this server is to attend users’ requests and to
redistribute the audio stream under their commands.
Furthermore, the environment permits the testing
of advanced configurations in this stage such as
redundancy and intermediate devices. Redundant
servers can be installed in order to attend users’
requests. This is possible by adding new Server
machines to the environment. In the simplest case,
servers will inform users about other servers that
manage the same audio stream. If a problem is
detected in the main server, users will try to plug
into the redundant server.
A more complex scenario uses several
intermediate devices or proxies. Combining proxies
with redundant servers, users will first go to the
proxy and it will redirect their requests to the proper
server. If poor performance periods are detected in
one of the servers, the proxy can redirect users to a
more efficient server. This proxy configuration is
called pass-through mode: proxies are only
redirecting devices. Another way of using proxies is
a splitting mode, where proxies act as servers for
final users. The original servers send the audio
streams to proxies, and the proxies redistribute those
contents among users. Again, this service
configuration can be tested: new machines can be
added to act as redundant servers or as proxies.
Apart from servers and proxies, another
important element in any distributed service is the
communication network. Here we can find two
different scenarios for delivering audio streams to
users: an Intranet Scenario and an Internet Scenario.
In an Intranet Scenario, the audience connects to
the service using the same network where all the
devices are installed. The size of this network varies
from an office LAN to a network operator’s WAN.
Nevertheless, the owner of the network can usually
control three critical points: available resources –for
users and service devices-, service architecture, and
network configuration.
On the other hand, in an Internet Scenario, the
audience connects to the service using different
networks and technologies. The owner of the
network where service devices are installed does not
control everything that happens in the service, so he
would have difficulty in solving the problems that
may arise while delivering the contents to final
users.
To emulate these two scenarios, several network
devices have been installed in the test environment
shown in Figure 3. The installed equipment is
broadly used in IP networks and allows service
administrators to test radio services using different
backbone and access technologies, where different
routing protocols can be found. Almost every
network device is from Cisco, mainly due to its
position in the market and to the flexibility of its
operating system CISCO IOS, which provides a
broad range of communications techniques and
standard protocols.
Two switches have been installed to give
network access to every device in the test
environment. These switches have 24 ports each and
are interconnected using a trunking protocol, acting
as one switch of 48 ports of 10/100 Mbps. Several
VLANs can be created in these switches. Each VLAN
has a set of ports assigned to the switches, so the
devices plugged into those ports are working as if
they were in different networks.
In order to interconnect the VLANs, several
routers are available in the test environment.
Furthermore, different models have been installed.
Simpler routers can emulate small office
connections, with firewall capabilities, QoS policies
based in WFQ or RSVP, NAT and PAT translation,
etc. Others are appropriate for larger companies or
small network operators, supporting up to 70
heterogeneous network modules and up to 225
Kpps. All these routers have been equipped with
different modules including Fast Ethernet
, ISDN,
ATM and serial communications.
The test environment also includes an ATM
switch. This equipment simulates the behaviour of a
network backbone that uses this technology. Several
routers have been connected to this switch,
emulating the connections that large enterprises
contract to network operators under guaranteed
bandwidth policies, connections between different
network operators, or connections between network
segments of the same operator.
An ISDN and PSTN PBX device has also been
installed in the test environment. It allows routers to
receive connections from users that access through
ISDN or PSTN connections. Depending on the phone
number provided by those users, the PBX redirects
their calls to the proper router, simulating the
behaviour of different ISPs.
A firewall has been installed in the system. In
Figure 3 this firewall is restricting the access to the
test environment from an external network.
Nevertheless, if different networks are configured in
the test environment, this firewall can be moved to
apply restrictions in any of the existing connections.
Furthermore, the chosen device can apply advanced
firewall techniques working with statefull filtering.
It is able to support 128,000 concurrent connections
with a maximum throughput of 188 Mbps, and it can
apply NAT and PAT conversions.
3.3 Content access
The last phase in every test environment is that of
content access. In some way, customers’ accesses
ICETE 2005 - MULTIMEDIA SIGNAL PROCESSING
186