Sample. Network Integrity Monitor Evaluation. Report by: Bernie Ledwick Network Integrity Service Ltd 17 March 2005 Phone:

Size: px
Start display at page:

Download "Sample. Network Integrity Monitor Evaluation. Report by: Bernie Ledwick Network Integrity Service Ltd 17 March 2005 bl@e-nis.com Phone: 0161 860 7678"

Transcription

1 Sample Report by: Bernie Ledwick Network Integrity Service Ltd 17 March 2005 Phone:

2 1 Tables. 1.1 Contents. 1 Tables Contents Figures Introduction Overview Constraints Network overview Network Diagram Network description Findings Site Firewall Switch Switch Wireless access points Site Site-2 router Site-3 Wireless Access Point Site Site-3 Router Site-3 Switch Site-3 Wireless access point Site Site-4 Switch 1 Port Latency Environmental Conclusions Appendix A. Network Diagram Figures. Figure 1 Site-1 Firewall 09-Mar to 17Mar... 6 Figure 2 Site-1 Firewall - Mar Figure 3 Switch 2 port 8 16-Mar to 17 Mar... 7 Figure 4 Site-1 Switch 2 port 8 9-Mar to 17-Mar... 8 Figure 5 Switch 2 port 8 - Mar Figure 6 Switch 2 port Mar to 17-Mar... 9 Figure 7 Switch 2 Port Mar to 17-Mar... 9 Figure 8 Site-1 switch 2 port 18 traffic - Feb-Mar Figure 9 Site-1 switch port 18 errors - Feb-Mar Figure 10 Switch 2 Gigabit port Figure 11 Site-4 switch 3 port 4 errors...11 Bernie Ledwick Page 2 19 April 2005

3 Figure 12 Site-4 switch 3 port 9 errors...12 Figure 13 Site-4 switch 3 port 15 errors...12 Figure 14 Conset router ADSL interface Mar Figure 15 Site-2 ISDN - Jan-Feb Figure 16 Site-2 ISDN - 9-Mar-17 Mar...15 Figure 17 Site-3 router ADSL interface 9-Mar to 17-Mar...16 Figure 18 Site-3 router ISDN interface - Feb-Mar Figure 19 Site-3 switch 2 port 3-16-Mar to 17-Mar...17 Figure 20 Site-3 switch 2 gigabit port 2 16-Mar to 17-Mar...17 Figure 21 Site-3 wireless access point Feb-Mar Figure 22 Site-4 switch 3 port 16-9-Mar to 17-Mar...19 Figure 23 Site-4 switch 3 port 24-9-Mar to 17-Mar...19 Figure 24 Site-4 switch 2 port 24-9-Mar to 17-Mar...20 Figure 25 Site-4 Switch 2 port 23-9-Mar to 17-Mar...20 Figure 26 Site-4 switch 1 port 21-9-Mar to 17-Mar...21 Figure 27 Site-4 switch 1 port 24-9-Mar to 17-Mar...21 Figure 28 Site-4 switch 1 port 21 traffic...22 Figure 29 Site-4 switch 1 port 21 errors...22 Figure 30 Site-2 router latency...24 Figure 31 Site 2 router errors on WAN port...24 Figure 32 Site 2 router traffic on WAN port...24 Figure 33 Computer room temperature...25 Figure 34 Network connectivity at Site Bernie Ledwick Page 3 19 April 2005

4 2 Introduction. 2.1 Overview. The background to the report is as follows.. Network Integrity Services Ltd (NIS) were asked by XXX Company to assist them in monitoring various aspects of their network, as issues were being encountered on a regular basis and the IT department resources were fully stretched and finding it difficult to keep on top of the issues as they arose. It was agreed that the evaluation should cover the Site-1, Site-2, Site-3 and Site-4 sites, concentrating on bandwidth usage, ISDN activation and network latency. 2.2 Constraints. All routers and switches at the four sites are being monitored. However, it has not been possible to monitor the Site-1-Site-4 routers during the evaluation as these are maintained by xxx-communications-services-company, rather than yyycommunications-services-company. Two switches in Site-1 (switch6 and switch7) do not appear to be configured to allow monitoring. Bernie Ledwick Page 4 19 April 2005

5 3 Network overview. 3.1 Network Diagram. Please refer to Appendix Network description. The XXX Company branch network is based on a zzz-isp (supported by yyycommunications-services-company) VPN solution, over ADSL with ISDN backup. The main site is Site-1 where all the live servers reside. There are backup servers located in Site-4, with real-time data synchronisation via a high-capacity link between the Site-1 and Site-4 sites. This link is maintained by xxx-communications-servicescompany. Each of the remote sites has a wireless access point and the Site-1 site has two wireless access points. The NIM server was installed at Site-1 and has links back to NIS s servers in Manchester via the internet connection. NIS were provided with a dial-in VPN connection for configuration and monitoring purposes. Bernie Ledwick Page 5 19 April 2005

6 4 Findings. The reports below show anomalous results, which may actually show expected traffic, but may also show underlying issues which would require further analysis to determine the causes. 4.1 Site Firewall. Figure 1 Site-1 Firewall 09-Mar to 17Mar As can be seen on the above graph, the Site-1 firewall network interface is completely utilised for about 8 hours each night from 21:30-07:30. There are times when the firewall is completely utilised during the day, e.g. Monday evening and Tuesday midday. During these periods Internet users will experience reduced performance and the e-commerce applications will also be slow to use for customers. This needs monitoring for a longer period to see if the experience of Monday and Tuesday is repeated. Bernie Ledwick Page 6 19 April 2005

7 Figure 2 Site-1 Firewall - Mar 2005 The above graphs show a significant increase in the throughput of the firewall during the day, with traffic increasing to 400kb/s in the last week. It may be useful to turn on the NIM Internet Usage reporting to identify if the increase is linked to non work related usage of the Internet Switch Port 8. Figure 3 Switch 2 port 8 16-Mar to 17 Mar Bernie Ledwick Page 7 19 April 2005

8 Figure 4 Site-1 Switch 2 port 8 9-Mar to 17-Mar Figure 5 Switch 2 port 8 - Mar 2005 There is a significant amount of traffic on a regular basis on this port, mainly overnight. However, traffic was not apparent in week 10. It is suspected this is related to a backup process, if it is expected to run every day then NIM can be configured to detect the failure of the process as seen during week 10. Bernie Ledwick Page 8 19 April 2005

9 Switch 2 Port 11. Figure 6 Switch 2 port Mar to 17-Mar Figure 7 Switch 2 Port Mar to 17-Mar Significant traffic can be seen on this port over the last 2 days, with no previous traffic. NIM can identify unexpected usage this may simply be a new employee or similar change of use. Bernie Ledwick Page 9 19 April 2005

10 Site-1 switch 2 port 18 Figure 8 Site-1 switch 2 port 18 traffic - Feb-Mar 2005 Figure 9 Site-1 switch port 18 errors - Feb-Mar 2005 There are errors showing on the port in weeks 9-11, which may indicate an issue with cabling or an interface. The user on this port will probably experience poor performance so correcting the issue will improve user satisfaction. Bernie Ledwick Page April 2005

11 Switch 2 Gigabit port 1. Figure 10 Switch 2 Gigabit port 1 Significant, abnormal traffic can be seen over the weekend period. This needs to be explained as it may indicate data being transferred out of the system, or a virus Switch 3. Figure 11 Site-4 switch 3 port 4 errors Bernie Ledwick Page April 2005

12 Figure 12 Site-4 switch 3 port 9 errors Figure 13 Site-4 switch 3 port 15 errors The above ports are showing errors in weeks 9-11, which may indicate an issue with cabling or an interface. See note on Bernie Ledwick Page April 2005

13 4.1.4 Wireless access points. Neither of the wireless access points seems to be utilised, with traffic only being apparent on ap2, yesterday. Bernie Ledwick Page April 2005

14 4.2 Site Site-2 router ADSL interface. Figure 14 Conset router ADSL interface Mar 2005 Traffic can be seen to be reasonably within the limits of the ADSL connection, but there is evidence of some constant 10-15kb/s traffic in weeks 7 and 10. The volume recorded is within the limits for normal activity but may indicate an underlying issue ISDN interface. Figure 15 Site-2 ISDN - Jan-Feb 2005 Bernie Ledwick Page April 2005

15 Figure 16 Site-2 ISDN - 9-Mar-17 Mar There is evidence that the ISDN line is being raised regularly in January and February, less so in March. NIM reports on these instances to NIS and to XXX Co IT staff. Reducing the time that the ISDN is in use for clearly saves money Site-3 Wireless Access Point. This does not seem to be utilised. Bernie Ledwick Page April 2005

16 4.3 Site Site-3 Router Site-3 Router ASDL Interface. Figure 17 Site-3 router ADSL interface 9-Mar to 17-Mar The traffic on the ADSL interfaces seems to be reasonably in the bounds of the ADSL capability, but there has been a marked increase to 15-20kb/s in the underlying traffic this week Site-3 Router ISDN Interface. Figure 18 Site-3 router ISDN interface - Feb-Mar 2005 Bernie Ledwick Page April 2005

17 The ISDN line is being activated on a regular basis for short periods Site-3 Switch Site-3 Switch 2 Port 3 and Gigabit Port 2. Figure 19 Site-3 switch 2 port 3-16-Mar to 17-Mar Figure 20 Site-3 switch 2 gigabit port 2 16-Mar to 17-Mar Abnormal traffic yesterday is showing between these two ports, up to 15:30. N.B. Gigabit port 2 is labelled as being connected to switch5, but we have no record of a switch5 in Site-3. Bernie Ledwick Page April 2005

18 4.3.3 Site-3 Wireless access point. Figure 21 Site-3 wireless access point Feb-Mar 2005 This seems to have been utilised only in weeks 9 and 10. Bernie Ledwick Page April 2005

19 4.4 Site Switches. Figure 22 Site-4 switch 3 port 16-9-Mar to 17-Mar Figure 23 Site-4 switch 3 port 24-9-Mar to 17-Mar Bernie Ledwick Page April 2005

20 Figure 24 Site-4 switch 2 port 24-9-Mar to 17-Mar Figure 25 Site-4 Switch 2 port 23-9-Mar to 17-Mar Bernie Ledwick Page April 2005

21 Figure 26 Site-4 switch 1 port 21-9-Mar to 17-Mar Figure 27 Site-4 switch 1 port 24-9-Mar to 17-Mar It would seem that the switches in Site-4 are daisy chained, e.g. 1->2->3. It may be beneficial to re-arrange the switch connections, so that, as in the case shown above, significant amounts of traffic would not need to visit 3 switches, thus removing a potential performance bottle neck. Bernie Ledwick Page April 2005

22 4.4.2 Site-4 Switch 1 Port 21. Figure 28 Site-4 switch 1 port 21 traffic Figure 29 Site-4 switch 1 port 21 errors This port is showing errors in weeks 9-11, which may indicate an issue with cabling or an interface. Bernie Ledwick Page April 2005

23 5 Latency. In the last few days of the evaluation period, we implemented a latency test of the network to the three remote sites. The test as implemented is a network ping test to the router and a switch at each of the remote locations. Whilst this gives an indication of performance, including packet loss, it can be, in some cases, misleading as routers and switches do not always respond readily to ping requests if they are busy. More sophisticated tests can be implemented, e.g. HTTP round trip timings, depending on what network equipment is available at the remote location. Some thought would be required as to the relevance of this type of information, but one important use could be as a direct comparison between different service providers. A sample output for the performed test is shown below and it can be seen that there is a strong correlation between traffic, CRC errors and slower response times. A small volume of packet loss was observed. All remote sites, except Site-4 connected by Megastream, exhibited similar characteristics, so it would be worth investigating the cause of the CRC errors as this could have performance implications for users at remote sites. Bernie Ledwick Page April 2005

24 Figure 30 Site-2 router latency Figure 31 Site 2 router errors on WAN port Figure 32 Site 2 router traffic on WAN port Bernie Ledwick Page April 2005

25 6 Environmental As well as monitoring the data traffic NIM has been recording the temperature in the computer room. Figure 33 Computer room temperature Problems with the air conditioning during the period are clear to see. NIM alerted staff at XXX Co to the problem allowing them to prevent a serious issue. Bernie Ledwick Page April 2005

26 7 Conclusions. The above findings need to be discussed and investigated, as required, so that XXX Company IT personnel have an understanding of the types of issues that NIM can identify and report. In order for XXX Company to benefit fully from a wider implementation of NIM, some work will be required to more fully document the network (e.g. what is connected to which switch port) and an on-going programme of assessing what issues need to be reported automatically needs to be progressed. During the period covered by the report, NIM identified several issues where money was saved with the ISDN links and a number of issues that were unlikely to be found without NIM and which would have an impact on the user. A number of system processes were identified that need further investigation, and close monitoring if deemed critical. Bernie Ledwick Page April 2005

27 Appendix A. Network Diagram Sample only Figure 34 Network connectivity at Site 1. Bernie Ledwick Page April 2005

Managed Service For IP VPN Networks

Managed Service For IP VPN Networks LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Internet Services. Amcom. Support & Troubleshooting Guide

Internet Services. Amcom. Support & Troubleshooting Guide Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

Server must be connected to the internet via high-speed internet connection.

Server must be connected to the internet via high-speed internet connection. Server Based System Requirements Database Server Component / Number of users 1-10 Users 11-25 Users 28-50 Users Processor Recommended 4 Cores 6 Cores 8 Cores Processor Minimum 2 Cores 4 Cores 6 Cores Memory

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Edge Configuration Series Reporting Overview

Edge Configuration Series Reporting Overview Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed

More information

3.2 This situation is also experienced by Officers who also need remote access to Council networks.

3.2 This situation is also experienced by Officers who also need remote access to Council networks. Report Asset Management Committee 29 September 201 15- BROADBAND ACCESS TO COUNCIL NETWORKS 1. Reason for Report To seek Members' approval to undertake a pilot project which will lead to the introduction

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

Can a Data Centre lower your networking costs?

Can a Data Centre lower your networking costs? 2009 WHITE PAPER Can a Data Centre lower your networking costs? Version 1.0.0 Release 5.0 www.link-connect.com advice@link-connect.com +44 (0)800 0354 777 Link-Connect Services Ltd, Moor Park House, Farnham,

More information

Site2Site VPN Optimization Solutions

Site2Site VPN Optimization Solutions XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding

More information

Mesh VPN Link Sharing (MVLS) Solutions

Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

Firewall, Mail and File server solution

Firewall, Mail and File server solution Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

Application Performance Analysis and Troubleshooting

Application Performance Analysis and Troubleshooting Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency

More information

QoS (Quality of Service)

QoS (Quality of Service) QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

The Key to Cost-Effective WAN Optimization - White Paper

The Key to Cost-Effective WAN Optimization - White Paper The Key to Cost-Effective WAN Optimization - White Paper Table of Contents General...3 The Challenges of WAN Link Management in the Datacenter...3 Link Up-time and Business Continuity...3 The Active-backup

More information

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

How to configure DNAT in order to publish internal services via Internet

How to configure DNAT in order to publish internal services via Internet How to configure DNAT in order to publish internal services via Internet How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Using Application Response to Monitor Microsoft Outlook

Using Application Response to Monitor Microsoft Outlook Focus on Value Using Application Response to Monitor Microsoft Outlook Microsoft Outlook is one of the primary e-mail applications used today. If your business depends on reliable and prompt e-mail service,

More information

Data Network Security Policy

Data Network Security Policy Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

MPLS provides multi-site solution

MPLS provides multi-site solution MPLS provides multi-site solution Executive Summary MPLS (Multi Protocol Label Switching) meets the need for a cost effective solution for voice and data connectivity across multiple sites. Spitfire s

More information

L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning

L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning L-Series LAN Provisioning Best Practices for Local Area Network Deployment Introduction Scope NComputing s L-series access devices connect to a host computer through an Ethernet interface and IP protocol.

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

A Simple Idea: Multiple Carriers, One Point of Contact

A Simple Idea: Multiple Carriers, One Point of Contact A Simple Idea: Multiple Carriers, One Point of Contact Private Network & MPLS Gurus 10 Years of Experience Industry Recognition Experienced Install & Provisioning Support Thousands of Installs Hundreds

More information

Campus Network Best Practices: Core and Edge Networks

Campus Network Best Practices: Core and Edge Networks Campus Network Best Practices: Core and Edge Networks Dale Smith Network Startup Resource Center dsmith@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).

More information

Campus Network Best Practices: Core and Edge Networks

Campus Network Best Practices: Core and Edge Networks Campus Network Best Practices: Core and Edge Networks Dale Smith University of Oregon/NSRC dsmith@uoregon.edu This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).

More information

Lab Testing Summary Report

Lab Testing Summary Report Key findings and conclusions: Lab Testing Summary Report March 2012 Report SR120222B AR s Access and Interconnection Vendor Tested: Dual 3G uplinks provide fully redundant WAN connectivity Interoperability

More information

1 Network Service Development Trends and Challenges

1 Network Service Development Trends and Challenges 1 Network Service Development Trends and Challenges Mobility 1. Shift the focus from technology, device, and connectivity to services and user experience. Cloud Computing 2. Shift from single-point security

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

How To Implement A Ucmc Communications System

How To Implement A Ucmc Communications System COMMUNICATIONS OPTIONS FOR UTMC Mark Bodger Siemens Traffic Controls Sopers Lane, Poole Dorset, BH17 7ER United Kingdom Tel: +44 (0)1202 782848 Fax: +44 (0)1202 782602 Mobile: +44 (0)7808 822366 Email:

More information

BioCity Nottingham, Pennyfoot Street, NG1 1GF

BioCity Nottingham, Pennyfoot Street, NG1 1GF Description of requirement Invitation To Quote ref BioCity location Your quotation is invited for the supply of internet connectivity and VOIP services in accordance with this ITQ and any attached specifications.

More information

Enterprise Broadband Customer Service Description

Enterprise Broadband Customer Service Description BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband

More information

Monitoring the NTP Server. eg Enterprise v6.0

Monitoring the NTP Server. eg Enterprise v6.0 Monitoring the NTP Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Figure 41-1 IP Filter Rules

Figure 41-1 IP Filter Rules 41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

Reliable high throughput data connections with low-cost & diverse transport technologies

Reliable high throughput data connections with low-cost & diverse transport technologies Virtual Leased Line (VLL) for Communications between Offices Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband Bonding Network

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Building integrated services intranets

Building integrated services intranets Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

How To Monitor Bandwidth On A Computer Network

How To Monitor Bandwidth On A Computer Network Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I sinha@live.in, II nishant@desidoc.drdo.in

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive

More information

Meeting the challenge of voice services

Meeting the challenge of voice services Meeting the challenge of voice services Executive Summary Making the most of convergence to bridge the gap between IT networks and traditional telephony. This white paper is aimed at IT support companies

More information

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. 30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V

More information

Appendix C Network Planning for Dual WAN Ports

Appendix C Network Planning for Dual WAN Ports Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and

More information

- Introduction to PIX/ASA Firewalls -

- Introduction to PIX/ASA Firewalls - 1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers

More information

Service Descriptions

Service Descriptions Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application

More information

4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W

4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W 4G Business Continuity Solution 4G WiFi M2M Router NTC-140W Introduction Whether you run a small corner shop, are the plant manager of a factory or manage IT in a corporate office, you ll need a reliable

More information

AscenVision. Successful Story of F1. AscenVision Technology Inc. The Intelligent Network Provider

AscenVision. Successful Story of F1. AscenVision Technology Inc. The Intelligent Network Provider AscenVision Successful Story of F1 AscenVision Technology Inc. The Intelligent Network Provider Background Formula one racing is all about winning. Only the car first to cross the checker flag is the winner.

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

SURF Feed Connection Guide

SURF Feed Connection Guide SURF Feed Connection Guide Tullett Prebon Information Ltd A wholly owned subsidiary of Tullett Prebon Version 6.0 3 rd August 2005 Contents 1. Introduction...3 1.1 General...3 2. Connectivity via the Internet...4

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

TSC (Total Solution Communications Ltd)

TSC (Total Solution Communications Ltd) TSC (Total Solution Communications Ltd) 1 Parkway Drive, Mairangi Bay, North Harbour Phone: 09 477 2888 Fax: 09 477 2889 E-Mail: info@tsc.co.nz Web: www.tsc.co.nz A vaya IP Office Converged Communications

More information

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth.

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth. Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth. Presenter information Tomas Kirnak Network design Security, wireless Servers, Virtualization Mikrotik Certified Trainer

More information

Source-Connect Network Configuration Last updated May 2009

Source-Connect Network Configuration Last updated May 2009 Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network

More information

Net Optics and Cisco NAM

Net Optics and Cisco NAM When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

How to Build a Security Dashboard

How to Build a Security Dashboard Building a Security Dashboard Joel M Snyder jms@opus1.com Senior Partner Opus One Agenda What s a Dashboard? How do I build one (part 1)? don t fit in an hour A Security Dashboard Provides

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

Application Description

Application Description Application Description Firewall in front of LAN Different Servers located behind Firewall Firewall to be accessible from Internet Load Balancer to be installed in a TRANSPARENT MODE between Firewall and

More information

White Paper: Virtual Leased Line

White Paper: Virtual Leased Line Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices

More information

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services Avaya IP Office Converged Communications Streamlining and simplifying communications by bringing your voice, data and Internet all together IP Telephony Contact Centres Unified Communication Services Simplicity

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

SystemWatch SM. Remote Network Monitoring

SystemWatch SM. Remote Network Monitoring SystemWatch SM Remote Network Monitoring SystemWatch Network Monitoring Service: Real World Experience Sony s SystemWatch network monitoring service uses device and networking monitoring software in conjunction

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool

More information

Chapter 51 WAN Load Balancing

Chapter 51 WAN Load Balancing Chapter 51 WAN Load Balancing Introduction... 51-2 WAN Load Balancer Operating Principles... 51-2 Load Distribution Methods... 51-3 Round Robin Distribution... 51-3 Weighted Lottery Distribution... 51-3

More information

Provider Managed Network Products

Provider Managed Network Products Provider Managed Network Products Service Description and Prices LAST UPDATED: 7 July 2014 VERSION 1 Contents 1 Overview... 3 2 Definitions... 3 3 Managed Network Connection... 4 3.1 Features... 4 3.2

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Accelerating WAN Performance with Riverbed

Accelerating WAN Performance with Riverbed Information Technology Accelerating WAN Performance with Accelerating WAN Performance with How this revolutionary technology is improving WAN performance. By Alex Dewar, Head of IT & IM Solutions, Excitech

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

EXINDA NETWORKS. Deployment Topologies

EXINDA NETWORKS. Deployment Topologies EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: info@exinda.com :: 2005 Exinda Networks Pty Ltd.

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

Beyond Monitoring Root-Cause Analysis

Beyond Monitoring Root-Cause Analysis WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based

More information

Broadband Bonding Network Appliance TRUFFLE BBNA6401

Broadband Bonding Network Appliance TRUFFLE BBNA6401 Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable

More information

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations

More information

White Paper: Broadband Bonding with Truffle PART I - Single Office Setups

White Paper: Broadband Bonding with Truffle PART I - Single Office Setups PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise

More information