LAN Performance Measurements Lab
|
|
- Randolph Freeman
- 7 years ago
- Views:
Transcription
1 LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February
2 Introduction: The goal of this laboratory is for students to gain some first hand experience measuring and observing the performance characteristics of the two LAN technologies, Ethernet and token-ring. The hands-on experience gained in the lab is intended to supplement and reinforce the student's understanding of the operational and performance aspects of the MAC-layer protocols. For student's to benefit from this experience it is essential that they have a basic understanding of IEEE 802.3(Ethernet) and 802.5(Token Ring) specifications. Specific measurements observed in this experiment may vary considerably from commonly held theoretical results. Keep in mind that these popular rules-of-thumb are based upon a number of simplifying assumptions which are not applicable to all environments. For this reason, they should be put in the proper perspective as general guidelines, and not steadfast rules. Furthermore, there are number of limitations to the methodology employed in this lab experiment. Therefore, these results must also be put in the proper perspective. Keep in mind the following limitations to the practical validity of these experiments: (1) packet gap times and (2) frame lengths are deterministic rather than stochastic, (3) the number of stations is small, and (4) the propagation delay for Ethernet and ring latency for token ring are small because the physical network segments are short. These are all significant factors in relation to LAN performance. Furthermore, the traffic generation and monitoring equipment are low-end devices which provide only moderately accurate information and may behave inconsistently under high loads. When analyzing their results, students should keep these factors in mind. They should also attempt to understand why these issues might skew performance measures. Using PC based traffic generators, students will transmit known loads on each network. A range of input loads will be achieved by varying the frame rate and the frame length. To simplify the experiment, configurations will be held constant across all the traffic generators for each experiment. Students will measure the network utilization or throughput, and the time it takes to perform a simple FTP file transfer as the loads are varied. Simple observations should reveal some basic relationships among load, throughput, frame length and delay. Using their understanding of each network's MAClayer protocol, and their understanding of the particular environment they should be able to assess the reasons for the behavior they have observed. Students should understand that it is difficult to compare the performance of Ethernet and token-ring in an absolute sense. But this lab should provide some opportunity to observe relative effects. Students are expected to give some thought as to why the technologies behave differently and when it may be more appropriate to use one versus the other. When considering what they have observed in this lab students should consider the following questions: (1) How performance issues might affect LAN design. (2) What kinds of things might be done to improve LAN performance in an Ethernet or token-ring environment? (3) What should a LAN analyst or engineer look for when assessing LAN performance and design? Lan Performance Lab Ver 1.4, February
3 Equipment and Setup To be efficient, students will be distributed to two groups. One group works on Ethernet while the other works on Token Ring. Then switch. Please gather all your data during your time-slot before attempting to work out any of the problems. During your assigned lab lecture, the TA will introduce you to the equipment, procedures and concepts needed to complete this lab. There are two parts to this lab. The first part involves performance measurements for 10 Mbps Ethernet. The second part involves a similar set of procedures to measure the performance of a 4-Mbps token-ring. You should verify that the necessary equipment is in place, configured properly and operational before continuing with the lab procedures. Ethernet Configuration Verification: The following is a list of the equipment required for part one of this lab. This equipment should be pre-configured for you before coming into the lab. In general you will not have to worry about the details; they are presented primarily for informational purposes: 8 PC running windows XP 8 Network Interface Cards (NICs). 6 FETEST LanXL - LAN monitoring and traffic generation software. 2 FTP stations, one is FTP server, the other is FTP client. 8 10base-T Ethernet cables linking each PC on the segment to the Hub. 8 RJ45-connectors Table 1: Ethernet Equipment List All the PCs have already been appropriately labeled as traffic generator, or monitor, or FTP server, or FTP clients. Once you have identified the traffic generators, close LanXL and reopen it again. re-boot each machine by powering it off and on. It is important that you perform a cold start because certain software which may have been running causes the network interface to halt when LanXL is run. Procedure-1 Ethernet Traffic Generator and Monitor function Verification: Double click the LanXL icon on windows XP desktop On the LanXL PC which is labeled as "Monitor" 1) Click "Module-> Mode of Operation->" from the main menu, and make sure "capture" and "monitor" are selected 2) Click the start icon on the menu bar Assuming this PC is functioning properly, you should be capturing traffic seen on the Lan Performance Lab Ver 1.4, February
4 Ethernet segment. However you should not see anything yet because none of the other stations are generating traffic. Next you should test each of the other traffic generators one at a time. Select an un-tested generator: Procedure-2 1) Double click the LanXL icon on windows XP desktop 2) Click "transmit" icon to set it to transmit mode 3) Click detail view icon enter into detail view 4) Click "create/modify transmit buffer icon 5) Click Delete to delete the old settings if it exists. 6) Set the destination address as FFFFFFFF 7) Choose continuous as sending mode 8) Modify packet size and packet gap 9) Click Add 10) Click Load Module 11) Click the start icon on the menu bar At this point the traffic generator should be transmitting Ethernet frames according to its default settings. Check the monitor station to confirm that frames are actually being transmitted. On the monitor PC you should see some indication that frames are being sent by the test traffic generator PC. Hopefully you won't have a problem generating traffic on one PC and monitoring from another. If it is working, stop the traffic generator by clicking "stop" icon. Next you will want to repeat this step with all of the other 5 generator PCs. Procedure-3 Ethernet FTP Verification: Up to now, you have all traffic generators and monitors working. Then, you need to test FTP server and FTP client. Before doing this, you need to stop all the traffic generators. IP address of FTP Server for Ethernet segment And the service is automatically enabled. Start the FTP software on the client machine: Lan Performance Lab Ver 1.4, February
5 1) Enter DOS mode by clicking Start->run, then type cmd in the "open" field. 2) In the DOS mode, type ftp username: ftpaccess password: ftpaccess 3) Now, you are connected to FTP server. Set file type to Binary by typing the command Binary 4) Get file from FTP server, in the later steps, you need to record the displayed time. get file.exe The file transfer should take about 3 seconds. Note: On the FTP client machine, pressing <F3> will repeat the previous command. You will use this key throughout the lab. Lan Performance Lab Ver 1.4, February
6 Token-Ring Configuration Verification: The following is a list of the equipment required for part two of this lab. This equipment should be pre-configured for you before coming into the lab. In general you will not have to worry about the details; they are presented primarily for informational purposes: 8 PC running windows XP 8 4/16 Mbps Network Interface Cards (NICs). 6 FETEST LanXL - LAN monitoring and traffic generation software. 2 FTP stations, one is FTP server, the other is FTP client. 1 IBM 8226 token-ring MAU. 8 RJ-45 connectors and twisted cables connecting each PC to the MAU. Table 2: Token-Ring Equipment List You will have 8 PCs for the token-ring experiment: 5 traffic generators, 1 monitor, 1 FTP client and 1 FTP server. All the PCs have already been appropriately labeled as traffic generator, or monitor, or FTP server, or FTP clients. All the NICs had been put into promiscuous mode. Each of the token-ring PCs must be connected to the IBM 8226 MAU via UTP cable. The UTP cable connects to the token-ring NICs and the MAU using RJ-45 type connectors. Procedure-4 Token-Ring Traffic Generator Verification: Monitor setup: Double click the LanXL icon on windows XP desktop On the LanXL PC which is labeled as "Monitor" 1) Click "Module-> Mode of Operation->" from the main menu, and make sure "capture" and "monitor" are selected 2) Click the start icon on the menu bar Assuming this PC is functioning properly, you should be capturing traffic seen on the Token Ring network. Unlike Ethernet, token-ring involves some active management. You should be able to observe captured token-ring monitor frames. Next test each of the traffic generators in turn. Procedure-5 Traffic generator setup: Lan Performance Lab Ver 1.4, February
7 Select an un-tested generator: Do the same thing step by step as in Ethernet traffic generator setup case which is showed in Procedure-2. At this point the traffic generator should be transmitting Token Ring frames according to its default settings. Check the monitor station to confirm that frames are actually being transmitted. On the monitor PC you should see some indication that frames are being sent by the test traffic generator PC. Hopefully you won't have a problem generating traffic on one PC and monitoring from another. If it is working, stop the traffic generator by clicking "stop" icon. Next you will want to repeat this step with the other generator PCs. The traffic generator should indicate that it is transmitting frames, and you should be able to observe a flurry of capture activity on the network monitor. Procedure-6 Token-Ring FTP Connection Verification: IP address of FTP Server for Token Ring And the service is automatically enabled. Start the FTP software on the client machine: 1) Enter DOS mode by clicking Start->run, then type cmd in the "open" field. 2) In the DOS mode, type ftp username: ftpaccess password: ftpaccess 3) Now, you are connected to FTP server. Set file type to Binary by typing the command Binary 4) Get file from FTP server, in later steps you need to record the displayed time. Remember for normalization compare with Ethernet, this file size is 2.5 times less than the file used in Ethernet case. (Guess why?) get file.exe Lan Performance Lab Ver 1.4, February
8 Lab Procedures: Part I: Ethernet (IEEE 802.3) Performance Measurements Overview: On a single 10BaseT Ethernet segment there are 6 PCs running LanXL LAN monitoring and traffic generation software. You will configure the 5 traffic generators to generate traffic on the LAN segment by specifying the frame length and the frame inter-arrival time for each iteration of the experiment as specified in the Ethernet configuration charts below. Each configuration imposes a known offered load on the network. The offered load is a function of the frame length, frame inter-arrival time, and the number of stations. For example: Assume the frame length is 1518 octets, the packet gap is 24.2msec and there are 5 stations. First we can calculate the frame rate which is the reciprocal of the packet gap: 41.3 frames per second. Given that each frame is 1518 octets long, we can calculate the load generated by one station as being 1518 x 8 x 41.3 = bps. Since there are 5 stations we have a total load of 5 x = bps. Divide this by the capacity of Ethernet which is 10 Mbps and we have a total offered load of 25%. The drop-off varies between PCs and by the particular rate being requested. Therefore the offered loads should be understood as reasonable approximations. Care should be taken not to confuse the term inter-arrival time with inter-frame gap. The IEEE standard calls for minimum 9.6us inter-frame gap after the channel has become free before the MAC-layer can initiate a new transmission. This inter-frame gap is enforced at the MAC-layer to meet constraints imposed by the Physical-layer. Interarrival time represents the time between successive MAC-UNITDATA. Request primitives issued by the MAC service user. Keep in mind that the MAC-layer may not be able to service these requests immediately due to on-going network activity. The rate at which these requests are serviced reflects the station's throughput, whereas the rate at which they are made reflects the offered load. In some literature, offered load includes the additional load due to retransmission attempts. Our definition does not include these effects. For each configuration you will estimate the total network utilization by reading utilization from the throughput table on each of the traffic generators and adding them together to get total network utilization. Each of the generators indicates the throughput it is currently achieving. Under light loads, these numbers will be stable and consistent across the network; however as the load increases, these indications will begin to fluctuate considerably due to the effects of contention and collision handling. To record the network utilization you will have to estimate the average value you see and multiply it by 5. Two additional PCs will be used to transfer a file using FTP. The transfer should be done 5 times for each load configuration. Do not to transfer the file while you are determining the utilization. The traffic generated by the file transfer increases the load on the network and thus has a direct impact on the utilization. For light loads the transfer Lan Performance Lab Ver 1.4, February
9 time stays relatively constant. Under heavy loads it may vary considerably. You should take about 5 readings and calculate an average for each iteration.. There are tables corresponding to each of two sets of experiments. The first uses maximum length Ethernet frames of 1518 octets. The second set uses frame length of 512 octets. You should observe different FTP file transfer performance with same offer load but different packet size on traffic generator (why?). Follow the example procedures detailed following the configuration tables (table 3 and 4) for the first configuration set, and then repeat those procedures for each subsequent configuration. Lan Performance Lab Ver 1.4, February
10 Ethernet Configuration tables: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 3: Ethernet Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File-Transfer Time (octets) (msec) (%) (%) (sec) 512 NA Table 4: Ethernet Octet Frames Lan Performance Lab Ver 1.4, February
11 Ethernet Example Step-by-Step Procedures 1) Ethernet Traffic Generator and Monitor function Verification, refer to Procedure-1 and Procedure-2. 2) Ethernet FTP verification, refer to Procedure-3 3) Stop FTP transfer 4) Stop traffic generator and monitor 5) From FTP client, transfer file from server to client 6) Transfer five times, when finished, record the average time into table3 and table 4. 7) On each traffic generator, set its operation mode as transmitting mode and set the transfer buffer parameters based on table 3 and 4. Refer to Procedure-2. Note: Each of the traffic generators will be configured identically for each run of the experiment. Be sure to confirm that they are the same before you take any measurements. 8) Repeat 7) on each traffic generator. 9) Click start for each traffic generator. 10) Wait for about 15 seconds, click start on the monitor. 11 ) Read the Utilization from the monitor and record it. Note: The total offered load to the network is the sum of the offered load from each of the traffic generators. The total network utilization, which could be seen from monitor, is equal to the sum of the utilization reported by each station. This may become difficult to do as the load increases. Get the best average estimate you can. Determine the utilization and record it in the appropriate place on the Ethernet table. This should be about 20-25% for the experiment corresponding with the first configuration. 12. Connect to FTP server using the Procedure From FTP client, run get file.exe 5 times, and record the average transfer time on the table. 14. Change the traffic generator settings and repeat the procedure from 7 to 13 and record the data. Lan Performance Lab Ver 1.4, February
12 Part II: Token-Ring (IEEE 802.5) Performance Measurements Overview On a single 4 Mbps token-ring network there are 6 PCs running LanXL network monitoring and traffic generation software. As with the Ethernet experiments, you will configure each of these to generate traffic on the LAN specifying the frame length and the frame inter-arrival rate according to the token-ring configuration table provided below. Each configuration imposes a known offered load on the network. The definition and calculation of offered load is consistent as with the Ethernet, except when dividing to obtain the % of the network's capacity. In this case the aggregate bit rate is divided by 4 Mbps rather than 10 Mbps. A PC is running LanXL in the Capture and Monitor mode. This allows you to observe the traffic on the network and read the total network utilization directly from the monitoring station. The token-ring monitor does not have to be very sophisticated in order to provide this capability; however accurately assessing Ethernet utilization from a monitoring station is far more difficult due to the presence of collisions and retransmissions. For each experiment you will observe and record the total network utilization by reading the average utilization from the Network Utilization window of the monitor PC. Two PCs will be used to transfer a file using FTP. The transfer should be done several times for each load configuration. As with the Ethernet, do not transfer the file while you are determining the utilization. You should take about 5 readings and calculate an average. There are charts corresponding to each of two sets of experiments. The first uses large frame lengths of 1518 octets. The second set uses small length frames of 512 octets. The justification for these choices parallel the explanations given for the Ethernet experiments. Follow the example procedures detailed following the configuration tables for the first configuration set, and then repeat those procedures for each subsequent configuration. Lan Performance Lab Ver 1.4, February
13 Token-Ring Configuration Charts: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 5: Token-Ring Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (bytes) (msec) (%) (%) (sec) 512 NA Table 6: Token-Ring Octet Frames Lan Performance Lab Ver 1.4, February
14 Token-Ring Example Step-by-Step Procedures 1) Token-Ring Traffic Generator and Monitor function Verification, refer to Procedure- 4 and Procedure-5. 2) Token-Ring FTP verification, refer to Procedure-6 3) Stop FTP transfer 4) Stop traffic generator and monitor 5) From FTP client, transfer file from server to client 6) Transfer five times, when finished, record the average time into table5 and table 6. 7) On each traffic generator, set its operation mode as transmitting mode and set the transfer buffer parameters based on table 5 and 6. Refer to Procedure-5. Note: Each of the traffic generators will be configured identically for each run of the experiment. Be sure to confirm that they are the same before you take any measurements. 8) Repeat 7) on each traffic generator. 9) Click start for each traffic generator. 10) Wait for about 15 seconds, click start on the monitor. 11 ) Read the Utilization from the monitor and record it. Note: The total offered load to the network is the sum of the offered load from each of the traffic generators. The total network utilization, which could be seen from monitor, is equal to the sum of the utilization reported by each station. This may become difficult to do as the load increases. Get the best average estimate you can. Determine the utilization and record it in the appropriate place on the Ethernet table. This should be about 20-25% for the experiment corresponding with the first configuration. 12. Connect to FTP server using the Procedure From FTP client, run get file.exe 5 times, and record the average transfer time on the chart. 14. Change the traffic generator settings based on table 5 and table 6 and repeat the procedure from 7 to 13 and record the data. Lan Performance Lab Ver 1.4, February
15 Part III: Analysis and Questions Students are required to attend a lab session, then complete and hand in the questions on the following pages: Lan Performance Lab Ver 1.4, February
16 LAN Performance Lab: Analysis and Questions Supplement NAME: The measurement results should be copied from the corresponding tables in your complete lab handout. Please DO NOT turn in the complete handout. Please answer the following questions on a separate piece of paper. If you can, please type your answers. 1. Measurements Please complete the following tables using results you collected in the lab: Lan Performance Lab Ver 1.4, February
17 Ethernet Configuration tables: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 3: Ethernet Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File-Transfer Time (octets) (msec) (%) (%) (sec) 512 NA Table 4: Ethernet Octet Frames Lan Performance Lab Ver 1.4, February
18 Token-Ring Configuration Charts: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 5: Token-Ring Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (bytes) (msec) (%) (%) (sec) 512 NA Table 6: Token-Ring Octet Frames Lan Performance Lab Ver 1.4, February
19 2. Required Graphs: You will be required to use MATLAB to plot six graphs as part of the analysis of this lab experiment.. NOTE: MAKE SURE THAT YOU SET THE X AND Y COORDINATES AS INDICATED IN THE LAB, OTHERWISE YOUR GRAPHS WILL BE MARKED WRONG. Label all relevant information on each submitted graph. This includes a title, axis labels and clear indication of the scale on each axis. The dependent variable should be along the vertical axis, the independent variable along the horizontal axis. Graphs: Please complete the following graphs based upon the data you collected in the lab: 3. Questions 1. Graph total offered load (y - axis) versus network utilization (x - axis) for each of the following cases: Ethernet using 1518-octet frames. Ethernet using 512-octet frames. Token-ring using 1518-octet frames. Token-ring using 512-octet frames. 2. Graph network utilization (y - axis) versus file transfer time (x - axis) for each of the following cases: Assume utilization is the independent variable for these graphs. Ethernet using 1518-octet frames. Token-ring using 1518-octet frame. Please provide concise answers to the following questions on an attached sheet. 1. Explain any differences in the Ethernet utilization curves for the two frame sizes tested. 2. What are the advantages and/or disadvantages of using small or large frames on Ethernet? 3. Why does the file transfer time rise so dramatically on the heavily loaded Ethernet network using 1518 byte frames? 4. What can you say about the relative throughput characteristics of Ethernet and token-ring. 5. Explain any differences in delays between lightly loaded token-ring and Ethernet networks. 6. Why do the delay characteristics on the token-ring network remain relatively flat even under heavily loaded conditions? Lan Performance Lab Ver 1.4, February
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationLab assignment #2 IPSec and VPN Tunnels (Document version 1.1)
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationLAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
More informationThe following sections describe the Gateway configuration pages in the SBG1000 Setup Program.
Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationETHERNET WEATHER STATION CONNECTIONS Application Note 33
ETHERNET WEATHER STATION CONNECTIONS Application Note 33 With WeatherLink and a Device Server INTRODUCTION It is possible to substitute an Ethernet connection for the direct USB or serial connection that
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationTCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL
TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL w w w. c d v g r o u p. c o m CA-ETHR-A: TCP/IP Module Installation Manual Page Table of Contents Introduction...5 Hardware Components... 6 Technical Specifications...
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationRFC 2544 Testing of Ethernet Services in Telecom Networks
RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in
More informationUSER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
More informationSmoking and any food or drinks are not permitted in the Applications Lab!
220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks
More informationUSB 3.0 Universal Mini Docking Station Adapter
USB 3.0 Universal Mini Docking Station Adapter User Manual DSH-M100U3 Ver. 1.00 All brand names and trademarks are properties of their respective owners. www.vantecusa.com Copyright 2015 Vantec Thermal
More informationNETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)
NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who
More informationProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
More information1 PC to WX64 direction connection with crossover cable or hub/switch
1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationLab assignment #1 Firewall operation and Access Control Lists
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationADSL Router Quick Installation Guide Revised, edited and illustrated by Neo
ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the
More informationCompulite File Server
Compulite File Server General Information Compulite File Server (CFS) is an application that runs on Microsoft Windows based PCs. This application enables Compulite lighting consoles to access the PC's
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationModel 2120 Single Port RS-232 Terminal Server Frequently Asked Questions
Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto
More informationENET-710. ENET-710 - Ethernet Module ENET-710 JAN / 06 FOUNDATION
ENET-710 ENET-710 - Ethernet Module JAN / 06 ENET-710 FOUNDATION E N E T 7 1 0 ME smar www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is
More informationConnect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationMFC7840W Windows Network Connection Repair Instructions
Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine
More informationWUA-0605 300Mbps Wireless USB Network Adapter
WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
More informationHow to add a SIP server How to register a handset
How to add a SIP server How to register a handset Contents Contents... 1 Hardware required equipment... 2 Software required equipment... 3 Add server... 3 Register handset to base... 7 1 of 12 Hardware
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationZyXEL AES-100 V2.03(AS.0) Release Notes/Manual Supplement
Date: May 22, 2002 ZyXEL AES-100 V2.03(AS.0) Release Notes/Manual Supplement Version: F/W Version: V2.03(AS.0) 5/22/2002 This version is the same as V2.03(AS.0)b10 Release by Glen Lin 1 Date: May 21, 2002
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More information1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A
1-Port Wireless USB 2.0 Print Server Model # APSUSB201W Quick Installation Guide Ver. 2A Section 1 Step 1Connect one end of the Ethernet cable to the RJ-45 port of the Print Server and attach the other
More informationPacket Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
More informationUsing a simple crossover RJ45 cable, you can directly connect your Dexter to any computer.
Dexter is a network device using the Ethernet protocol to connect and communicate with other devices on the network: Computers, routers, DHCP servers. Thus you have to setup your Dexter and your network
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationUSER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks
USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks CTC Union Technologies Co., Ltd. Far Eastern Vienna Technology Center (Neihu Technology Park) 8F, No. 60 Zhouzi St. Neihu,
More informationDebugging Network Communications. 1 Check the Network Cabling
Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps
More informationStarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking
StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE
More informationDSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
More informationThe Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
More informationPreparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
More informationTE100-P21/TEW-P21G Windows 7 Installation Instruction
Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click
More informationCET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
More informationIP-Pro (Virtual IP Protocol Independent Version) User Instructions
IP-Pro (Virtual IP Protocol Independent Version) User Instructions - Table of Contents - 1. IP Pro introduction 2. IP Pro installation 3. IP Pro setup 4. Virtual IP function check 5. Virtual IP changes
More informationQvis Security Technical Support Field Manual LX Series
Table of Contents Page 1: Motion Detection 1.0 Configuring Motion Detection for LX Apollo / LX Zeus DVRs 2 1.1 Motion Playback on LX Apollo / LX Zeus DVRs 3 1.2 Scheduling Motion and Continuous Recording
More informationVerifying Network Bandwidth
Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific
More informationLAB 1: Evaluating Internet Connection Choices for a Small Home PC Network
LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.
More informationSweex Wireless BroadBand Router + 4 port switch + print server
Sweex Wireless BroadBand Router + 4 port switch + print server Advantages Internet Sharing - A broadband internet connection makes it possible for several PCs to use the internet simultaneously. Wireless
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationTen top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
More informationFile Sharing. Peter Lo. CP582 Peter Lo 2003 1
File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring
More informationEnabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11
Sharing an Internet Connection with SatDirect Plus Table of Contents Contents Section 1: Section 2: Section 3: Introduction... 1 Physical Setup......2 Enabling Internet Connection Sharing on Windows XP
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationPART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
More informationWRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014
WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234
More informationVolume. Instruction Manual
Volume 1 Instruction Manual Networking EVERFOCUS ELECTRONICS CORPORATION Networking Instruction Guide 2004 Everfocus Electronics Corp 2445 Huntington Drive Phone 626.844.8888 Fax 626.844.8838 All rights
More informationNetwork Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University
Network Performance Evaluation Throughput by Troy Bennett Computer Science Department School of Engineering California Polytechnic State University 1998 Date Submitted: Advisor: TABLE OF CONTENTS Page
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationIntroduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
More informationHow to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server
How to Setup and Connect to an FTP Server Using FileZilla The ability to store data on a server and being able to access the data from anywhere in the world has allowed us to get rid of external flash
More informationModel 288B Charge Plate Graphing Software Operators Guide
Monroe Electronics, Inc. Model 288B Charge Plate Graphing Software Operators Guide P/N 0340175 288BGraph (80207) Software V2.01 100 Housel Ave PO Box 535 Lyndonville NY 14098 1-800-821-6001 585-765-2254
More informationCCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationNetwork Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
More informationLab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationEXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
More informationImplementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
More information1. Hardware Installation
4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet
More informationMonitoring Load-Balancing Services
CHAPTER 8 Load-balancing is a technology that enables network traffic to follow multiple paths to a specific destination. It distributes incoming service requests evenly among multiple servers in such
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationPRILINK PRI Management System
www.prilink.com PRILINK PRI MANAGEMENT SSTEM INSTALLATION GUIDE PRI Management PRILINK PRI Management System Installation Guide Version 3.0, Rev. 12-01-24 Page 1 Table of Contents 1 HARDWARE INSTALLATION...
More informationCCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
More informationExploring the Remote Access Configuration Utility
Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell
More informationConnecting to the Internet
Connecting to the Internet Connecting the Gateway to the Internet Configuration of TCP/IP Protocol Installing the USB Drivers Connecting Ethernet Network Devices Connecting USB Network Devices Connecting
More informationNAS 307 Link Aggregation
NAS 307 Link Aggregation Set up link aggregation on your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding of
More informationNetwork Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
More informationLab 7.1.9b Introduction to Fluke Protocol Inspector
Lab 7.1.9b Introduction to Fluke Protocol Inspector DCE SanJose1 S0/0 S0/0 SanJose2 #1 #2 Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network
More informationQuick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP
Quick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP This guide is intended to help you quickly and easily install your High Power Wireless Ethernet Converter. For more setup and configuration
More informationBusiness Model - Create and Thrustling Group Policy in Windows Vista
Bandwidth with Policy-Based Quality of Service Page 1 of 11 Managing Windows Vista and Windows Server Longhorn Network Bandwidth with Policy-Based Quality of Service Abstract Policy-based Quality of Service
More informationUltra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
More informationIPS Attack Protection Configuration Example
IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
More informationConfiguring an A Series LED Sign Controller for your Network
Configuring an A Series LED Sign Controller for your Network A Series LED displays from Optec support both serial and 10BaseT Ethernet communication. Serial communication via RS232 or RS485 is independent
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationTurbo 85 Mbps Powerline Ethernet Adapter Model # APL8512. User s Manual. Ver. 1A
Turbo 85 Mbps Powerline Ethernet Adapter Model # APL8512 User s Manual Ver. 1A Table of Contents 1. Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 2. Installing Adapters... 4 3. Installing
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Configuring NETGEAR PROSAFE 8-port, 16-port and 24-port switches Supporting Power over Ethernet with Avaya Communication Manager, Avaya one-x Quick Edition G10
More informationADSL MODEM. User Manual V1.0
ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...
More information