Transferring large amount of data over the Internet network
|
|
- Marjory Bradford
- 8 years ago
- Views:
Transcription
1 SOBCZYK Andrzej 1 MARCINIAK Marian 2, 3 Transferring large amount of data over the Internet network INTRODUCTION It became very common that even very large amount of data is nowadays transmitted over the Internet network. For instance, television production systems, where widespread medium for transmitting video materials were magnetic tapes, optical media and real time transmission systems (e.g. DSNG Digital Satellite News Gathering) or complex transmultiplexing systems [1]. Today transmitting these materials over the Internet is more and more common. Development of telecommunication technologies for high speed data transmission enables access to the Internet network with higher and higher bandwidth. However protocols used in the network were designed when transmission speed was relatively low [2]. Therefore, it is important to examine and compare efficiency of network transmission protocols for high speed transmission of large amount of data in the public Internet network. 1 RESEARCH METHOD For the investigation, we have selected network protocols of application layer (layer 7 of the OSI /The Open Systems Interconnection/ model) that use on transport layer both TCP /Transmission Control Protocol/ and UDP /User Datagram Protocol/ as follow: a) HTTP HyperText Transfer Protocol- TCP based, mostly used for downloading files. Apache HTTPD server [9] and wget application [4] as a client are used. b) FTP File Transfer Protocol TCP based, allows both downloading and uploading files. This uses ProFTPD server [10] and wget application as a client. c) UDT UDP-based Data Transfer- UDP based, designed for high speed file transfer. UDT software [11] is used. d) FASP - UDP based, designed for high speed file transfer. Aspera Connect [2] software is used. The choice of protocols was not made in a desultory kind of way. Both HTTP and FTP protocols have been used for a long time, they have transport layer based on TCP, and they and provide reliable data transmission. However, such TCP features as: initiating connection procedure, so-called three-way-handshake slow start algorithm, used to prevent congestion, confirmation of transmission of any single data packet make the protocol inefficient to transmit large amount of data over the Internet network. Protocols UDT and FASP have transport layer based on UDP, and they are designed for highspeed data transmission. The primary difference between UDT and FASP is the way of implementation libraries licensing. The UDT protocol is available under BSD license and it was published as open source software, while the FASP is a commercial product with closed source. It is known that transmission paths, available bandwidth and many other conditions on the public Internet network are not homogeneous. Such a protean environment may affect transmission speed regardless of the protocol, however, in the case of the present research it is intended factor. In a 1 Politechnika Świętokrzyska, Wydział Elektrotechniki, Automatyki i Informatyki, Katedra Telekomunikacji, Fotoniki i Nanomateriałów, Zakład Telekomunikacji, Kielce, al. Tysiąclecia Państwa Polskiego 7, Tel: , Fax: , andrzej@sobczyk.it 2 Instytut Łączności, Zakład Teletransmisji i Technik Optycznych, Warszawa, ul. Szachowa 1, Tel , Fax , M.Marciniak@itl.waw.pl 3 Politechnika Świętokrzyska, Wydział Elektrotechniki, Automatyki i Informatyki, Katedra Telekomunikacji, Fotoniki i Nanomateriałów, Zakład Telekomunikacji, Kielce, al. Tysiąclecia Państwa Polskiego 7, Tel: , Fax: , marianm@tu.kielce.pl 9771
2 laboratory condition, it would be hard to build a test environment capable to fully simulate effects appearing in a real, global network especially for long distance transmission. Factors independent of researchers that may affect on the results among others are: occupancy of Internet service providers links used in transmissions paths of packet routing, occupancy and load of routers and other network hardware, occupancy and load of the servers. The test procedure consisted of transmission a 500Mb sized file of random data for each of researched protocols between following computer servers: Server A location: Roubaix near Paris, France. Operating system Linux Internet link symmetrical 100 Mbps. Server B location: Warsaw, Poland. Operating system Linux Internet link symmetrical 100 Mbps. Server C location: Kielce, Poland. Operating system Linux Internet link asymmetrical 3.30 Mbps. Server D - location: Warsaw, Poland. Operating system Linux Link to server B Ethernet 1000Mbps. Directions of transfers was as follows: Server A => Server B Server B => Server D Server A => Server C Server B => Server C In order to minimize the impact of the aforementioned independent factors affecting the research results, procedure was repeated five times and the results averaged. Data transmission speed was measured with IPaudit software. Checksums were calculated with md5sum application. 2 TEST RESULTS 2.1 Quality of transmission After every transmission MD5 checksum of the received file was calculated. In all cases the sum was equal to the sum calculated for the source file. We conclude that all protocols ensure reliable data transmission. 2.2 Data link bandwidth utilization Typical characteristics of utilization of bandwidth for each protocol are as follows. 9772
3 Fig. 1 Typical characteristics of link saturation (Example for connection Server A => Server B) Protocols based on UDP transport saturate the link in more even, steady way. 2.3 Amount of excessing data Each of protocols in addition to useful data (payload), transmits some extra data, for example: packet headers, retransmissions, checksums. During the research average amount of transferred data were calculated, either in transmit and receive direction. Fig. 2 Average excess amount of transferred data classified by protocol and location UDT and FASP protocols in some cases generate much more redundant data than those based on TCP transport. One possible reason for the behaviour is the way of sending confirmations of packet reception. TCP transport protocol is a kind of connection-oriented protocol, where each sent packet must be confirmed independently. 9773
4 In the contrary, UDP is a kind of connectionless protocol, thus mechanisms providing reliability of the data link are moved to higher layer protocols. In practice, often confirmations are send grouped, what may result in higher excess data amount, especially when the number of non-delivered packets is high. 2.4 Transmission speed The chart below shows average transmission speed for each protocol. Fig. 3 Average transmission speed divided by protocol and location Due to large disparities of the transmission speed between particular locations, below are shown individual charts. Fig. 4 Average individual transmission speed classified by protocol and location 9774
5 In most cases we have noticed an advantage of the newer protocols, the only exception is the transmission over LAN where standard were FTP and HTTP more efficient. 2.5 time of transmission of single file The chart below shows an average time required to transmit a test file for each protocol. Fig. 5 Average time of file transfer classified by protocol and location There is an advantage of FASP protocol, it is more efficient for links of lower quality. For transmission over LAN (BD direction) it should be mentioned that the configuration (license conditions) of software using FASP protocol was set to artificially limit transmission speed to maximum level of 100Mbps. CONCLUSIONS The aim of the presented research was to compare the efficiency of different data transmission protocols to transfer large amounts of data in the real public Internet network. The efforts have been made to achieve the best possible compromise between keeping original conditions of the global network and minimizing factors that might affect on the study result and that are independent of the protocol. The results can be classified into two groups: group of research carried out in real conditions and a research carried out in local area network where the influence of external factors was the lowest one. Research carried under real conditions shows a slight advantage of the FASP protocol, the advantage is inversely proportional to available link speed. While averaging the results the dispersion was at level of 10%. During testing over local area network, FASP protocol was clearly less effective than the others, this evidently strange behaviour was caused by specific (due to software license limitation) configuration of the software that artificially limits transfer to 100Mbps, while the original link was 1 GBps. Very interestingly, the dispersion of results for local area network was much larger than for the real conditions and reached a high level over 150%. The authors believe they have clarified essential issues related to transmission of large amounts of data and modern protocols designed for this purpose. Looking to the future, telecommunication techniques and protocols are constantly evolving, and speed of data links available for the average user increases. On the other hand, size of transmitted files has increased by several orders of 9775
6 magnitude during last few years. For example, video files are sent more frequently in high resolution HDTV and ultra-high resolution 4k UHDTV and recently even 8k UHDTV. Given the above, continuous development and upgrade of protocols designed for transport very large amount of data at very high speed over public networks seems to be natural and inevitable processes. Abstract With development of telecommunications techniques of high speed data transmission the Internet network began displacing the traditional methods of transferring very large amounts of data. As yet common way to transport large amounts of data has been their record on optical or magnetic media and physical transport to the destination. Multimedia technologies, especially high and ultra-high resolution Internet Television, also require techniques to transfer large amounts of data. The progress in telecommunications techniques enabled development of network protocols, which need to be adapted to transmit such significant data amounts. Authors were aimed to research the efficiency of different network protocols, these used for a quite long time as well as relatively new ones based on UDP datagrams transport layer. Both speed and efficiency are compared for different protocols. Przesyłanie bardzo dużych ilości danych w sieci Internet Streszczenie Wraz z rozwojem technik telekomunikacyjnych w zakresie szybkiej transmisji danych sieć Internet wypiera tradycyjne metody przesyłania bardzo dużej ilości danych. Dotychczas często spotykanym sposobem transportu dużej ilości danych była ich rejestracja na nośnikach optycznych czy taśmach magnetycznych, a następnie transport fizyczny do miejsca przeznaczenia. Różnorakie technologie multimedialne, zwłaszcza telewizje internetowe o wysokiej, czy ultra wysokiej rozdzielczości, również wymagają technik umożliwiających przesyłanie znacznej ilości danych. Rozwój technik telekomunikacyjnych pociąga za sobą rozwój protokołów sieciowych, które muszą zostać przystosowane do transmisji tak dużej ilości danych. Autorzy postawili sobie za cel zbadanie efektywności różnych protokołów sieciowych zarówno tych używanych od dawna jak i stosunkowo nowych opartych w warstwie transportowej na datagramach UDP. Podczas badań porównywano zarówno prędkość transmisji uzyskaną dla poszczególnych protokołów jak i ich efektywność. REFERENCES 1. Ciosmak J., Efficient Algorithm to Calculate Nonseparable Two-Dimensional Filter Banks for Transmultiplexer Systems. Przegląd Elektrotechniczny, 2011, 87, Chodorek A., Chodorek R. R., A simple and effective TCP-friendly layered multicast content distribution, Polish Journal of Environmental Studies; 2009, 4B. 3. Asperasoft, accessed Fielding R., Gettys J., Mogul J., Frystyk L. Masinter L., Leach P., Berners-Lee T., Hypertext Transfer Protocol - HTTP / 1.1" RFC 2616, The Internet Society, July Free Software Foundation, GNU Wget, accessed ISO Standard : 1994 Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model. 7. Postel J., Transmission Control Protocol" RFC 761, USC / Information Sciences Institute, January Postel J., User Datagram Protocol" RFC 768, USC / Information Sciences Institute, January Postel J., Reynolds J., "File Transfer Protocol" RFC 959, USC / Information Sciences Institute, October The Apache Software Foundation, HTTP Documentation, accessed
7 11. The ProFTPD Project, Project Documentation, accessed Yunhong Gu, accessed
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More information1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
More informationBCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT SEPTEMBER 2014. Computer Networks EXAMINERS REPORT
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT SEPTEMBER 2014 Computer Networks EXAMINERS REPORT General Comments This session is again like the April
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationNetwork Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationTop-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationUDR: UDT + RSYNC. Open Source Fast File Transfer. Allison Heath University of Chicago
UDR: UDT + RSYNC Open Source Fast File Transfer Allison Heath University of Chicago Motivation for High Performance Protocols High-speed networks (10Gb/s, 40Gb/s, 100Gb/s,...) Large, distributed datasets
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationLayered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationCCNA Discovery Chapter Four
CCNA Discovery Chapter Four By Chief Eng. Amna Ahmed Institute of Telecommunication amna_ahmed28@yahoo.com Modified by Vincenzo Bruno Hacklab Cosenza Chapter 4 Explain what the internet is Every day millions
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationAspera Mobile An Open Platform for Rapid Content Acquisition and Delivery WHITE PAPER
WHITE PAPER TABLE OF CONTENTS Overview 3 Transitioning to Mobile Upload 3 - an Open Platform for Rapid Upload/Download 3 Rapid Individual and Concurrent Upload/Download Speed 4 Predictable Control of Mobile
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationTraffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationWireless data transmission segment for Pilot Navigation and Docking System, dedicated to use with commercial mobile devices
Scientific Journals Maritime University of Szczecin Zeszyty Naukowe Akademia Morska w Szczecinie 2012, 32(104) z. 2 pp. 29 33 2012, 32(104) z. 2 s. 29 33 Wireless data transmission segment for Pilot Navigation
More informationWEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP
WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP Alae Loukili, Alexander Wijesinha, Ramesh K. Karne, and Anthony K. Tsetse Towson University Department of Computer & Information Sciences Towson, MD 21252
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationCITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationIST 220 Exam 3 Notes Prepared by Dan Veltri
Concepts to know: IST 220 Exam 3 Notes Prepared by Dan Veltri The Final Exam is scheduled for Wednesday, December 15 th from 4:40PM 6:30 PM in 112 Chambers. Chapters covered: 12, 13, 15, 16, 17, 18, 20,
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationCS 5516 Computer Architecture Networks
Lecture 11: ISDN & ATM CS 5516 Computer Architecture Networks VA Tech Prof. Roy M. Wnek History of ISDN Traditionally, local loop connectivity has been with an analog signal on copper Inefficient, prone
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationTCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationSwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationA Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationThe TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationUnderstanding Layer 2, 3, and 4 Protocols
2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationAcquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
More informationUser Datagram Protocol - Wikipedia, the free encyclopedia
Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers
More informationA comparison of TCP and SCTP performance using the HTTP protocol
A comparison of TCP and SCTP performance using the HTTP protocol Henrik Österdahl (henost@kth.se), 800606-0290, D-01 Abstract This paper discusses using HTTP over SCTP as an alternative to the traditional
More informationApplication Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationChapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
More informationCloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com
More informationACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
More informationArchitecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
More informationCISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationPART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationBandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
More informationModule 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationLinux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More information