in the access network without needing an
Internet connection as the local network is usually very fast and the Internet connection is the
bottleneck between users and services. This brings new opportunities for providing locally
services that require high bandwidth, such as IPTV or Video on Demand (VoD). Some of the
local services like city maps, public transportation timetables etc. may be provided free of
charge, but services like IPTV or VoD will most probably be charged. Lappeenranta Model
provides also built-in positioning and notification/advertisement services, support for multiple
languages and devices with different screen sizes.
Company
Intranet
Company
Operator
Neutral Access Operator ISP
Network Interface
Internet
ISP
Let us assume that a new user (i.e. a user that has not connected to the network before) enters
the coverage area of the open access network. The user has a device with a network card (for
example a WLAN card) connected and operating correctly. The user wants to access some
web page in the Internet and starts a web browser to retrieve the page. Figure 2 illustrates
what happens in the network.
A u th e n tic a tio n IS P ’s
D H CP W W W H TTP C o n firm a t io n A u th
U ser S erver S e rv er C ach e S e rv e r S e rv e r In te rn e t
1
2
3
4
5
6
7
8
9
10
11
12
13
It was mentioned in previous list under item 2 that one reason for using private IP addresses is
the lack of free addresses. Another reason is that when using private addresses, a large amount
of devices in the access network can easily be addressed in the same network so that they can
hear each other. This allows direct local communications and prevents the need for circulating
local traffic through Internet service providers and Internet. When connecting to Internet
through some of the ISPs, the private address can be translated to public addresses.
Lappeenranta Model is based on computers running Linux operating system. Each of the
computers hosts some services required to operate the network system. As section 2.3 later
describes, there are different options for implementation, but let us first describe the
components and the operating principle of the system.
The core of Lappeenranta model is called Operator Interface. Operator Interface includes all
the components needed to run Lappeenranta model and acts like an Access Controller
extended with several additional features. Figure 3 shows an example distribution of the
components of Operator Interface. There are three main operational components: Access
Controllers, Other Common Services (OCS) and Name Service.
Access Controllers are responsible for routing access network users to correct ISPs. An HTTP
cache connected to user routing is used for redirecting users to a login page when necessary
and providing network users with pushed announcements or advertisements. Each Access
Controller can handle one or multiple ISPs and can be physically located wherever in the
access network. Redirector is used for checking from the Database whether to show a user
another page than requested. For example, the user can be advised to use DHCP, show
different advertisements, announcements or login pages. The transparent HTTP cache is
implemented with Linux iptables tools redirecting all the traffic from port 80 to local port
listened by Squid.
Other Common Services include the main functions for managing the access network: login
pages to users for selecting ISPs, DHCP services, and Radius services for authenticating
devices in the Access Points of the access network.
Name Service is used for providing the access network with alphabetical domain names that
are easier to remember than IP addresses. Name Service includes DNS (Domain Name
Service) and NTP (Network Time Protocol). Database is for storing information from DHCP
service and from network’s Access Points.
Although there are many components, only three of them are crucial for the operation of
Lappeenranta model. These components are Redirector, HTTP Cache and Database. In
principle, everything else is optional, but highly recommended in order to maintain all the
functionality and to enable easy connectivity.
Please note that Figure 3 shows only a logical component view of Lappeenranta Model. The
figure does not commit on the actual locations of the components, as they can be installed on
different servers or locations like described later in section 2.3.
ISP 3
Internet
ISP 2
Hot S
pots Acc
s Users e ss
ic e Poi
nts
erv
Lo
ca
ls Operator neutral access network
Although Operator Interface consists of numerous components, only the required three core
components produce high load to the system: redirector (source-address-based user routing),
HTTP cache, and user database. These core components can be distributed in different ways
to separate server computers to improve the overall performance. The distribution of other
components is not critical to the overall performance.
The first basic option for implementing Operator Interface is to concentrate all the
components into one server computer. This single server then has all the functionality and
services required to run Lappeenranta Model.
Centralized Operator Interface can be considered the easiest and quickest (of presented three
methods) to implement. It is also the easiest to maintain and update, as all of the configuration
files are located in one computer. On the other hand, relations between different services
would be easier to handle in separate computers than in one computer.
Centralized Operator Interface suits especially well in small environments, like airports,
hotels and apartment buildings, where a single computer can handle the load. If needed, some
of the services and functions can still be distributed into different computers to increase
performance. It may also be possible to implement the centralized Operator Interface using
several identical servers balancing the load and providing redundancy. However, this option
still needs to be verified.
Partially distributed implementation is a reasonable option for most cases. Partial distribution
means that the three main components are distributed into two computers. This means that
one of the components is separated from the other. So there are three options: to distribute
either user database, user routing, or HTTP cache. The rest of the components can then be
installed wherever wanted as they are not critical to the overall performance.
User routing and HTTP cache bond tightly to each other and they both use the same database.
It can be easily seen that separating HTTP cache and user routing from each other is not a
reasonable choice as it brings problems with both performance (high network usage, delays
etc.) and security (transferring data trough more vulnerable medium).
So it is a good idea to keep user routing and HTTP cache together and dedicate another
computer for the user database. This will increase the performance compared to the
centralized implementation as the database generates quite heavy load to the system.
Additionally, distributing the user database to an external computer will increase the security
of the system, as the database computer does not have to be connected to the access network.
Fully distributed implementation means that the three high-load components (user routing,
HTTP cache and user database) are all distributed in different computers. The other
components can be distributed freely, as they produce virtually no load to the system.
Dedicating a separate computer for each of the components is generally good for performance
but requires several computers.
Separating HTTP cache and user routing from each other brings out the same performance
and security problems described earlier in partially distributed implementation option. This
means that partially distributed implementation is the reasonable choice for most cases.
2.4. Performance
In order to know more about the performance and scalability of the Lappeenranta model we
needed to test it. As mentioned earlier, the most important components for the performance of
the Operator Interface are the HTTP cache, redirector and the database. We ran the tests with
partially distributed implementation option, where HTTP cache and redirector are located in
one server computer and the database is distributed to another computer. We decided to
evaluate the system with Web Polygraph, a performance benchmarking tool for caching
proxies, origin server accelerators, L4/7 switches, content filters, and other Web
intermediaries (Web Polygraph Web Site, 2006).
We used Web Polygraph to simulate real world HTTP traffic with standardized test sets in an
isolated test network to see how Lappeenranta Model behaves under variable load patterns.
We used Web Polygraph with PolyMix-4 test set, which is a workload for testing forward
caching proxies. The main motivation for the tests was to see the difference in load that
Lappeenranta Model sets to the computers compared to a normal proxy system. The test
network consisted of a few computers and two Ethernet switches listed in Table 2.
Equipment Hardware
OS: Debian GNU/Linux, linux-2.4.20, Web proxy: Squid 2.5STABLE1, CPU: AMD Athlon XP 2200+,
Operator 512MB RAM, IDE HDD: 40GB Maxtor 6Y060L0 (7200rpm, 9ms, ATA-133, 2MB cache), SCSI HDD:
Interface 18GB IBM DNES-318350W (7200rpm, 7ms, U2 LVD, 2MB cache),, SCSI host adapter: Adaptec 19160B ,
Network interfaces: 3Com 3c905C, 3Com 3C996B-T, integrated BCM95702A20
Database CPU: Pentium III 1Ghz, 256MB RAM, IDE HDD: 40GB IC35L040AVER07-0, NEtwork interfaces: 3Com
Server 3c905C
Polygraph OS: Debian GNU/Linux, linux-2.4.20, CPU: AMD Athlon XP 1700+, 512MB RAM, IDE HDD: 40GB
Client IC35L040AVER07-0, Network interfaces: 3Com 3c905C
Polygraph OS: FreeBSD 4.3, CPU: Pentium II 400Mhz, 128MB RAM, IDE HDD: 20GB IBM-DTLA-305020, Network
Server interfaces: 3Com 3c905C
Ethernet 3com Superstack II 3000, 24x 10/100 ports, Allied Telesyn FS708, 8x 10/100 ports
Switches
Table 2. Testing equipment
In the tests, Operator Interface was located between two test networks that simulated the local
access network and Internet. The structure of the test network is shown in Figure 4. In the first
test network (local access network where the Polygraph client is located) there was a group of
clients acting as normal network users generating requests for web pages, IP address etc. In
the second test network (Internet), there were servers returning the requested web pages and
other content. The arrangement corresponds to the implementation option 2: partially
distributed (database distributed to a separate server).
Polygraph client O perator
M anagem ent P C
10.1.255.254
lo:10.101.0.0/22
10.1.255.255 Interface
192.168.1.1
3Com SuperStack II-3000
F ast E thernet sw itch
192.168.0.1
Polygraph server
G atew ay M yS ql database
192.168.1.20
192.168.0.10 192.168.0.4
lo:10.101.128.0/22
Internet
Operator Interface was configured to route traffic between the Web Polygraph test
subnetworks 10.101.0.0/22 and 10.101.128.0/22. Operator Interface acted as a transparent
proxy, i.e. it redirected all TCP traffic with destination port 80 to Squid proxy listening at
localhost. Web Polygraph was configured to use the test set Polymix-4.
The purpose of the tests was to find out how the redirector affects the overall performance of
the web proxy. The performance was expected to decrease, since executing several SQL
transactions for each HTTP request takes time.
The tests were conducted in four different setups where used disk system and cache operation
were varied:
- with redirector, cache on IDE disk
- with redirector, cache on SCSI disk
- without redirector, cache on IDE disk
- without redirector, cache on SCSI disk
The PolyMix-4 test consists of 10 phases and the total test duration is about 10 hours. Each of
the phases has different load settings and they simulate different real-world load situations.
The most important phases for the test are “top1” and “top2”, which produce the highest load
on the system. "top1" is active during minutes 250-450 and "top2" is active during minutes
550-750. Their impact can be seen as the two peaks in Figure 5, where the cache delay times
for each four test setups are plotted as a function of the overall PolyMix-4 test duration.
As described above, turning redirector on rises the delay times roughly 20-30 per cent under
heavy load. It seems that Squid's response times are much more dependent on the
performance of the cache disk than any other factor in this test. Compared to SCSI disk, using
IDE disk quadrupled the delay times. Having decent disk IO performance is critical for high
load environments, but it is still feasible to implement small scale services utilizing IDE disks.
The hardware requirements to run Lappeenranta Model HTTP proxy are very similar to the
generic requirements that any Squid HTTP proxy installation has. The Lappeenranta Model
seems to be able to handle relatively high HTTP loads with minimum effect on delay times.
The performance tests show that Lappeenranta Model can be implemented with similar
hardware compared to normal network cache systems. The most important factor in
performance is the good IO performance of hard disks.
4. References
Battiti, R., Cigno, R.L., Orava, F. and Pehrson, B. (2005), “Wireless LANs: from War Chalking and to Open Access
Networks”, Mobile Networks and Applications, Volume 10, Number 3, June 2005, Springer Science+Business Media B.V,
pages 275-287, ISSN: 1383-469X (Paper) 1572-8153 (Online).
Juutilainen, M., Ikonen, J. and Porras, J. (2004), “Comparison of Different WLAN Network Models”, Proc. 3rd IEEE
International Conference on Networking, Gosier, Guadeloupe, French Caribbean, 2004, pp. 374-381.
StockholmOpen.net project Web Site (2006), http://www.stockholmopen.net/. (Accessed 28 March 2006)
Web Polygraph Web Site (2006), http://www.web-polygraph.org/. (Accessed 28 March 2006)
Wireless Lappeenranta Network project Web Site (2006), http://www.wlpr.net/. (Accessed 28 March 2006)