:22:59 Report Generated: 10/22/ :03 UTC. CPU Intel Xeon E v2 2.50GHz Connections 1 Mean Jitter 10/22/15 1

Size: px
Start display at page:

Download "2015-10-22 19:22:59 Report Generated: 10/22/2015 20:03 UTC. CPU Intel Xeon E5-2670 v2 2.50GHz Connections 1 Mean Jitter 10/22/15 1"

Transcription

1 :22:59 Report Generated: 10/22/ :03 UTC Page 1 of 10 Provider Amazon Web Services Test Protocol TCP Mean Bandwidth Service Amazon EC2 Direction Up Median Bandwidth Region us-west-2 Duration 600 secs Std Dev Instance Type Concurrency 1 Transfer Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :22:59 Mean Datagram Loss Test ID ec Ended :03:00 Median Datagram Loss TCP - Bandwidth Mb/s Mb/s Mb/s /22/15 1

2 :22:59 Report Generated: 10/22/ :03 UTC Page 2 of 10 Provider Amazon Web Services Test Protocol TCP Mean Bandwidth Service Amazon EC2 Direction Up Median Bandwidth Region us-west-2 Duration 600 secs Std Dev Instance Type Concurrency 1 Transfer Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :22:59 Mean Datagram Loss Test ID ec Ended :03:00 Median Datagram Loss TCP - Bandwidth Histogram - All s Mb/s Mb/s Mb/s /22/15 2

3 :22:59 Report Generated: 10/22/ :03 UTC Page 3 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :22:59 Mean Datagram Loss Test ID ec Ended :33:00 Median Datagram Loss TCP - Bandwidth : Mb/s Mb/s Mb/s GB 10/22/15 3

4 :22:59 Report Generated: 10/22/ :03 UTC Page 4 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :22:59 Mean Datagram Loss Test ID ec Ended :33:00 Median Datagram Loss TCP - Bandwidth Histogram : Mb/s Mb/s Mb/s GB 10/22/15 4

5 :33:00 Report Generated: 10/22/ :03 UTC Page 5 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :33:00 Mean Datagram Loss Test ID ec Ended :43:00 Median Datagram Loss TCP - Bandwidth : Mb/s Mb/s Mb/s GB 10/22/15 5

6 :33:00 Report Generated: 10/22/ :03 UTC Page 6 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :33:00 Mean Datagram Loss Test ID ec Ended :43:00 Median Datagram Loss TCP - Bandwidth Histogram : Mb/s Mb/s Mb/s GB 10/22/15 6

7 :43:00 Report Generated: 10/22/ :03 UTC Page 7 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :43:00 Mean Datagram Loss Test ID ec Ended :53:00 Median Datagram Loss TCP - Bandwidth : Mb/s Mb/s Mb/s GB 10/22/15 7

8 :43:00 Report Generated: 10/22/ :03 UTC Page 8 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :43:00 Mean Datagram Loss Test ID ec Ended :53:00 Median Datagram Loss TCP - Bandwidth Histogram : Mb/s Mb/s Mb/s GB 10/22/15 8

9 :53:00 Report Generated: 10/22/ :03 UTC Page 9 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :53:00 Mean Datagram Loss Test ID ec Ended :03:00 Median Datagram Loss TCP - Bandwidth : Mb/s Mb/s Mb/s 17.2 GB 10/22/15 9

10 :53:00 Report Generated: 10/22/ :03 UTC Page 10 of 10 Provider Amazon Web Services :80 Test Protocol TCP Mean Bandwidth Instance Type Region us-west-2 Concurrency 1 Transfer Instance Type Connections 1 Mean Jitter UDP Bandwidth Median Jitter Started :53:00 Mean Datagram Loss Test ID ec Ended :03:00 Median Datagram Loss TCP - Bandwidth Histogram : Mb/s Mb/s Mb/s 17.2 GB 10/22/15 10

Network performance in virtual infrastructures

Network performance in virtual infrastructures Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso

More information

AMAZON S3 AND EC2 PERFORMANCE REPORT

AMAZON S3 AND EC2 PERFORMANCE REPORT AMAZON S3 AND EC2 PERFORMANCE REPORT OVERVIEW A frequently asked question regarding the Amazon Web Services (AWS) cloud computing platform is how well their storage system (S3) performs with their computing

More information

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?

More information

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and 1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise

More information

Performance and Bandwidth Testing for Data Circuits

Performance and Bandwidth Testing for Data Circuits Performance and Bandwidth Testing for Data Circuits In some cases, customers report that they are experiencing slower than expected data connections. These can be caused by any number of factors, including

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар

POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар УПРАВЛЕНИЕ И ОБРАЗОВАНИЕ MANAGEMENT AND EDUCATION TOM IX (6) 2013 VOL. IX (6) 2013 POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА Селчук

More information

Wide Area Monitoring, Control, and Protection

Wide Area Monitoring, Control, and Protection Wide Area Monitoring, Control, and Protection Course Map Acronyms Wide Area Monitoring Systems (WAMS) Wide Area Monitoring Control Systems (WAMCS) Wide Area Monitoring Protection and Control Systems (WAMPACS)

More information

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015 Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis katsarakis@csd.uoc.gr Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android

More information

Network testing with iperf

Network testing with iperf Network testing with iperf Bill Farrow bill.farrow@gmail.com Why use iperf? What does it run on? TCP example UDP example Use Case: Network Server Appliance Use Case: Embedded Video Streaming Use Case:

More information

DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014

DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014 DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL

More information

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015 DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP

More information

McAfee Firewall for Linux 8.0.0

McAfee Firewall for Linux 8.0.0 Release Notes McAfee Firewall for Linux 8.0.0 Contents About this release Features Installation Known issues Find product documentation About this release This document contains important information about

More information

CalSPEED: California Mobile Broadband - An Assessment - Spring 2015

CalSPEED: California Mobile Broadband - An Assessment - Spring 2015 CalSPEED: California Mobile Broadband - An Assessment - Spring 2015 Quality vs Throughput Ken Biba 1 Managing Director and CTO Novarum, Inc. This is an analysis of the Round 7 Spring 2015 dataset for CalSPEED.

More information

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of

More information

Transport Layer Services Mul9plexing/Demul9plexing. Transport Layer Services

Transport Layer Services Mul9plexing/Demul9plexing. Transport Layer Services Computer Networks Mul9plexing/Demul9plexing Transport services and protocols provide logical communica+on between app processes running on different hosts protocols run in end systems send side: breaks

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania enache.biancaemilia@gmail.com

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Yale Software Library http://www.yale.edu/software/

Yale Software Library http://www.yale.edu/software/ e/ Yale Software Library http://www.yale.edu/software/ For assistance contact the ITS Help Desk 785-3200, 432-9000, helpdesk@yale.edu Windows XP Firewall Windows XP SP2 includes the new Windows Firewall,

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

How To Create A Virtual Private Cloud On Amazon.Com

How To Create A Virtual Private Cloud On Amazon.Com Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment

More information

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed ASPERA HIGH-SPEED TRANSFER SOFTWARE Moving the world s data at maximum speed PRESENTERS AND AGENDA PRESENTER John Heaton Aspera Director of Sales Engineering john@asperasoft.com AGENDA How Cloud is used

More information

EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)

EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

How To Write A Blog Post On Dropbox

How To Write A Blog Post On Dropbox Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015

CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 1. Goals and Overview 1. In this MP you will design a Dynamic Load Balancer architecture for a Distributed System 2. You will

More information

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a

More information

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions 1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are

More information

Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc

Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc Presenters and Agenda! PRESENTER Ying Xu Principle Engineer, Aspera R&D ying@asperasoft.com AGENDA Challenges in Moving Big Data

More information

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express

More information

Deep Dive: Maximizing EC2 & EBS Performance

Deep Dive: Maximizing EC2 & EBS Performance Deep Dive: Maximizing EC2 & EBS Performance Tom Maddox, Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved What we ll cover Amazon EBS overview Volumes Snapshots

More information

Cloud and Network facilities federation in BonFIRE David García Pérez, AtoS

Cloud and Network facilities federation in BonFIRE David García Pérez, AtoS Building service testbeds on FIRE Cloud and Network facilities federation in BonFIRE David García Pérez, AtoS FedICI 2013. Aachen, Germany, 26/08/2013 BonFIRE BonFIRE is a multi-cloud facility for testing

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

WiFiPerf User Guide 1.5

WiFiPerf User Guide 1.5 WiFiPerf User Guide 1.5 AccessAgility LLC 2012 AccessAgility LLC. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any

More information

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

Measuring Wireless Network Performance: Data Rates vs. Signal Strength EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength

More information

Considerations for a successful demo and implementation of Simplicity Video

Considerations for a successful demo and implementation of Simplicity Video CLOUD SOLUTIONS Considerations for a successful demo and implementation of Simplicity Video Client Requirements: PC Requirements Windows Software Processor RAM Video Memory Hard Drive Space Camera Audio

More information

An Overview of Amazon Silk Amazon s new cloud-powered browser

An Overview of Amazon Silk Amazon s new cloud-powered browser An Overview of Amazon Silk Amazon s new cloud-powered browser Jon Jenkins Twitter - @jonjenk jjenkin@amazon.com O Reilly Velocity EU November 8, 2011 Web Page Complexity is Steadily Increasing Amazon s

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Cloud Computing For Bioinformatics. EC2 and AMIs

Cloud Computing For Bioinformatics. EC2 and AMIs Cloud Computing For Bioinformatics EC2 and AMIs Cloud Computing Quick-starting an EC2 instance (let s get our feet wet!) Cloud Computing: EC2 instance Quick Start On EC2 console, we can click on Launch

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

Internet Management and Measurements Measurements

Internet Management and Measurements Measurements Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?

More information

Mini-Challenge 3. Data Descriptions for Week 1

Mini-Challenge 3. Data Descriptions for Week 1 Data Sources Mini-Challenge 3 Data Descriptions for Week 1 The data under investigation spans a two week period. This document describes the data available for week 1. A supplementary document describes

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage

More information

CQG/LAN Technical Specifications. January 3, 2011 Version 2011-01

CQG/LAN Technical Specifications. January 3, 2011 Version 2011-01 CQG/LAN Technical Specifications January 3, 2011 Version 2011-01 Copyright 2011 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows XP, Windows Vista,

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Infrastructure Level Objectives... 2 2.1 Availability Calculation:... 2 3 Compute Platform... 2 3.1 Availability Level... 2 3.1.1 Availability Objectives... 2 3.1.2 Unavailability...

More information

2013 Measuring Broadband America February Report

2013 Measuring Broadband America February Report 2013 Measuring Broadband America February Report A Report on Consumer Wireline Broadband Performance in the U.S. FCC s Office of Engineering and Technology and Consumer and Governmental Affairs Bureau

More information

Monitor network traffic in the Dashboard tab

Monitor network traffic in the Dashboard tab As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa makes it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network

More information

Test Methodology White Paper. Author: SamKnows Limited

Test Methodology White Paper. Author: SamKnows Limited Test Methodology White Paper Author: SamKnows Limited Contents 1 INTRODUCTION 3 2 THE ARCHITECTURE 4 2.1 Whiteboxes 4 2.2 Firmware Integration 4 2.3 Deployment 4 2.4 Operation 5 2.5 Communications 5 2.6

More information

Master s Thesis Evaluation and implementation of a network performance measurement tool for analyzing network performance under heavy workloads

Master s Thesis Evaluation and implementation of a network performance measurement tool for analyzing network performance under heavy workloads Master s Thesis Evaluation and implementation of a network performance measurement tool for analyzing network performance under heavy workloads Kuralamudhan Ramakrishnan Hamburg, 04 May 2015 Evaluation

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Denial of Service and Anomaly Detection

Denial of Service and Anomaly Detection Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and

More information

Virtual Office. Technical Requirements. Version 3.1. Revision 1.0

Virtual Office. Technical Requirements. Version 3.1. Revision 1.0 ---------------------------------------------------------------------------- ------- --------- Virtual Office Technical Requirements Version 3.1 Revision 1.0 Technical Requirements Version 3.0 Revision

More information

DG Forwarding Algorithm

DG Forwarding Algorithm DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

More information

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

DATA COMMUNICATIONS AND NETWORKING. Solved Examples Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

More information

ECCAIRS 5 Technical Course. Minimal System Requirements. Minimal System Requirements. Server Installation and Configuration

ECCAIRS 5 Technical Course. Minimal System Requirements. Minimal System Requirements. Server Installation and Configuration ECCAIRS 5 Technical Course Server Installation and Configuration Uniting Aviation On Safety Security Environment Minimal System Requirements Common (Hardware and Software) Intel or AMD, 2 GHz or higher,

More information

i.mx28 Ethernet Performance on Linux

i.mx28 Ethernet Performance on Linux Freescale Semiconductor Document Number:AN4544 Application Note Rev. 0, 6/2012 i.mx28 Ethernet Performance on Linux 1 Introduction The aim of this document is to show how to measure the ENET "Ethernet

More information

Bandwidth Management Technology White Paper

Bandwidth Management Technology White Paper Bandwidth Management Technology White Paper Keyword: Bandwidth management, segment-based bandwidth management, user-based bandwidth management, service-based bandwidth management, connection-based bandwidth

More information

Simulation of SIP-Based VoIP for Mosul University Communication Network

Simulation of SIP-Based VoIP for Mosul University Communication Network Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication

More information

TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux a.delvaux@man.poznan.pl perfsonar developer 30.09.

TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux a.delvaux@man.poznan.pl perfsonar developer 30.09. TCP Labs WACREN Network Monitoring and Measurement Workshop Antoine Delvaux a.delvaux@man.poznan.pl perfsonar developer 30.09.2015 Hands-on session We ll explore practical aspects of TCP Checking the effect

More information

Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down

Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down Rony Kay www.cpacket.com, 2012 Pervasive Visibility, Monitoring, and Drill Down cpacket delivers solutions for intelligent

More information

CLOUDSPECS PERFORMANCE REPORT LUNACLOUD, AMAZON EC2, RACKSPACE CLOUD AUTHOR: KENNY LI NOVEMBER 2012

CLOUDSPECS PERFORMANCE REPORT LUNACLOUD, AMAZON EC2, RACKSPACE CLOUD AUTHOR: KENNY LI NOVEMBER 2012 CLOUDSPECS PERFORMANCE REPORT LUNACLOUD, AMAZON EC2, RACKSPACE CLOUD AUTHOR: KENNY LI NOVEMBER 2012 EXECUTIVE SUMMARY This publication of the CloudSpecs Performance Report compares cloud servers of Amazon

More information

Cloud Performance Benchmark Series

Cloud Performance Benchmark Series Cloud Performance Benchmark Series Amazon Elastic Load Balancing (ELB) Md. Borhan Uddin Bo He Radu Sion ver. 0.5b 1. Overview Experiments were performed to benchmark the Amazon Elastic Load Balancing (ELB)

More information

EVALUATING NETWORK BUFFER SIZE REQUIREMENTS

EVALUATING NETWORK BUFFER SIZE REQUIREMENTS EVALUATING NETWORK BUFFER SIZE REQUIREMENTS for Very Large Data Transfers Michael Smitasin Lawrence Berkeley National Laboratory (LBNL) Brian Tierney Energy Sciences Network (ESnet) [ 2 ] Example Workflow

More information

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol

More information

Huawei Network Edge Security Solution

Huawei Network Edge Security Solution Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview

More information

! 10 data centers. ! 3 classes " Universities " Private enterprise " Clouds. ! Internal users " Univ/priv " Small " Local to campus. !

! 10 data centers. ! 3 classes  Universities  Private enterprise  Clouds. ! Internal users  Univ/priv  Small  Local to campus. ! The*Case*for*Understanding*Data* Center*Traffic* Better understanding! better techniques Network(Traffic(Characteris1cs(of( Data(Centers(in(the(Wild( Theophilus*Benson,*Aditya*Akella,**David*A.*Maltz*

More information

Cloud Computing with Amazon Web Services and the DevOps Methodology. www.cloudreach.com

Cloud Computing with Amazon Web Services and the DevOps Methodology. www.cloudreach.com Cloud Computing with Amazon Web Services and the DevOps Methodology Who am I? Max Manders @maxmanders Systems Developer at Cloudreach @cloudreach Director / Co-Founder of Whisky Web @whiskyweb Who are

More information

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Who am I? David Attias Installing VoIP systems for over 7 years Mikrotik user for 5 years Mikrotik certifications MTCNA, MTCRE

More information

Performance Analysis: Benchmarking Public Clouds

Performance Analysis: Benchmarking Public Clouds Performance Analysis: Benchmarking Public Clouds Performance comparison of web server and database VMs on Internap AgileCLOUD and Amazon Web Services By Cloud Spectator March 215 PERFORMANCE REPORT WEB

More information

State Health Repository Tool (SHRT) Testing Instructions

State Health Repository Tool (SHRT) Testing Instructions Step 1 - Access the SHRT State Health Repository Tool (SHRT) Testing Instructions 1. Close out any other open browsers. 2. Enter https://shrt.adp.com in the Address field of your browser and press Enter

More information

Analysis of Network Beaconing Activity for Incident Response

Analysis of Network Beaconing Activity for Incident Response Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Cisco Multiservice IP-to-IP Gateway the Cisco IOS Session Border Controller

Cisco Multiservice IP-to-IP Gateway the Cisco IOS Session Border Controller Cisco Multiservice IP-to-IP Gateway the Cisco IOS Session Border Controller Cisco Unified Communications is a comprehensive IP communications system of voice, video, data, and mobility products and applications.

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Infrastructure Service Level Objectives... 2 2.1 Availability Calculation:... 2 3 Compute Platform... 2 3.1 Availability Service Level... 2 3.1.1 Availability Objectives...

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Availability Level Objective Calculation... 2 3 Compute Platform on VDC... 2 3.1 Availability Level... 2 4 EBS Storage Platform on VDC... 3 4.1 Availability Level... 3 4.2

More information

This computer will be on independent from the computer you access it from (and also cost money as long as it s on )

This computer will be on independent from the computer you access it from (and also cost money as long as it s on ) Even though you need a computer to access your instance, you are running on a machine with different capabilities, great or small This computer will be on independent from the computer you access it from

More information

The Cost of the Cloud. Steve Saporta CTO, SwipeToSpin Mar 20, 2015

The Cost of the Cloud. Steve Saporta CTO, SwipeToSpin Mar 20, 2015 The Cost of the Cloud Steve Saporta CTO, SwipeToSpin Mar 20, 2015 The SwipeToSpin product SpinCar 360 WalkAround JPEG images HTML JavaScript CSS WA for short Creating a WA 1. Download and parse CSV file

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Copyright Notice. Disclaimer. Limitations of Liability. Content. Software Version: 2.9.1032.35. Published Date: Jul. 15 th, 2015.

Copyright Notice. Disclaimer. Limitations of Liability. Content. Software Version: 2.9.1032.35. Published Date: Jul. 15 th, 2015. Software Version: 2.9.1032.35 Published Date: Jul. 15 th, 2015 Copyright 2015 Copyright Notice This publication, including all photographs, illustrations and software, is protected under international

More information

Configuring an APOGEE System on an IT Infrastructure White Paper

Configuring an APOGEE System on an IT Infrastructure White Paper Configuring an APOGEE System on an IT Infrastructure White Paper 149-1006 Building Technologies 149-1006, Rev. DA Copyright Notice Copyright Notice Notice Document information is subject to change without

More information

Survey Evaluation Results

Survey Evaluation Results Texarkana College 2500 N Robison Road Texarkana, TX 75599 Institutional Research & Effectiveness Survey Evaluation Results Institutional Research & Effectiveness, In the attachment you will find the evaluation

More information

Recommended QoS Configuration Settings for Rosewill RNX-AC750RT Wireless Router

Recommended QoS Configuration Settings for Rosewill RNX-AC750RT Wireless Router Recommended QoS Configuration Settings for Rosewill RNX-AC750RT Wireless Router Recommended QoS Configuration RNX- AC750 RT Contents Contents Introduction....................................... 3 Supported

More information

CQG/NET Technical Specifications. September 16, 2014 Version 2014-05

CQG/NET Technical Specifications. September 16, 2014 Version 2014-05 CQG/NET Technical Specifications September 16, 2014 Version 2014-05 2014 CQG Inc. Information in this document is subject to change without notice. Windows XP, Windows Vista, Windows, ActiveX, Excel, and

More information

Cisco Digital Media System: Cisco Digital Media Player 4305G

Cisco Digital Media System: Cisco Digital Media Player 4305G Cisco Digital Media System: The Cisco Digital Media System (DMS) is a comprehensive suite of digital signage, Enterprise TV, and desktop video applications that allow companies to use digital media to

More information

Stratusphere UX Prerequisites & Preparation Overview. Stratusphere Requirements... 2. Stratusphere Hub Appliance (SHA)... 2

Stratusphere UX Prerequisites & Preparation Overview. Stratusphere Requirements... 2. Stratusphere Hub Appliance (SHA)... 2 Table of Contents Stratusphere Requirements... 2 Stratusphere Hub Appliance (SHA)... 2 Stratusphere Database Appliance (SDA)... 2 Stratusphere Network Station (SNS)... 3 Stratusphere Software Download...

More information

Comprehensive VoIP Evaluation Report

Comprehensive VoIP Evaluation Report VoIP Evaluation Report Sample Timeline Tuesday, December 14, 2004 15:13:39 GMT to Saturday, December 18, 2004 11:58:41 GMT Generated on Saturday, December 18, 2004 12:00 PM Total pages 17 1. Evaluation

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information