Wide Area Network Latencies for a DIS/HLA Exercise
|
|
- Myra Walsh
- 7 years ago
- Views:
Transcription
1 Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506 Lorimer St, Fishermens Bend MELBOURNE, VIC 3207 Keywords: Latency; Wide Area Networks; Latency; Distributed Interactive Simulation; High Level Architecture ABSTRACT: Many issues are involved in the successful conduct of an Advanced Distributed Simulation (ADS) exercise undertaken over a large geographic area. One key issue is the extent to which the geographic separation between the simulation nodes creates unacceptable latencies between transmission and reception of data. Latency problems can lead to lack of fidelity in the simulated exercise which ideally requires real time response. This paper reports experiments which estimate these transmission latencies over large geographic areas. The effect of the protocol used (eg. Distributed Interactive Simulation (DIS) or Higher Level Architecture (HLA)) on the latency is also discussed. 1. Introduction Many issues are involved in the successful conduct of Advanced Distributed Simulation (ADS) exercises that are undertaken across a large geographic area. One of the most important is the extent to which the geographic separation creates unacceptable latencies across the network. Many, if not all, ADS applications use the IEEE 1278 standards [1] for communicating data. This paper reports the use of standard network tools to estimate the latency expected over a Wide Area Network (WAN). The effect of the data packet size, and thus the ADS communication protocol used (eg. DIS or HLA), on the WAN latency is also examined. Typical latencies over Australia and world wide are reported. 2. TTCP and Project SEA 1412 As part of Australia s multinational simulation research with the United States, Canada, United Kingdom and New Zealand through The Technical Cooperation Program (TTCP) countries, DSTO s Air Operation Division is producing a document describing how to set up an ADS experiment to run over an international WAN. This document will discuss the issues involved and will include hardware, software and network configurations and costs. Some main areas of interest to be reported in this work are: Integrated Services Digital Network (ISDN) services available, equipment required, initial and recurring costs bandwidth estimates WAN latencies effect of communications protocol used ISDN channel aggregation and router compression effect of insufficient WAN bandwidth This document will be available through TTCP to any participating countries. The first customer of this work will most likely be the RAN s SEA 1412 project which (in part) is required to establish a WAN which will link various fleet bases in Perth and Sydney with shore-based simulation facilities at HMAS Watson [2]. 3. Tools for Measurement of Network Latencies Two main tools were used to measure network latency - the Ping and Traceroute utilities. The following sections describe the application of these tools. 3.1 The Ping Utility The ping utility is a system administrator's tool used to determine if a computer is operating and its network connections are intact. Ping places a timestamp in a packet which is sent through the network to a particular Internet Protocol (IP) address. The computer that sent the packet then waits (or 'listens') for a return packet. If the connections are good the target computer transmits a return packet which is used to compute how long each packet exchange took - the Round Trip Time (RTT). Two useful common ping options are: -c count - Send count packets and then stop. The other way to stop is type CNTL-C. -s packetsize - Change the size of the test packets. Large packets that are not a power of two bytes must be fragmented. The Internet ping measurements between host computers were repeated several thousand times (using the c parameter mentioned above). The minimum of these measured ping times (latency) can be assumed to approximate the ISDN latency using the maximum Internet bandwidth available with the same communications equipment latency present in the Internet connection. Ping can also be used to send packets directly to World Web (WWW) sites without the need to know their IP address. Therefore the latency of transmissions
2 to remote WWW servers in locations of interest can be studied. Such WWW servers are easily found on the Internet. 3.2 The Traceroute Utility Traceroute is a network debugging utility that attempts to trace the path a packet takes through the network. Traceroute transmits packets with small TTL (Time To Live) values. TTL is an IP header field that is designed to prevent packets from running in loops. Every router that handles a packet subtracts one from the packet's TTL. If the TTL reaches zero, the packet has expired and is discarded. Traceroute relies on the common router practice of sending a Time Exceeded message back to the sender when this occurs. By using small TTL values which quickly expire, traceroute causes routers along a packet's normal delivery path to generate these messages which identify the router. A TTL value of one should produce a message from the first router; a TTL value of two generates a message from the second; etc. Round trip times are reported for each packet. Traceroute also reports any additional messages such as destination or host unreachable. Traceroute is used to check that the communications path used by the ping utility is the shortest path to the required destination and that the destination computer is really where it is supposed to be. 4. Wide Area Network Latency The latency present in a WAN can be described as: WAN Latency = L d + L n + L p (1) where L d is the latency due to the time required for the packet to physically travel the required distance on the cable, L n is the latency incurred by the packet being processed by any communications equipment in the route travelled, and L p is the latency incurred due to the time required for the fixed size packet to pass through the finite size communications pipe available. The objective of this work is to develop a simple method to predict the required ISDN WAN latency. It is assumed that equation (1) applies to both ISDN and Internet WAN connections. The difference between these is that an ISDN WAN is a guaranteed bandwidth service whereas Internet bandwidth is not guaranteed. An Internet connection takes whatever bandwidth is available and shares the connection with any other traffic using it at the time. For an Internet connection, the required communications equipment is already in place and the L d, L n and L p parameters in equation (1) can easily be estimated and/or measured. For an ISDN connection there will be no additional (time delaying) communications equipment other than that provided at each end of the communications link provided by the user(s). This assumes that any repeaters etc. provided by the ISDN service provider(s) do not add any considerable delays. 4.1 Physical Distance Latency The physical distance latency L d can be simply estimated as: L d (seconds) = cable distance (kms) / 300,000 (2) The physical cable distance can be obtained from Telstra Australian Broadband Bearer Network maps [3]. Distances measured from Sydney, Melbourne and Adelaide to other Australian destinations are shown below in Table 1 together with the physical latency predicted by equation (1). Return distances are given since the latency will be compared to round trip times measured using the Ping utility described in Section 3. Sydney Melbourne Adelaide Sydney (6) 3000 (10) Melbourne 1850 (6) (4) Adelaide 3000 (10) 1300 (4) - Brisbane 1600 (10) 3750 (13) 4150 (14) Rockhampton 2800 (9) 4950 (17) 5350 (18) Cairns 4800 (16) 6950 (23) 7350 (18) Darwin 9000 (30) 7300 (24) 6000 (20) Perth 8250 (28) 6550 (22) 5250 (18) Table 1. Approximate round trip distances in km and latencies (L d s) in ms (in italics) from Sydney, Melbourne and Adelaide to Australia wide destinations. 4.2 Packet Size Latency The packet size or pipe latency (L p ) can be simply estimated as: L p (seconds) = packet size / pipe size (3) The packet size latency will indicate what effect the protocol (DIS or HLA) will have on the total WAN latency. Ping allows the packet size to be varied (see Section 3). Figure 1 shows the minimum ping time versus ping packet size in increments of 100 bytes between an RMIT computer in Melbourne, Australia and a University of NSW computer system in Sydney, Australia Packet Size (bytes) Figure 1. Minimum ping time versus packet size for communication between RMIT and the server with address The differences in latencies are attributed to the differences in the packet sizes. Thus the pipe size is determined from the slope of Figure 1 to be roughly 1 Mbps. This is the effective maximum bandwidth between the two computer systems and thus at least this
3 bandwidth is available at each end. The Visual Ping tool [4] which can do this measurement over Internet predicts minimum bandwidths of 965 kbps and 650 kbps, respectively, for the Sydney and Melbourne computer systems. This infers that it is most likely that both systems will have a 1 Mbps pipe size. Ryan et al. [5] predict that a bandwidth of approximately 800 kbps is required (ie. a 1 Mbps pipe) for a typical naval warfare scenario using the DIS protocol. An Entity State DIS Protocol Data Unit (PDU), the most commonly issued PDU [6], is slightly more than two kilobits long [7]. A two kilobit packet would require four ms to complete a return trip through a 1Mbps pipe. If HLA were used to reduce this packet size to one kilobit this may save on the bandwidth required (eg a 0.5 Mbps pipe) but would only reduce the WAN latency by a few ms. Further, increasing the WAN bandwidth (pipe size) would only reduce the DIS/HLA WAN latency by a few ms as most of the latency would be due to the time taken for the packet to travel along the cable and the delay caused by the communication devices within the WAN connection. 4.3 Communications Equipment Latency The communications equipment latency (L n ) is the sum of all the latencies incurred whilst passing the packet through any communications equipment (such as routers etc.) along the route travelled. The network ping utility was used to determine the round trip total latency for a predetermined size network packet. Re-arranging equation (1) gives L n = WAN Latency - L d - L p (4) where WAN Latency can be the time returned by ping, L d is determined as described in Section 4.1, and L p is determined as described in Section 4.2 The communications equipment latency incurred in an ISDN system would come from the communication devices installed at each end of the Wide Area Network connection by the user(s). This latency can be approximated by measuring ping time for a small packet to a nearby computer system with a large pipe so that L d and L p can be considered negligible. The ping time of three ms between RMIT and both Melbourne and Monash Universities can be used as an upper estimate of L n. The effective bandwidth between RMIT and these two institutions will be approximately 1 Mbps as this appears to be the maximum bandwidth from the RMIT computer and it is unlikely to be less than 1 Mbps from either Melbourne or Monash Universities (see Section 4.2). Since Melbourne University is less than one km away from RMIT and Monash less than 30 km from RMIT, L d and L p will be negligible compared to the measured interstate ping times. 5. Measurements of Latencies 5.1 Wide Area Network Latency across Australia Equation (1) can be used to predict the latency for both an ISDN and Internet WAN. The time required for the packet to physically travel on the cable (L d ) is identical for both networks and is reported in Section 4.1 for Australia wide connections. In an ISDN network the communications equipment latency (L n ) is the sum of the latencies in the only important communication devices present, those installed at each end of the WAN connection by the user(s). In Section 4.3 this is estimated to have a maximum value of three ms. In an Internet network the communications equipment latency (L n ) is the sum of the latencies from all the communications devices present along the network which have been installed by the Internet service provider. This is different in every new situation. For a typical Australian naval exercise [5] a pipe size of at least 800 kbps is required close to the 1 Mbps pipe sizes measured on some of the university WWW servers. The default (RMIT computer) ping packet size of 64 bytes (512 bits) would add approximately one ms latency for a 1 Mbps pipe size to a round trip ping measurement on both an Internet and a dedicated ISDN WAN. To determine the pipe latency (L p ) for a 64 byte packet the ping measurement was repeated for packet sizes of 64, 128, 192 and 256 bytes. Figure 2 shows the measured ping round trip times in ms for 64 byte packets between RMIT and various locations in Australia. The predicted ISDN latencies, as described above, are shown in brackets where the three numbers correspond to L d, L n and L p. The measured (minimum) ping times are always greater than the predicted ISDN latencies (for the same size 64 byte packet). This is most likely due to the communications equipment latency being always greater in an Internet WAN than in an ISDN WAN and the Internet bandwidth not being guaranteed to be optimal. A typical World Wide Web address used is also shown in Figure Predicted ISDN Latency for a DIS Exercise from Sydney Equation (1) was used to predict the ISDN latency for a DIS exercise with participation from Sydney ie. the Maritime Warfare Training Centre (MWTC) at HMAS Watson. Values for cable distance latency (L d ) from Sydney to other locations were obtained from equation (2), and the communications equipment latency (L n ) was assumed to be 3 ms (Section 4.3). For a 1 Mbps pipe a 2 kilobit packet (the size of a DIS Entity State PDU packet) would add slightly more than 4 ms for a round trip. Assuming some overhead for the 2 kilobit packet to be disassembled and reconstructed by the communications equipment at each end of the ISDN network (ie. aggregation) a value of 5 ms was used for the pipe latency (L p ). The predicted ISDN (round trip) latencies from
4 Sydney to other locations of interest in Australia are shown below in Table 2. City Latency (ms) Brisbane 18 Cairns 24 Darwin 38 Perth 36 Adelaide 18 Melbourne 14 Table 2. Predicted ISDN (round trip) latencies from Sydney to other locations in Australia in ms. These predicted round trip latencies are well below the acceptable value of 100 ms for a tightly coupled DIS exercise [8]. Therefore DIS exercises involving HMAS Watson in Sydney and other most likely places of interest in Australia should not suffer detrimental affects due to ISDN WAN latency. 5.3 World Wide Latencies The data presented in Figure 2 indicate that the ping utility can be used to obtain an upper estimate of the required ISDN latency. Figure 3 shows some measured minimum (from a trial of 2000 pings) ping values between Melbourne, Australia and some international (TTCP country) locations. In some recent international DIS experiments [9] the ISDN ping time between DSTO Melbourne and a server at Communications Research Centre (CRC) in Ottawa, Canada (address: was found to be 350 ms. This can be compared to an Internet ping time between the RMIT computer system and the CRC server of 440 ms. 6. Conclusions A simple methodology has been developed to estimate ISDN latency. The ping utility can be used to measure an upper estimate of the required ISDN latency and traceroute can be applied to check the route used. Both the measured upper estimate of, and the predicted, ISDN latencies indicate that DIS WAN experiments can be carried out between main population centres in Australia with latencies of less than 100 ms. International DIS exercises to nearby countries, such as New Zealand, may be able to be carried out with latencies less than 100 ms. However for countries further away, such as the United Kingdom and the Unites States, the latencies are likely to exceed 100 ms. Switching from DIS to HLA data packets would not significantly reduce the ISDN Wide Area Network latency for a typical exercise. The smaller size of the HLA packets will only account for a negligible reduction in latency across a WAN. 7. References 1. IEEE a-1998 (1998). IEEE Standard for Information Technology - Protocols for Distributed Interactive Simulation Applications (DIS 2.14) 2. Marshall, S. LCDR RAN, Maritime Warfare Training Centre Project Director. (March, 1998). Maritime Warfare Training Centre Project Management Issues, Industry Day, SimTecT 98, Adelaide, Australia 3. Telstra Broadband Bearer Network Australia, National IDN Region, Capacity Planning, 12/242 Exhibition Street, Melbourne, phone - (03) Visual Ping web site: 5. Ryan, P. and J. Morton. (March 1997). Network Traffic Prediction for Distributed Interactive Simulation Exercises, Proc. SimTecT 97, Canberra, Australia 6. Perry, N. and P. Ryan. (March 1998). Analysis of Logged DIS PDU Traffic Generated by the NavySAF Synthetic Force System, Proc. SimTecT 98, Adelaide, Australia 7. Doris, K. and M. Loper. (1993). DIS Network Traffic Analysis Estimation Techniques, Proc. 15 th I/ITSEC Conference, Orlando FL, US 8. The DIS Vision - A Map to the Future of Distributed Simulation, DIS Steering Committee, Version 1 - May, 1994, IST-SP Zalcman, L. et al. (March 1998). ModSAF Experiment on an International ISDN Wide Area Network, Proc. SimTecT 98, Adelaide, Australia 8. Author Biographies Dr Lucien Zalcman graduated from Melbourne University with a BSc (Hons.) in He was awarded a PhD in Physics from Melbourne University in In 1984, he joined DSTO as an Information Technology Officer. Since 1992 he has been employed as a Senior Professional Officer in Air Operations Division specialising in the field of Distributed Interactive Simulation. Dr Peter Ryan is a Senior Research Scientist with the Air Operations Division of the Defence Science & Technology Organisation. He graduated from Melbourne University with a BSc (Hons) (1975) and PhD (1981). After postdoctoral work at the University of Massachusetts, USA he joined DSTO in His research interests include the modelling and simulation of military operations with particular interest in applications of Advanced Distributed Simulation.
5 Figure 2. Measured minimum round trip Internet ping values (latencies) and predicted (L d +L n +L p ) ISDN latencies from Melbourne to some other Australian locations in ms. The address of the World Wide Web server pinged is also included. Figure 3. Measured minimum round trip Internet ping values (latencies) between Melbourne, Australia and some international (TTCP country) locations in ms. The address of the World Wide Web server pinged is also included.
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationAsynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationD. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationIntroduction, Rate and Latency
Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text
More informationOperating Systems and Networks Sample Solution 1
Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationCHAPTER 1 PRINCIPLES OF NETWORK MONITORING
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationChapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationVoIP network planning guide
VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationA Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More information(Refer Slide Time: 01:38 01:37)
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed
More informationAcceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1
Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 December 2015 Table of Contents 1 PAT... 1 1.1 Network Quality Report (Pre-test Evaluation)... 1 1.1.1 Raw MTR Data... 4 2 Executing
More informationCMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationWAN Performance Analysis A Study on the Impact of Windows 7
A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and
More informationWhite Paper. Accelerating VMware vsphere Replication with Silver Peak
Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Contents Overview...3 The Challenge of Replicating Over Distance...3 VMware vsphere Replication
More informationPART 1: USING BASIC BANDWIDTH TOOLS
Internet Bandwidth Issues -- from Internet Sources by J. Scott, Jan 2007 Page 1 of 8 This note begins by showing you some results from free Internet tools to determine you bandwidth, either at home via
More informationComponent 4: Introduction to Information and Computer Science
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationEECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationLevel 1 Technical. Networking and Technology Basics. Contents
Level 1 Technical Networking and Technology Basics Contents 1 Glossary... 2 2 IP Networking Basics... 4 Fundamentals... 4 IP Addresses... 4 Subnet Masks... 5 Network Communication... 6 Transport Protocols...
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationADVANTAGES OF AV OVER IP. EMCORE Corporation
ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationEnabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More information- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationComputer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationVideo Streaming with Network Coding
Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationNetwork Troubleshooting
Network Troubleshooting by Othmar Kyas 18 Testing Network Performance An Agilent Technologies Publication Agilent Technologies Testing 18 Network Performance It is a capital mistake to theorize before
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationVoIP 101. E911-Enhanced 911- Used for providing emergency service on cellular and internet voice calls.
If you ve been researching phone systems for awhile, you ve probably heard the term VoIP. What s the definition? Do you need certain hardware for it to work? There are a few questions that should be answered
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationWHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE
WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE As a general purpose e-mail system, IBM Lotus Notes/Domino (Domino) provides powerful e-mail authoring, transport,
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationAdditional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
More informationEncrypting Network Traffic
Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have
More informationMidterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
More informationVerifying Network Bandwidth
Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationNetwork Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
More informationLevel 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationExpertNet Lite Assessment Tool
WHITE PAPER ExpertNet Lite Assessment Tool February 2008 Table of Contents Section 1: Executive Summary... 1 1.1 ELAT Reports... 1 Section 2: Installation Planning... 1 2.1 Network Impact... 2 Section
More informationMeasuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
More informationNetwork-Wide Change Management Visibility with Route Analytics
Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application
More informationWide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationNetwork-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationInternet Control Message Protocol (ICMP)
SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by
More informationInternet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
More informationChapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationIMPLEMENTING VOICE OVER IP
51-20-78 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network
More informationExpert Reference Series of White Papers. Basics of IP Address Subnetting
Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction
More informationHigh Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More informationCalculating Bandwidth Requirements
Calculating Bandwidth Requirements Codec Bandwidths This topic describes the bandwidth that each codec uses and illustrates its impact on total bandwidth. Bandwidth Implications of Codec 22 One of the
More informationNetwork Configuration Example
Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
More informationVegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More information