Wide Area Network Latencies for a DIS/HLA Exercise

Size: px
Start display at page:

Download "Wide Area Network Latencies for a DIS/HLA Exercise"

Transcription

1 Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506 Lorimer St, Fishermens Bend MELBOURNE, VIC 3207 Keywords: Latency; Wide Area Networks; Latency; Distributed Interactive Simulation; High Level Architecture ABSTRACT: Many issues are involved in the successful conduct of an Advanced Distributed Simulation (ADS) exercise undertaken over a large geographic area. One key issue is the extent to which the geographic separation between the simulation nodes creates unacceptable latencies between transmission and reception of data. Latency problems can lead to lack of fidelity in the simulated exercise which ideally requires real time response. This paper reports experiments which estimate these transmission latencies over large geographic areas. The effect of the protocol used (eg. Distributed Interactive Simulation (DIS) or Higher Level Architecture (HLA)) on the latency is also discussed. 1. Introduction Many issues are involved in the successful conduct of Advanced Distributed Simulation (ADS) exercises that are undertaken across a large geographic area. One of the most important is the extent to which the geographic separation creates unacceptable latencies across the network. Many, if not all, ADS applications use the IEEE 1278 standards [1] for communicating data. This paper reports the use of standard network tools to estimate the latency expected over a Wide Area Network (WAN). The effect of the data packet size, and thus the ADS communication protocol used (eg. DIS or HLA), on the WAN latency is also examined. Typical latencies over Australia and world wide are reported. 2. TTCP and Project SEA 1412 As part of Australia s multinational simulation research with the United States, Canada, United Kingdom and New Zealand through The Technical Cooperation Program (TTCP) countries, DSTO s Air Operation Division is producing a document describing how to set up an ADS experiment to run over an international WAN. This document will discuss the issues involved and will include hardware, software and network configurations and costs. Some main areas of interest to be reported in this work are: Integrated Services Digital Network (ISDN) services available, equipment required, initial and recurring costs bandwidth estimates WAN latencies effect of communications protocol used ISDN channel aggregation and router compression effect of insufficient WAN bandwidth This document will be available through TTCP to any participating countries. The first customer of this work will most likely be the RAN s SEA 1412 project which (in part) is required to establish a WAN which will link various fleet bases in Perth and Sydney with shore-based simulation facilities at HMAS Watson [2]. 3. Tools for Measurement of Network Latencies Two main tools were used to measure network latency - the Ping and Traceroute utilities. The following sections describe the application of these tools. 3.1 The Ping Utility The ping utility is a system administrator's tool used to determine if a computer is operating and its network connections are intact. Ping places a timestamp in a packet which is sent through the network to a particular Internet Protocol (IP) address. The computer that sent the packet then waits (or 'listens') for a return packet. If the connections are good the target computer transmits a return packet which is used to compute how long each packet exchange took - the Round Trip Time (RTT). Two useful common ping options are: -c count - Send count packets and then stop. The other way to stop is type CNTL-C. -s packetsize - Change the size of the test packets. Large packets that are not a power of two bytes must be fragmented. The Internet ping measurements between host computers were repeated several thousand times (using the c parameter mentioned above). The minimum of these measured ping times (latency) can be assumed to approximate the ISDN latency using the maximum Internet bandwidth available with the same communications equipment latency present in the Internet connection. Ping can also be used to send packets directly to World Web (WWW) sites without the need to know their IP address. Therefore the latency of transmissions

2 to remote WWW servers in locations of interest can be studied. Such WWW servers are easily found on the Internet. 3.2 The Traceroute Utility Traceroute is a network debugging utility that attempts to trace the path a packet takes through the network. Traceroute transmits packets with small TTL (Time To Live) values. TTL is an IP header field that is designed to prevent packets from running in loops. Every router that handles a packet subtracts one from the packet's TTL. If the TTL reaches zero, the packet has expired and is discarded. Traceroute relies on the common router practice of sending a Time Exceeded message back to the sender when this occurs. By using small TTL values which quickly expire, traceroute causes routers along a packet's normal delivery path to generate these messages which identify the router. A TTL value of one should produce a message from the first router; a TTL value of two generates a message from the second; etc. Round trip times are reported for each packet. Traceroute also reports any additional messages such as destination or host unreachable. Traceroute is used to check that the communications path used by the ping utility is the shortest path to the required destination and that the destination computer is really where it is supposed to be. 4. Wide Area Network Latency The latency present in a WAN can be described as: WAN Latency = L d + L n + L p (1) where L d is the latency due to the time required for the packet to physically travel the required distance on the cable, L n is the latency incurred by the packet being processed by any communications equipment in the route travelled, and L p is the latency incurred due to the time required for the fixed size packet to pass through the finite size communications pipe available. The objective of this work is to develop a simple method to predict the required ISDN WAN latency. It is assumed that equation (1) applies to both ISDN and Internet WAN connections. The difference between these is that an ISDN WAN is a guaranteed bandwidth service whereas Internet bandwidth is not guaranteed. An Internet connection takes whatever bandwidth is available and shares the connection with any other traffic using it at the time. For an Internet connection, the required communications equipment is already in place and the L d, L n and L p parameters in equation (1) can easily be estimated and/or measured. For an ISDN connection there will be no additional (time delaying) communications equipment other than that provided at each end of the communications link provided by the user(s). This assumes that any repeaters etc. provided by the ISDN service provider(s) do not add any considerable delays. 4.1 Physical Distance Latency The physical distance latency L d can be simply estimated as: L d (seconds) = cable distance (kms) / 300,000 (2) The physical cable distance can be obtained from Telstra Australian Broadband Bearer Network maps [3]. Distances measured from Sydney, Melbourne and Adelaide to other Australian destinations are shown below in Table 1 together with the physical latency predicted by equation (1). Return distances are given since the latency will be compared to round trip times measured using the Ping utility described in Section 3. Sydney Melbourne Adelaide Sydney (6) 3000 (10) Melbourne 1850 (6) (4) Adelaide 3000 (10) 1300 (4) - Brisbane 1600 (10) 3750 (13) 4150 (14) Rockhampton 2800 (9) 4950 (17) 5350 (18) Cairns 4800 (16) 6950 (23) 7350 (18) Darwin 9000 (30) 7300 (24) 6000 (20) Perth 8250 (28) 6550 (22) 5250 (18) Table 1. Approximate round trip distances in km and latencies (L d s) in ms (in italics) from Sydney, Melbourne and Adelaide to Australia wide destinations. 4.2 Packet Size Latency The packet size or pipe latency (L p ) can be simply estimated as: L p (seconds) = packet size / pipe size (3) The packet size latency will indicate what effect the protocol (DIS or HLA) will have on the total WAN latency. Ping allows the packet size to be varied (see Section 3). Figure 1 shows the minimum ping time versus ping packet size in increments of 100 bytes between an RMIT computer in Melbourne, Australia and a University of NSW computer system in Sydney, Australia Packet Size (bytes) Figure 1. Minimum ping time versus packet size for communication between RMIT and the server with address The differences in latencies are attributed to the differences in the packet sizes. Thus the pipe size is determined from the slope of Figure 1 to be roughly 1 Mbps. This is the effective maximum bandwidth between the two computer systems and thus at least this

3 bandwidth is available at each end. The Visual Ping tool [4] which can do this measurement over Internet predicts minimum bandwidths of 965 kbps and 650 kbps, respectively, for the Sydney and Melbourne computer systems. This infers that it is most likely that both systems will have a 1 Mbps pipe size. Ryan et al. [5] predict that a bandwidth of approximately 800 kbps is required (ie. a 1 Mbps pipe) for a typical naval warfare scenario using the DIS protocol. An Entity State DIS Protocol Data Unit (PDU), the most commonly issued PDU [6], is slightly more than two kilobits long [7]. A two kilobit packet would require four ms to complete a return trip through a 1Mbps pipe. If HLA were used to reduce this packet size to one kilobit this may save on the bandwidth required (eg a 0.5 Mbps pipe) but would only reduce the WAN latency by a few ms. Further, increasing the WAN bandwidth (pipe size) would only reduce the DIS/HLA WAN latency by a few ms as most of the latency would be due to the time taken for the packet to travel along the cable and the delay caused by the communication devices within the WAN connection. 4.3 Communications Equipment Latency The communications equipment latency (L n ) is the sum of all the latencies incurred whilst passing the packet through any communications equipment (such as routers etc.) along the route travelled. The network ping utility was used to determine the round trip total latency for a predetermined size network packet. Re-arranging equation (1) gives L n = WAN Latency - L d - L p (4) where WAN Latency can be the time returned by ping, L d is determined as described in Section 4.1, and L p is determined as described in Section 4.2 The communications equipment latency incurred in an ISDN system would come from the communication devices installed at each end of the Wide Area Network connection by the user(s). This latency can be approximated by measuring ping time for a small packet to a nearby computer system with a large pipe so that L d and L p can be considered negligible. The ping time of three ms between RMIT and both Melbourne and Monash Universities can be used as an upper estimate of L n. The effective bandwidth between RMIT and these two institutions will be approximately 1 Mbps as this appears to be the maximum bandwidth from the RMIT computer and it is unlikely to be less than 1 Mbps from either Melbourne or Monash Universities (see Section 4.2). Since Melbourne University is less than one km away from RMIT and Monash less than 30 km from RMIT, L d and L p will be negligible compared to the measured interstate ping times. 5. Measurements of Latencies 5.1 Wide Area Network Latency across Australia Equation (1) can be used to predict the latency for both an ISDN and Internet WAN. The time required for the packet to physically travel on the cable (L d ) is identical for both networks and is reported in Section 4.1 for Australia wide connections. In an ISDN network the communications equipment latency (L n ) is the sum of the latencies in the only important communication devices present, those installed at each end of the WAN connection by the user(s). In Section 4.3 this is estimated to have a maximum value of three ms. In an Internet network the communications equipment latency (L n ) is the sum of the latencies from all the communications devices present along the network which have been installed by the Internet service provider. This is different in every new situation. For a typical Australian naval exercise [5] a pipe size of at least 800 kbps is required close to the 1 Mbps pipe sizes measured on some of the university WWW servers. The default (RMIT computer) ping packet size of 64 bytes (512 bits) would add approximately one ms latency for a 1 Mbps pipe size to a round trip ping measurement on both an Internet and a dedicated ISDN WAN. To determine the pipe latency (L p ) for a 64 byte packet the ping measurement was repeated for packet sizes of 64, 128, 192 and 256 bytes. Figure 2 shows the measured ping round trip times in ms for 64 byte packets between RMIT and various locations in Australia. The predicted ISDN latencies, as described above, are shown in brackets where the three numbers correspond to L d, L n and L p. The measured (minimum) ping times are always greater than the predicted ISDN latencies (for the same size 64 byte packet). This is most likely due to the communications equipment latency being always greater in an Internet WAN than in an ISDN WAN and the Internet bandwidth not being guaranteed to be optimal. A typical World Wide Web address used is also shown in Figure Predicted ISDN Latency for a DIS Exercise from Sydney Equation (1) was used to predict the ISDN latency for a DIS exercise with participation from Sydney ie. the Maritime Warfare Training Centre (MWTC) at HMAS Watson. Values for cable distance latency (L d ) from Sydney to other locations were obtained from equation (2), and the communications equipment latency (L n ) was assumed to be 3 ms (Section 4.3). For a 1 Mbps pipe a 2 kilobit packet (the size of a DIS Entity State PDU packet) would add slightly more than 4 ms for a round trip. Assuming some overhead for the 2 kilobit packet to be disassembled and reconstructed by the communications equipment at each end of the ISDN network (ie. aggregation) a value of 5 ms was used for the pipe latency (L p ). The predicted ISDN (round trip) latencies from

4 Sydney to other locations of interest in Australia are shown below in Table 2. City Latency (ms) Brisbane 18 Cairns 24 Darwin 38 Perth 36 Adelaide 18 Melbourne 14 Table 2. Predicted ISDN (round trip) latencies from Sydney to other locations in Australia in ms. These predicted round trip latencies are well below the acceptable value of 100 ms for a tightly coupled DIS exercise [8]. Therefore DIS exercises involving HMAS Watson in Sydney and other most likely places of interest in Australia should not suffer detrimental affects due to ISDN WAN latency. 5.3 World Wide Latencies The data presented in Figure 2 indicate that the ping utility can be used to obtain an upper estimate of the required ISDN latency. Figure 3 shows some measured minimum (from a trial of 2000 pings) ping values between Melbourne, Australia and some international (TTCP country) locations. In some recent international DIS experiments [9] the ISDN ping time between DSTO Melbourne and a server at Communications Research Centre (CRC) in Ottawa, Canada (address: was found to be 350 ms. This can be compared to an Internet ping time between the RMIT computer system and the CRC server of 440 ms. 6. Conclusions A simple methodology has been developed to estimate ISDN latency. The ping utility can be used to measure an upper estimate of the required ISDN latency and traceroute can be applied to check the route used. Both the measured upper estimate of, and the predicted, ISDN latencies indicate that DIS WAN experiments can be carried out between main population centres in Australia with latencies of less than 100 ms. International DIS exercises to nearby countries, such as New Zealand, may be able to be carried out with latencies less than 100 ms. However for countries further away, such as the United Kingdom and the Unites States, the latencies are likely to exceed 100 ms. Switching from DIS to HLA data packets would not significantly reduce the ISDN Wide Area Network latency for a typical exercise. The smaller size of the HLA packets will only account for a negligible reduction in latency across a WAN. 7. References 1. IEEE a-1998 (1998). IEEE Standard for Information Technology - Protocols for Distributed Interactive Simulation Applications (DIS 2.14) 2. Marshall, S. LCDR RAN, Maritime Warfare Training Centre Project Director. (March, 1998). Maritime Warfare Training Centre Project Management Issues, Industry Day, SimTecT 98, Adelaide, Australia 3. Telstra Broadband Bearer Network Australia, National IDN Region, Capacity Planning, 12/242 Exhibition Street, Melbourne, phone - (03) Visual Ping web site: 5. Ryan, P. and J. Morton. (March 1997). Network Traffic Prediction for Distributed Interactive Simulation Exercises, Proc. SimTecT 97, Canberra, Australia 6. Perry, N. and P. Ryan. (March 1998). Analysis of Logged DIS PDU Traffic Generated by the NavySAF Synthetic Force System, Proc. SimTecT 98, Adelaide, Australia 7. Doris, K. and M. Loper. (1993). DIS Network Traffic Analysis Estimation Techniques, Proc. 15 th I/ITSEC Conference, Orlando FL, US 8. The DIS Vision - A Map to the Future of Distributed Simulation, DIS Steering Committee, Version 1 - May, 1994, IST-SP Zalcman, L. et al. (March 1998). ModSAF Experiment on an International ISDN Wide Area Network, Proc. SimTecT 98, Adelaide, Australia 8. Author Biographies Dr Lucien Zalcman graduated from Melbourne University with a BSc (Hons.) in He was awarded a PhD in Physics from Melbourne University in In 1984, he joined DSTO as an Information Technology Officer. Since 1992 he has been employed as a Senior Professional Officer in Air Operations Division specialising in the field of Distributed Interactive Simulation. Dr Peter Ryan is a Senior Research Scientist with the Air Operations Division of the Defence Science & Technology Organisation. He graduated from Melbourne University with a BSc (Hons) (1975) and PhD (1981). After postdoctoral work at the University of Massachusetts, USA he joined DSTO in His research interests include the modelling and simulation of military operations with particular interest in applications of Advanced Distributed Simulation.

5 Figure 2. Measured minimum round trip Internet ping values (latencies) and predicted (L d +L n +L p ) ISDN latencies from Melbourne to some other Australian locations in ms. The address of the World Wide Web server pinged is also included. Figure 3. Measured minimum round trip Internet ping values (latencies) between Melbourne, Australia and some international (TTCP country) locations in ms. The address of the World Wide Web server pinged is also included.

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Introduction, Rate and Latency

Introduction, Rate and Latency Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text

More information

Operating Systems and Networks Sample Solution 1

Operating Systems and Networks Sample Solution 1 Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

(Refer Slide Time: 01:38 01:37)

(Refer Slide Time: 01:38 01:37) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed

More information

Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1

Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 December 2015 Table of Contents 1 PAT... 1 1.1 Network Quality Report (Pre-test Evaluation)... 1 1.1.1 Raw MTR Data... 4 2 Executing

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

WAN Performance Analysis A Study on the Impact of Windows 7

WAN Performance Analysis A Study on the Impact of Windows 7 A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and

More information

White Paper. Accelerating VMware vsphere Replication with Silver Peak

White Paper. Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Contents Overview...3 The Challenge of Replicating Over Distance...3 VMware vsphere Replication

More information

PART 1: USING BASIC BANDWIDTH TOOLS

PART 1: USING BASIC BANDWIDTH TOOLS Internet Bandwidth Issues -- from Internet Sources by J. Scott, Jan 2007 Page 1 of 8 This note begins by showing you some results from free Internet tools to determine you bandwidth, either at home via

More information

Component 4: Introduction to Information and Computer Science

Component 4: Introduction to Information and Computer Science Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Level 1 Technical. Networking and Technology Basics. Contents

Level 1 Technical. Networking and Technology Basics. Contents Level 1 Technical Networking and Technology Basics Contents 1 Glossary... 2 2 IP Networking Basics... 4 Fundamentals... 4 IP Addresses... 4 Subnet Masks... 5 Network Communication... 6 Transport Protocols...

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

ADVANTAGES OF AV OVER IP. EMCORE Corporation

ADVANTAGES OF AV OVER IP. EMCORE Corporation ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Network Troubleshooting

Network Troubleshooting Network Troubleshooting by Othmar Kyas 18 Testing Network Performance An Agilent Technologies Publication Agilent Technologies Testing 18 Network Performance It is a capital mistake to theorize before

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

VoIP 101. E911-Enhanced 911- Used for providing emergency service on cellular and internet voice calls.

VoIP 101. E911-Enhanced 911- Used for providing emergency service on cellular and internet voice calls. If you ve been researching phone systems for awhile, you ve probably heard the term VoIP. What s the definition? Do you need certain hardware for it to work? There are a few questions that should be answered

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE

WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE As a general purpose e-mail system, IBM Lotus Notes/Domino (Domino) provides powerful e-mail authoring, transport,

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

Encrypting Network Traffic

Encrypting Network Traffic Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Verifying Network Bandwidth

Verifying Network Bandwidth Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

ExpertNet Lite Assessment Tool

ExpertNet Lite Assessment Tool WHITE PAPER ExpertNet Lite Assessment Tool February 2008 Table of Contents Section 1: Executive Summary... 1 1.1 ELAT Reports... 1 Section 2: Installation Planning... 1 2.1 Network Impact... 2 Section

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Network-Wide Change Management Visibility with Route Analytics

Network-Wide Change Management Visibility with Route Analytics Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

Network-Wide Capacity Planning with Route Analytics

Network-Wide Capacity Planning with Route Analytics with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

IMPLEMENTING VOICE OVER IP

IMPLEMENTING VOICE OVER IP 51-20-78 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network

More information

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers. Basics of IP Address Subnetting Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

More information

High Speed Internet Access Using Satellite-Based DVB Networks

High Speed Internet Access Using Satellite-Based DVB Networks High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Calculating Bandwidth Requirements

Calculating Bandwidth Requirements Calculating Bandwidth Requirements Codec Bandwidths This topic describes the bandwidth that each codec uses and illustrates its impact on total bandwidth. Bandwidth Implications of Codec 22 One of the

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

VegaStream Information Note Considerations for a VoIP installation

VegaStream Information Note Considerations for a VoIP installation VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information