CSL 858 Virtual Network Simulation

Size: px
Start display at page:

Download "CSL 858 Virtual Network Simulation"

Transcription

1 CSL 858: Simulation of a CDN in a virtual network by Ashish Khullar 2007CS50212 under the guidance of Prof. Aaditeshwar Seth

2 Contents 1 Introduction 3 2 The Virtual Network 4 3 The Implementation 7 4 The Emulation Simulation -1: The Effectiveness of CDN The Study of our emulation Conclusion and Future Work 16 6 Rural CDN Network 18 2

3 Chapter 1 Introduction Content Distribution Networks consist of a set of systems placed at various nodes in a network.cdn essentially works on the principles of caching content that is accessed frequently and also localizing the availability of content with respect to a given requesting machine and thus reducing the latency and also looks to increase the bandwidth, by reducing the number of nodes between the requesting machine and the machine satisfying the request. Strategically placed edge servers decrease load on backbones and public and private peers,as it redirects the traffic meant for these servers.the intent on all the cases is to get the content to as near to the edge user as possible. CDN s give more control over asset delivery and network load. They are optimized to per customer need. Several service providers provide CDN services professionally, including Akamai Technologies,Amazon, Windows Azure CDN to name a few. We also have examples of some free CDN s like the Coral Content Distribution Network.Other open source projects which look to create CDN s are MirrorBrain and CoDeen to name a few. 3

4 Chapter 2 The Virtual Network The virtual network for this simulation was created using VMware ESXi server installation. The front end queries were executed against a vcentre Client. This client was installed on a VM inside the VMware ESXi server itself. We have basically divided the network into separate regions that we have shown in the diagram. These regions will be mentioned in our entire discussion henceforth as AS. With these AS s we look to draw a parallel between the service providers like BSNL,Reliance in India. All the service providers have multiple routers, but for the purpose of our simulation we have chosen to provide each AS with only one router as shown in the diagram. 4

5 We look to model the Internet scenario, and have tried to emulate the scenario in a fashion, wherein we have modelled the network behind service provider, by having a dhcp server on all the machines that act as routers.thus by setting the IP range of the dhcp server, we are able to ensure that all machines that are connected to the dhcp server end up lying in the same AS. This also ensures that we can connect any number of clients to the router without having to worry about assigning IP s. We do need to assign a static IP to all the CDN servers that we have, so that we can ensure that DNS resolution can be handled. So effectively we are trying to emulate a scenario, wherein there is only one service provider within an AS and all the traffic that leaves an AS has just one gateway. Also we have assumed that the AS assigns IP s dynamically(which most AS s do). We have only two routes in between the AS s right now, but the approach that we have chosen can be very easily extended to a vary large number of systems, and we can add a very large number of links between the AS s and can define what all routes do want to be able to transmit and receive packets, which we achieve by the means of forwarding tables, as has been explained later. The CDN server in each server is right now servicing requests originating only in that AS, and a load balancing extension of the present emulation would be very more accurate.the Diagram below tries to explain the idea followed in resolution 5

6 As we can see from the diagram, a machine from a particular AS ultimately end s up having its requests serviced from it s AS. 6

7 Chapter 3 The Implementation We have for the purpose essentially made four templates for the virtual machines.we provide a brief explanation of the various changes that have been made to each machines. 1. Client VM s: These machines are machines in which the etc/udev/rules.d/70- persistent-net* files were removed to make changing the network labels using the vswitch possible. Other than that we did not make any major changes in the client. We exchanged the public/private keys of the client and the controlling machine so that the controlling machine is able to remotely log in without having to give a password. 2. The CDN servers: The CDN servers have been assigned static IP s.each CDN server has a nginx server running on it. We have configured the nginx server in accordance with our network created.in the nginx server, we have created files that enable it to cache files of the indicated type. Certain files have to be created for the server to be able to cache content. 3. The Routers: Each router in our simulation has 3 NIC s. In general, since we want to control the bandwidth of each router we have to add NIC s for each link that we want to control the bandwidth and connect them to separate Port Groups on the vswitch In each router, we have enabled IP-forwarding. We have added entries 7

8 to its forwarding tables specifying the traffic that can come to it form a particular AS. For instance, if we want a connection on its eth1 to also be able to forward traffic coming from another AS say AS2, to which it is connected via AS1, and not directly, we have to add entries that look like route add-host {IP range of AS1} dev eth1 route add-host {IP range of AS2} netmask gw {IP range of AS1} Also on one of the eth0 ports of the router we have a dhcp server running. This is the NIC that is attached to the AS, for which that particular machine acts as a router.for setting up this dhcp server changes have to be made to the /etc/dhcp3/dpcp.conf file of the machine. This file contains information like the range of the IP s from which the machines which connect to this NIC will be assigned IP s, their netmask, gateway etc. 4. The Main server: The main server from which all files are download. we have set up a DNS server on this machine. For handling the 8

9 requests coming from the machines for downloading files, an Apache server runs on the machine.for the purpose of conducting experiments we have created files of size from 1 to 100 Mb in the main server. For setting up a DNS sever we had to define views in the main server. These consisted of adding a definition of as AS in /etc/bind/named.conf.local. The definition of the view has to be added to /etc/bind/zones/*.conf where * will be the name of the view that you look to create. Changes also have to be made in the named.hosts and the named-rev.hosts files. 9

10 Chapter 4 The Emulation For the emulation we have added two client machines to each of the AS s. We have used two type of traffic generators for our study- a random traffic generator and a Poisson traffic generator. In the random traffic generator, a number is generated randomly between 1 and 100 and the file of corresponding size is requested from the server. The machine then sleeps for a random time between 1 and 10 seconds after which, the process of seeking the file is repeated. The requests are being made using wget.this file size is not ant standard distribution but it ensures that we have a fairly large spread in terms of file sizes. We could also have tried to create files whose size forms a Poisson distribution, or any other distribution. For the Poisson traffic generator, we have used a modified version of the traffic generator created by Prof. Ribero. The traffic generator, initially used to open a port to a given IP, and used to send packets of some a given size to that IP at Poisson intervals. We have modified this sender to request for files using wget at the Poisson intervals. The parameters for this generator is the time for which we want the packets following a Poisson distribution in time to be demanded.the size of the file that is requests is one again randomly generated. For initialization of the simulation, we have created a bash script that remotely log s into these machines. The traffic shaping parameter that has been set in all the scenarios is the average bandwidth parameter. For setting the traffic shaping parameters, the user has to fill in a config file, and a bash script runs against the vcentre client using the data in the config file and sets the traffic shaping parameters of all the vswitches in the network. The bash script then remotely log s into all these machines, a list of whose IP s 10

11 have to be provided by the user and executes the scripts corresponding to the emulation scenario. 4.1 Simulation -1: The Effectiveness of CDN For this simulation, we have used the random traffic generator. We ran the simulation for three scenarios. For running the simulations we divided our vswitches into two classes. The vswitches that connect two AS s that is the vswitches that connect the routers of two AS have been put in class 1. The vswitches inside an AS have been put in the second class. In scenario 1 we have set the bandwidth of all class1 vswitches as 1 Mbps and the bandwidth of all class 2 vswitches as 10 Mbps. This choice is motivated by the fact that in this emulation, the bottleneck in the traffic shall be the links between the AS s and the links between the systems and the CDN s in the AS s themselves are over-capacity. In scenario 2 we have set the bandwidth of all class 1 vswitches as 10 Mbps and the bandwidth of class 2 switches as 1 Mbps. In this scenario, we have the links between the the 11

12 Table 4.1: Transmitted/Received rates in MBps Scenario Main Server AS-CDN1 AS-CDN2 AS-CDN AS s as over capacity and the bottleneck are the links between the clients and the CDN s In scenario 3, we have set the bandwidth of both class 1 and class 2 vswicthes as 5Mbps. So by the means of these three emulations we look to understand how severely does the presence of a bottleneck at the points in a network affect the overall transmission rates at various points in the network. As we can see form Table 4.1, in the case of scenario 1, we have the maximum amount of data being transmitted from the cdn servers and the main servers. This is the case in which the bandwidth is maximum for the local connections. We can also see that the effective use of the bandwidth of the main server is maximum in the scenario 1. Thus this presses the case of localizing the data, as we can clearly see that the overall performance of the network increases. In this simulation, we also had a bandwidth manager running in the background on all the clients. Using the bandwidth manager we recorded the bandwidth being used at each client. As we can see from the diagram, there are times when the amount of traffic being received/transmitted from a particular machine is almost negligible. In such a scenario it would be wise to use the CDN machine of its AS to service requests from other AS s. Thus for effective usage of the CDN, some form of load balancing among the servers forming the CDN seems to make a lot of sense. 4.2 The Study of our emulation In this simulation, we seek to see how close we actually are to simulating real Internet traffic and the aggregate behaviour that happens because of the interaction in our emulation. We try and see if the packets being sent/received by any server in the network shows self similar behaviour.we will also see the effect of aggregate Poisson traffic in our emulation. In a normal emulation, 12

13 Figure 4.1: Each figure is a plot of the bandwidth as a plot of the time in minutes. Each pair horizontally were connected to the same vswitch 13

14 wherein no interaction was happening between the systems, the aggregate would ideally have been a normal distribution. For this purpose we run our simulation for 12 hours using the Poisson traffic generator. On each of the CDN servers and the main server we have a tcpstat process running in the background. The Poisson traffic generator requests for a file of random size at Poisson intervals. tcpstat running in the background on every machine collects data at every second. We plot the number of packets sent and received in unit time against time. We have expanded the graphs around arbitrary regions and check to see if the graphs show some self similarity. One such zoomed in expansion is shown below. We observe that in general the graphs do show a great deal of self similarity. We will however try to prove it mathematically. For a rigorous mathematical approach we will use the approach as described in the On Self Similar Nature Of Ethernet Traffic. The paper use a pox plot of the R/S data. For a time variant series X = {X i, i 1 } with the partial sum Y (n) = X i, and sample variance 1 i n S 2 (n) = 1 n the R/S statistic is given by 1 i n X 2 i 1 n 2 Y 2 (n) R S (n) = 1 S(n) { max (Y (t) t Y (n)) min 0 t n n (Y (t) t 0 t n n Y (n))} To determine the R/S statistic for a time series of length N, we divide the series into lengths of K blocks each of size N. Then for each lag N, compute K R(k i,n) starting at points k S(k i,n) i = i N, i = 1, 2... such that k K i + n N. Then we choose logarithmically spaced values of n plot the log plot log(r/s) vs log n. For each n we end up getting several points on the graph. The figure shows the graph that we obtain. From this figure we estimate the Hurst parameter to be 0.67 which is between 0.5 and 1 as required, thus mathematically proving our claim about the self similarity of the traffic that we generate. Thus the interaction in our emulation does not end up giving us a normal distribution as we would expect but rather a self similar result. 14

15 Figure 4.2: Self Similarity of Traffic. The highlighted Parts show the Parts Magnified 15

16 Chapter 5 Conclusion and Future Work We have managed to create a virtual network and successfully simulate a CDN on it. We have been able to confirm some principles that have gone into the use of CDN s using this simulation. We have been able to see that by using traffic generators, we are able to fairly accurately get to a simulation scenario that parallels a real simulation. This simulation could be thus used to explore the any changes in the CDN technology that one might look to implement. Also since the simulation is self similar in nature, we expect the results obtained to be very much in accordance to what shall be experienced in an actual deployment or change in as was simulated. Features that could be added to this simulation include 1. Adding load balancing between the CDN machines.this makes a lot of sense, as we observe that at times that load balancing might lead to faster processing of a file request when the load on the CDN that corresponds to that AS might be very high. This could then also be used to study the various load balancing algorithms that might have been suggested for use. 2. The API of vcentre right now allows for only changing the bandwidth of an entire vswitch. The API should be extended to be able to do the same over every port group. This would give greater control over the traffic shaping. Thus we have managed to create an effective system of simulating network traffic and also creating a CDN network in a virtual network. If we look at 16

17 the system load of our emulation, we can see that a system must be provided with a typical 1TB server to execute the virtual deployment, we will be able to successfully run about 25 virtual machines on the server(a 40 GB hard disk to each VM in our experiment will provide for a lof size of 20 GB which should be sufficient for any server log).thus using virtualization is providing us with a 25 fold reduction as compared to a single machine with say a 1TB physical hard disk. 17

18 Chapter 6 Rural CDN Network The rural CDN project is an ongoing project in the Department of Computer Science, which is being run in colloboration with the Department of Information Technology and Ministry of Health and Family Welfare. The project aims at creating a robust rural CDN network. The aim of such a network will be to enable medicare in rural secnarios. The idea essentially is that with the flaky connections that exist in Rural India, it will not be feaseable for the doctors in rural india to actually connect to mainframe servers in India. So the idea instead is that they should be provoded with a robust CDN network that covers all states. This idea is currenlty in implementation with actual testbeds deployed to try and cover the states of Kerala and Uttar Pradesh.A testbed also exists for the same in IIT Delhi. One of the major problems with the Rural CDN project is the enormous testing costs. With no virtalization based framework currently present, the costs of buying physical servers increases linearly as for every new state to be added, with a typical server costing aroud 7-8 lacs. For every server added, atleast 10 machines are to be added to successfully test if the server behaves appropriately under heavy traffic conditions.however with the use of the virtual CDN network, we will be able to use successfully reduce this linear cost. We have successfully deployed a CDN with 3 servers and 8 machines running on a single server, with the machines emulating traffic using the poission and the random traffic genertaors as we had shown earlier. AS we have shown in our results earlier, the simluation behves exactly similar to what actual network traffic would. So we are able to effectively save on the cost of 2 servers and 24 machines with a single server. The testbed in IIT was successfully emulated using this CDN server installation to show that this method works. 18

19 Thus effectively we have brought a 5 fold reductionin the cost of an installation(2 servers + 24 machines(cost of 8 mahines = cost of a server). Thus using the CDN virtual setup, the testing and deployment will be much cheaper 19

20 Bibliography [1] Leyland, Taqqu, Willinger, Wilson, On self Similar Nature of Ethernet Traffic [2] Keshav,Shenker,Demers Analysis and Simulation of a Fair Queueing Algorithm [3] [4] [5] [6] Saroiu, Gummadi, Dunn, Gribble, Levy Analysis of Internet Content Delivery Systems [7] Labovitz, McPherson, Oberheide, Jahanian Internet Inter-Domain Traffic [8] 20

How to Configure an Initial Installation of the VMware ESXi Hypervisor

How to Configure an Initial Installation of the VMware ESXi Hypervisor How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide

More information

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to

More information

Altor Virtual Network Security Analyzer v1.0 Installation Guide

Altor Virtual Network Security Analyzer v1.0 Installation Guide Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

NComputing L-Series LAN Deployment

NComputing L-Series LAN Deployment NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.

More information

3.0 CDN 3.0 OnApp CDN Activation and Setup Guide Author: Version: Date:

3.0 CDN 3.0 OnApp CDN Activation and Setup Guide Author: Version: Date: 3.0 CDN 3.0 OnApp CDN Activation and Setup Guide Author: Version: Date: admin 2 24-Apr-2015 10:00 Table of Contents 1 The OnApp Dashboard 5 2 How your CDN Account Works 6 3 Hardware & Marketplace Requirements

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

How to Setup Bare Metal Adaxa Suite Demonstration Box

How to Setup Bare Metal Adaxa Suite Demonstration Box How to Setup Bare Metal Adaxa Suite Demonstration Box Level 1 616 St Kilda Road Melbourne Victoria 3004 T:1-300-990-120 Email: info@adaxa.com Web: www.adaxa.com Table of Contents Pre-Requisites 1.1 Hardware

More information

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,

More information

What communication protocols are used to discover Tesira servers on a network?

What communication protocols are used to discover Tesira servers on a network? Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Building a Penetration Testing Virtual Computer Laboratory

Building a Penetration Testing Virtual Computer Laboratory Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Fixed Price Website Load Testing

Fixed Price Website Load Testing Fixed Price Website Load Testing Can your website handle the load? Don t be the last one to know. For as low as $4,500, and in many cases within one week, we can remotely load test your website and report

More information

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B Acano solution Virtualized Deployment R1.1 Installation Guide Acano February 2014 76-1025-03-B Contents Contents 1 Introduction... 3 1.1 Before You Start... 3 1.1.1 About the Acano virtualized solution...

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

How to Create a Virtual Switch in VMware ESXi

How to Create a Virtual Switch in VMware ESXi How to Create a Virtual Switch in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the information

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

Install Guide for JunosV Wireless LAN Controller

Install Guide for JunosV Wireless LAN Controller The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

CDN OnApp CDN Activation and Setup Guide Author: Version: Date:

CDN OnApp CDN Activation and Setup Guide Author: Version: Date: CDN OnApp CDN Activation and Setup Guide Author: Version: Date: Haresnape 4 24-Apr-2015 11:08 Table of Contents 1 The OnApp Dashboard 5 2 How your CDN Account Works 6 3 Hardware & Marketplace Requirements

More information

Exinda How to Guide: Virtual Appliance. Exinda ExOS Version 6.3 2012 Exinda, Inc

Exinda How to Guide: Virtual Appliance. Exinda ExOS Version 6.3 2012 Exinda, Inc Exinda How to Guide: Virtual Appliance Exinda ExOS Version 6.3 2 Virtual Appliance Table of Contents Part I Introduction 4 1 Using... this Guide 4 Part II Overview 6 Part III Deployment Options 8 Part

More information

Installation of the On Site Server (OSS)

Installation of the On Site Server (OSS) Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit

More information

ISERink Installation Guide

ISERink Installation Guide ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Francesco.diaz@insight.com. http://francescodiaz.azurewebsites.net

Francesco.diaz@insight.com. http://francescodiaz.azurewebsites.net Francesco.diaz@insight.com http://francescodiaz.azurewebsites.net Agenda SQL workloads on Azure Microsoft Azure IaaS concepts Best Practices for SQL running on Azure VMs HA/DR SQL DB HA/DR Dedicated Higher

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Networking Topology For Your System

Networking Topology For Your System This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.

More information

Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide

Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide July 2010 1 Specifications are subject to change without notice. The Cloud.com logo, Cloud.com, Hypervisor Attached Storage, HAS, Hypervisor

More information

Shoal: IaaS Cloud Cache Publisher

Shoal: IaaS Cloud Cache Publisher University of Victoria Faculty of Engineering Winter 2013 Work Term Report Shoal: IaaS Cloud Cache Publisher Department of Physics University of Victoria Victoria, BC Mike Chester V00711672 Work Term 3

More information

Preparation Guide. How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment.

Preparation Guide. How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment. Preparation Guide v3.0 BETA How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment. Document version 1.0 Document release date 25 th September 2012 document revisions 1 Contents 1. Overview...

More information

Quick Note 052. Connecting to Digi Remote Manager SM Through Web Proxy

Quick Note 052. Connecting to Digi Remote Manager SM Through Web Proxy Quick Note 052 Connecting to Digi Remote Manager SM Through Web Proxy Digi Product Management August 2015 Contents 1 Document Version...2 2 Abstract...3 3 Introduction...3 4 Web Proxy Configuration...4

More information

ALTIRIS Package Server

ALTIRIS Package Server ALTIRIS Package Server The information contained in the Altiris knowledgebase is subject to the Terms of Use as outlined at http://www.altiris.com/legal/termsofuse.asp. History Additions / Edits Date 1st

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Astaro Deployment Guide High Availability Options Clustering and Hot Standby Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...

More information

Project 4: SDNs Due: 11:59 PM, Dec 11, 2014

Project 4: SDNs Due: 11:59 PM, Dec 11, 2014 CS168 Computer Networks Fonseca Project 4: SDNs Due: 11:59 PM, Dec 11, 2014 Contents 1 Introduction 1 2 Overview 2 2.1 Components......................................... 2 3 Setup 3 4 Shortest-path Switching

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

How to Create VLANs Within a Virtual Switch in VMware ESXi

How to Create VLANs Within a Virtual Switch in VMware ESXi How to Create VLANs Within a Virtual Switch in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support

More information

Internet Services. Amcom. Support & Troubleshooting Guide

Internet Services. Amcom. Support & Troubleshooting Guide Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further

More information

RSA Security Analytics Virtual Appliance Setup Guide

RSA Security Analytics Virtual Appliance Setup Guide RSA Security Analytics Virtual Appliance Setup Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

A Comparison of Oracle Performance on Physical and VMware Servers

A Comparison of Oracle Performance on Physical and VMware Servers A Comparison of Oracle Performance on Physical and VMware Servers By Confio Software Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 303-938-8282 www.confio.com Comparison of Physical and

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

White Paper. Recording Server Virtualization

White Paper. Recording Server Virtualization White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...

More information

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required

More information

CommandCenter Secure Gateway

CommandCenter Secure Gateway CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance - VMware, XEN, HyperV This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway. For additional

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Validating Long-distance VMware vmotion

Validating Long-distance VMware vmotion Technical Brief Validating Long-distance VMware vmotion with NetApp FlexCache and F5 BIG-IP F5 BIG-IP enables long distance VMware vmotion live migration and optimizes NetApp FlexCache replication. Key

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3

NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3 NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under

More information

NETWORK SETUP GLOSSARY

NETWORK SETUP GLOSSARY GLOSSARY NETWORK SETUP Static IP PPPoE DHCP DDNS Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

Configuration Notes 283

Configuration Notes 283 Mediatrix 4400 Digital Gateway VoIP Trunking with a Legacy PBX June 21, 2011 Proprietary 2011 Media5 Corporation Table of Contents Table of Contents... 2 Introduction... 3 Mediatrix 4400 Digital Gateway

More information

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3

More information

ISERink Overview. Version 1.1. February 1, 2015

ISERink Overview. Version 1.1. February 1, 2015 ISERink Overview Version 1.1 February 1, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to undertake

More information

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst

More information

CS312 Solutions #6. March 13, 2015

CS312 Solutions #6. March 13, 2015 CS312 Solutions #6 March 13, 2015 Solutions 1. (1pt) Define in detail what a load balancer is and what problem it s trying to solve. Give at least two examples of where using a load balancer might be useful,

More information

How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations

How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations Jan van Doorn Distinguished Engineer VSS CDN Engineering 1 What is a CDN? 2 Content Router get customer

More information

Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study

Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study White Paper Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study 2012 Cisco and/or its affiliates. All rights reserved. This

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Quick Start Guide. for Installing vnios Software on. VMware Platforms Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,

More information

Data Center Content Delivery Network

Data Center Content Delivery Network BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

Introduction to LAN/WAN. Network Layer (part II)

Introduction to LAN/WAN. Network Layer (part II) Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking

More information

Panda GateDefender Virtual eseries QUICK GUIDE

Panda GateDefender Virtual eseries QUICK GUIDE Panda GateDefender Virtual eseries QUICK GUIDE CONTENTS Panda GateDefender virtual eseries - KVM > What you have and what you need > Panda Virtual Appliance Installation Procedure > Web interface > Choose

More information

How to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2

How to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2 How to Set Up a Wireless Network How to configure a wireless network for a computer science programming contest using PC 2 Checklist: The procedure to set up a wireless network is not difficult at all.

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

VI Performance Monitoring

VI Performance Monitoring VI Performance Monitoring Preetham Gopalaswamy Group Product Manager Ravi Soundararajan Staff Engineer September 15, 2008 Agenda Introduction to performance monitoring in VI Common customer/partner questions

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

1 Introduction This document describes the service Performance monitoring for the GTS Virtual Hosting service.

1 Introduction This document describes the service Performance monitoring for the GTS Virtual Hosting service. 1 Introduction This document describes the service for the GTS Virtual Hosting service. 2 Description of Performance Monitoring System The Performance Monitoring System is operated on a BaseN solution

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report July 2006 Report 060725 Product Category: WAN Optimization Appliances Vendors Tested: Citrix Systems TM Riverbed Technology TM Key findings and conclusions: The WANScaler 8800

More information

Pexip Reverse Proxy and TURN Server Deployment Guide

Pexip Reverse Proxy and TURN Server Deployment Guide Pexip Reverse Proxy and TURN Server Deployment Guide Introduction In Pexip Infinity deployments, all Pexip Infinity Connect clients use HTTPS for the call signaling connections towards Conferencing Nodes.

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance

More information

VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS

VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

BLACK BOX. Quick Start Guide. Virtual Central Management System (VCMS) Works with LES Series Console Servers. LES-VCMS. Customer Support Information

BLACK BOX. Quick Start Guide. Virtual Central Management System (VCMS) Works with LES Series Console Servers. LES-VCMS. Customer Support Information LES-VCMS Virtual Central Management System (VCMS) Quick Start Guide Works with LES Series Console Servers. BLACK BOX Customer Support Information Order toll-free in the U.S.: Call 877-877-BBOX (outside

More information

Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array

Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array Evaluation report prepared under contract with Lenovo Executive Summary Love it or hate it, businesses rely on email. It

More information

Citrix XenServer Design: Designing XenServer Network Configurations

Citrix XenServer Design: Designing XenServer Network Configurations Citrix XenServer Design: Designing XenServer Network Configurations www.citrix.com Contents About... 5 Audience... 5 Purpose of the Guide... 6 Finding Configuration Instructions... 6 Visual Legend... 7

More information

Deploying the BIG-IP System with VMware vcenter Site Recovery Manager

Deploying the BIG-IP System with VMware vcenter Site Recovery Manager Deployment Guide Version 1.0 Deploying the BIG-IP System with VMware vcenter Site Recovery Manager Contents 2 Prerequisites and configuration notes 2 Deployment overview 3 Example configuration of BIG-IP

More information

VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS

VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS If you re not using Citrix XenCenter 6.0, your screens may vary. VELOCITY REPLICATION ACCELERATOR Citrix XenServer Hypervisor Server Mode (Single-Interface Deployment) 2013 Silver Peak Systems, Inc. This

More information

How to Guide: StorageCraft Cloud Services VPN

How to Guide: StorageCraft Cloud Services VPN How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Detailed Lab Report DR101115D. Citrix XenDesktop 4 vs. VMware View 4 using Citrix Branch Repeater and Riverbed Steelhead

Detailed Lab Report DR101115D. Citrix XenDesktop 4 vs. VMware View 4 using Citrix Branch Repeater and Riverbed Steelhead Detailed Lab Report Citrix XenDesktop 4 vs. VMware View 4 using Citrix Branch Repeater and Riverbed Steelhead February 11, 2011 Miercom www.miercom.com Table of Contents 1.0 Executive Summary... 3 2.0

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Uila SaaS Installation Guide

Uila SaaS Installation Guide USER GUIDE Uila SaaS Installation Guide January 2016 Version 1.8.1 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE Copyright Uila, Inc., 2014, 15. All rights

More information

Kaltura On-Prem Evaluation Package - Getting Started

Kaltura On-Prem Evaluation Package - Getting Started Kaltura On-Prem Evaluation Package - Getting Started Thank you for your interest in the Kaltura On-Prem Online Video Platform (OVP). Before you get started with your Kaltura On-Prem evaluation, a Kaltura

More information