BACKBONE INTERNET TRAFFIC INTENSITIES AND STATISTICS IN SUDAN

Size: px
Start display at page:

Download "BACKBONE INTERNET TRAFFIC INTENSITIES AND STATISTICS IN SUDAN"

Transcription

1 BACKBONE INTERNET TRAFFIC INTENSITIES AND STATISTICS IN SUDAN Hiba M. Osman Sudan Telecom Co. Ltd. P. O. Box Khartoum, Khartoum, Sudan Fax: Sami M. Sharif Department of Electrical and Electronic Engineering Faculty of Engineering and Architecture, University of Khartoum P. O. Box 321 Khartoum, Khartoum, Sudan Huda M. A. ElHag Department of Computer Science Faculty of Mathematical Sciences, University of Khartoum P. O. Box 321 Khartoum, Khartoum, Sudan 1 abstract To properly model the Internet a through understanding of the characteristics of network traffic is needed. These characteristics can be obtained by measurement and analysis of actual network traffic. Internet traffic is known to exhibit self-similarity and long-range dependence in both local area networks and wide area networks. This paper presents backbone Internet traffic intensities and statistics in the Sudan in the period from 17th April 2002 to 30th September The traffic measurements were carried out using MRTG (Multi Router Traffic Grapher) software at an Internet core router. Keywords : Internet traffic analysis, Internet traffic statistics, Internet traffic distribution, self-similarity, long-range dependence,. 2 Introduction To properly model the Internet a through understanding of the characteristics of network traffic is needed. These characteristics can be obtained by measurement and analysis of actual network traffic. A lot of work has been done in the measurement and analysis of network traffic. These studies encompass both local area networks and wide area networks. For both local area networks [1][2] and wide area network [3][4], it is shown that network traffic is self-similar and long-range dependant in nature [5][6]. This paper presents backbone Internet traffic intensities and statistics in the Sudan in the period from 17th April 2002 to 30th September The traffic measurements for the international links were carried out using MRTG (Multi Router Traffic Grapher) [7] software at the Table 1. Link Specifications (Reference [8]) Link Name Link Capacity Link Type I1 2Mbps Full Duplex I2 2Mbps Full Duplex I3 2Mbps Full Duplex I4 6Mbps CBR/ 12Mbps BBR Simplex Downlink Internet core router. Satellites provide international connectivity through an Earth Station, to four international to Internet service providers. Local Internet connectivity is provided through a Frame Relay network. Two types of Internet connectivity are provided, committed information rate and burstable rate. 3 Measurement Setup and Data Collection The measurement setup was made up of satellites at an earth station and a small dish using DVB/IP technology at Khartoum Center, this was used to provide connectivity through four links to International ISPs Table 1 shows the Internet links names and specifications. All of the links terminate in the Internet core router, I1, I2 and I3 are connected using serial ports while I4 is via Ethernet. Internet service is provided to organizations and local service providers through the Frame Relay network, Figure 1 shows the top-level measurement connections. There are two types of Internet connectivity, committed information rate and burstable rate [8]. Data was collected at the Internet gateway router from the international ports (I1, I2, I3 and I4) during the 1

2 Table 2. Peak Hour Intensity and Utilization for International Links Link Peak Hour Intensity Utilization Name (byte) (%) I1 3 pm I2 3 pm I3 1 pm I4 2 pm Figure 1. Measurement Connectivity Table 3. International Links Load Distributions Link Name Received Traffic Transmitted Traffic Load Percentage (%) Load Percentage (%) I I I I Total Figure 2. Daily Traffic Variations for International Internet links, for the period April 2002 to September 2002 period from to [8]. The trace consisted of the following data: link name, link type (upload / download), international service provider, protocol used, bandwidth, upload and download bytes/second, queuing delay and utilization for a Frame Relay switch for one day. 4 Backbone Traffic Analysis This section describes the traffic patterns per day, week and month for the international Internet links. Daily Traffic Pattern As shown in Figure 2 the input traffic intensity starts to grow from 8 am and reaches its peak between 12 noon and 2 pm then decreases sharply from 4 pm to 7 pm and has another peak between 10 pm to 1 am. The peak at night is mostly generated by the traffic from internal ISPs. The traffic generated by the local ISP s consists of about 42.9%. The ISPs serve home users who always access the Internet at night. The increased Internet access at night is due to the cheaper telephone and Internet service. Business users generate the evening peak, the drop between 4 to 7 pm is the end of business day. The output traffic follows the same behavior as the input. Table 2 shows the peak hour for each link, the table also shows values of intensity and utilization. The four links maintain the same daily traffic variations for input and output traffic, with slight difference in the values of incoming traffic. From the statistics gathered it is observed that the received and transmitted traffic are shared between the four links as shown in Table 3.From 3 it is clear that the load balancing technique used to balance the output traffic is efficient with exact load sharing. For the incoming traffic the I2 and I3 links carry the same load which indicates that the metrics of BGP protocol used to control the traffic give good results. For the case of I1 the load is less than I2 and I3 because no routing policy is used to share the traffic load of this link it just depends on aspath length metric. Link I4 is static, no dynamic routing protocol is used and customer traffic is not shared with the other links, the 20% indicates that theirtraffic is less than the other customers. As shown in Figure 3 below both the input and output traffic have lowest values on Friday and peak values on Wednesday. The difference between the traffic on Fridays and Wednesdays is always less than 10%, therefore the weekly traffic variations are not significant, because most of the users are home users and their access on Friday same as on the other week days. Figure 4 show the monthly growth of the Internet traffic. The data shows the average traffic utilization per month for the period from April to September There was no observable change in the incoming traffic while the outgoing traffic doubled. That is because during this period most of the ISPs began to have their own download links and relied on Sudatel backbone for the upload only. The traffic mean and standard deviation for the links I1, I2 and I3 are calculated for the period between 15 August 2002 and 30 September Table 5 below, shows the mean and standard deviation for input and output utilization. All the links have comparable mean and standard deviation for the outgoing traffic. For the incoming I2 and I3

3 Figure 3. Weekly traffic variations for international Internet links, for the period April 2002 to September 2002 Figure 5. Distribution of Incoming Traffic compared to Poisson distributions have similar statistics, but the incoming traffic for link I1 is less than 50% that of link I2 and link I3, this means that the number of accessed web sites that have the shortest path through I1 are less than those through I2 and I3.The technique used to distribute upload traffic between the three links worked fine, and gave 1:1 load balancing. Traffic Distribution Figure 4. Monthly traffic variations for international Internet links, for the period April 2002 to September 2002 To find the statistical distribution of the received traffic, the probability of each traffic utilization value is calculated, the probability is taken from the 5 minute averaged utilization readings for the period of 15 August 2002 to 30 September Figure 5 shows the observed distribution for each link compared with the corresponding Poisson distribution. The Poisson distribution for each graph is calculated from the utilization values in Table 4. As shown in Figure 5 the arrival model for all of the links does not follow Poisson arrival model, hence the queuing strategies that apply to a Poisson arrival model may not be suitable with this kind of traffic. 5 Self-Similarity Table 4. Mean and standard deviation for upload and download Utilization Link Statistic Input Output Name Utilization Utilization (%) (%) I1 Mean Std. Deviation I2 Mean Std. Deviation I3 Mean Std. Deviation A phenomenon that is self-similar looks the same or behaves the same when viewed at different degrees of magnification or different scales on a dimension. This dimension can be space or time [9]. Figure 6 compares traffic that is non self-similar (left) and traffic that is self-similar (right). For the non self-similar traffic it is observed that as the time scales get longer the traffic smoothes out, but for the self-similar traffic the traffic tends to look the same for short time scales and long time scales. The data used to check for self similarity was taken from one of the aggregate Frame Relay links. The measurement set consisted of an 8 hour period, with a resolution of 12 seconds. Figure 7 shows the traffic variations on different time scales. On the X-axis each time unit = 12

4 Figure 6. Comparison between self-similar and non-selfsimilar stochastic processes seconds, the traffic in Figure 7 maintains the same behavior when viewed at different scales of aggregation. Figure 8 shows plots of the number of packets per unit time for a measurement set from 24 December 2002, which consists of over 7 hours of continuous monitoring of the Internet traffic, on the plot each subsequent plot is obtained from the previous one by increasing the time resolution by a factor of 2 and displaying a chosen sub interval. The first line covers a period of 7 hours, the second is 3.5 hours and so on.all the plots look similar to one another, all the plots involve a fair amount of burstiness thus Internet traffic tends to look the same at large scales and at small scales. The variance time plot was calculated for the same data using the same aggregation levels as on Figure 8, the resultant variance-time plot is shown in Figure 9. The values of log variance against log 10 (m) are used to estimate the straight-line equation in order to find the slope; we obtained the following equation log 10 (normalized var) = log 10 (m), from the above equation the slope of the line that represent log 10 (var) and log 10 (m) is 1, this gives β = 1 and H = 1. This indicates that the traffic is self similar with H = 1. Figure 7. Traffic at different time scales 6 Utilization and queuing delay Figure 10 shows delays versus utilization plot for a measurement set from 17 October 2002 which consisted of over 8 hours of continuous monitoring of University of Khartoum Internet Frame Relay link.the y-axis shows the normalized queuing delay averaged over 14 second polling intervals and divided by the maximum allowable delay value of the switch, the x-axis shows the percentage utilization of the link. The dark line shows the general trend of the plot. It is observed that the delay increases sharply for utilization values above 55%. Figure 11 shows delay versus utilization for an aggregate Internet link with low load. Figure 8. Plots of the number of packets per unit time for a measurement set from 24 December 2002

5 7 Conclusion Figure 9. Variance-time This paper gives the backbone internet intensities and statistics. The traffic examined came from Internet gateway router; using this data it was shown that Internet traffic is self-similar in nature. The data measured was at relatively coarse time scales, in future work measurements should be taken at finer time scales. The ratio of the accessed web sites that have the shortest path through I2 and I3 to those have the shortest path through I1 is 4:1.The peak utilization is at 2 pm, during week days and the traffic shows no variation except for a slight drop on Fridays. On a monthly basis the upload traffic doubled in four months but there was no increase in the download traffic. The packet delay in the Frame Relay switches was found to increase sharply when the utilization exceeded 55%, this should be taken into account for the links that carry delay sensitive applications. In the future it is predicted that demand for Internet applications such as video conferencing, distance learning, remote banking and e-commerce will come into being in Sudan, some of these services are Quality of Service sensitive applications. The performance effects of traffic self-similarity have to be taken into effect when designing networks that carry such applications. The data used in this research was gathered in a few months, the results obtained may need to be recalculated for long term measurements. For further research large storage devices, statistical analysis tools and packet sniffers to gather traffic data from the routers and switches should be used. References Figure 10. Delay-Utilization [1] Leland W. E., Willinger W., Taqqu M. S. and Willson D.V., On The Self Similar Nature Of Ethernet Traffic, Proceedings of the ACM SIGCOMM 93, September [2] Leland W. E., Willinger W., Taqqu M. S. and Willson D.V., On The Self Similar Nature Of Ethernet Traffic (Extended Version), IEEE / ACM Transactions on Networking, Vol. 2, 1994, pp [3] Crovella M. E., and Bestavros A., Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, Proceedings of the 1996 ACM SIGMET- RICS International Conference on Measurement and Modeling of Computer Systems, May [4] Paxson V. and Floyd S., Wide-Area Traffic: The Failure of Poisson Modeling, IEEE / ACM Transactions on Networking, Vol. 3, 1995, pp Figure 11. Delay-Utilization [5] Crovella M. E., Taqqu M. S. and Bestavros A., Heavy- Tailed Probability Distributions In The World Wide Web, in A Practical Guide To Heavy Tails: Statistical Techniques And Applications, R. Adler, R. Feldman and M. S. Taqqu, editors, Boston: Birkhauser,, [6] Willinger W., Paxson V., Reidi R. and Taqqu M. S., Long-Range Dependence and Data Network Traffic,

6 in Theory And Applications of Long-Range Dependence, P. Doukan, G. Oppenheim and M. S. Taqqu editors, Boston: Birkhauser, [7] MRTG (multi router traffic grapher), oetiker/webtools/mrtg/ [8] H. M. Osman, Internet backbone network traffic in Sudan, masters thesis, Khartoum University, Khartoum, Sudan, [9] W. Stallings, High-speed networks TCP/IP and ATM design principles (Prentice Hall, 1998).

Examining Self-Similarity Network Traffic intervals

Examining Self-Similarity Network Traffic intervals Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have

More information

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

Observingtheeffectof TCP congestion controlon networktraffic

Observingtheeffectof TCP congestion controlon networktraffic Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu

More information

Measurement and Modelling of Internet Traffic at Access Networks

Measurement and Modelling of Internet Traffic at Access Networks Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,

More information

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,

More information

RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT

RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT Sergejs Ilnickis Keywords: network traffic, self-similar traffic, traffic analysis. Abstract - Last scientific publication shows that

More information

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Seung-Hwa Chung 1, Deepali Agrawal 1, Myung-Sup Kim 1, James W. Hong 1, and Kihong Park 2 1 DPNM Lab., Dept. of Computer

More information

Table of Contents. Cisco How Does Load Balancing Work?

Table of Contents. Cisco How Does Load Balancing Work? Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and

More information

Network Performance Measurement and Analysis

Network Performance Measurement and Analysis Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: R.R.Marie@lboro.ac.uk Helmut E. Bez Department of Computer

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

The Dependence of Internet User Traffic Characteristics on Access Speed

The Dependence of Internet User Traffic Characteristics on Access Speed University of Würzburg Institute of Computer Science Research Report Series The Dependence of Internet User Traffic Characteristics on Access Speed Norbert Vicari*, Stefan Köhler* and Joachim Charzinski

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Connection-level Analysis and Modeling of Network Traffic

Connection-level Analysis and Modeling of Network Traffic ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling

More information

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. Title Maximizing the number of users in an interactive video-ondemand system Author(s) Bakiras, S; Li, VOK Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. 281-292 Issued Date 2002 URL

More information

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions 1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Application Layer Traffic Analysis of a Peer-to-Peer System

Application Layer Traffic Analysis of a Peer-to-Peer System Application Layer Traffic Analysis of a Peer-to-Peer System Dietmar Tutsch Technical University Berlin Institute of Computer Engineering and Microelectronics Berlin, Germany DietmarT@cs.tu-berlin.de Gilbert

More information

Examining the Impact of the Earthquake on Traffic on a Macro Level

Examining the Impact of the Earthquake on Traffic on a Macro Level 3. Broadband Traffic Report Examining the Impact of the Earthquake on Traffic on a Macro Level The Great East Japan Earthquake in March 2 also caused extensive damage to communications infrastructure.

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Competitive Analysis of QoS Networks

Competitive Analysis of QoS Networks Competitive Analysis of QoS Networks What is QoS? The art of performance analysis What is competitive analysis? Example: Scheduling with deadlines Example: Smoothing real-time streams Example: Overflow

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

Metrics One Way. Two way. Availability Other metrics (R, BW,..?) latency packet loss Jitter delay variation. extensions of one-way metrics

Metrics One Way. Two way. Availability Other metrics (R, BW,..?) latency packet loss Jitter delay variation. extensions of one-way metrics Metrics One Way Two way latency packet loss Jitter delay variation extensions of one-way metrics Availability Other metrics (R, BW,..?) 10/3/2005 MIT IQD Meeting - Oct 4-5,2005 1 Jitter Delay variation

More information

Design and Implementation of One-way IP Performance Measurement Tool

Design and Implementation of One-way IP Performance Measurement Tool Design and Implementation of One-way IP Performance Measurement Tool Jaehoon Jeong 1, Seungyun Lee 1, Yongjin Kim 1, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu,

More information

Vega VoIP Traffic Analysis and Selfsimilarity

Vega VoIP Traffic Analysis and Selfsimilarity A Traffic Analysis per Application in a real IP/MPLS Service Provider Network Paulo H. P. de Carvalho 1, Priscila Solís Barreto 1,2, Bruno G. Queiroz 1, Breno N. Carneiro 1, Marcio A. de Deus 1 1 Electrical

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

CONTROL MICROSYSTEMS DNP3. User and Reference Manual DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876

More information

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department

More information

A Planning Methodology and Cost Models for Designing A Wide Area Network

A Planning Methodology and Cost Models for Designing A Wide Area Network A Planning Methodology and Cost Models for Designing A Wide Area Network Sami S. Al-Wakeel, Abstract - The planning and cost-ling of large-scale computer Wide Area Networks (WANs) are important issues

More information

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Proceedings of the 4 IEEE United States Military Academy, West Point, NY - June Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Wei Yan, Student Member, IEEE, and Edwin

More information

ECEN4533 Design Problem #2 80 points Due???

ECEN4533 Design Problem #2 80 points Due??? ECEN4533 Design Problem #2 80 points Due??? You are a Staff Engineer, Networking, for MegaMoron Communications Inc., the world's premier communications design company. You have been tasked with the design

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING MECHANISM

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING MECHANISM 686 Journal of Marine Science and Technology, Vol. 21, No. 6, pp.686-694 (213) DOI: 1.6119/JMST-13-516-1 NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING

More information

multi-site, private networking service Uses MPLS access-agnostic transport routing intelligence in the network Class of Service (CoS)

multi-site, private networking service Uses MPLS access-agnostic transport routing intelligence in the network Class of Service (CoS) MPLS IP-VPN Overview XO MPLS IP-VPN is a multi-site, private networking service for IP data and voice transport Uses MPLS and is competitive with legacy services such as ATM, Frame-Relay, and long-haul

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Bandwidth Measurement in xdsl Networks

Bandwidth Measurement in xdsl Networks Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

AXIS 211A Network Camera

AXIS 211A Network Camera PRODUCT REVIEW GUIDE TABLE OF CONTENTS 1 PRODUCT BRIEF... 3 2 REQUIREMENTS FOR TEST... 4 3 INSTALLATION... 5 3.1 Installing the AXIS 211A... 5 3.2 Set the IP address with AXIS IP Utility... 5 3.2.1 Automatic

More information

Detection and Analysis of Packet Loss on Underutilized Enterprise Network Links

Detection and Analysis of Packet Loss on Underutilized Enterprise Network Links Detection and Analysis of Packet Loss on Underutilized Enterprise Network Links Seung-Hwa Chung, Young J. Won, Deepali Agrawal, Seong-Cheol Hong, and James Won-Ki Hong Dept. of Computer Science and Engineering

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

APRSstat An APRS Network Analysis Tool

APRSstat An APRS Network Analysis Tool APRSstat An APRS Network Analysis Tool Richard Parry, P.E., W9IF rparry@qualcomm.com http://people.qualcomm.com/rparry ABSTRACT APRSstat monitors network traffic by connecting to an APRS telnet server

More information

MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD

MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD STaaS, modelling, cloud computing Rostyslav STRUBYTSKYI * MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD Abstract Cloud data storages in their internal structure are not using their full potential

More information

LAN Performance Measurements Lab

LAN Performance Measurements Lab LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for

More information

Characterization of E-Commerce Traffic

Characterization of E-Commerce Traffic Characterization of E-Commerce Traffic Udaykiran Vallamsetty Advanced Micro Devices Sunnyvale, CA 9486 uday.vallamsetty@amd.com Krishna Kant Intel Corporation Hillsboro, OR 97124 krishna.kant@intel.com

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Flow aware networking for effective quality of service control

Flow aware networking for effective quality of service control IMA Workshop on Scaling 22-24 October 1999 Flow aware networking for effective quality of service control Jim Roberts France Télécom - CNET james.roberts@cnet.francetelecom.fr Centre National d'etudes

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

Time Series Analysis of Network Traffic

Time Series Analysis of Network Traffic Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Service Level Analysis of Video Conferencing over Wireless Local Area Network

Service Level Analysis of Video Conferencing over Wireless Local Area Network Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Paper C. c Institute of Electrical and Electronics Engineers, Inc. 2000 Reprinted with permission.

Paper C. c Institute of Electrical and Electronics Engineers, Inc. 2000 Reprinted with permission. Paper C Bob Melander, Mats Björkman, and Per Gunningberg. A New End-to-End Probing and Analysis Method for Estimating Bandwidth Bottlenecks. Proceedings of IEEE GLOBECOM 00, San Francisco, CA, USA, November

More information

Border Gateway Protocol BGP4 (2)

Border Gateway Protocol BGP4 (2) Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning

More information

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS Andrei Sukhov 1), Prasad Calyam 2), Warren Daly 3), Alexander Iliin 4) 1) Laboratory of Network Technologies, Samara Academy of Transport

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport

IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport Paul Julian Harper Turin Networks, 5 N McDowell Ave, Petaluma CA 995, USA Email: pharper@turinnetworks.com Abstract The

More information

Generation of High Bandwidth Network Traffic Traces

Generation of High Bandwidth Network Traffic Traces Generation of High Bandwidth Network Traffic Traces Purushotham Kamath, Kun-chan Lan, John Heidemann, Joe Bannister and Joe Touch University of Southern California Information Sciences Institute Los Angeles,

More information

O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1

O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1 1 Which two statements are true regarding the advantages of the use of static routes? (Choose increased security reduced effort in configuring routes the administrator maintains control over routing easier

More information

The ISP Column A monthly column on all things Internet

The ISP Column A monthly column on all things Internet The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question

More information

Comparative Traffic Analysis Study of Popular Applications

Comparative Traffic Analysis Study of Popular Applications Comparative Traffic Analysis Study of Popular Applications Zoltán Móczár and Sándor Molnár High Speed Networks Laboratory Dept. of Telecommunications and Media Informatics Budapest Univ. of Technology

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

THE UNIVERSITY OF AUCKLAND

THE UNIVERSITY OF AUCKLAND COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.

More information

Network Traffic Invariant Characteristics:Metering Aspects

Network Traffic Invariant Characteristics:Metering Aspects etwork Traffic Invariant Characteristics:Metering Aspects Vladimir Zaborovsky, Andrey Rudskoy, Alex Sigalov Politechnical University, Robotics Institute St.Petersburg, Russia; Fractel Inc., USA, E-mail:

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings.

In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. 2 2.1 Introduction In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. It has been reported that growth in Internet traffic levels

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

Internet Services. Amcom. Support & Troubleshooting Guide

Internet Services. Amcom. Support & Troubleshooting Guide Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further

More information

Wide Area Network Latencies for a DIS/HLA Exercise

Wide Area Network Latencies for a DIS/HLA Exercise Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506

More information

PCoIP Protocol Network Design Checklist. TER1105004 Issue 3

PCoIP Protocol Network Design Checklist. TER1105004 Issue 3 PCoIP Protocol Network Design Checklist TER1105004 Issue 3 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada phone +1.604.451.5800 fax +1.604.451.5818 www.teradici.com The information

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University

More information

MONITORING OF NETWORKED MACHINES AND DEVICES IN MANUFACTURING NETWORKS

MONITORING OF NETWORKED MACHINES AND DEVICES IN MANUFACTURING NETWORKS DAAAM INTERNATIONAL SCIENTIFIC BOOK 2010 pp. 129-140 CHAPTER 14 MONITORING OF NETWORKED MACHINES AND DEVICES IN MANUFACTURING NETWORKS FABISIAK, B. Abstract: The monitoring of networked machines, devices

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

CSL 858 Virtual Network Simulation

CSL 858 Virtual Network Simulation CSL 858: Simulation of a CDN in a virtual network by Ashish Khullar 2007CS50212 under the guidance of Prof. Aaditeshwar Seth Contents 1 Introduction 3 2 The Virtual Network 4 3 The Implementation 7 4 The

More information

PictureTel H.323 Videoconferencing Network Bandwidth Analysis

PictureTel H.323 Videoconferencing Network Bandwidth Analysis PictureTel H.323 Videoconferencing Network Bandwidth Analysis by John Bartlett NSD Engineering PictureTel Corporation August 25, 1997 Introduction This document evaluates the network bandwidth required

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

GregSowell.com. Mikrotik Routing

GregSowell.com. Mikrotik Routing Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

Component 4: Introduction to Information and Computer Science

Component 4: Introduction to Information and Computer Science Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

PC-over-IP Protocol Virtual Desktop Network Design Checklist. TER1105004 Issue 2

PC-over-IP Protocol Virtual Desktop Network Design Checklist. TER1105004 Issue 2 PC-over-IP Protocol Virtual Desktop Network Design Checklist TER1105004 Issue 2 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com

More information

EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais

EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS by Arthur L. Blais B.A., California State University, Fullerton, 1982 A thesis submitted to the Graduate Faculty

More information

A CLASS-BASED DYNAMIC BANDWIDTH ALLOCATION SCHEME FOR EPONS

A CLASS-BASED DYNAMIC BANDWIDTH ALLOCATION SCHEME FOR EPONS A CLASS-BASED DYAMIC BADWIDTH ALLOCATIO SCHEME FOR EPOS Jing Xie,, Shengming Jiang, and Yuming Jiang 3 Institute For Infocomm Research, Heng Mui Keng Terrace, Singapore 963, Singapore Department Of Electrical

More information

US Data Services 2014-2019

US Data Services 2014-2019 US Data Services 2014-2019 Executive Summary CMR Market Research April 2015 Reproduction without permission 1 The contents of this report represent CMR s analysis of the information available to the public

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,

More information