1 Applications Model User Guide

Size: px
Start display at page:

Download "1 Applications Model User Guide"

Transcription

1 1 Applications Model User Guide Communications networks enable applications to exchange data. Popular applications that use data networks include virtual terminal services, file transfer utilities, database transactions, and . Each of these applications generates its own sort of traffic: virtual terminals slowly generate many small packets, while file transfer utilities send long streams of large packets. Each type of traffic causes and experiences a different set of problems in the underlying network, so you may want to accurately model the traffic patterns generated by a variety of applications. This chapter describes the implementation of each application modeled by OPNET and provides guidelines for using these applications in your network. OPNET uses a generic network application model to generate typical application traffic patterns. This is the applications model, also called the standard network application model. Most of the standard OPNET client-server node models embed the applications model to model the traffic they generate and the way they treat received traffic. Each application can be enabled or disabled on the client nodes through use of one or more profiles, and each can be specified as a supported application service type on the server nodes. The applications model provides the following client-server network applications: Table 1-1 Components of the Application Model Application FTP Remote Login Video Conferencing Database HTTP Print Voice Custom Description File transfer Sending and receiving Rlogin (telnet) Video conferencing involving image exchanges Database queries and updates Web browsing Print job submission On-Off voice model User-definable multi-tier application End of Table 1-1 Modeler/Release 10.0 STM-1-1

2 Model Scope and Limitations The applications model is a simple, general model of client and server network applications. Its behavior can be modified through parameters to make it act like a wide variety of network applications. It does not, however, model in detail the behavior of any particular application. Additional applications may be added by modifying the underlying process models and updating the related header files. Terminology Used in the Application Models This section explains terms commonly used in the applications model. Session. A session is a single conversation between a client and a server. All traffic between application clients and servers is organized into sessions. During a session, the client may alternate between periods of low traffic (lull periods) and periods of high traffic (burst periods). Request. A request is a packet sent from the client application to the server. A request receives a single response packet sent from the server to the client. Response. A response packet is sent from the server application to the client. Each request requires a certain amount of processing before the response is sent, so each application server models a single shared processor. Only one request may be processed at a time for a session, but if a server has several active sessions, each session may have a request being processed. When multiple requests are being processed, the server takes longer to respond to each request. Service Time. The service time for an incoming request is a function of the following factors: Request or response size. For certain applications (FTP get, receive, DB query, HTTP), the service time calculation uses response size. For all other applications, the calculation uses request size. Processing speed, Processing overhead, and Processing speed multiplier. These are configurable attributes for each application. Processor load. This is the number of active requests currently serviced by the server. Service time is calculated as follows. Figure 1-1 Service Time Calculation Service Time (sec) = f (Request or Response size / Processing speed + Processing overhead) * Processor load Processing speed multiplier STM-1-2 Modeler/Release 10.0

3 Application Details All applications start a session at the specified application start time (100 seconds after the start of a simulation is the default). This session remains active until the specified application stop time (end of simulation is the default). Standard Network Applications Depending on their underlying networks, application architectures may differ. For standard network applications (such as FTP, , Remote Login, Video Conferencing, Database, HTTP, Print, and Voice), a two-tiered architecture is common. Newer application implementations may have additional tiers. The applications described in this paper are implemented in a two-tier architecture, wherein: (1) the client issues a request; and (2) the server receives the request and returns a response. Typically, the request-response exchange happens within one conversation, between the client and the server. We will use the term conversation to represent a sequence of activity between a host and a server within the context of a given application. A conversation includes a pattern of data exchanges, typically defined in a statistical manner that repeats over time. Figure 1-2 Client-Server (Two-Tier) Architecture Request Client Server Response FTP An FTP application enables file transfers between a client and a server. FTP has two basic commands for transferring a file: get and put. The get command triggers the transfer of a file from a remote server. The put command sends a file to a remote server. For connection-oriented transport protocols such as TCP, a new transport connection is opened for each file transfer. TCP is the default transport protocol for this application. Modeler/Release 10.0 STM-1-3

4 Some of the important FTP attributes are described below. Table 1-2 Attribute FTP Application Model Attributes Description Command Mix (get/total) Inter-Request Time (seconds) File Size (bytes) Symbolic Server Name Type of Service RSVP Parameters Ratio of get (download) commands to the total number of commands (sum of gets and puts ). Time between subsequent file requests. Size of a file being transferred. Symbolic name of the file server to which the client connects. Quality-of-service parameter used to assign a priority to the traffic generated by this application. RSVP parameters for making bandwidth reservations. End of Table 1-2 Important Configuration Issues The rate at which files are requested is independent of the responses received, that is, the second request can leave without the first response being received. To represent a single user generating FTP application traffic, a single row of this attribute must be configured. If multiple rows are configured, each row represents an independent FTP session, i.e., one of multiple users generating FTP application traffic simultaneously on the same machine. Notes on Configuration from Measurement To obtain the total number of FTP connections opened by a user, position a protocol analyzer on a segment shared by the client. For each FTP session, there is one control connection and one data connection. To obtain the number of file transfers, divide the total number of FTP-related connections by two. The ratio of FTP gets to puts is judged from the direction of the data connections: An FTP put issued at the client results in a data connection from the client to the server An FTP get issued at the client results in a data connection from the server to the client The file transfer rate = (number of file transfers) / (length of traffic capture). The Inter-Request Time is the inverse of the file transfer rate. STM-1-4 Modeler/Release 10.0

5 The average file size = (total number of bytes) / (number of file transfers). The default transport protocol used in the application provided with the software is TCP, i.e., messages are sent and received using TCP. Modern packages use a combination of SMTP (Simple Mail Transfer Protocol) and POP (Post Office Protocol). Both SMTP and POP use TCP as the underlying transport. SMTP transfers an from the client to the mail server. If TCP is chosen for the transport protocol, then a single TCP connection is opened between the client and the server, and data is transferred based on the configured send-and-receive rate attributes. The message transfer is modeled between the client and the server, not from the client to another client. Some of the important attributes are described below. Table 1-3 Attribute Application Model Attributes Description Send Interarrival Time (seconds) Send Group Size Receive Interarrival Time (seconds) Receive Group Size Symbolic Server Name Size (bytes) Type of service RSVP Parameters Time between s sent from the client to the server. Number of messages grouped before transmission. Time between s received from the server at the client. Number of messages grouped before reception. Symbolic name of the server to which the client connects. Average size of an message. Quality-of-service parameter for assigning priority to this application's traffic. RSVP parameters for making bandwidth reservations. End of Table 1-3 Important Configuration Issues The send rate is independent of the receive rate. If TCP is used as the transport protocol, there is only one TCP connection open from the client to the server, i.e., for each row in the attribute table. Messages are sent and received through this single TCP connection. Notes on Configuration from Measurement A protocol analyzer can be used to determine the protocols supporting . Modeler/Release 10.0 STM-1-5

6 To obtain the send interarrival time and the receive interarrival time, place a protocol analyzer on a segment shared by the client, configure the analyzer's filters to capture traffic exclusively, and monitor the exchange between the client and the server. The total bytes transferred from the server to the client (and vice-versa) are obtained. The average size = (total number of bytes)/(number of s exchanged). Note The number of messages exchanged can be obtained by requesting the user to quantify s sent/received when determining the send and receive rates. Remote Login A Remote Login application models a remote login scenario. Users login to different machines, interact with the operating systems of the remote hosts. The commands they enter and the feedback they receive generate traffic on the network. TCP is the default transport protocol. Some of the important Remote Login attributes are described below. Table 1-4 Attribute Remote Login Application Model Attributes Description Inter-Command Time (seconds) Terminal Traffic (bytes/command) Host Traffic (bytes/command) Symbolic Server Name Type of Service RSVP Parameters Time between commands issued within a remote login session. Average amount of data transferred per command. Average amount of data returned in response to a command. Symbolic name of the server to be contacted. Quality-of-service parameter for assigning priority to this application's traffic. RSVP parameters for making bandwidth reservations. End of Table 1-4 Important Configuration Issues Traffic within each login session (modeled as an independent TCP connection) is represented by the host traffic and terminal traffic attributes. Host traffic is defined as the traffic being received at the client. Terminal traffic is defined as the traffic being sent by the client. STM-1-6 Modeler/Release 10.0

7 Video Conferencing A video conferencing application lets users transfer streaming video frames across the network. UDP is the default transport protocol used for video conferencing. Some of the important video conferencing attributes are described below. Table 1-5 Attribute Video Application Model Attributes Description Frame Interarrival Time Information Incoming Stream Interarrival Time (seconds) Outgoing Stream Interarrival Time (seconds) Time between frames generated within a video conferencing session from the destination. Time between frames generated within a video conferencing session from the source. Frame Size Information Incoming Stream Frame size (bytes) Outgoing Stream Frame size (bytes) Symbolic Destination Name Type of service RSVP Parameters Average size of an incoming video frame. Average size of an outgoing video frame. Symbolic name of the destination to which the client connects. Quality-of-service parameter for assigning priority to this application's traffic. RSVP parameters for making bandwidth reservations. End of Table 1-5 Important Configuration Issues If TCP is used as the transport protocol (not the default), each conference opens up an independent TCP connection. Database A database application enables the user to store information. Database operations are divided into two categories: (1) a database entry, and (2) a database query. A database entry results in a fixed amount of data being written into the database. A database query results in the client issuing a query, and the server responding with some data. The default transport protocol for the database application is TCP. Modeler/Release 10.0 STM-1-7

8 Some of the important database attributes are described below. Table 1-6 Attribute Database Application Model Attributes Description Transaction Mix (Queries/Total Transactions) Transaction Interarrival Time (seconds) Transaction Size (bytes) Symbolic Server Name Type of Service RSVP Parameters Ratio of queries to the total number of transactions (queries + updates). Time between transactions. Average size of an entry or a response to a query. Symbolic name of the server the client contacts. Quality-of-service parameter for assigning priority to this application's traffic. RSVP parameters for making bandwidth reservations. End of Table 1-6 Important Configuration Issues Requests within a transaction run independently of responses. The second request can be initiated before the first one completes. STM-1-8 Modeler/Release 10.0

9 HTTP The HTTP application Web browsing. The user downloads a page from a remote server. The page contains text and graphic information (also referred to as inline objects ). TCP is the default transport protocol for HTTP. Each HTTP page request may result in opening multiple TCP connections for transferring the contents of the inline objects embedded in the page. Some of the important HTTP application attributes are described below. Table 1-7 Attribute HTTP Application Model Attributes Description HTTP Specification HTTP Version Max Connections Max Idle Period (seconds) Pipeline Buffer Size (requests) Page Interarrival Time (seconds) The name of the supported HTTP version. Maximum number of simultaneous TCP connections that HTTP can spawn. Maximum idle time after which a connection is torn down. The number of HTTP requests that can be buffered together in a single application message. This attribute is only used for HTTP version 1.1. Time between subsequent pages that a user browses. Page Properties Object size (bytes/object) Number of Objects (objects/page) Location Average size of an object. Number of inline objects contained in a page. The symbolic name of the server on which the object is located. Server Selection Initial Repeat Probability Pages Per Server RSVP Parameters Type of Service Probability that a user would request the next page from the same server. Number of pages accessed consecutively on the same server. RSVP parameters for making bandwidth reservations. Quality-of-service parameter for assigning priority to this application traffic. End of Table 1-7 Modeler/Release 10.0 STM-1-9

10 Notes on Configuration from Measurement The above attributes require measurement of user behavior. For example, to configure the page interarrival time, a typical user's browsing activity should be monitored. A corporate firewall may be a good source of information about average page downloads and the number of bytes transferred. There are many tools that monitor Web activity and provide summary statistics on corporate Internet usage. Typically, the number of inline objects reflects the amount of graphical elements on a page. Print A print application allows the user to initiate print jobs. TCP is the default transport protocol used for this application. Each print job creates a new TCP connection with the printer. Some important print application attributes are described below. Table 1-8 Attribute Print Application Model Attributes Description Print Interarrival Time (seconds) File Size (bytes) Symbolic Printer Name Type of Service Time between print jobs issued by the user. Average size of the file sent for printing. Symbolic name of the printer. Quality-of-service parameter for assigning priority to this application's traffic. End of Table 1-8 STM-1-10 Modeler/Release 10.0

11 Voice A voice application enables two clients to establish a virtual channel over which they can communicate using digitally encoded voice signals. UDP is the default transport protocol used for this application. The voice data arrives in spurts that are followed by a silence period. Encoding schemes can be specified for the voice-to-packet translation. Some important voice application attributes are described below. Table 1-9 Attribute Voice Application Model Attributes Description Silence Length (sec) Talk Spurt Length (sec) Symbolic Destination Name Encoder Scheme Voice Frames per Packet Type of Service RSVP Parameters Silence length for the incoming and outgoing calls along with the associated distributions. Length of a talk spurt for the incoming and outgoing calls along with the associated distributions. Symbolic destination name of the client. Encoding scheme in effect at the client. Number of voice frames that can be sent in a single packet. Quality-of-service parameter for assigning priority to this application's traffic. RSVP parameters for making bandwidth reservations. End of Table 1-9 Important Configuration Issues A voice call is established from one client to another, no server is modeled for voice conversations. The parameters for both the incoming and outgoing directions of the voice call are configured on the client. The silence length refers to the pause between talk spurts, the source client may stop talking when the destination is talking. Modeler/Release 10.0 STM-1-11

12 Custom Application The custom application is a generic model that can represent a broad class of applications. It can be used when the application of interest does not correspond to any of the standard applications. The custom application provides attributes that allow you to configure various aspects of the application in detail. A custom application can be used to represent any number of tiers, including a two-tier application. This section describes the Custom Application model and how it can be configured to represent different application architectures. Terminology in the Custom Application Model The following definitions are used within the custom application model: Application. A software product that is used to perform a task. Examples include , FTP, Database, and HTTP. Application architecture: The structure used to implement an application. For example, an FTP application may be implemented according to a client-server architecture, where the client requests a file and the server responds with the file. Task: A basic unit of user activity within the context of an application. For example: reading an message, making a calendar entry, or obtaining records from a database. The start and end of a task must be defined. If a task involves some user think time (user-activity time wherein a user considers incoming data), be sure to factor think time into the total task response time. Phase: An interval of related activity that is contained within a task, e.g., a data transfer phase and a processing phase are specific phases of a task. Step: A phase consists of many steps, e.g., obtaining a simple record from a database server involves two steps: first, sending a request to the database server, and second, receiving the corresponding response. Tier: A single software process responsible for executing some or all of the steps in a task. STM-1-12 Modeler/Release 10.0

13 Figure 1-3 Application Modeling Terminology Steps Data Transfer Phases Processing Phase Task Time Steps Client Server1 Server2 Server3 Custom Application Architecture One of the most useful and flexible client-server application models provided by the Model Library is the Custom Application. It can be programmed in detail to generate network and server loads according to specified patterns. The Custom Application has the following characteristics: More than two hosts can be involved in data transfers and processing. You can specify the sequence of hosts involved in each task. The sequence begins with a workstation, ends with a server or workstation, and uses any collection of clients or servers in between. Client-Server interaction is task-based. A task consists of many interactions between a client and a server, or between successive servers. Modeler/Release 10.0 STM-1-13

14 Figure 1-4 Phases of a Transaction Processing Phase A B C Data Transfer Phase The basic task consists of many phases. Each phase consists of either a data transfer or a processing event. Data transfer or processing event can occur at any device. This workstation-type device becomes a source node for the application. Subsequent phases are typically set up to occur in a chain, where the destination of one data transfer phase becomes the source of the next data transfer phase. However, it is possible to have more than one possible source node for an application. A data transfer phase can consist of many steps where each step represents a unit of application activity. Transfer of a request from the client to the server is one step. Transfer of a response from the server to the client is another step. Steps can be either serial or concurrent in nature: serial requires that a response is received before the next request is sent; concurrent allows a series of requests or a series of responses to be sent independently of each other. The entire task is complete only when the last phase of the task has been completed. A task need not terminate at the originating node, though this is a common case. Wherever the task completes, a Response Time statistic is measured to record the time separating the initiation of the task, (e.g., when a simulated user presses the OK button), to its completion (e.g., when the hourglass disappears). The pictures below depict common configurations where the phase may not end at the originating node. STM-1-14 Modeler/Release 10.0

15 Figure 1-5 The Last Phase of a Task Can Complete at the Originating Node A B C Figure 1-6 The Last Phase of a Task Can Complete at an Intermediate Node A B C Figure 1-7 The Last Phase of the Task Can Complete at the Last Node that Performs Processing A B C Figure 1-8 Only LAN Objects Can be in Two Distinct Phases of a Task A B C A B Same LAN Object Modeler/Release 10.0 STM-1-15

16 Configuring Tasks and Phases Custom Application makes use of global objects in its configuration. The advantage of a global object is that it provides a single place to specify information that can be shared by many objects within the network model. Furthermore, large amounts of configuration information can be copied quickly from network to network simply by copying and pasting global objects. Reusing global objects is a common technique used by many models within the Model Library. Custom Applications are configured using two global objects: the Application Definition Object and the Task Definition Object. Tasks, which function as the building blocks of the custom application, are defined in the Task Definition Object. Once the tasks have been defined, they are used to build (define) the custom application in the Application Definition Object. Once defined, the custom application can be used in the profiles that are deployed to the individual workstations or LANs using the application. This section describes the steps involved in configuring tasks. Procedure 1-1 Configuring Tasks 1 Open the Utilities object palette and drag a Task Definition Object into the project workspace. Open the Task Definition Object's attributes dialog box and select Edit from the Task Specification pull-down menu. 2 In the Task Specification Table, change the Rows value to the number of tasks you will be using. List each task in a separate row of the table. Note There are two ways to configure tasks: the first way is to manually configure the task phase by phase and the second way is to use ACE to record the task details then specify the ACE filename in the Task Specification Table. The example below shows three tasks: two, login and logout, have been manually configured while the third, File Transfer, uses imported data. We will not discuss importing traces and ACE in this section; detailed information on ACE is available in the ACE documentation. Figure 1-9 Task Specification Table 3 To configure a task using imported data, simply list the file in the ACE Filename field. STM-1-16 Modeler/Release 10.0

17 Figure 1-10 Manual Configuration Table 4 To manually configure a task, choose Edit from the Manual Configuration field pull-down menu. In the Manual Configuration Table, change the Rows value to the number of phases in the task. Manually configuring a task involves detailing the task in its Manual Configuration Table where each row of the table represents a phase. A phase can begin at the start of the application or it can begin once the previous phase has ended. Each phase is implicitly designated as a data transfer phase or a processing phase, depending on the Source and Destination attributes; data transfer phases have distinct Source and Destination nodes while processing phases do not. The Destination attribute for a processing phase is denoted as Not Applicable. Data transfer phases consist of network activity and processing. Each data transfer includes the exchange of many application data units from a source address to a destination address. An exchange involves a sequence of requests (from the source to the destination) and responses (in the other direction). Modeler/Release 10.0 STM-1-17

18 5 Enter a name for each phase in the Phase Name column of the Manual Configuration Table. Complete the table by specifying values for each attribute in the table. Brief descriptions of the attributes appear below. Table 1-10 Manual Configuration Attributes for the Custom Application Model (Part 1 of 2) Attribute Start Phase After Source Destination Source->Dest Traffic Dest->Source Traffic Description Indicates when the phase begins. A phase can begin at the start of the application or it can begin after the previous phase ends. A symbolic name that refers to the phase's source node. (Symbolic names are resolved when the custom application is used in a project.) A symbolic name that refers to the phase's destination node. A compound attribute that describes the requests sent from the source to the destination. This attribute specifies: Distributions for the size of requests, in terms of the number of packets sent and the size of each packet. Distributions for the time between successive requests at the source. This represents the time needed to generate each request. A distribution for the number of request/response pairs in the exchange. (Use the constant distribution if you want a specific number of requests and responses to occur. A single request and response is a common case; use the constant distribution with a mean of 1.0 to set up such a data transfer). For a processing phase, set the number of requests to 0. A distribution for initial processing time when the phase begins: in a data transfer phase, this is the time before the first request is sent, whereas in a processing phase, this is the total processing time. A compound attribute that describes the responses sent from the destination to the source. If this attribute is set to No Response, requests will be generated based on the Interrequest Time distribution in the Source->Dest Traffic attribute but no responses will be returned to the device sending the requests. STM-1-18 Modeler/Release 10.0

19 Table 1-10 Manual Configuration Attributes for the Custom Application Model (Part 2 of 2) Attribute REQ/RESP Pattern End Phase When Transport Connection Description This attribute specifies if each request is followed by a response - REQ->RESP - or if several requests can be sent without waiting for a response - REQ->REQ->. If each request is followed by a response, the source is blocked from sending further requests until it receives a response. This attribute specifies the activity that indicates the ending of the phase. This attribute has four possible values: when the final request leaves the source when the final request arrives at the destination when the final response leaves the destination when the final response arrives at the source A compound attribute that specifies the transport connection policy and limit used for the phase. The Policy attribute specifies how requests use connections; connections can be reused, or each request can use a new connection. The Limit attribute specifies the maximum number of connections that can be established. End of Table 1-10 End of Procedure 1-1 Figure 1-11 shows a completed Manual Configuration Table for a task with 6 phases. Note that the second and fourth phases, Transaction #2 and Transaction #4, are processing phases and have the Destination attribute set to Not Applicable. With the exception of the first phase, each phase begins after the final request from the previous phase arrives at its destination. Figure 1-11 Sample Manual Configuration Table Modeler/Release 10.0 STM-1-19

20 Configuring Applications and Profiles Once you have constructed the network topology, you are ready to model network traffic. There are several techniques for representing network traffic: the first technique is to import traffic as traffic flows and another technique is to model application traffic by setting up various application attributes. The first topic is covered in Traffic Flows on page MC-10-9 of the Modeler documentation. This section deals with the second technique and outlines the process for configuring application models. To configure a workstation or LAN to model the behavior of a user or group of users, you need to describe their behavior. A user's behavior or profile can be described by the applications he or she uses and how long and often the applications are used throughout the day. An application can be described in terms of its actions, which are referred to as tasks in OPNET. OPNET provides global objects for defining profiles and applications. The advantage of using a global object is that once you have defined the profiles and applications, you can re-use them across the entire topology. These global objects are portable entities that are defined independent of each other and of other objects. Therefore, you can copy and paste global objects from one project or scenario to another and re-use the same profiles and applications. OPNET ships with pre-defined profiles and applications that may suit the behavior you wish to describe. You may, however, wish to modify the existing definitions to suit your needs or even create new application and profile definitions. Architecture The figure below depicts the hierarchy involved in constructing an application profile: a profile consists of applications. Applications can be represented as simple traffic sources, complex protocols or a discrete set of tasks. Tasks may consist of many phases where each phase describes a pattern of data exchange between a source and destination. The first two elements of this hierarchy, profiles and applications, are described in detail in the following sections. The configuration of the other two elements, tasks and phases, applies to only one type of application, the custom application. Refer to Custom Application on page STM-1-12 for detailed information on tasks and phases. STM-1-20 Modeler/Release 10.0

21 Figure 1-12 The Application Model Hierarchy Profiles Applications Tasks Phases Profile Definition Object Application Definition Object Task Definition Object Profile Configuration Profiles describe the activity patterns of a user or group of users in terms of the applications used over a period of time. You can have several different profiles running on a given LAN or workstation. These profiles can represent different user groups - for example, you can have an Engineering profile, a Sales profile and an Administration profile to depict typical applications used for each employee group. Profiles can execute repeatedly on the same node. OPNET enables you to configure profile repetitions to run concurrently (at the same time) or serially (one after the other). Profiles contain a list of applications. You can configure the applications within a profile to execute in the following manner: at the same time one after the other in a specific order you determine one after another in a random order In most cases, when describing the actions of a single user, the actions are serial since most people can only perform one activity at a time. However, when using applications that can perform non-blocking tasks, you can have more than one task running at a time. When describing the activities of a group of users, concurrency is common. Like profile repetitions, application repetitions within the profile can execute either concurrently or serially. The diagrams below depict possible profile configurations. Modeler/Release 10.0 STM-1-21

22 Figure 1-13 Profile Configuration (Serial Mode) Figure 1-14 Profile Configuration (Simultaneous Mode) Figure 1-15 Simultaneous Applications Within a Profile The Profile Definition Object defines all profiles that can be used within a scenario. Only profiles that have been defined in the Profile Definition Object can be applied to the workstations or LANs of a project and only applications that have been defined in the Application Definition Object can be used in profile definitions. Application Configuration A profile is constructed using different application definitions; for each application definition, you can specify usage parameters such as start time, duration and repeatability. You may have two identical applications with different usage parameters; you can use different names to identify these as two distinct application definitions. For example, the engineer may browse the web frequently in the morning but occasionally in the afternoon. Hence, you can create two different application definitions for web browsing, such as web_browsing_morning and web_browsing_noon, with two different usage patterns. You can also create application definitions based on different workgroups. For example, you may have an engineering_ and a sales_ where the former may send 3 s/sec while the latter may send 10 s/sec. STM-1-22 Modeler/Release 10.0

23 The software allows you to specify a user profile consisting of many applications. There are two types of application models that are supported by the software: Standard Network Applications and a custom application. Before you can select a model, you must first thoroughly understand the software models. Instructions on selecting a particular model, configuring and using it, appear in sections 3 and 4. Selecting an Application Model Once you have an understanding of the standard network applications and the custom application (see the documents referred to above), you should be able to determine which option best describes the behavior of the application whose activity you wish to model. There may be more than one application model you can use for a distinct scenario. The compatibility of an application model will likely depend on the objective of your simulation study. In this section, five practical examples show how to choose an application model suited to particular simulation studies. Server-Based Application When a client sends an , the is stored on the server. The client polls the server on a regular basis, and receives destined to it. You can model this architecture easily by configuring the Standard Application Model, which provides a Send Interarrival Time attribute and a Receive Interarrival Time attribute Note that the interarrival time, which is the time between successive messages, is the inverse of the rate). Inter-arrival times are configurable on an individual basis for each client. Send and receive inter-arrival times are independent. This means that a client can be a frequent sender of messages but an infrequent recipient. Figure Attributes on a Client Modeler/Release 10.0 STM-1-23

24 Networked Calendar Application A networked calendaring application is used to schedule meetings and to book resources for those meetings. When a calendar entry is made, the client application contacts the server separately for each staff member or resource involved in the entered event. As each new data item is received, schedule conflicts are generated and analyzed at the server side. The server then responds to the client, indicating that it is prepared to process the next item. Once all information has been received and processed by the server, the final entry is made, and a confirmation is returned to the client. A custom application is a good choice to represent it because no standard calendaring application is provided. Another reason to choose the custom application model in this instance is that the request-responses are serial in nature, i.e., the next request is made only when the previous response is completed. Intranet Application An I.S. department has deployed an intranet application that lets employees use services such as the company directory, and marketing information. Each employee has a browser installed on her desktop. A central web server serves the intranet site. The web-browsing application is two-tier with the browser issuing requests to the web server and the server returning pages, text or images. The HTTP application model will represent the above architecture appropriately because it allows you to do the following: select the average number of pages downloaded and the average number of objects per page choose the average page size and the number of servers accessed to download various objects on the page The number of TCP connections that can be opened simultaneously by the browser can be specified. Figure 1-17 Web Browsing Attributes STM-1-24 Modeler/Release 10.0

25 Three-Tier Customer Relationship Management Application A sales department uses a proprietary GUI to create, browse, and edit customer information stored in a single database. The application is three-tier with a thin client submitting requests to an application server. The application server submits queries to the database server, organizes the returned information, and sends formatted text information back to the client for display. Of specific interest to this case study are searches performed to display a collection of records for clients responding to common criteria (e.g., all clients located in Virginia). The application is programmed as follows: 1) the client submits a completed form to the application server 2) the application server processes the form and generates one or more queries to the database server, one query at a time 3) the database server responds to each query and the application server accepts and accumulates the returned records 4) the application server organizes the records and generates content which is sent to the client, and 5) the client parses the content and displays a form with appropriate information in each field The custom application is the most applicable model for the following reasons: (1) there is no corresponding standard application; (2) there are more than two tiers; and, (3) on each of its tiers, the application consists of a series of blocking (i.e., serial) requests, followed by responses. General Data Traffic from a LAN A number of users on a LAN segment generate a variety of data traffic, i.e., they transfer documents and images to and from one or more servers. The rate and size of these documents can be measured using a protocol analyzer. A recommended approach to doing this is to use the analyzer to monitor the behavior of typical users over a sufficient period of time. Relative to capturing all of the users' traffic, this method reduces the volume of data to analyze. Since the application model is being used to represent the traffic of an entire LAN, the various documents and/or images are transferred independently. These can occur at any time, and without blocking for each other's completion. The Custom Application corresponds well to this behavior. Furthermore, the Custom Application can be scaled easily to represent many similar users, all users adhering to the same profile while acting independently. Modeler/Release 10.0 STM-1-25

26 Configuring an Application Model Setting up nodes to use applications for traffic generation is a multi-step process. Since each step depends on definitions from the previous step in the procedure, it is important that the steps are completed in the order specified on the following pages. Step 1: Define the Application The first step to using applications for generating traffic at a node is to create and configure the application definitions. As described in the section titled Architecture on page STM-1-20, the Application Definition Object is used to define and configure applications. Procedure 1-2 Defining an Application 1 Place a new Application Definition Object in your project by dragging it from the Utilities object palette into the workspace. Right click on the object and select Edit Attributes from the pop-up menu. Edit the value of the Application Definitions attribute. Figure 1-18 The Application Definition Object Attributes 2 In the Applications Definitions Table, add a new row by changing the Rows value to 1. Give the application you will create a descriptive name such as Engineer's . STM-1-26 Modeler/Release 10.0

27 Figure 1-19 Application Definitions Table 3 To describe the behavior of the application definition you just created, double-click in the Description field. For standard applications such as , you can select any of the pre-configured settings such as Low Load, Medium Load or High Load. If the pre-configured settings suit your modeling purpose, you are done with this step. However, if you want to edit any of these pre-configured settings, you should first select it and then click on the field again to edit its value. Figure 1-20 Application Definition Configuration 4 If the standard applications are not suitable and you want to customize your application, you should use the Custom Application model. This model requires that the application's tasks have been defined in a separate object, the Task Definition Object. Therefore, create a Task Definition Object using the Utilities object palette and configure the task definition. Since task definition is a detailed process, refer to Custom Application on page STM-1-12 for information on task architecture and configuration. Once you complete the task definition, you can come back to the application definition and select the list of tasks for your custom application specification. Modeler/Release 10.0 STM-1-27

28 Figure 1-21 Application Definition Configuration for a Custom Application End of Procedure 1-2 Step 2: Construct the Profiles Once the applications have been defined, the second step is to include the application definitions in profile definitions that are later deployed to workstations and LANs. This step uses the application definitions that were configured in Step 1. STM-1-28 Modeler/Release 10.0

29 Figure 1-22 Profile Definition Configuration Procedure 1-3 Constructing the Profiles 1 Add a profile Definition Object to the project workspace from the Utilities object palette. Right-click and select Edit Attributes. Edit the value of the Profile Configuration attribute. 2 Enter a Profile Name. You can use any name for the profile; typically, you may want to base the name on workgroups such as Engineer or Sales Person if your objective is to represent different user types based on divisions within your organization. However, a profile can be constructed to represent not only traffic generated by an individual, but also aggregate traffic on a LAN or even just one application. Choose a name that appropriately reflects what you are trying to model. For each profile, you can configure the applications it supports by using the start time, duration, operation mode and repeatability attributes. The operation mode refers to the order in which applications within the profile are executed. Serial (Ordered) implies that applications are executed one after another in the order specified in the table. Serial (Random) implies that the applications are executed serially but the order of execution is random. Simultaneous implies that applications are executed at the same time. Figure 1-23 Profile Configuration Table Modeler/Release 10.0 STM-1-29

30 3 Edit the value of the Applications attribute. Add as many rows to the Applications Table as the number of applications you want to support in this profile. In each row, you will have to specify the application name, its start time offset (relative to the profile start time), duration and repeatability. The application name field's pull down menu lists applications that have been defined in the Application Definition object. This object was configured in step 1. If you did not execute step 1, there will be no application definitions listed in the Name field pull-down menu. The Start Time Offset is the time between the profile's start time and the application's start time. To have the application start at the same time as the profile, set the start time offset to 0. The Duration attribute specifies the application's duration in seconds. If you set the duration to the End of Profile, the application will end at the same time that the profile ends. The Repeatability attribute specifies the number of application sessions for this application within the profile. Note If you have set the Operation Mode for the applications to Serial (Ordered) or Serial (Random) and you have multiple applications in the application table, you should not set the Duration for any application to End of Profile. This will cause only one application to execute until the end of the profile. Since the second application cannot begin until the first one completes, the second application will never be executed. Figure 1-24 Applications Table End of Procedure 1-3 Step 3: Assign the Profiles to the LAN or Workstation Once you have configured your applications and profiles, you are ready to deploy these profiles on individual workstations, servers and LANs. Typically, profiles are specified on workstations or LAN's since they are traffic sources. However, a profile may be deployed on a server if the server acts as a source for any application task. This implies that if you have configured a task table such that the server is an independent source, you should ensure that you support that profile on the server object. Please refer to Custom Application on page STM-1-12 for details on the custom application task configuration. STM-1-30 Modeler/Release 10.0

31 Procedure 1-4 Assigning the Profiles to the LAN or Workstation 1 Edit the Application: Supported Profiles attribute on the object that will execute this profile. 2 Add the desired number of rows and select the profiles you wish to support. Note that if you have not executed steps 1 and 2 as described earlier, there will be no profiles available for selection. In this case, OPNET will automatically place a default application and profile definition object and give you a list of default profiles that are available. Figure 1-25 Deploying a Profile to a Workstation End of Procedure 1-4 Step 4: Configure the Server to Support the Applications Once you setup the profiles on the workstations or LANs, you will have to configure the server to support the application of interest. Procedure 1-5 Configuring a Server to Support Applications 1 Edit the Application: Supported Services attribute on the server. 2 Add as many rows as the number of applications you want to support. Edit the Name field. This will automatically pop-up the list of applications you have configured on the global Application Definition Object. Select the application of interest and edit the Description field to indicate that the application is supported. Modeler/Release 10.0 STM-1-31

32 Figure 1-26 Configuring Servers to Support Applications End of Procedure 1-5 Step 5: Specify the Destination and Source Preferences. Each application uses a symbolic name to refer to a server. For example, if you have set the symbolic server name of the application to Corporate_ _Server. You must resolve this reference so that the symbolic name refers to an actual server object on the network. The Application: Destination Preferences attribute allows you to map a symbolic name to an actual server name. For each server, you can specify a selection weight. Additionally, you can map a symbolic name to a set of servers (more than one). In this case, the server selection is based on the selection weights specified. The server's Server Address attribute identifies the server by its actual name. The advantage of using symbolic names is that you can define an application once with a symbolic name. You can then resolve the symbolic name to different actual names on different workstations. For example, you can resolve the Corporate_ _Server described above as Server_192 for all engineers and as Server_198 for all sales people. Note If you do not set any destination preferences, the server will be selected at random from the servers that support the application of interest. STM-1-32 Modeler/Release 10.0

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Lab 3: Evaluating Application Performance across a WAN

Lab 3: Evaluating Application Performance across a WAN Lab 3: Evaluating Application Performance across a WAN Objective In this lab, we have a small LAN with 20 users for a startup company named Deltasoft Technologies. We investigate the application performance

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

Wireshark Tutorial INTRODUCTION

Wireshark Tutorial INTRODUCTION Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

Distinct. Network Monitor. User s Guide

Distinct. Network Monitor. User s Guide Distinct Network Monitor Version 4.2 User s Guide Distinct Corporation 3315 Almaden Expressway San Jose, CA 95118 USA Phone: +1 408-445-3270 Fax: +1 408-445-3274 Email: sales@distinct.com WWW: http://www.distinct.com

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

Chapter 7. Address Translation

Chapter 7. Address Translation Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210

More information

Implementing Network Address Translation and Port Redirection in epipe

Implementing Network Address Translation and Port Redirection in epipe Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4

More information

StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes

StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes User Guide Rev A StreamServe Persuasion SP4StreamServe Connect for SAP - Business Processes User Guide Rev A SAP, mysap.com,

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

SNMP Web Management. User s Manual For SNMP Web Card/Box

SNMP Web Management. User s Manual For SNMP Web Card/Box SNMP Web Management User s Manual For SNMP Web Card/Box Management Software for Off-Grid Inverter Version: 1.2 Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2 Features... 1 1.3 Overlook...

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

How To Design A Layered Network In A Computer Network

How To Design A Layered Network In A Computer Network A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control

More information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc. Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Opus Guide for IT Managers

Opus Guide for IT Managers Opus Guide for IT Managers Table of Contents Introduction...1 System Requirements...2 Configuration...3 Integration...3 Networking...3 Security...5 Interconnectivity...6 History Archival Sizing...7 Introduction

More information

FINS Gateway For OMRON PLCs

FINS Gateway For OMRON PLCs 1 Purpose This Technical Note describes how to set up a remote collaboration. A remote collaboration consists in configuring, programming or monitoring a PLC from a remote location, without the need of

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information

User Manual V1.0. Remote Software

User Manual V1.0. Remote Software User Manual V1.0 Notice: The information in this manual was current when published. The manufacturer reserves the right to revise and improve its products. All specifications are therefore subject to change

More information

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software.

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software. Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Wireshark Lab: Assignment 1w (Optional)

Wireshark Lab: Assignment 1w (Optional) Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding

More information

Installation Guide For ChoiceMail Enterprise Edition

Installation Guide For ChoiceMail Enterprise Edition Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

5.1 Features 1.877.204.6679. sales@fourwindsinteractive.com Denver CO 80202

5.1 Features 1.877.204.6679. sales@fourwindsinteractive.com Denver CO 80202 1.877.204.6679 www.fourwindsinteractive.com 3012 Huron Street sales@fourwindsinteractive.com Denver CO 80202 5.1 Features Copyright 2014 Four Winds Interactive LLC. All rights reserved. All documentation

More information

Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas

Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas Applies to: SAP NetWeaver BW. Summary This document is the second installment of a 6 part Query Designer Training guide for

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

ENSC 427- Communication Networks Spring 2015. Quality of service of the wireless networking standard over a Multi user environment.

ENSC 427- Communication Networks Spring 2015. Quality of service of the wireless networking standard over a Multi user environment. ENSC 427- Communication Networks Spring 2015 Quality of service of the wireless networking standard over a Multi user environment Group 9 Name: Saumya Sangal Email: ssangal@sfu.ca Name: Jasmine Liu Email:

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

RIP: Routing Information Protocol

RIP: Routing Information Protocol Laboratory 6 RIP: Routing Information Protocol A Routing Protocol Based on the Distance-Vector Algorithm Objective The objective of this lab is to configure and analyze the performance of the Routing Information

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

User Manual of Web Client

User Manual of Web Client User Manual of Web Client 1 Index Chapter 1 Software Installation... 3 Chapter 2 Begin to Use... 5 2.1 Login and Exit... 5 2.2 Preview Interface Instruction... 6 2.3 Preview Image... 7 Chapter 3 Playback...

More information

OCS Training Workshop LAB14. Email Setup

OCS Training Workshop LAB14. Email Setup OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Asset Track Getting Started Guide. An Introduction to Asset Track

Asset Track Getting Started Guide. An Introduction to Asset Track Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing

More information

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address NAT Introduction: Vidyo Conferencing in Firewall and NAT Deployments Vidyo Technical Note Section 1 The VidyoConferencing platform utilizes reflexive addressing to assist in setup of Vidyo calls. Reflexive

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0

TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0 TENVIS Technology Co., Ltd User Manual For H.264 Cameras Version 2.0.0 Catalogue Basic Operation... 3 Hardware Installation... 3 Search Camera... 3 Get live video... 5 Camera Settings... 8 System... 8

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Ethereal: Getting Started

Ethereal: Getting Started Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me

More information

Some Setup guidelines for Voyager Megapixel camera

Some Setup guidelines for Voyager Megapixel camera Some Setup guidelines for Voyager Megapixel camera Date : 4/27/2010 1. Overview This quick guide has detailed information on how to setup the recording mechanisms available in Voyager I. It also has information

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5 Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound

More information

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide One of the typical usage cases for NowSMS is as an E-Mail to SMS & MMS Gateway. E-Mail users can send an SMS or MMS message by sending an e-mail

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle

SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012 Load Test Results for Submit and Approval Phases of Request Life Cycle Table of Contents Executive Summary 3 Test Environment 4 Server

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

USB Recorder User Guide

USB Recorder User Guide USB Recorder User Guide Table of Contents 1. Getting Started 1-1... First Login 1-2... Creating a New User 2. Administration 2-1... General Administration 2-2... User Administration 3. Recording and Playing

More information

PRINT CONFIGURATION. 1. Printer Configuration

PRINT CONFIGURATION. 1. Printer Configuration PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

Installation Guide for Microsoft SQL Server 2008 R2 Express. October 2011 (GUIDE 1)

Installation Guide for Microsoft SQL Server 2008 R2 Express. October 2011 (GUIDE 1) Installation Guide for Microsoft SQL Server 2008 R2 Express October 2011 (GUIDE 1) Copyright 2011 Lucid Innovations Limited. All Rights Reserved This guide only covers the installation and configuration

More information

AVer EVC. Quick Installation Guide. Package Contents. 8. Mini Din 8 pin MIC Cable. 1. Main System. 9. HDMI Cable. 2. Camera. 10.

AVer EVC. Quick Installation Guide. Package Contents. 8. Mini Din 8 pin MIC Cable. 1. Main System. 9. HDMI Cable. 2. Camera. 10. AVer EVC Quick Installation Guide Package Contents 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 2013 AVer Information Inc. All Rights Reserved. 1. Main System 2. Camera 3. Microphone 4. Remote Control 5. Power

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.

More information

point to point and point to multi point calls over IP

point to point and point to multi point calls over IP Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

i -CEN S USER S Manual 2007. 08. 13.

i -CEN S USER S Manual 2007. 08. 13. i -CEN S i -CEN'S USER S Manual 2007. 08. 13. i -CEN S Table of Contents Overview of i-cen S software... 4 1 Introduction of i-cen S... 4 2 Key Features... 5 3 Key Benefits... 5 4 System Specification...

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide

IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide IBM Unica emessage Version 8 Release 6 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 403. This edition applies to

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on

More information