NQA Technology White Paper
|
|
- Constance Strickland
- 8 years ago
- Views:
Transcription
1 NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics on the network information such as response time, jitter, and packet loss rate. NQA also provides the collaboration between the track module and the application modules to monitor network status change in real time. This manual introduces the basic concepts first, and then introduces the mechanism, technical characteristics and application scenarios of NQA in detail. Acronyms: Acronym Full spelling DHCP DLSw DNS FTP HTTP ICMP ICPIF MOS NQA SNMP TCP UDP VoIP Dynamic Host Configuration Protocol Data Link Switching Domain Name System File Transfer Protocol Hypertext Transfer Protocol Internet Control Message Protocol Calculated Planning Impairment Factor Mean Opinion Scores Network Quality Analyzer Simple Network Management Protocol Transmission Control Protocol User Datagram Protocol Voice over IP Hangzhou H3C Technologies Co., Ltd. 1/14
2 Table of Contents Overview 3 Background 3 Benefits 3 NQA Implementation 3 Concepts 3 Test Processing Mechanism 4 ICMP-Echo Processing Mechanism 4 UDP Echo Processing Mechanism 4 UDP Jitter Processing Mechanism 5 Voice Processing Mechanism 7 TCP Processing Mechanism 8 DLSw Processing Mechanism 8 SNMP Processing Mechanism 8 HTTP Processing Mechanism 8 FTP Processing Mechanism 9 DHCP Processing Mechanism 9 DNS Process Mechanism 9 Collaboration Mechanism 9 NQA Server Processing Mechanism 10 Application Scenarios 10 Collaboration Between NQA and VRRP 11 Collaboration Between NQA and Static Routing 11 Collaboration Between NQA and the Backup Center 12 Collaboration Between NQA and Policy Routing 13 Hangzhou H3C Technologies Co., Ltd. 2/14
3 Overview Background With the fast development of the Internet, it supports more and more services and applications. Traditional network performance analysis tools such as ping and tracert cannot satisfy users requirements on service diversity and real-time monitoring of the network. Network Quality Analyzer (NQA) analyzes network performance and service quality by sending test packets, providing you with network performance parameters such as jitter, total delay of HTTP, delay for obtaining an IP address through DHCP, TCP connection delay, FTP connection delay and file transfer rate. With the NQA test results, you can: Know network performance in time and then take corresponding measures. Diagnose and locate network faults. NQA also provides the collaboration between the track module and the application modules to monitor network status change in real time, and then take corresponding actions, thus avoiding communication interruption or service quality decrease. Benefits NQA has the following benefits: Supporting multiple test types Traditional ping tool can only use the Internet Control Message Protocol (ICMP) to test the reachability of the destination and the roundtrip time of a packet between the source and the destination. NQA is an enhanced ping tool used for testing the performance of protocols running on networks. At present, NQA supports eleven test types: ICMP-echo, DHCP, DNS, FTP, HTTP, UDP jitter, SNMP, TCP, UDP echo, voice, and DLSw. Supporting enabling of multiple test groups at the same time The NQA module supports enabling of multiple test groups at the same time and you can configure the number of test groups as needed. For a DHCP test, however, only one test group can perform a test at one time. Supporting the collaboration function The collaboration function means that NQA performs probes and notify other modules of the probe results, and these modules then take corresponding actions according to the probe results. At present, collaboration between NQA and static routing, backup center and policy routing is implemented. NQA Implementation Concepts NQA agent: client in an NQA test. Hangzhou H3C Technologies Co., Ltd. 3/14
4 NQA server: In a narrow sense, an NQA server is the NQA server in a UDP echo, TCP, UDP jitter, or voice test; in a broad sense, an NQA server refers to the peer device to be probed, such as an FTP server or an HTTP server. Test group: An NQA test is performed based on test groups. Each test group has attributes such as test type, destination address, destination port, and packet sending interval. Identification of a test group: For better management of an NQA test group, each test group has an administrator name and operation tag, which can uniquely identify the test group. After a test group is created, you can configure the test type in test group view and enter test type view to configure other parameters. Probe: An independent process in which complete probe results can be obtained. For a TCP or DLSw test, one probe means one connection; for a UDP jitter or voice test, the number of packets sent in one probe depends on the probe packet-number command; for an FTP, HTTP or DHCP test, one probe means to carry out a corresponding function; for an ICMP-echo or UDP echo test, one probe packet is sent in one probe; for an SNMP test, three probe packets are sent in one probe. Test: One NQA test involves multiple consecutive probes. UDP jitter test: A group of probe packets are sent in one UDP jitter test and the probe results are calculated based on the information carried in each response. SD: Source to destination. DS: Destination to source. Test frequency: The interval between the start time of two consecutive tests for a test group. Test results: Statistics of all the probes in one test. If only some of the probes in one test are completed, the statistics of the probes completed will be displayed. History record: A history record is related to a probe, and is generated for each probe. Test Processing Mechanism ICMP-Echo Processing Mechanism The ICMP-echo function is the most basic function of NQA, and is implemented following RFC An ICMP-echo test is used to test reachability of a destination, and calculate the response time and packet loss rate by sending ICMP-echo requests. An ICMP-echo test can succeed only if the destination device can respond correctly to the ICMP-echo requests. An NQA client sends an ICMP-echo request to the destination IP address according to the configured probe time and interval. Upon receiving the ICMP-echo request, the destination IP address sends an ICMP-echo reply. The NQA client calculates the response time of the destination IP address and the packet loss rate based on the time when it receives the ICMP-echo reply and the number of the received packets, and thus the current network performance and network status can be analyzed. The test results and history records of an ICMP-echo test will be recorded in the test group, and you can use command lines to view them. UDP Echo Processing Mechanism A UDP echo test is used to test the connectivity and delay of a network by sending UDP echo packets. When you test the network connectivity and delay of a UDP packet, you must enable the NQA server, and bring up the corresponding UDP port on the NQA server. Hangzhou H3C Technologies Co., Ltd. 4/14
5 An NQA client sends a UDP packet to the destination IP address according to the configured probe time and interval. Upon receiving the UDP packet, the destination sends a response. The NQA client then calculates the time for the packet to reach the destination and the packet loss rate, thus analyzing the network performance and status. The test results and history records of a UDP echo test will be recorded in the test group, and you can use command lines to view them. UDP Jitter Processing Mechanism UDP jitter is an important tool to detect network status and monitor real-time service quality. Real-time services such as voice and video have high requirements on delay jitters. A UDP jitter test can be used to judge whether a network can provide high quality services for real-time services. As packets in a UDP jitter test are proprietary packets, the peer device should be NQA-enabled and be configured with NQA server related parameters; therefore, the device cannot be a device of other vendors. Figure 1 UDP jitter implementation NQA agent NQA server IP network T1 T4 T2 T3 T5 T8 T6 T7 The process of a UDP jitter test is as shown in Figure 1: 1) The NQA agent sends the NQA server a UDP jitter packet, which is timestamped when it leaves the NQA agent. The timestamp is T1. 2) When this packet arrives at the NQA server, it is timestamped by the NQA server. The timestamp is T2. 3) When the UDP jitter packet leaves the NQA server, the NQA server timestamps it. The timestamp is T3. 4) When the NQA agent receives the response, the time when it receives the packet is timestamped T4. 5) The NQA agent sends multiple probe packets at a fixed interval (T5-T1), and repeats the above process. 6) The NQA agent calculates the SD (source to destination) and DS (destination to source) delay jitters according to the roundtrip time of two consecutive packets it successfully received. Take the two packets shown in Figure 1 as an example: SD jitter = (T6-T5) (T2-T1) = (T6-T2) (T5-T1) Hangzhou H3C Technologies Co., Ltd. 5/14
6 DS jitter = (T8-T7) (T4-T3) = (T8-T4) (T7-T3) Figure 2 UDP jitter packet loss statistics principle NQA agent NQA server IP network ID = 1 NQA server: MAX ID = 1 Sum = 1 Packet 1 Packet 1 ID = 2 Packet 2 MAX ID = 1 Sum = 1 Packet 2 lost MAX ID = 2 Sum = 2 ID = 3 Packet 3 lost ID = 4 NQA server: MAX ID = 4 Sum = 3 ID = 5 Packet 4 Packet 4 Lost for unknown reason MAX ID = 4 Sum = 3 As shown in Figure 2, SD or DS packet loss rate can be calculated by the UDP jitter client and server. Each packet sent by the NQA agent contains a packet ID. The NQA server updates the biggest packet ID and the number of packets received every time it receives a packet, and sends them back to the NQA agent in the response; the NQA agent then records the number of responses and obtains the information of the NQA sever from these responses. The information that the NQA agent can obtain includes: 1) Number of packets sent by the NQA agent; 2) The greatest packet ID and the number of packets received by the NQA server; 3) Number of packets received by the NQA agent. Based on the information, the following can be calculated: Number of packets lost from source to destination = the biggest packet ID received by the NQA server Number of packets received by the NQA server Number of packets lost from destination to source = Number of packets received by the NQA server Number of packets received by the NQA agent Number of packets lost on the unknown directions = Number of packets sent by the NQA agent Number of packets received by the NQA agent Number of packets lost from source to destination Number of packets lost from destination to source Hangzhou H3C Technologies Co., Ltd. 6/14
7 UDP jitter can collect the following statistics: packet response time, packet loss rate, reasons for probe failures, delay jitters from the NQA agent to the NQA server, delay jitters from the NQA server to the NQA agent and uni-directional packet loss rate (SD or DS). The test results and history records of a UDP jitter test will be recorded in the test group, and you can use command lines to view them. In a UDP jitter test, a group of packets are sent in one probe, and this group of packets corresponds to one history record only. Therefore, to know the UDP jitter test results, you are recommended to view the probe results, rather than the history records. Voice Processing Mechanism A voice test is used to test voice over IP (VoIP) network status, and collect VoIP network parameters so that users can adjust the network accordingly. The voice test can be used to test delay jitter, delay, and packet loss. The calculation method is similar to that of a UDP jitter test. The voice parameter values that indicate VoIP network status can also be calculated in a voice test, including: Calculated Planning Impairment Factor (ICPIF): Measures attenuation of voice data in a network, depending on packet loss and delay. A higher value represents a lower network quality. Mean Opinion Scores (MOS): Measures quality of a VoIP network. A MOS value can be evaluated by using the ICPIF value, in the range 1 to 15. A higher value represents a higher quality of a VoIP network. The evaluation of voice quality depends on users tolerance to voice quality, and this factor should be taken into consideration. For users with higher tolerance to voice quality, you can use the advantagefactor command to configure the advantage factor. When the system calculates the ICPIF value, this advantage factor is subtracted to modify ICPIF and MOS values and thus both the objective and subjective factors are considered when you evaluate the voice quality. The test results and history records of a voice test will be recorded in the test group, and you can use command lines to view them. Hangzhou H3C Technologies Co., Ltd. 7/14
8 As packets in a voice test are proprietary packets, the peer device should be NQA-enabled and be configured with NQA server related parameters; therefore, the device cannot be a device of other vendors. In a voice test, a group of packets are sent in one probe, and this group of packets corresponds to one history record only. Therefore, to know the voice test results, you are recommended to view the probe results, rather than the history records. TCP Processing Mechanism A TCP test is used to test the TCP connection between a client and a specified server and the setup time for the connection. You cannot initiate TCP probes too frequently to avoid occupying too many resources and affecting normal services on the destination device. The test results and history records of a TCP test will be recorded in the test group, and you can use command lines to view them. DLSw Processing Mechanism An NQA DLSw test initiates a TCP connection to the DLSw port of the peer device, and then decides whether the DLSw function has been enabled on the peer device according to whether the connection can be established. As an NQA DLSw test is only used to test whether DLSw is enabled on the peer device, it can be considered as a TCP test with a fixed destination port number. The test results and history records of a DLSw test will be recorded in the test group, and you can use command lines to view them. SNMP Processing Mechanism An SNMP test is used to send SNMP packets to a specified port to decide whether SNMP is enabled on the peer device according to the peer s response. You cannot specify the SNMP version on the client. Every time a test is performed, all the SNMP versions SNMPv1, SNMPv2c and SNMPv3 are tested; as long as a response is received from any version, the probe succeeds. At present, the SNMP test does not distinguish between different SNMP versions on the SNMP server. The test results and history records of an SNMP test will be recorded in the test group, and you can use command lines to view them. HTTP Processing Mechanism An HTTP test is used to test the connection between the NQA client and a specified HTTP server, thus deciding whether the NQA client provides HTTP services and the time for establishing the connection. Hangzhou H3C Technologies Co., Ltd. 8/14
9 An HTTP test supports get and post operations, that is, it is used to send a get or post request to a specified HTTP server, and then calculates the test time after receiving a response. This process is to establish a connection with the HTTP server; if the connection is established, the test succeeds. The test results and history records of an HTTP test will be recorded in the test group, and you can use command lines to view them. FTP Processing Mechanism An FTP test is used to test the connection between the NQA client and a specified FTP server and the time necessary for the NQA client to transfer a file to or download a file from the FTP server. An FTP test supports both get and put operations. A get operation does not put a file into the local file system, but calculate the time for downloading the file, and automatically releases the memory after the calculation; a put operation does not put a local file on the server, but uploads the file with fixed size and content (you can configure the filename, and the data is the fixed data specified by the system; if the configured filename is the same as that on the server, the existing file is overwritten, and the file will not be deleted after the test is completed.). Therefore, an FTP test is unrelated to the local file system. The test results and history records of an FTP test will be recorded in the test group, and you can use command lines to view them. DHCP Processing Mechanism A DHCP test simulates a DHCP client to initiate a DHCP request on the specified interface. Then it decides whether the DHCP server services exist on the network segment where the interface resides and tests the time used for the NQA client obtains an IP address. A DHCP just uses an interface to send DHCP packets, and as long as an address is obtained, the lease of the address will be released at once, and therefore, it does not occupy the address resources of the DHCP server. An interface that is performing a DHCP test must be in the up state. The test results and history records of a DHCP test will be recorded in the test group, and you can use command lines to view them. DNS Process Mechanism A DNS test is mainly used to test whether the NQA client can resolve a domain name into an IP address through a DNS server and the time required for resolution. As a DNS test is a process to simulate the domain name resolution, the mapping between the domain name and the IP address will not be saved. The test results and history records of a DNS test will be recorded in the test group, and you can use command lines to view them. Collaboration Mechanism Collaboration is implemented by establishing collaboration entries to monitor the probe results of the current test group. If the number of consecutive probe failures reaches a certain limit, collaboration Hangzhou H3C Technologies Co., Ltd. 9/14
10 with other modules is triggered (collaboration is not supported in a UDP jitter test).the implementation of collaboration is as shown in Figure 3. Figure 3 Implementation of collaboration Application modules VRRP VRRP Static routing Static routing Policy Policy routing routing Backup Backup center center Track module Detection modules NQA BFD The collaboration here involves three parts: the application modules, the track module, and the detection modules (for example, NQA).The track module works between the application modules and the detection modules. If the state of a track entry changes, the detection module notifies the track module, which then notify the application module to take corresponding actions. In this way, collaboration can be implemented. Take static routing as an example. You have configured a static route with the next hop If is reachable, the static route is valid; if is unreachable, the static route is invalid. With the collaboration between NQA, the track module and the application modules, real time monitoring of reachability of static routes can be implemented. If is detected to be unreachable, NQA will inform the static routing module through the track module. The static routing module then can know that the static route is invalid. NQA Server Processing Mechanism Before performing a UDP jitter, UDP echo, TCP or voice test, you need to configure the NQA server first. For a UDP echo test, the NQA server simply sends the received packets back to the client; for a TCP test, the NQA server simply creates a listening port to connect to the client; for a UDP jitter or voice test, however, the NQA server needs to put a timestamp in the packet, records the greatest packet ID received and the number of packets in the packet, and sends the packet to the client. Application Scenarios NQA is generally used in the collaboration function. NQA can collaborate with VRRP, static routing, backup center, and policy routing through the track module, so as to detect network faults in time and avoid communication interruption or service quality decrease. Hangzhou H3C Technologies Co., Ltd. 10/14
11 Collaboration Between NQA and VRRP Through collaboration between NQA and VRRP, you can monitor the upper link. If there is a fault on the upper link of the master of a VRRP group, hosts in the LAN cannot access the external network through the master. In this case, NQA will notify VRRP through the track module to decrease the priority of the master by a specified value, allowing a higher priority router in the VRRP group to become the master to maintain proper communication between the hosts in the LAN and the external network. After the upper link recovers, NQA will notify VRRP to restore the priority of the router whose priority is decreased through the track module. Figure 4 Collaboration between NQA and VRRP Virtual IP address: / / / /24 Device A Device C / /24 Internet Host A Host B / / /24 Device B Device D As shown in Figure 4, configure VRRP-track-NQA collaboration on Device A to implement real-time monitoring of If is detected unreachable, NQA will notify the track module, which will notify VRRP to decrease the priority of Device A by a specified value, allowing Device B to become the master to forward packets. Collaboration Between NQA and Static Routing With the collaboration between NQA, track module and static routing module, real time monitoring of reachability of static routes can be implemented. NQA probes the next hop of the static route. If the probe succeeds, the static route is valid; otherwise, the static route is invalid. Hangzhou H3C Technologies Co., Ltd. 11/14
12 Figure 5 Collaboration between NQA and static routing Device A / / / /24 Device B Device C As shown in Figure 5, on Device B, configure the next hop address of the static route to Device C as , and configure static routing-track-nqa collaboration. If is detected unavailable, NQA will notify the track module, which will notify the static routing module to set the static route as invalid; if is detected available, NQA will notify the track module, which will notify the static routing module to set the static route as valid. Collaboration Between NQA and the Backup Center NQA-backup center collaboration implements interface backup state change based on network status. NQA is used to monitor the status of the main interface. If detecting that the link on the main interface fails, the NQA will notify the track module, which then notify the backup center to enable the link on the backup interface for communication; if NQA detects that the link on the main interface restores, it will notify the track module, which then notify the backup center to communicate through the main interface. Figure 6 Collaboration between NQA and the backup center Hangzhou H3C Technologies Co., Ltd. 12/14
13 As shown in Figure 6, data from Device A can reach Device C through Device B or Device D. Suppose the main link is Device A-Device B-Device C, that is, data from Device A is sent to Device C through Device B. On Device A, configure backup center-track-nqa collaboration. If the main link is detected unreachable, NQA notifies the track module, which then notifies the backup center to use Device A-Device D-Device C as the main link, that is, data from Device A is sent to Device C through Device D; if the link Device A-Device B-Device C recovers, NQA notifies the track module, which then notifies the backup center to use the Device A-Device B-Device C link as the main link, that is, data from Device A is sent to Device C from Device B. Collaboration Between NQA and Policy Routing Collaborated with NQA and track, IP unicast policy routing can be used more flexibly, and its awareness of the dynamic networking environment is enhanced. You can associate the policy routing with NQA through track when configuring the outgoing interface, the default outgoing interface, the next hop, and the default next hop. If the NQA probe succeeds, the configuration is valid and can be used to instruct forwarding; if the probe fails, the configuration is invalid and is ignored during packet forwarding. Figure 7 Collaboration between NQA and policy routing Device B /24 Host B Device A / /24 Internet /24 Host A Device C As shown in Figure 7, Device A can connect to the Internet through Device B or Device C. Define a policy routing on Device A, thus all TCP packets received on the interface connecting the LAN are forwarded by Device B (with the next hop of the packets being ). Configure collaboration between policy routing, NQA and Track to use NQA to detect the reachability of Device B. If Device B is reachable, the policy can instruct forwarding, and the next hop of the TCP packets received on the interface is ; otherwise, the policy is invalid, and an available next hop of the TCP packets received on the interface will be searched according to the routing table. Hangzhou H3C Technologies Co., Ltd. 13/14
14 Copyright Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. The information in this document is subject to change without notice. Hangzhou H3C Technologies Co., Ltd. 14/14
HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationCiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
More informationInternetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
More informationConfiguring Health Monitoring
CHAPTER 6 This chapter describes how to configure the health monitoring on the CSM and contains these sections: Configuring Probes for Health Monitoring, page 6-1 Configuring Route Health Injection, page
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationPortal Authentication Technology White Paper
Portal Authentication Technology White Paper Keywords: Portal, CAMS, security, authentication Abstract: Portal authentication is also called Web authentication. It authenticates users by username and password
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationAbout Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
More informationVRRP Technology White Paper
Issue 01 Date 2012-08-31 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationSecurity Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
More informationH3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted
More information7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More informationHands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
More informationNetwork Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
More informationHow To Configure A Network Monitor Probe On A Network Wire On A Microsoft Ipv6 (Networking) Device (Netware) On A Pc Or Ipv4 (Network) On An Ipv2 (Netnet) Or Ip
61700600L2-29.3D January 2014 Configuration Guide This configuration guide describes network monitoring and its use on ADTRAN Operating System (AOS) products. This guide contains information about the
More informationNetwork Configuration Example
Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
More informationChapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
More informationConfiguring Voice Quality Monitoring in AOS
61200796L1-29.2E September 2010 Configuration Guide Configuring Voice Quality Monitoring in AOS This configuration guide describes the configuration and use of the voice quality monitoring (VQM) feature
More informationVoice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
More informationConfiguring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
More informationBroadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
More informationEnterprise Edge Communications Manager. Data Capabilities
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationitvsense Probe M-301/M-304
implementing next generation IT and communications solutions Service Assurance for Digital Video and IP-based Multiplay Networks itvsense Probe M-301/M-304 telecommunication networks it networks research
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationQualNet 4.5 Network Emulation Interface Model Library
QualNet 4.5 Network Emulation Interface Model Library February 2008 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationMULTI WAN TECHNICAL OVERVIEW
MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationUsing SolarWinds Orion for Cisco Assessments
Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling
More informationChapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
More informationHPE FlexNetwork 10500 Switch Series
HPE FlexNetwork 10500 Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-7128R Software version: 10500-CMW710-R7178 Document version: 6W100-20160129 Copyright 2016 Hewlett
More informationCISCO IOS IP SERVICE LEVEL AGREEMENT
DATA SHEET CISCO IOS IP SERVICE LEVEL AGREEMENT Network services have changed dramatically in recent years, most notably due to the addition of voice, video, and other mission-critical delay- and performance-sensitive
More informationLinux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
More informationUsing WhatsUp Gold VoIP Monitor About, configuring, installing, and using the VoIP monitor features in WhatsUp Gold
Using WhatsUp Gold VoIP Monitor About, configuring, installing, and using the VoIP monitor features in WhatsUp Gold Contents CHAPTER 1 About WhatsUp Gold VoIP Monitor About Cisco IP SLA features in the
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationConfiguration Guide. DHCP Server. LAN client
DHCP Server Configuration Guide 4.0 DHCP Server LAN client LAN client LAN client Copyright 2007, F/X Communications. All Rights Reserved. The use and copying of this product is subject to a license agreement.
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationEd. 00 GWIM. Firewall Handbook
Ed. 00 GWIM Firewall Handbook COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied, translated, transcribed
More informationConfigure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: alto.ec@gmail.com Ms. Zarna M. Gohil Electronics & Communication
More informationCA Spectrum. Service Performance Manager User Guide. Release 9.4
CA Spectrum Service Performance Manager User Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationUsing WhatsUp Gold VoIP Monitor About, configuring, installing, and using the VoIP monitor features in WhatsUp Gold
Using WhatsUp Gold VoIP Monitor About, configuring, installing, and using the VoIP monitor features in WhatsUp Gold Contents CHAPTER 1 About WhatsUp Gold VoIP Monitor About Cisco IP SLA features in the
More informationLARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
More informationTunnel Broker System Using IPv4 Anycast
Tunnel Broker System Using IPv4 Anycast Xin Liu Department of Electronic Engineering Tsinghua Univ. lx@ns.6test.edu.cn Xing Li Department of Electronic Engineering Tsinghua Univ. xing@cernet.edu.cn ABSTRACT
More informationGSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2
GSM Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.2 Document Title HTTP Service AT Commands Version 1.2 Date 2015-04-13 Status Document Control ID Release GSM_HTTP_ATC_V1.2 General Notes offers
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationOSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
More informationCCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationIPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
More informationCiscoWorks Internetwork Performance Monitor
CiscoWorks Internetwork Performance Monitor (IPM) v2.6 Tutorial Introduction 1-1 About This Tutorial Identify the need for network service monitoring tools Describe how to use IPM to configure and monitor
More informationChapter 4 Restricting Access From Your Network
Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can
More informationChapter 3 Restricting Access From Your Network
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.
More informationDDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
More informationehealth Psytechnics Integration for User Guide r6.0 SP3
ehealth Psytechnics Integration for User Guide r6.0 SP3 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational
More informationFirewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
More informationLab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
More informationNetwork Monitoring Using Cisco Service Assurance Agent
Network Monitoring Using Cisco Service Assurance Agent This chapter describes how to configure the Cisco Service Assurance Agent (SAA) to provide advanced network service monitoring information using Cisco
More informationVirtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
More informationA New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper
More informationQuick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.
Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...
More informationBandwidth Management Technology White Paper
Bandwidth Management Technology White Paper Keyword: Bandwidth management, segment-based bandwidth management, user-based bandwidth management, service-based bandwidth management, connection-based bandwidth
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationNetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
More informationLink Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Link Load Balancing 2015-04-28 08:50:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Link Load Balancing... 3 Link Load Balancing... 4 Configuring
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationSIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required)
SIP Trunking Manual 05.15 Technical Support Web Site: http://ws1.necii.com (registration is required) This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationIPS Attack Protection Configuration Example
IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling
More informationChapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators
More informationHosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationFireware XTM Traffic Management
WatchGuard Certified Training Fireware XTM Traffic Management Fireware XTM and WatchGuard System Manager v11.4 Disclaimer Information in this guide is subject to change without notice. Companies, names,
More informationOracle Enterprise Manager Ops Center. Ports and Protocols. Ports and Protocols 12c Release 3 (12.3.0.0.0)
Oracle Enterprise Manager Ops Center Ports and Protocols 12c Release 3 (12.3.0.0.0) E59963-01 June 2015 This document contains the latest information on the ports and protocols that Oracle Enterprise Manager
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationConfiguring WAN Failover & Load-Balancing
SonicOS Configuring WAN Failover & Load-Balancing Introduction This new feature for SonicOS 2.0 Enhanced gives the user the ability to designate one of the user-assigned interfaces as a Secondary or backup
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationGuide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
More informationSample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationenetworks TM IP Quality of Service B.1 Overview of IP Prioritization
encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority
More informationLinking 2 Sites Together Using VPN How To
ewon Application User Guide AUG 015 / Rev 1.0 You Select, We Connect Linking 2 Sites Together Using VPN How To Content The purpose of this document is to explain you how to connect 2 remote equipments
More informationco Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationVLAN and QinQ Technology White Paper
VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More information3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
More information