Website Analysis. foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) North America with 4 IPv4.
|
|
- Lenard Carson
- 8 years ago
- Views:
Transcription
1 Website Analysis Hanieh Hajighasemi Dehaghi Computer Networks : Information transfert (LINGI2141) Ecole Polytechnique de Louvain (EPL) Université Catholique de Louvain Abstract The candidate website(foxnews.com) is investigated about behavior of HTTP, TCP and DNS in the Ubuntu software platform V I. INTRODUCTION Checking and analysis of a website can help to understand the importance of network all over the world. Many users do not pay attention that what happen when the user just presses the Enter bottom to travel to internet world through the all web-servers and how the protocols help to make connections between them. In this report foxnews.com, an American news channel, has been investigated. The ranking of this website is 214 all over the word and most of its visitors are in English speaking country such as USA, Canada, UK and Australia. Several websites such as You-tube, Amazon, Yahoo, ebay and wikipedia are linked to the foxnews.com. Also among wellknown news websites, CNN and USAtoday have a connection link inside foxnews. A. Domain name foxnews.com has ability to connect to many web servers. It uses only IPv4 ( ) which is located in Switzerland for European countries and then it is able to connect to other countries host server. There are 16 IPv4 which are attributed to this domain name. It worth to mention that foxnews.com does not support IPv6. It also has 7 name servers (NS). All these servers are provided by Akamai Technologies company and they will be expired in June 21, Its parent name server for com zone is k.gtld-servers.net ( ) which is located in the United States of America. All name servers of foxnew.com are listed in the following table. It has to be mentioned that the primary name server is DNS.TPA.FOXNEWS.COM. The name server provided in table I are after resolving CNAME:s and CDN analysis and de-duplication. Domain names discussed here have only A records (IPv4). USW3.AKAM.NET NS1-157.AKAM.NET USC2.AKAM.NET USW1.AKAM.NET TABLE I NAME SERVERS Delegated name servers ASIA3.AKAM.NET NS1-253.AKAM.NET USC4.AKAM.NET DNS.TPA.FOXNEWS.COM foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) and it is located in North America with 4 IPv4. TABLE II IP NUMBERS THAT HAVE PTR OF FOXNEWS.COM TABLE III THE PTR RECORDS OF THE IP NUMBERS OF THE NAME SERVERS OF FOXNEWS.COM A1-157.AKAM.NET A12-64.AKAM.NET A14-66.AKAM.NET A7-66.AKAM.NET NS1-157.AKAM.NET A1-253.AKAM.NET A12-65.AKAM.NET A22-64.AKAM.NET ASIA3.AKAM.NET NS1-253.AKAM.NET A comprehensive visual presentation of the different records associated with this domain is provided in appendix A. CNAME records information of the host are provided in the table IV. SOA default TTL(time-to-live) is set to 5 minutes. TTL represent time duration spent until DNS related information will be refreshed. CNAME Name Type Class TTL TABLE IV CNAME RECORDS CNAME IN 154 sec This name server usw1.akam.net returns the following DNS records for foxnews.com: (A) ; However, the rest of the name servers return different DNS records for foxnews.com. B. Type of resources In the foxnews.com, many types of resources are used. According to the figure 1, It can be observed that JavaScript files occupied more volume compared to the other types. After JavaScript, images and html sources are taking most of space. Resource distribution of primed cache in terms of type, number of usage and size is illustrated in Figure 1.
2 websites he visits. foxnews.com sets 67 persistent cookies with average life-time of 476 days and longest 8419 days. C. TCP port Fig. 1. resource distribution All TCP ports are obtained using nmapsi4 V software package [1]. Most of the domain names access to the web server via port number 80 except 4 cases that contact via port number 443 and all of them also present the JavaScript resource. D. Header request TABLE V TCP PORTS Port State service Description 80/tcp open http AkamaiGHOST 433/tcp open ssl/http AkamaiGHOST 8000/tcp closed http-alt 1) analysis: There are 10 constant request header for all domain names. But some of domain names have additional request headers such as cookie, connect-type, If-Modified- Since, If-Non-Match and X-Requested-With. All these request fields are permanent. 2) Non-standard: According to the result, the non-standard request headers were not observed. 3) Cookies: Different types of cookies are listed as: -Session cookies are cleared when the browser is closed. They also allow the website to identify user s state such as logged-in users. They are mostly considered harmless because they cannot be used for long-term user tracking. This site sets 4 session cookies. -Third-party cookies is written on the machine by website that is different from the website user is actually visiting. These cookies may be set for various purposes, like tracking ads displayed on the website, collection of statistics and etc. This website allows 19 other websites to track your activity. -Persistent cookies are the cookies that are preserved through browser shut-downs. This means, even if user closes the page visiting today and return there in future, the website will know that this is a returning visitor. This may be used for remember me features, as well as persistent user tracking. These cookies, especially if set by third party organizations, are powerful tool for monitoring user activities across all the E. Header respond 1) HTTP version: The web server of foxnews.com uses HTTP version 1.1. HTTP/1.1 is an expanded model of the previous version(http 1.0). Many status codes are defined in the latter version. Here, a list of the status codes based on two different browsers is presented. Chrome : 200 (success), 204 (no content), 301 (moved permanently), 302 (moved temporarily). In the Chrome, approximately all requests sent by browser are accepted from server (code 200). There are 29 cases in code 302. The status Moved temporarily means temporary transition of one web address to another address however, the primary address is still valid. Code 301 represents permanent transition of one web address. There are 5 cases related to this code. no content status is observed while the request of browser is received and processed correctly by server but the response of server is not included any specific content. This code is occurred just in one case of plain text document. Firefox : 200 (success), 204 (no content), 301 (moved permanently), 304 (not modified) In the Firefox, there are only one case in code 304. The browser requests to the server that it sends the latest changes of file. If the file is not modified, the server will send code 304. This code is occurred for an image resource. 2) Analysis: In request field, all connections have keepalive status. But in the respond side, some of the connection are closed. Only unusual thing here is about Expire field. Most of the responds have an expiration time but some have already been expired many years ago. F. TCP analysis By refreshing homepage of foxnews.com in firefox, 2769 total packets received (2769 incoming packets delivered, 2704 requests sent out). There are 8 dropped packets because of missing route. A detailed tcp information can be obtained by netstat -s c tcp. Table VI explained tcp connection information. TABLE VI TCP CONNECTION REPORT 87 active connections openings 0 passive connection openings 0 failed connection attempts 0 connection resets received 66 connections established 2305 segments received 2213 segments send out 4 segments retransmited 5 bad segments received 6 resets sent It is also worth to note that there is one TCP socket finished time wait in fast timer. Twenty delayed acknowledgement
3 (acks) sent. Quick ack mode was activated 14 times packet headers predicted. 262 acknowledgements not containing data payload received. 65 predicted acknowledgements. There are two recovered packet using selective acknowledgements. There are two congestion windows fully recovered without slow start. There is one congestion windows recovered without slow start after partial ack. Other obtained TCP feature data are reported in the table VII: TABLE VII TCPEXT. REPORT TCPLossProbes 12 TCPLossProbeRecovery 10 DSACKs sent for old packets 14 DSACKs sent for out of order packets 1 DSACKs received 11 TCPDSACKIgnoredNoUndo 8 TCPSackShiftFallback 2 TCPRcvCoalesce 1245 TCPOFOQueue 289 TCPOFOMerge 1 TCPChallengeACK 5 TCPSYNChallenge 5 G. initial congestion window value In older Linux kernel versions initial congestion window size (initcwnd) was as low as just 2 (2*MSS, or about 3KB), and since version 3.0 new default is set to 10 (about 14KB). In linux command terminal screen current default route information can be obtained using $ ip route grep default $ default via dev wlan0 proto static As explained above TCP initial congestion window as per draft-hkchu-tcpm-initcwnd-01 in newer Linux kernel version is set to 10. This value can be obtained in tcp.h file and reassigned by: $ sudo ip route change default via dev eth0 proto static initcwnd 10 It is worth to mention that Akamai has a higher initwncd value in terms of performance matters. There are also Limelight and Level3 with a higher initwncd value. There are several advantages of increasing initial windows value which will be discussed below: 1) Reducing Latency: reduces the total transfer time for data sets range (depends on the value). 2) Keeping up with the growth of web object size 3) Recovering faster from loss on under-utilized or wireless links However, in the case of network connection (not an individual connection), increasing the initial window may results in increase of congestion in the network. Although, the increase will happen one-time just at the start of a connection, and the rest of TCP s congestion back-off mechanism will be remained in place. There the numerous studies in literature proposing solution in order to speed up short transfers [2]. A test is performed on the number packets the server sends in the first round-trip after the initial GET request on a fresh connection. The results are listed below. Packets received in first round-trip: 16 Bytes received in first round-trip: Total bytes received: IP address: H. Traceroute Traceroute is a utility that traces a packet from source computer to an Internet host. It illustrates how many hops the packet requires to reach the host and how long each hop takes. Traceroute is performed for both active ports (80 http, 443 https). Results are provided in the following tables using Nmap scanning test: TABLE VIII USING PORT 80/TCP HOP RTT ADDRESS ms bb0-vlan50-th1.59-bdp.teentelecom.net ( ) ms interlink-routers.use.teentelecom.net ( ) ms interlink-routers.use.teentelecom.net ( ) ms bb3-v505-cb.nxdt.teentelecom.net ( ) ms ms decix-fra9.netarch.akamai.com ( ) ms a deploy.static.akamaitechnologies.com Nmap done(port 80/tcp): 1 IP address (1 host up) scanned in seconds Raw packets sent: 108 (9.042KB) Rcvd: 77 (5.244KB) TABLE IX USING PORT 443/TCP HOP RTT ADDRESS ms bb0-vlan50-th1.59-bdp.teentelecom.net ( ) ms interlink-routers.use.teentelecom.net ( ) ms interlink-routers.use.teentelecom.net ( ) ms bb3-v505-cb.nxdt.teentelecom.net ( ) ms ms decix-fra9.netarch.akamai.com ( ) ms a deploy.static.akamaitechnologies.com Nmap done(port 443/tcp): 1 IP address (1 host up) scanned in seconds. Raw packets Nr: sent: 74 (6.084KB) Rcvd: 75 (5.040KB). Wireshark software package [3] is also used to perform tests in the domain foxnews.com. Desired information can be extracted by applying filters which are provided inside Wireshark. In order to obtain number of re-transmitted packets in tcp port 80, following filter is applied in Wireshark
4 tcp.analysis.retransmission and tcp.port == packets have been re-transmitted. same filter used for tcp port 443 (this time tcp.port sets to 443). Results shows that 3 packets has been re-transmitted. Fig. 2. Wireshark-TCP 443 Figure 2 shows screen shot of Wireshark filtering tcp port of 443 and re-transmitted packets. There is a good agreement between results obtained by Wireshark and Nmap test. The size of the receive window regardless of the number of unacknowledgement bytes is illustrated in Figure 2. (tcp stream graph!windows scaling graph). TCP port is set to 80 for Figure 3. Maximum window size obtained by setting TCP port to 443 is 423 bytes which is less than one tested by TCP port 80. before the connection is ended. That also explains why in the test TCP Reset sent by client after receiving [FIN,ACK] Packet by Server. J. Test Using load impact online tool [4], a load test is performed on the foxnews.com domain. Total number of 50 active virtual users is used in this test. Figure 4 shows user load time variation and total number of active TCP connection over time. User Scenario generated in three different categories using the Load impact : NonMemberSimple: This user only surfs on the webpages for reading news. NonMember: This user explores news page. Moreover, the user uses the search engine embedded in the website. The user also watches videos available on the websites. Member: This user does everything as Not Member user can do plus commenting and downloading data. Overall 142 pages and 948 URLs are tested in 5 minutes. During test MB data in total received and 8931 request have been sent. Fig. 4. Load test II. CONCLUSION As conclusion the behaviour of the foxnews channel website over the world web is analysed. main TCP ports are found to be 80 and 443. Using different filters provided in the Wireshark software package, packets transmitted by server has been analysed. Effect of the initial congestion window size has been discussed. For more detailed it may refer to [2]. REFERENCES Fig. 3. windows scaling graph-tcp 80 I. TCP Connection termination In TCP, connection termination is implemented so that each device terminates its end of the connection separately. In other hand when one side closes the connection, It means that device will no longer send data, but still can continue to receive data until the other device has decided to stop sending. By doing so, it allows all data that are pending to be sent by both sides [1] Gordon Lyon. Free security scanner for network exploration [Online; accessed 16-December-2014]. [2] N. Dukkipati, T. Refice, Y. Cheng, J. Chu, T. Herbert, A. Agarwal, A. Jain, and N. Sutin. An argument for increasing tcps initial congestion window. ACM SIGCOMM Computer Communications Review, 40:2733, [3] The Wireshark team. Troubleshooting with Wireshark [Online; accessed 16-December- 2014]. [4] The Load impact team. On demand load testing for developers [Online; accessed 16-December- 2014]. APPENDIX DOMAIN RECORDS
5 Fig. 5. Domain records
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationComputer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
More informationOperating Systems and Networks Sample Solution 1
Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation
More informationLab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
More informationDNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
More informationSnoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points
Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course
More informationWorkshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015
Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - alvaro@nsrc.org Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands
More informationRally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
More informationEKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationNmap: Scanning the Internet
Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA August 6, 2008; 10AM Defcon 16 August 8, 2008; 4PM Abstract The Nmap Security Scanner was built to efficiently scan large networks, but Nmap's
More informationAKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling
AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview
More informationCOMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
More informationDNS and E-mail Interface User Guide
DNS and E-mail Interface User Guide Document Revision 04 // 2012 www.twcbc.com back back to TOC to TOC Header Text and Info Table of Contents 1. Introduction 3 2. Accessing the Application 4 3. Working
More informationCopyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
More informationDistributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationDNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationCSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto
CSC2231: Akamai http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Project proposals due today!!! No lecture on Monday:
More informationCollecting information
Mag. iur. Dr. techn. Michael Sonntag Collecting information E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
More informationNetwork Management and Debugging. Jing Zhou
Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for
More informationTools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.
Tools for penetration tests 1 Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus. What is a penetration test? Goals: 1. Analysis of an IT-environment and search
More informationLife of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
More informationModern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
More informationWhy Mobile Performance is Hard
Matt Welsh mdw@google.com Google, Inc. http://www.flickr.com/photos/nao-cha/2660459899/ Why Mobile Performance is Hard In a nutshell: Despite 20 years of research and engineering, mobile performance still
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationComputer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
More informationGetting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
More informationLocal DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
More informationPerformance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER
Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to
More informationWork No. 1 Samba. What is Samba?
Work No. 1 Samba What is Samba? Samba is an implementation of a Server Message Block (SMB) protocol server that can be run on almost every variant of UNIX in existence. Samba is an open source project,
More informationHomework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14
1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
More informationHands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
More informationFront-End Performance Testing and Optimization
Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client
More informationMike Canney Principal Network Analyst getpackets.com
Mike Canney Principal Network Analyst getpackets.com 1 My contact info contact Mike Canney, Principal Network Analyst, getpackets.com canney@getpackets.com 319.389.1137 2 Capture Strategies capture Capture
More informationDomain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
More informationLab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationIntroduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki antonakd@csd.uoc.gr Active Monitoring Inject test packets into the network or send packets
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationConfiguring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
More informationAcceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1
Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 December 2015 Table of Contents 1 PAT... 1 1.1 Network Quality Report (Pre-test Evaluation)... 1 1.1.1 Raw MTR Data... 4 2 Executing
More informationTunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer
Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get
More information1 Analysis of HTTPè1.1 Performance on a Wireless Network Stephen Cheng Kevin Lai Mary Baker fstephenc, laik, mgbakerg@cs.stanford.edu http:èèmosquitonet.stanford.edu Techical Report: CSL-TR-99-778 February
More informationAdvantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Internet Performance
Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved Internet Performance Reasons for Internet Performance Issues: 1) Hardware Old hardware can place a bottleneck
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
More informationImproving DNS performance using Stateless TCP in FreeBSD 9
Improving DNS performance using Stateless TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology
More informationGetting Started with AWS. Static Website Hosting
Getting Started with AWS Static Website Hosting Getting Started with AWS: Static Website Hosting Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationHost Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: 1608@nu.edu.pk Naveedafzal gmail.com Abstract: The purpose
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationDomain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014.
Application Layer Mahalingam Mississippi State University, MS September 15, 2014 Outline 1 DNS Records DNS Components 2 Message Transfer Fetching Emails 3 Applications We will focus on 3 applications DNS
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationYottaa Site Optimizer Guide
Yottaa Site Optimizer Guide The Yottaa Site Optimizer automatically accelerates web sites and mobile apps, reducing page load times and improving your visitors ability to interact with every page on your
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationInternet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationHomework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
More informationConfiguration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationPerformance Report for: http://singaporestockstrading.com/ Report generated: Friday, April 24, 2015, 7:29 AM -0700 (via API)
The web should be fast. Executive Summary Performance Report for: http://singaporestockstrading.com/ Report generated: Friday, April, 5, : AM - (via API) Test Region: Vancouver, Canada Using: Firefox (Desktop)
More informationOverclocking the Yahoo! CDN for Faster Web Page Loads
Overclocking the Yahoo! CDN for Faster Web Page Loads Mohammad Al-Fares,, Khaled Elmeleegy, Benjamin Reed, and Igor Gashinsky Computer Science and Engineering Yahoo! Research Yahoo! Inc. UC San Diego malfares@cs.ucsd.edu
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationNetwork Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
More informationKey Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationCOMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
More informationNetwork Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS kaw@cerias.purdue.edu 1 Network Packet Analysis Definition: Examining network packets to determine
More informationUnderstanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
More informationshortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationUsing TrueSpeed VNF to Test TCP Throughput in a Call Center Environment
Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about
More informationPerformance Tuning Guide for ECM 2.0
Performance Tuning Guide for ECM 2.0 Rev: 20 December 2012 Sitecore ECM 2.0 Performance Tuning Guide for ECM 2.0 A developer's guide to optimizing the performance of Sitecore ECM The information contained
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationWireshark Quick-Start Guide. Instructions on Using the Wireshark Packet Analyzer
Wireshark Quick-Start Guide Instructions on Using the Wireshark Packet Analyzer July 2, 2008 Table of Contents Chapter 1: Getting Started... 3 I) Current Version... 4 II) Installation... 4 III) Specifying
More informationEffect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
More informationDistributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationhttp://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationDOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES
.com DOSarrest External Monitoring S ystem (DEMS) User s Guide REAL BROWSER MONITORING OF YOUR WEBSITE MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES
More informationIndirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer
Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationWhy running measurements?
Network Measurements: Passive, Active and Hybrid approaches Stefano Traverso stefano.traverso@polito.it Why running measurements? The Internet is the first thing that humanity has built that humanity doesn't
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationBroadband Quality Test Plan
Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS
More informationNetwork Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationMobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationNETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida vivekkathayat@gmail.com lahuja@amity.edu ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
More information