IEEE International Conference on Emerging Technologies September 17-18, Islamabad

Size: px
Start display at page:

Download "IEEE --- 2005 International Conference on Emerging Technologies September 17-18, Islamabad"

Transcription

1 Sajjad Ali Mushtaq 1 & Azhar A. Rizvi 2 CIIT Abbottabad Pakistan 1 & Department of Electronics, Quaid-I-Azam University Islamabad, Pakistan 2. alisajjad_mushtaq@yahoo.com 1 & azhar@qau.edu.pk 2 Abstract Network traffic due to its heterogeneity can be modeled by heavy tail distributions. A 100 Mbps Ethernet link has been used to capture the network traffic(ip Packets) and the measurements on a Switched Ethernet System are presented that reveal new insights into the statistical nature of the traffic. Various parameters of sniffed network traffic from six different datasets are parsed for its characterization. Packet inter-arrival time and packet size are statistically evaluated and analyzed. Packet inter-arrival time follows power law and can be modeled by heavy tail distribution (Pareto distribution). Hybrid mathematical model of packet size has also been presented. Keywords Wor d Wide Web(WWW), Quality of Service(QoS), Switched Network, Probability Density Function, Heavy Tail Distribution I. INTRODUCTION The last decade has been an active era for research in local and global communication networks which includes telephony networks, mobile communication, LAN/WAN and the Internet. Data networks have become trendy while giving birth to smart and cool technology along with computing since the magical development of WWW (World Wide Web) [1] at CERN. Internet is the most multifarious, versatile, and dynamic system ever since developed on the planet. There are many varieties of network connectivity, architecture, equipment and accordingly different types of traffic flows. It has converted the world into a global village and now-a-days you can not even think of a micro second down time. The alteration of this network of network is immensely complicated and difficult as there is no centralized control and administration and this huge network is not owned by any organization or an individual. However, because of such factors there is always a need for an in depth analysis and study of the system for its smooth operation and future planning and every segment have to play its role and should feel the responsibility. Due to the scale and diversity of its physical infrastructure, the distributed nature of its administrative control, the distributed operation of its protocols, the variability of traffic patterns, the diversity of applications, users and most importantly the interplay of these and other factors, a coherent understanding of the network traffic behavior has to be developed by the experts and researchers. To solve the problem of modeling the network traffic, a multi-disciplinary approach from electronics, computer science, mathematics and statistics point of view is required. In this regard, it is emphasized that what is intended is not a mathematical model, although this could be one outcome, but rather the development of a deep understanding of the scientific and engineering principles underlying the current network/internet, in particular, and distributed communications systems, in general. In addition, the outcomes will help to better design, control, manage, interpolate and extrapolate the network. It will enable us to develop professional simulators, design and develop fast, efficient and robust protocols resulting in the optimization of computer and communication systems along with applications Circuit switched networks are highly static in their topology and their loading. They have typical users whose patterns are well known. Averages describe the system well and it is possible to make use of relatively simple mathematical models which have direct physical interpretation. These models require only inputs which are readily estimated from available data. Growth rates are very predictable and network controls are highly or fully centralized which means that the information about the network s global state can be utilized for system optimization. The packet switched networks on the other hand exhibit entirely different characteristics due to its dynamicity and versatility. Without an appropriate model it is impossible to obtain an insight that is required to efficiently plan, manage and operate a network to render a satisfactory quality of service (QoS). The packet switched traffic due to its complicated structure and stochastic behavior [2] require a number of parameters for its characterization. The rapid growth of network/internet technologies has created an urgent need for predictive models of performance. To this end it has become imperative to obtain a good abstraction of the diverse types of network traffic. In preparation for the building of performance models for network performance, we have measured and analyzed network traffic. In the good old days of traffic engineering, modeling congestion in telecommunications networks was simpler than today. There was only one kind of traffic of any significance, and that was voice. It had (and has) well-known characteristics; namely, Poisson inter-arrival rates (time between calls reaching the central office switch) and exponential call length distribution. There was no need to worry about things such as network layers, as they did not exist. It was easy to measure critical values of the important parameters. Queuing /05/$ IEEE 246

2 theory permitted analysis of voice networks to meet any desired performance characteristics; for example, call-blocking probability. Unfortunately, those days are gone forever. With packet networks, multilayer protocols are here to stay. This means many more invariants, as one or more are generally associated with each network layer, far more complicated traffic statistics, and accordingly much greater difficulty while analyzing and simulating network traffic. There is also a far greater number of applications (not just voice conversation), each with its own traffic characteristics, and new applications can arise at any time. There are many more varieties of network connectivity, architecture, equipment, and, accordingly, different types of traffic flow. There are no standard network topologies around which all design efforts can be based, and the topologies that exist are subject to constant change. "Success disasters" occur regularly, new soft-ware technologies which spread like wildfire through the Internet before they can be optimally engineered. The design of circuit-switched networks, used for over 100 years to carry telephone traffic throughout the world, is a wellunderstood and highly refined discipline. Such networks can be engineered to provide any desired level of service. This is because the underlying voice traffic characteristics, first investigated by Erlang in , [5] are also well-understood and have been the basis of elaborate theoretical development. What is the goal of network analysis and design? Of course, it is to design reliable networks that will meet specified performance criteria under all expected load conditions. For packet networks considerable progress has been made for invariants. The parsimonious models are especially important, because they are mathematically tractable and which can be applied over a wide range of conditions with considerable confidence and limited need to guess parameter values. In particular, most of the tools developed for telephone networks do not work for packet networks. As an example, queuing theory, a highly refined discipline often used to analyze networks, requires "wellbehaved" probability distribution functions for its solutions to converge. Packet traffic is unfortunately characterized by illbehaved distributions with "heavy-tails". The first step in all modeling, simulation, and analysis is to look for invariants, defined as some facet of network/internet behavior shown to hold over a wide range of environments and to be observable by any observer. Such invariants are the "hooks" on which hangs mathematical analysis of networks. Poisson arrival rates and exponential call duration are two of them which have been used in voice telephony for 70 years, with great success. The problem is much more difficult in data networks such as network/internet, characterized by multiple layers, great heterogeneity of topology and applications, constantly changing and non-standard topologies, new applications arising, e.g., World Wide Web, changes within applications, e.g., shift from text to graphics to audio to video. The net result is many invariants, each of which occurs at a specific layer The motivation here is to provide a better understanding of network issues and to provide datasets which can be used to validate future networks and network traffic models. Network traffic has been measured by many researchers and been analyzed in many different ways ever since the seminal papers of Leland et al. and Eramili et al. [3, 4]. The main interest is to obtain a better understanding of the characteristics of network traffic. In addition, however, we want to build an accurate model of network traffic. To this end, we grabbed six different datasets from a LAN by tweaking the Redhat Linux 9.0 kernel to get optimal performance for our user level process. We have used Packet Capturing Libraries following the software engineering principal "Don t Reinvent the Wheel". During the process we have to face lot of problems like capturing continuous traffic for a long time span, parsing big files on an ordinary computer and plotting the parsed data. After having the required data we then carefully parameterized these datasets using insights from various observations of real traffic. The distribution of packet inter-arrival times exhibit power law and can be modeled by heavy tail distribution. Packet size distribution is a characteristic of the network traffic and describes the size of packets traveling across the network. If every packet in production workloads has the same size, we wouldn t have any need for a distribution statistics but in reality production networks are host to a wide range of packet sizes and the packet size distributions of most production workloads are far from ideal. Packet size distribution plays a significant role in the performance of networks. Packet size distribution reveal that there are different classes of packet size and about half of the packets carry the maximum number of data bytes while the remaining half are distributed in different classes. II. DATASETS FOR DESIRED ANALYSIS We have used Redhat Linux 9.0 for capturing packets. Although we have tried to run the same operation on windows but windows time stamp resolution was not precise as compared to the Redhat Linux due to architecture of the operating system. DAG cards are also available for having high time resolution and precise time stamping, but these cards were not available so we have to rely on simple network cards the only state of the art difference we can have is the choice of an efficient operating system so we choose Redhat Linux 9.0. The packet is time stamped as part of the process of the network interface s device driver, or the networking stack, handling it. This means that the packet is not time stamped at the instant that it arrives at the network interface; after the packet arrives at the network interface, there will be a delay until an interrupt is delivered or the network interface is polled (i.e., the network interface might not interrupt the host immediately - the driver may be set up to poll the interface if network traffic isheavy, to reduce the number of interrupts and process more packets per interrupt), and there will be a further delay between the point at which the interrupt starts being processed and the time stamp is generated. So packet are not time stamped as seen by the NIC(Network Interface Card) rather they are time stamped when seen by the kernel. The network shown in Fig. 1 we are dealing with is a conventional Ethernet Switched Network having hybrid star/bus topology. We had sniffed the traffic of a cache(proxy)/web Server conntecd 247

3 (0) ack win (DF) tos[0x10]. As in the line the field "09:27: " is the time in hh(hours): mm(minutes): ss(seconds): fraction(note thatthe fraction is one millionth of a second), "eth0" is the interface type, " " is the source IP address with port, " telnet" is destination IP address, " : (0)" is the sequence number, "ack " mean acknowledgement number, "win 64770"is the packet size then a TCP flag like SYN, FIN etc appears, "DF" means don t fragment any more and "tos[0x10]" is the type of service. Fig. 1. Layout of the Network Where Traffic has been Captured connected with the "Main Switch" situated in ISP where most of the network traffic hits. The machine has 2.4 Giga Hertz Dual Processor with 512 MB RAM (Xeon Server with 1MB L2 cache). To monitor a conventional Ethernet switched network one simply requires only one NIC (Network Interface Card) and it has to be in promiscuous mode. We have grabbed only the first few (150) bytes of each packet which contain sufficient information about the source, destination, size and type of frame. The output of the Packet Capture Engine can be written to a file for later analysis. This allows monitoring over long periods of time. We have gathered six datasets and these datasets have 210 MB, 220 MB, 260 MB, 361 MB and 377 MB of captured data. The network traffic had been sniffed continuously and there were some packet losses which can be ignored due to its size, for example if 500 packets are dropped among E6 sniffed ones then the packet drop can be ignored. The traffic will be characterized based on the required parameters. We have developed a parser (Using C Language) which collects useful information from the raw data and stored it into a file. The parser gathers timestamp indicating when the packet reaches the kernel, source and destination IP addresses and port numbers, size of the frame (only the user data is reported, the headers for various protocol layers have to be added on to recover the actual size of the frame) and the traffic type (TCP, UDP, ICMP, etc). These parameters are then further parsed like calculation of inter-arrival time and the results are stored in a file for further analysis. The timestamp is the time the kernel first sees the packets rather than the time it seen by the ethernet card. Sample code for capturing the data is available. Let s have a brief overview of the data grabbed. 09:27: eth > telnet: : III. MEASUREMENT ERRORS We gained some idea of the size of the error in our measurements by looking at the reported inter-arrival times. Given the time stamp and size of the previous packet one can determine the time the Ethernet has been busy and therefore when the next arrival can possibly have happened. This is due to several factors. The network interface card introduces errors by buffering data unreliably. Our Program runs as a user-level process and hence can simply miss CPU cycles if the machine is under a heavy load. PC-based hardware is less reliable so it is relatively easy to attack, essentially by remotely reprogramming the switches. Another reason for the seemingly implausible inter-arrival times may be the fact that we monitor a full-duplex connection which is able to send and receive simultaneously. However, the kernel of the monitoring OS can only deal with one packet at a time and will hence introduce errors if sending and receiving happens closely together. IV. TRAFFIC ANALYSIS AND MODEL Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network. The analysis and modeling of LAN/WAN traffic data represents an important major challenge for engineers, computer scientists, statisticians and for probabilists. Really new ideas and models are needed due to high variability in the network traffic and due to diversity in the equipment. Novel graphical views of data play an important role in depicting and predicting the traffic patterns and behavior. Mathematical models are an abstraction used for analysis and design. A key issue is the appropriate level of abstraction to use networkmodels range from detailed packet level simulations (e.g. ms/s/ns) to statistical models of aggregate traffic patterns. Despite the fact that we are capturing the Network Traffic for Statistical Analysis and Mathematical Modeling of the Network, there can be numerous genuine and valid reasons like identifying network or communication issues, monitoring network performance, verifying network security, tracking communication transactions, logging network traffic, discovering source of unwanted traffic and discovering compromised workstations for building traffic datasets. But there can also be illicit and illegitimate motives to grab the network traffic which includes capturing passwords, sniffing network information, reading confidential information and determining network information. 248

4 Fig. 2. Packet Inter-Arrival Time Histogram V. INTER-ARRIVAL TIME ANALYSIS AND MODEL We concentrate here on the point processes formed by packet arrival events happening at times t i,i I IN. We assume that there are n IN events (observations of events), the first happening at t 1 and the last one at t n.the observation period may begin before the first event and end after the last, so we define it to be with T =[t 0 +t n+1 ] IR with t 0 t 1 t 2... t n t n+1 for the arbitrary, t 0 and t n+1. The inter arrival times t i, 1 i n 1, aredefined as Fig. 3. Log-log Scale Inter-Arrival Time Plot for Combined Data Set. t i = t i+1 t i (1) For a finite observation of a point process we can easily generate a histogram that approximates the probability density function of inter-arrival time. But we have used Origin- Lab(OriginPro 7.5 E) for further analysis and graphs. The time series X(t) resulting from our measurements describe point processes. One way to characterize the behavior of such a process is to compute the Probability distribution of inter arrival times of the events. To do this, we plot the interarrival time histograms (IIH) on log-log scale with bin size as showninfig.2 Fig. 4. Log-log Scale Inter-Arrival Time Plot for 377 MB Data Set. Next we have computed the probabilities and plot the Probability Density Function for packet inter-arrival time. The y-axis of the plot is the number of inter arrival times falling into a given bin divided by the size of the bin (to approximate a density function and make sure that bigger bins do not get a bigger weight) and also divided by the total number of arrivals (so that we can compare different observation periods). For most plots we find that a large part of the resulting graph can be fitted to straight line. This implies that there is a power law behavior of the probability density function y = p (x) =ax b. This is a characteristic behavior for heavy tail distributions like Pareto. Also from the values of a and b we can see that it is a heavy tail distribution and the values lies close to the Pareto distribution (Remember that we are plotting the values on log-log scale). The Fig. 3 encompasses the characterization of combined dataset. As we have mentioned that we have six different datasets and we are presenting plots of five datasets only. As we are dealing with values in micro scale while considering the inter-arrival time and on the other hand we have to play with huge number of packets which fall into that small scale bin so we have presented log-log scale analysis. From the Figs. 3, 4, 5, 6, 7 and 8, we found that the Probability Density Function has infinite mean as a 1 and infinite variance for b 2, so follow power law. In a power-law we have y = ax b,which means log (y) =log(a)+b log (x). This 249

5 Fig. 5. Log-log Scale Inter-Arrival Time Plot for 361 MB Data Set. Fig. 7. Log-log Scale Inter-Arrival Time Plot for 220 MB Data Set. Fig. 6. Log-log Scale Inter-Arrival Time Plot for 260 MB Data Set. Fig. 8. Log-log Scale Inter-Arrival Time Plot for 201 MB Data Set. refers to the heavy tail Pareto distribution by looking at the values of a and b. All the six datasets yield almost similar Probability Density Function. VI. PACKET SIZE ANALYSIS AND MODEL If every packet in production workloads has the same size, we wouldn t have any need for a distribution statistics but in reality production networks are host to a wide range of packet sizes and the packet size distributions of most production workloads are far from ideal. Packet size distribution plays a significant role in the performance of networks Packet size distribution reveal that there are different classes of packet size and about half of the packets carry the maximum number of data bytes while the remaining half are distributed in different classes. We have analyzed network traffic packet size and also performed zoomed analysis for more details. The CDF for Combined dataset has been shown in Fig. 9 and the Fig. 10 is representing the actual curve in dotted lines while the fitted curve with solid lines in five different portions. Figure.11 is showing the normalized Probability Density Function. 250

6 Fig. 9. CDF for Combined Dataset Fig. 11. Normalized PDF(By a Factor of (10 4 ) IP Packets has most of the hardware architecture(sun, IBM, Intel), hybrid Operating System(Linux, Solaris, Windows etc) environment along with hybrid topology. It has almost 500 plus wired and wireless nodes which are up 24 hours a day. Keeping in view all these factors an in depth study and analysis has been done which reveals that the Switched LAN(segment) Traffic can be modeled by Pareto Distribution(A Class of heavy tail distribution). Network Topology and Media can also be a strong candidate for this model but these have not been evaluated and we will focus on them in our future work. Although Ethernet is very popular Local Area Network Standard but now it is almost 35 years old. The enhancements in the media, equipment are skying but the protocols and applications required to be revamped. Our work can help to get better insights into the nature of the LAN Traffic. Packet size has also different classes and most of the packets have very small(requests) and large(actual data) data while the rest of the packets fall into other three different classes, so segmentation algorithms on different layers can be a reason for this biased segmentation. Fig. 10. Piecewise Curve Fitting Having 5 Segments VII. CONCLUSIONS In many internet traffic engineering and modeling research works, authors are of the opinion that internet traffic (Datasets of the order of giga/tera bytes) can only be modeled by heavy tail distribution due to heterogeneity and variability of the network infrastructure. But we have proved that the segment (LAN) traffic (Datasets of the order of megabytes) can also be modeled by heavy tail distribution. It is due to the fact that now-a-days, LANs are moving towards heterogeneity and variability. The dynamicity, versatility and flexibility of the equipment, applications, architecture and topology are thekeyfactors.thelan(segment)wherewehavecaptured REFERENCES [1] M. Crovella and A. Bestavros, Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, IEEE/ACM Transactions on Networking, vol. 5, no. 6,(1997) pp [2] D. Chakraborty, A. Ashir, T. Suganuma, G. Mansfield, T. Kinoshita, T.K. Roy, N. Shiratori "Self-similar and Fractal Nature of Internet Traffic". International Journal of Network Management. Vol.14, Issue 2, pp , March [3] Will E. Leland, Murad Taqqu, Walter Willinger and Daniel Wilson, On the Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transactions on Networking, Vol. 2, No. 1, February 1994 [4] Ashok Eramilli, Onuttom Narayan and Walter Willinger, Experimental Queuing Analysis with Long-Range Dependent Packet Traffic, IEEE/ACM Transactions on Networking, Vol. 4, No. 2, April [5] Will E. Leland, Murad Taqqu, Walter Willinger and Daniel Wilson, On the Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transactions on Networking, Vol. 2, No. 1, February

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

Observingtheeffectof TCP congestion controlon networktraffic

Observingtheeffectof TCP congestion controlon networktraffic Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu

More information

Examining Self-Similarity Network Traffic intervals

Examining Self-Similarity Network Traffic intervals Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: R.R.Marie@lboro.ac.uk Helmut E. Bez Department of Computer

More information

Optimizing TCP Forwarding

Optimizing TCP Forwarding Optimizing TCP Forwarding Vsevolod V. Panteleenko and Vincent W. Freeh TR-2-3 Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556 {vvp, vin}@cse.nd.edu Abstract

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology 3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related

More information

A Research Study on Packet Sniffing Tool TCPDUMP

A Research Study on Packet Sniffing Tool TCPDUMP A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark 1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Analysis of VDI Workload Characteristics

Analysis of VDI Workload Characteristics Analysis of VDI Workload Characteristics Jeongsook Park, Youngchul Kim and Youngkyun Kim Electronics and Telecommunications Research Institute 218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Republic of

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Using UDP Packets to Detect P2P File Sharing

Using UDP Packets to Detect P2P File Sharing 188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

EE984 Laboratory Experiment 2: Protocol Analysis

EE984 Laboratory Experiment 2: Protocol Analysis EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a

More information

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Gigabit Ethernet Design

Gigabit Ethernet Design Gigabit Ethernet Design Laura Jeanne Knapp Network Consultant 1-919-254-8801 laura@lauraknapp.com www.lauraknapp.com Tom Hadley Network Consultant 1-919-301-3052 tmhadley@us.ibm.com HSEdes_ 010 ed and

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Network Performance Measurement and Analysis

Network Performance Measurement and Analysis Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM Computer Modelling & New Technologies, 2002, Volume 6, No.1, 62-68 Transport and Telecommunication Institute, Lomonosov Str.1, Riga, LV-1019, Latvia STATISTICS AND RELIABILITY PRODUCTIVITY ESTIMATION OF

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

White Paper: Performance of Host-based Media Processing

White Paper: Performance of Host-based Media Processing White Paper: Performance of Host-based Media Processing The viability of host-based software in providing media processing capabilities continues to expand the possibilities for voice application development.

More information

A New Approach to Developing High-Availability Server

A New Approach to Developing High-Availability Server A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Networking Topology For Your System

Networking Topology For Your System This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

Leased Line + Remote Dial-in connectivity

Leased Line + Remote Dial-in connectivity Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer

More information

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl The SCAMPI Scaleable Monitoring Platform for the Internet Baiba Kaskina TERENA baiba@terena.nl Agenda Project overview Project objectives Project partners Work packages Technical information SCAMPI architecture

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania enache.biancaemilia@gmail.com

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Network Performance Evaluation of Latest Windows Operating Systems

Network Performance Evaluation of Latest Windows Operating Systems Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

The Analysis and Simulation of VoIP

The Analysis and Simulation of VoIP ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci ddilekci@sfu.ca Conrad Wang cw11@sfu.ca Jiang

More information

A NEW TRAFFIC MODEL FOR CURRENT USER WEB BROWSING BEHAVIOR

A NEW TRAFFIC MODEL FOR CURRENT USER WEB BROWSING BEHAVIOR A NEW TRAFFIC MODEL FOR CURRENT USER WEB BROWSING BEHAVIOR Jeongeun Julie Lee Communications Technology Lab, Intel Corp. Hillsboro, Oregon Maruti Gupta Communications Technology Lab, Intel Corp. Hillsboro,

More information

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1 Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;

More information

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

UNDERSTANDING the nature of network traffic is critical

UNDERSTANDING the nature of network traffic is critical IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 835 Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes Mark E. Crovella, Member, IEEE, and Azer Bestavros, Member,

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

Sci.Int.(Lahore),26(5),2097-2102,2014 ISSN 1013-5316; CODEN: SINTE 8 2097

Sci.Int.(Lahore),26(5),2097-2102,2014 ISSN 1013-5316; CODEN: SINTE 8 2097 Sci.Int.(Lahore),26(5),2097-2102,2014 ISSN 1013-5316; CODEN: SINTE 8 2097 DETECTION OF NETWORK TRAFFIC ABNORMALITIES USING LRD BEHAVIOR ANALYSIS OF CONTROL AND DATA PLANES Basil AsSadhan *1 and José M.

More information

Network Traffic Invariant Characteristics:Metering Aspects

Network Traffic Invariant Characteristics:Metering Aspects etwork Traffic Invariant Characteristics:Metering Aspects Vladimir Zaborovsky, Andrey Rudskoy, Alex Sigalov Politechnical University, Robotics Institute St.Petersburg, Russia; Fractel Inc., USA, E-mail:

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Connection-level Analysis and Modeling of Network Traffic

Connection-level Analysis and Modeling of Network Traffic ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

MEASURING WIRELESS NETWORK CONNECTION QUALITY

MEASURING WIRELESS NETWORK CONNECTION QUALITY Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING MECHANISM

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING MECHANISM 686 Journal of Marine Science and Technology, Vol. 21, No. 6, pp.686-694 (213) DOI: 1.6119/JMST-13-516-1 NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information