TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux perfsonar developer
|
|
- Rosanna West
- 8 years ago
- Views:
Transcription
1 TCP Labs WACREN Network Monitoring and Measurement Workshop Antoine Delvaux perfsonar developer
2 Hands-on session We ll explore practical aspects of TCP Checking the effect of loss and latency on TCP performance Looking the TCP window size Checking and setting buffers values Looking at the effects of tuning on TCP performance 2
3 VM setup On your local setup: 3 VM Debian + perfsonar-testpoint CentOS + perfsonar-testpoint perfsonar toolkit full install (CentOS) Need to check/change network card before boot Should be on Bridged adapter If not possible, then in Host-only adapter or NAT Local network on your machine (IP if host-only adapter config): : your host : Debian host wacren : CentOS host wacrencos : perfsonar wacrenps 3
4 VM reconfig Login: pst/abuja Beware of keyboard: AZERTY Change after login with: On Debian: sudo dpkg-reconfigure keyboard-configuration On CentOS (as root) vi /etc/sysconfig/keyboard Timezone On Debian: sudo dpkg-reconfigure tzdata 4
5 Mininet What is mininet? Mininet creates a realistic virtual network, running real kernel, switch and application code, on a single machine (VM, cloud or native), in seconds, with a single command Used by many networking courses: 5
6 Mininet Simulates network using OpenFlow (Open vswitch), all on your local machine Simulate network topology and link characteristics bandwidth losses delays queuing etc You define the network topology in a Python script 6
7 Launch and use mininet Default topology: h1 s1 h2 $ sudo mn *** Creating network ( ) mininet> help Ping hosts in mininet shell: pingall h1 ping h2 Show interfaces h1 ifconfig h2 ifconfig 7
8 What is iperf? Throughput: Rate of successful message delivery over a communication channel How much data can I shovel into the network for some given amount of time? What does this tell us? Opposite of utilization (e.g. its how much we can get at a given point in time, minus what is utilised) Utilisation and throughput added together are capacity Tools that measure throughput are a simulation of a real work use case (e.g. how well could bulk data movement perform) Ways to game the system Parallel streams Manual window size adjustments memory to memory testing no spinning disk 8
9 How does iperf work? Data Transfer between memory on local and remote host through end systems TCP/IP- Stack and network Two modes: TCP, UDP Best practise: Interactive session on both sides Take result from Server (Receiver) 9
10 iperf server One program, two roles : Server (Receiver) Client (Sender) Run the server as daemon or interactively On wacrenps (CentOS host) iperf3 -s 10
11 iperf client output iperf3 -c Connecting to host , port 5201 [ 4] local port connected to port 5201 [ ID] Interval Transfer Bandwidth Retr Cwnd [ 4] sec 78.1 MBytes 655 Mbits/sec KBytes [ 4] sec 72.0 MBytes 604 Mbits/sec KBytes [ 4] sec 72.8 MBytes 611 Mbits/sec KBytes [ 4] sec 75.7 MBytes 635 Mbits/sec KBytes [ 4] sec 69.8 MBytes 585 Mbits/sec KBytes [ 4] sec 50.7 MBytes 425 Mbits/sec KBytes [ 4] sec 64.8 MBytes 544 Mbits/sec KBytes [ 4] sec 75.6 MBytes 634 Mbits/sec KBytes [ 4] sec 73.8 MBytes 619 Mbits/sec KBytes [ 4] sec 75.1 MBytes 630 Mbits/sec KBytes [ ID] Interval Transfer Bandwidth Retr [ 4] sec 709 MBytes 594 Mbits/sec 856 sender [ 4] sec 708 MBytes 594 Mbits/sec receiver iperf Done. 11
12 iperf server output ~]$ iperf3 -s Server listening on Accepted connection from , port [ 5] local port 5201 connected to port [ ID] Interval Transfer Bandwidth [ 5] sec 75.6 MBytes 634 Mbits/sec [ 5] sec 72.0 MBytes 604 Mbits/sec [ 5] sec 72.9 MBytes 612 Mbits/sec [ 5] sec 75.8 MBytes 636 Mbits/sec [ 5] sec 69.8 MBytes 586 Mbits/sec [ 5] sec 51.9 MBytes 430 Mbits/sec [ 5] sec 62.6 MBytes 531 Mbits/sec [ 5] sec 75.8 MBytes 636 Mbits/sec [ 5] sec 73.2 MBytes 614 Mbits/sec [ 5] sec 75.6 MBytes 634 Mbits/sec [ 5] sec 2.67 MBytes 661 Mbits/sec [ ID] Interval Transfer Bandwidth [ 5] sec 0.00 Bytes 0.00 bits/sec sender [ 5] sec 708 MBytes 592 Mbits/sec receiver 12
13 iperf udp measurement iperf3 -c u -b 50M Connecting to host , port 5201 [ 4] local port connected to port 5201 [ ID] Interval Transfer Bandwidth Total Datagrams [ 4] sec 5.40 MBytes 45.2 Mbits/sec 691 [ 4] sec 5.96 MBytes 50.0 Mbits/sec 763 [ 4] sec 5.95 MBytes 49.8 Mbits/sec 761 [ 4] sec 5.97 MBytes 50.1 Mbits/sec 764 [ 4] sec 5.95 MBytes 49.9 Mbits/sec 762 [ 4] sec 5.96 MBytes 50.0 Mbits/sec 763 [ 4] sec 5.96 MBytes 50.0 Mbits/sec 763 [ 4] sec 5.95 MBytes 49.9 Mbits/sec 762 [ 4] sec 5.98 MBytes 50.2 Mbits/sec 765 [ 4] sec 5.95 MBytes 49.9 Mbits/sec [ ID] Interval Transfer Bandwidth Jitter Lost/Total Datagrams [ 4] sec 59.0 MBytes 49.5 Mbits/sec ms 0/0 (-nan%) [ 4] Sent 0 datagrams iperf Done. 13
14 iperf in mininet Default topology: h1 s1 h2 (2 hosts, 1 switch) $ sudo mn *** Creating network ( ) mininet> help Ping hosts in mininet shell: pingall h1 ping h2 iperf h2 iperf3 -s -D h1 iperf3 -c h2 We need to have iperf3 running in server mode on h2 (cannot run interactively in mininet) Notes: the mininet `iperf` command uses iperf version 2 14
15 Simulating latency Mininet topology hsssh h1 s1 s2 s3 h2 sudo mn --custom topology/topo-ps-tutorial.py --topo hsssh mininet> h1 ping h2 h2 iperf3 -s -D h1 iperf3 -c h2 h1 iperf3 -c h2 -u -b 100M What s different? latency throughput UDP tests: no retransmits, no cwnd 15
16 Simulating losses Mininet topology hsssh-loss h1 s1 s2 s3 h2 and losses between s1 and s2 sudo mn --custom topology/topo-ps-tutorial.py --topo hsssh-loss mininet> h1 ping h2 h2 iperf3 -s -D h1 iperf3 -c h2 What s different? do ping see losses? latency retransmits congestion window (Cwnd) 16
17 Increased latency Mininet topology hsssh-loss-lat h1 s1 s2 s3 h2 with losses between s1 and s2 and increased delay between s2 and s3 sudo mn --custom topology/topo-ps-tutorial.py --topo hsssh-loss-lat mininet> h1 ping h2 h2 iperf3 -s -D h1 iperf3 -c h2 What s different? throughput retransmits congestion window (Cwnd) 17
18 iperf 18
19 Throuput Expectations Q: What iperf through should you expect to see on a uncongested 10Gbps network? A: Gbps, depending on RTT TCP tuning CPU core speed, and ratio of sender speed to receiver speed It is good to have tools to measure! 19
20 OWAMP OWAMP = One Way Active Measurement Protocol (RFC 4656) E.g. one way ping Some differences from traditional ping: Measure each direction independently (recall that we often see things like congestion occur in one direction and not the other) Uses small evenly spaced groupings of UDP (not ICMP) packets Ability to ramp up the interval of the stream, size of the packets, number of packets OWAMP is most useful for detecting packet train abnormalities on an end to end basis Loss Duplication Out of order packets Latency on the forward vs. reverse path Number of Layer 3 hops Does require some accurate time via NTP the perfsonar toolkit does take care of this for you. 20
21 About time One Way Measurement means time measure happens on different host, need for accurate time synchronisation sync to good, close (network wise) time servers avoid pool.ntp.org servers that are too overloaded or not close enough to you perfsonar configuration provides a different set even better if you have a Stratum 1 time server on your network (and good service to your users!) OWAMP refuses to start if NTP sync is not good enough 21
22 OWAMP usefulness OWAMP is very useful in regular testing Congestion or queuing often occurs in a single direction Packet loss information (and how often/how much occurs over time) is more valuable than throughput This gives you a why to go with an observation. If your router is going to drop a 50B UDP packet, it is most certainly going to drop a 1500B/9000B TCP packet Overlaying data Compare your throughput results against your OWAMP do you see patterns? Alarm on each, if you are alarming (and we hope you are alarming ) 22
23 OWAMP lab Mininet topology hsssh sudo service owampd stop sudo mn --custom topology/topo-ps-tutorial.py --topo hsssh mininet> h2 service owampd start h1 owping h2 h1 owping -a 1 h2 Output in 2 directions 23
24 OWAMP with loss Mininet topology hsssh-loss sudo mn --custom topology/topo-ps-tutorial.py --topo hsssh-loss mininet> h2 service owampd restart h1 owping -a 1 h2 What s different? same losses on each direction? 24
25 Some Quick Words on BWCTL BWCTL is a wrapper around a few tools: iperf, iperf3, nuttcp, ping, owping, traceroute and tracepath Some general notes: Runs as a daemon and as a CLI client Use -c to specify a catcher (receiver) Use -s to specify a sender The bwctl client can be a 3rd machine! Will default to IPv6 if available (use -4 to force IPv4 as needed, or specify things in terms of an address if your host names are dual homed) Policy specification can do things like prevent tests to subnets, or allow longer tests to others. See the man pages for more details (bwctl.limits) 25
26 BWCTL tools Couple of varieties of testers that BWCTL knows how to talk with (use -T switch): Iperf2 Default for the command line (e.g. bwctl c HOST will invoke this) Some known problems (CPU hog, hard to get UDP testing to be correct) Iperf3 Default for the perfsonar regular testing framework, can invoke via command line switch (bwctl T iperf3 c HOST) New brew, has features iperf2 is missing (retransmissions, JSON output, daemon mode, etc.) Nuttcp Different code base, more control over how the tool behaves on the host (bind to CPU/core, etc.) Similar feature set to iperf3 Traceroute: useful to do reverse traceroutes Tracepath: very useful to see MTU and asymmetric routing issues 26
27 BWCTL lab: preparation Don t need mininet for these, can run directly on the VM (we ll use only the client) We need to install it on VM cd /etc/apt/sources.list.d sudo wget wget -qo - sudo apt-key add - sudo apt-get update sudo apt-get install bwctl-client BWCTL doesn t work behind a firewall, it needs a public IP, but we ll trigger BWCTL tests remotely 27
28 BWCTL lab On the VM: bwtraceroute -T tracepath -c newy-pt1.es.net -s nmm0.wacren.net bwtraceroute -T traceroute -c newy-pt1.es.net -s nmm0.wacren.net bwtraceroute -T tracepath -c amst-pt1.es.net -s nmm1.wacren.net bwtraceroute -T traceroute -c amst-pt1.es.net -s nmm1.wacren.net bwtraceroute -T tracepath -c nmm1.wacren.net \ -s jnbwits-1g.perfsonar.ac.za bwtraceroute -T traceroute -c nmm1.wacren.net \ -s jnbwits-1g.perfsonar.ac.za bwtraceroute -T tracepath -c nmm0.wacren.net -s pfsnr-pe.kenet.or.ke bwtraceroute -T traceroute -c nmm0.wacren.net -s pfsnr-pe.kenet.or.ke 28
29 BWCTL lab Test reverse direction, swap -s and -c Try other tools, try other hosts psmp-gn-bw-01-ath-gr.geant.net perfsonar2.mi.infn.it perfsonar02.hephy.oeaw.ac.at perfmon.dur.scotgrid.ac.uk psmp-gn-bw-01-tal-ee.geant.net ps0001.m45.ihep.su repos.indiacms.res.in dur-dut-1g.perfsonar.ac.za ps00-bsas.innova-red.net 29
How To Set Up A Network Measurement Toolkit For A Network Performance Test On A Network With A Network (Networking) On A Microsoft Ipa 2.5 (Netware) On An Ipa2 (Netcom) On Your Computer
Firewall Port Recommendations for the ps Performance Toolkit Prepared by the NTAC Performance Working Group November 2014 Edited by J. Zurawski (ESnet), A. Brown (Internet2), A. Lake (ESnet), K. Miller
More informationIperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH
Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?
More informationperfsonar: End-to-End Network Performance Verification
perfsonar: End-to-End Network Performance Verification Toby Wong Sr. Network Analyst, BCNET Ian Gable Technical Manager, Canada Overview 1. IntroducGons 2. Problem Statement/Example Scenario 3. Why perfsonar?
More informationTier3 Network Issues. Richard Carlson May 19, 2009 rcarlson@internet2.edu
Tier3 Network Issues Richard Carlson May 19, 2009 rcarlson@internet2.edu Internet2 overview Member organization with a national backbone infrastructure Campus & Regional network members National and International
More informationEVALUATING NETWORK BUFFER SIZE REQUIREMENTS
EVALUATING NETWORK BUFFER SIZE REQUIREMENTS for Very Large Data Transfers Michael Smitasin Lawrence Berkeley National Laboratory (LBNL) Brian Tierney Energy Sciences Network (ESnet) [ 2 ] Example Workflow
More informationNetwork testing with iperf
Network testing with iperf Bill Farrow bill.farrow@gmail.com Why use iperf? What does it run on? TCP example UDP example Use Case: Network Server Appliance Use Case: Embedded Video Streaming Use Case:
More information1000Mbps Ethernet Performance Test Report 2014.4
1000Mbps Ethernet Performance Test Report 2014.4 Test Setup: Test Equipment Used: Lenovo ThinkPad T420 Laptop Intel Core i5-2540m CPU - 2.60 GHz 4GB DDR3 Memory Intel 82579LM Gigabit Ethernet Adapter CentOS
More informationNetwork performance monitoring Insight into perfsonar
Network performance monitoring Insight into perfsonar Szymon Trocha, Poznań Supercomputing and Networking Center E-infrastructure Autumn Workshops, Chisinau, Moldova 9 September 2014 Agenda! Network performance
More informationMarch 10 th 2011, OSG All Hands Workshop Network Performance Jason Zurawski, Internet2. Performance Measurement Tools
March 10 th 2011, OSG All Hands Workshop Network Performance Jason Zurawski, Internet2 Performance Measurement Tools Agenda Tutorial Agenda: Network Performance Primer Why Should We Care? (15 Mins) GeMng
More informationMonitoring Android Apps using the logcat and iperf tools. 22 May 2015
Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis katsarakis@csd.uoc.gr Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android
More informationNetwork performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
More informationNetwork Performance - Theory
Network Performance - Theory This document is a result of work by the perfsonar Project (h@p://www.perfsonar.net) and is licensed under CC BY- SA 4.0 (h@ps://creajvecommons.org/licenses/by- sa/4.0/). Event
More informationMeasuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
More informationNetwork Performance Tools
Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf
More informationPerformance and Bandwidth Testing for Data Circuits
Performance and Bandwidth Testing for Data Circuits In some cases, customers report that they are experiencing slower than expected data connections. These can be caused by any number of factors, including
More informationNetwork Monitoring. Sebastian Büttrich, sebastian@less.dk NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
Network Monitoring Sebastian Büttrich, sebastian@less.dk NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda What is network
More informationHONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
More informationMeasure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
More informationOverview of Network Measurement Tools
Overview of Network Measurement Tools Jon M. Dugan Energy Sciences Network Lawrence Berkeley National Laboratory NANOG 43, Brooklyn, NY June 1, 2008 Networking for the Future of Science
More informationVMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
More informationGlobus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
More informationPerformance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
More informationHigh-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationInformation Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
More informationI. ADDITIONAL EVALUATION RESULTS. A. Environment
1 A. Environment I. ADDITIONAL EVALUATION RESULTS The tests have been performed in a virtualized environment with Mininet 1.0.0 [?]. Mininet is tool to create a virtual network running actual kernel, switch
More informationHOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
More informationPerformance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
More informationMuL SDN Controller HOWTO for pre-packaged VM
MuL SDN Controller HOWTO for pre-packaged VM 1 P a g e Table of Contents 1 Starting the VM... 3 2 Using MuL controller... 3 2.1 Mul component overview... 3 2.2 Running MUL... 5 2.2.1 Running MuL s forwarding
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationTHE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
More informationLecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
More informationITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose
Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine
More informationMaster s Thesis Evaluation and implementation of a network performance measurement tool for analyzing network performance under heavy workloads
Master s Thesis Evaluation and implementation of a network performance measurement tool for analyzing network performance under heavy workloads Kuralamudhan Ramakrishnan Hamburg, 04 May 2015 Evaluation
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationTFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
More informationTEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au
TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to
More informationUsing Linux Traffic Control on Virtual Circuits J. Zurawski Internet2 zurawski@internet2.edu February 25 nd 2013
Using Linux Traffic Control on Virtual Circuits J. Zurawski Internet2 zurawski@internet2.edu February 25 nd 2013 1. Abstract Research and Education (R&E) networks have experimented with the concept of
More informationInfrastructure for active and passive measurements at 10Gbps and beyond
Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA
More informationAugust 9 th 2011, OSG Site Admin Workshop Jason Zurawski Internet2 Research Liaison NDT
August 9 th 2011, OSG Site Admin Workshop Jason Zurawski Internet2 Research Liaison NDT Agenda Tutorial Agenda: Network Performance Primer Why Should We Care? (30 Mins) IntroducOon to Measurement Tools
More informationApplication Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
More informationNetwork Probe. Figure 1.1 Cacti Utilization Graph
Network Probe Description The MCNC Client Network Engineering group will install several open source network performance management tools on a computer provided by the LEA or charter school to build a
More informationEnd-to-End Network/Application Performance Troubleshooting Methodology
End-to-End Network/Application Performance Troubleshooting Methodology Wenji Wu, Andrey Bobyshev, Mark Bowden, Matt Crawford, Phil Demar, Vyto Grigaliunas, Maxim Grigoriev, Don Petravick Fermilab, P.O.
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationProject 4: SDNs Due: 11:59 PM, Dec 11, 2014
CS168 Computer Networks Fonseca Project 4: SDNs Due: 11:59 PM, Dec 11, 2014 Contents 1 Introduction 1 2 Overview 2 2.1 Components......................................... 2 3 Setup 3 4 Shortest-path Switching
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationCisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
More informationTroubleshoo*ng Network Performance Issues with Ac*ve Monitoring
Troubleshoo*ng Network Performance Issues with Ac*ve Monitoring NANOG 64 Brian Tierney, ESnet, bl*erney@es.net June 2, 2015 This document is a result of work by the perfsonar Project (hnp://www.perfsonar.net)
More informationDDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée
DDoS attacks on electronic payment systems Sean Rijs and Joris Claassen Supervisor: Stefan Dusée Scope High volume DDoS attacks Electronic payment systems Low bandwidth requirements: 5 from account X to
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationTrack 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationHOWTO: Set up a Vyatta device with ThreatSTOP in bridge mode
HOWTO: Set up a Vyatta device with ThreatSTOP in bridge mode Overview This document explains how to set up a minimal Vyatta device in a transparent bridge configuration and then how to apply ThreatSTOP
More informationperfsonar Host Hardware
perfsonar Host Hardware Event Presenter, OrganizaKon, Email Date This document is a result of work by the perfsonar Project (h@p://www.perfsonar.net) and is licensed under CC BY- SA 4.0 (h@ps://creakvecommons.org/licenses/by-
More informationUnix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
More informationIMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.
IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server
More informationHow To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
More informationTECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationHomework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
More informationRFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do
RFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do RFC 6349 is the new transmission control protocol (TCP) throughput test methodology that JDSU co-authored along with
More informationIntroduction & Motivation
Introduction & Motivation WACREN Network Monitoring and Measurement Workshop Antoine Delvaux a.delvaux@man.poznan.pl perfsonar developer 30.09.2015 This document is a result of work by the perfsonar Project
More informationAlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
More informationDeploy the ExtraHop Discover Appliance with Hyper-V
Deploy the ExtraHop Discover Appliance with Hyper-V 2016 ExtraHop Networks, Inc. All rights reserved. This manual, in whole or in part, may not be reproduced, translated, or reduced to any machine-readable
More informationAllocating Network Bandwidth to Match Business Priorities
Allocating Network Bandwidth to Match Business Priorities Speaker Peter Sichel Chief Engineer Sustainable Softworks psichel@sustworks.com MacWorld San Francisco 2006 Session M225 12-Jan-2006 10:30 AM -
More informationTELE 301 Network Management
TELE 301 Network Management Lecture 22: Diagnostics & Ethics Haibo Zhang Computer Science, University of Otago TELE301 Lecture 22: Diagnostics & Ethics 1 Fault Management Fault management It means preventing,
More informationHOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
More informationA Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, acecil19@yahoo.com Abstract As company intranets
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationConnections and wiring Diagram
Introduction 1 7 Introduction Teleport-Video SD image is based on Asterisk and FreePBX running on the Raspberry Pi. For any information related to Raspberry Pi, check the original website at raspberrypi.org.
More informationIntroduction to ServerIron ADX Application Switching and Load Balancing. Module 5: Server Load Balancing (SLB) Revision 0310
Introduction to ServerIron ADX Application Switching and Load Balancing Module 5: Server Load Balancing (SLB) Revision 0310 Objectives Upon completion of this module the student will be able to: Describe
More informationHow Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationProgramming Assignment 2: Using Mininet and Mininet Python API: Instructions
Programming Assignment 2: Using Mininet and Mininet Python API: Instructions In this exercise, you will be learning how to build custom topologies using Mininet Python API and how certain parameters like
More informationGregSowell.com. Mikrotik Basics
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
More informationIP Address: the per-network unique identifier used to find you on a network
Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationAutomated Penetration Test
Automated Penetration Test TABLE OF CONTENTS Introduction.... 2 Test Structure.... 2 Manually Launching The Automated Penetration Test.... 3 Automatically Launching The Automated Penetration Test On Boot....
More informationCisco Quality of Service and DDOS
Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationNetwork Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
More informationHow To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationCisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
More informationVLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationMEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied
More informationYou can keep your firewall (if you want to) Practical, simple and cost saving applications of OpenDaylight you can implement today
You can keep your firewall (if you want to) Practical, simple and cost saving applications of OpenDaylight you can implement today John Sobanski, Engineer, Solers Inc. July 2015 @OpenDaylightSDN #OpenSDN
More informationNetwork Configuration Example
Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationDeploying distributed network monitoring mesh
Deploying distributed network monitoring mesh for LHC Tier-1 and Tier-2 sites Phil DeMar, Maxim Grigoriev Fermilab Joe Metzger, Brian Tierney ESnet Martin Swany University of Delaware Jeff Boote, Eric
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationMPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
More information