Solution: B. Telecom
|
|
- Rosanna Heath
- 8 years ago
- Views:
Transcription
1 Homework 9 Solutions 1.264, Fall 2004 Assessment of first cycle of spiral model software development Due: Friday, December 3, 2004 Group homework In this homework you have two separate questions: 1. Assessment of the first cycle of the development spiral, in preparation for a second. 2. Brief question on telecom A. Review of Development Cycle 1 The chemical database and Web application that you have prototyped in your first round of the spiral model of development have unexpectedly been chosen by the CTO as the basis of her software system. She would like you to develop a cost estimate for the production system by December 3, before the next meeting of the company board of directors. She understands that it's difficult to produce this estimate quickly, but the next board meeting is 3 months later, and that would delay the system three months. Take out your homework 2 solutions and revise them to reflect the knowledge gained from doing the first cycle of development. Don't rewrite the document; just make changes, additions or deletions to reflect what you've learned. They can be brief; they can refer to homeworks 2-8 as needed. Hand in the revised requirements document. Keep it the same length and organization as your original document. Update the user interface, process descriptions, resource estimates, etc. Change the error bounds on the resource estimates to reflect the later stage of development. While you would normally include the data model, sample database and prototype prototype Web application in the revised requirements (and design documents), assume that they are available and will be delivered to the management as separate documents, to which you may refer. Thus, you should assume that homeworks 2-8 are being handed in to the management as well, and that they have been appropriately edited. Again, revise only homework 1. Add two pages of comments at the beginning of your revised requirements, addressing the following questions: What do you believe the outcomes of development efforts would be in the following two cases: Contracting development of your system to a vendor based on your original homework 1 Contracting development of your system to a vendor based on a package containing your homeworks 2-8 and revised homework 1 Do you feel that the error bounds on the resources for the next cycle are reasonable? Do they reflect the uncertainty that has been removed by the first cycle of the spiral model?
2 Do you feel the current requirements can be translated into a design and system with low risk, or are there still substantial elements of uncertainty? If so, identify the substantial elements of uncertainty. The comments should cover the following: 1. Outcome of efforts in the following two cases: Contracting development to a vendor after HW1: Vendor would have stated that the requirements are inadequate and would insist on a change order process that would be invoked many times as changes are made and details are specified. It would be a slow, costly and contentious process to build a production system from your initial requirements. The data model would have to be built, processes would be changed, the user interface would be changed, etc. Contracting development to a vendor after HW7: Vendor would be pleased that the requirements are well defined and a first version of the system exists, albeit with missing parts and imperfections. Data model, processes and user interface would be quite stable. Effort would be highly likely to succeed. 2. Error bounds on next cycle. Error bounds at the Product Design level are 0.8 to 1.25 times the point estimate. At the Detailed Design level they are 0.95 to These are narrow ranges but they should be attainable as long as omitted issues are addressed in the revised requirements. Examples are database transactions, scalability to large volumes, security, etc. 3. Can requirements be translated into a design and a system? Except for the items noted immediately above (transactions, scalability, security and a few related itesm), a system could be built by a vendor. There are a lot of other issues that would have to be addressed (installation, configuration, software maintenance, etc.) but the core system could be built. B. Telecom In your chemical manufacturing facility you have three buildings separated by streets and a river as follows. (The real estate was available and cheap.)
3 Building A is the manufacturing site; building B is the information technology facility and building C is the warehouse and shipping site; it ships by water, highway and rail. Describe three ways in which the chemical manufacturer can connect these three buildings at data rates of at least 1.5Mbps. Of the three, which would you recommend, and why? The manufacturer cannot cross streets or the river with a private network; it does not have authority to cross public rights of way. If the chemical company chose one of your options, but later had to change to another one, what else would need to change, at what levels (1-4, 7) in the 7 layer model? Describe any changes briefly. Options: DSL: Distances are one kilometer, which is within DSL distance. This is inexpensive broadband and would be appropriate. Separate DSL lines would be provided for each building. Microwave. Because the distance is short and there are no buildings in the way, and there are buildings on which to place towers, digital microwave is feasible. This could provide 45 Mbps. A LAN could be run over this link. (Don t expect students to know this.) Cable modem. Similar to DSL, but because it is shared, security would be a major problem. Traffic would probably need to be encrypted, which would slow it down. T-1. T-1 lines could be leased from a telecom carrier (who would probably provide them via DSL). Frame relay is feasible and provides 1.5 Mbps data rates reliably. Cheap, reasonable to use. Wireless. GPRS not feasible: data rate too low. WiFi not feasible: distance too great. WiMax may be feasible in the future. Dark fiber. Not feasible in general. If available, it would allow a LAN to run. ATM. Suitable for higher bandwidth and more demanding network needs. Likely to be very expensive. ATM is usually used by carriers, not enterprises, at this point.
4 Recommendation: DSL is likely to be most feasible, since each building can have its own, dedicated, relatively secure broadband connection. DSL is probably the best recommendation. Dark fiber is feasible if a carrier would provide dark fiber, but it s unlikely. The company could run a LAN protocol (Ethernet or FDDI) if dark fiber were available. Microwave is feasible and effective, with a 45Mbps data rate. Cable modem is similar to DSL but would require encryption, making its performance slower. Frame relay would work well. T-1 is feasible but likely to be expensive. ATM is feasible, high bandwidth, and expensive. Wireless is not feasible. LAN? The company could implement LAN technology via dark fiber or digital microwave. DSL, cable modem and T-1 are WAN technologies provided by carriers who will not support a LAN technology. Changes? If the company changes among all these technologies, only layers 1 and 2 change. The company would still run the same layer 7 protocols (HTTP, , etc.), layer 3-4 protocols (TCP/IP). While layer 2 within the three buildings is Ethernet, Ethernet is a LAN technology and can t be carried over a WAN (carriers are working to fake it currently) The routers (layer 3) would be plugged into different equipment at layer 2 to support the different WAN links. If a LAN were used and, say, microwave was replaced by dark fiber, Ethernet would be the layer 2 protocol in both cases, and only the layer 1 equipment would change. C. System architecture The chemical company has a Web server, application server and database server in building B. Go to and look at the latest TPC-C results for sizing the database server that will process the database queries from the Web and application servers. Assume that your company has approximately 8,000 users registered on its Web site. D. Of the top results in price/performance order, which of these systems would be appropriate to consider for the chemical company? Select at least 4; explain your choice. Remember that these systems are highly tuned to the exact characteristics of the TPC-C benchmark. E. Of the systems you chose, list the number of disks and the average delay for the stock level query. Is there a correlation? Why or why not? Briefly look at the TPC-W results, in price/performance order, on Read the white paper on the TPC-W page for background information. F. Are any of the listed configurations appropriate for the chemical manufacturer, with
5 8,000 users? Why or why not? G. Discuss the steps you would take to appropriately configure the Web server: Is the virtual storage hierarchy relevant and, if so, what are the key points to consider? Assume you have a good starting point in an appropriate system based on a TPC-C benchmark. What would you consider and how might you assess what to change? 1. Select systems 1-4 from the list: Dell PowerEdge 2650, HP ProLiant ML350T03 (3 variations, listed 2, 3, 4 in the results) The others are sized for much larger numbers of users and are not needed for the chemical company. They are more expensive and offer no advantages. 2. Summary of systems: System Users Cost Disk drives Stock lev delay Dell 18,000 $30, sec HP 14,500 $27, sec HP 15,300 $29, sec HP 15,300 $30, sec There is a correlation; the system with twice the disks has roughly half the response delay. 3. All four configurations are appropriate, and would probably just barely suffice. Their being highly tuned for about 15,000 users means they probably would work well for half that number in actual use. 4. The virtual storage hierarchy is highly relevant, as it always is! Steps to consider, based on the lecture notes: Adjust memory based on user, 5 minute or 1-5% rules. Don t accept benchmark memory based on its 180MB database size. Compute your own. Memory is critical. Processors (CPU) are based on number of users, so TPC benchmark should be fine. Disks should be fine. Check that capacity is sufficient, but usually capacity is not the determining factor. Throughput is, which is based on number of users, which the benchmark models well. Cache is from the benchmark is fine (2MB) Network card is fine; it s based on users and network traffic. Backup is not considered in the benchmark. You must add backup components (tape or FibreChannel off-site disks). With three nearby buildings, FibreChannel connected disks are feasible and should be considered. A. Assignment Turn in an MS Word document for your revised requirements and additional material from question A, and another, separate MS Word document for questions B and C.
TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2
TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2 1 INTRODUCTION How does one determine server performance and price/performance for an Internet commerce, Ecommerce,
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationSchools and Libraries Universal Service Support Mechanism Eligible Services List
Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationVirtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More information1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class
1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationCISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationVirtual Server in SP883
Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationHow To Make A Network More Reliable With A Virtualization System
A Talari Networks White Paper WAN Virtualization Transforming the Enterprise WAN! A Talari White Paper 2 WAN Virtualization - Transforming the Enterprise WAN Introduction IT departments face pressures
More informationUninterrupted Internet:
Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover White Paper Page 1 Table of Contents Executive Summary... 3 Considering The Options: Upgrades, Redundancy and
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationTechnical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
More informationSAN RFP Questions and Answers
SAN RFP Questions and Answers Questions for week ending 10/4/13 Questions from Sterling Computers What is the snapshot retention policy is and percent of change for the primary SAN? a. Is it just a 1 day
More informationThis course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
More informationFor the purpose of setting up a home network, all you need to worry about are two major categories of components:
Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn
More informationWhite Paper: Virtual Leased Line
Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices
More informationSecurity Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/
Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
More informationData Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationLab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationComputer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution
Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution 1. Chapter 3. Review Question 2 (Page 66) Comment on the statement, "The CPU is the brain of the computer." The CPU selects instructions,
More informationFixed Wireless Broadband
Fixed Wireless Broadband An overview of the benefits of Dreamtilt fixed wireless broadband Copyright 2013 Dreamtilt Pty Ltd A wireless network utilizes connections between nodes without the use of wires.
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationCPET 581 E-Commerce & Business Technologies. Topics
CPET 581 E-Commerce & Business Technologies E-Commerce Infrastructure Lecture Note 2 of 2 References: *Chapter 3. E-Commerce Infrastructure: The Internet, Web, and Mobile Platform of text book: e-commerce:
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationIntroduction. Network Basics. Workstations. Server. Hub
Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you
More informationA Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper
A Talari Networks White Paper Turbo Charging WAN Optimization with WAN Virtualization A Talari White Paper 2 Introduction WAN Virtualization is revolutionizing Enterprise Wide Area Network (WAN) economics,
More informationA Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper
ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures
More informationCertified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0
(CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without
More informationWhite Paper: Broadband Bonding with Truffle PART I - Single Office Setups
PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationwww.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern
More informationCisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More information51-30-21 Selecting a Web Server Connection Rate Gilbert Held
51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence
More informationReliable high throughput data connections with low-cost & diverse transport technologies
Virtual Leased Line (VLL) for Communications between Offices Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband Bonding Network
More informationA Talari Networks White Paper. Adaptive Private Networking Reliably Enabling Next Generation MSP / VNO / Outsourcing Services. A Talari White Paper
ATalariNetworksWhitePaper Adaptive Private Networking Reliably Enabling Next GenerationMSP/VNO/OutsourcingServices ATalariWhitePaper 2 AdaptivePrivateNetworkingforMSPs ExecutiveSummary Innovative MSPs,
More information1.264 Lecture 36 (Solutions)
1.264 Lecture 36 (Solutions) Telecom: Wireless networks Next class: Green chapter 31,33, 36, 39. No exercise. 1 Exercise Design a system for an intercity rail passenger train to provide Internet access
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationIntroduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8
INDEX Introduction Page 2 Understanding Bandwidth Units Page 3 Internet Bandwidth V/s Download Speed Page 4 Factors Affecting Download Speed Page 5-7 Optimum Utilization of Bandwidth Page 8 Conclusion
More informationDigi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
More information1.264 Lecture 30. System architecture
1.264 Lecture 30 System architecture Next class: Exercise due after class Please start Visual Paradigm-we ll use it in class today No zip file to download-it s online 1 Three tier architecture Web client
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationGorilla CRM System Requirements
Gorilla CRM System Requirements A Supplement to the Bill Good Marketing System Proposal Bill Good Marketing System April 2010 White Paper Bill Good, Chairman of Bill Good Marketing, Inc. 1 PREFACE This
More informationEthernet Passive Optical Networks EPON
Ethernet Passive Optical Networks EPON IEEE 802.3 Ethernet in the First Mile Study Group January 8-9, 2001, Irvine, CA Gerry Pesavento Alloptic, Inc. Tel 925-245-7647 Email gerry.pesavento@alloptic.com
More information1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
More informationTRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes
TRACE PERFORMANCE TESTING APPROACH Overview Approach Flow Attributes INTRODUCTION Software Testing Testing is not just finding out the defects. Testing is not just seeing the requirements are satisfied.
More informationXROADS NETWORKS WHITE PAPER
XROADS NETWORKS WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy XROADS NETWORKS - WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy Redundancy
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationExpand Your Enterprise With a Wireless Network
Expand Your Enterprise With a Wireless Network The Challenge: You have two weeks to build IT infrastructure for a new building on the other side of town. How can you connect this facility to the enterprise
More informationDistribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
More informationTechnology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.
on Cellular Data Networking for SCADA system networks Presented by Teamwork Solutions, Inc. Wireless (Cellular) Data Networking Internet SCADA Server How Wireless (Cellular) Data Networking Works Dynamic
More informationEligible Services Fall 2014 Applicant Trainings
E rate Program Eligible Services Fall 2014 Applicant Trainings Overview Draft Eligible Services List (ESL) Category One Category Two Eligible Services Broadband Voice Services Eliminated Services Eligibility
More informationBy: Mohsen Aminifar Fall 2014
By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: m.aminifar@modares.ac.ir admin@parsenet.ir Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationOptimize your network for voice.
RingCentral Office Optimize your network for voice. To contact RingCentral, please visit www.ringcentral.com RingCentral or call 1-800-574-5290. Office 1 Complete Business Phone System Design your network
More informationLAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
More informationMPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d.
MPLS@NLBd.d. Janko Jager * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. Telecommunications, Portorož, 04.10.2008 NLB d.d. 1 Foreword This presentation is about NLB d.d. experience
More informationHosted Voice. Best Practice Recommendations for VoIP Deployments
Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband
More informationServer must be connected to the internet via high-speed internet connection.
Server Based System Requirements Database Server Component / Number of users 1-10 Users 11-25 Users 28-50 Users Processor Recommended 4 Cores 6 Cores 8 Cores Processor Minimum 2 Cores 4 Cores 6 Cores Memory
More informationMANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More informationWHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
More informationHome Networking Evaluating Internet Connection Choices for a Small Home PC Network
Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Conceitos de Redes e Arquitecturas - Networks and Architectures
More informationHigh-performance VoIP Traffic Optimizer Client Solution
AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features
More informationHow To Send Video At 8Mbps On A Network (Mpv) At A Faster Speed (Mpb) At Lower Cost (Mpg) At Higher Speed (Mpl) At Faster Speed On A Computer (Mpf) At The
Will MPEG Video Kill Your Network? The thought that more bandwidth will cure network ills is an illusion like the thought that more money will ensure human happiness. Certainly more is better. But when
More informationA Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu PeteDulany@yahoo.com, ChangSooKim@yahoo.com, jyu@cs.depaul.edu School of Computer Science,
More informationProduct Overview. Steve Erickson
Product Overview Steve Erickson Memorylink products GPS-100C Flanger About Flanger TDM over IP, wired or wireless applications Wireless T1/E1 using Ethernet radios 1-4 T1 s or E1 s per unit Additional
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAPPOSITE TECHNOLOGIES Smoothing the Transition to 10 Gbps. WAN Emulation Made Easy
APPOSITE TECHNOLOGIES Smoothing the Transition to 10 Gbps WAN Emulation Made Easy The Transition to 10 Gbps 1. THE PROBLEM - Application Performance 2. THE SOLUTION - Performance Validation Using WAN Emulation
More informationChapter 5: Understanding Internetworking Infrastructure
Chapter 5: Understanding Internetworking Infrastructure Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future? A Graphical
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More informationSUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
More informationNetwork performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
More informationTransporting Legacy Switched Digital Circuits Using a Packet Network
Transporting Legacy Switched Digital Circuits Using a Packet Network Engage Communication is the manufacturer of high-speed data communications products, specifically targeting the growing market for converting
More informationChapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Thirteen Network Design and Management Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Recognize the systems
More informationChapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1
Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationEffective NZ Small Business Redundancy and Disaster Recovery
Effective NZ Small Business Most small enterprises prepare for catastrophic events such as fire, theft or natural disasters by purchasing insurance and writing documentation. Unfortunately, in a significant
More informationStorage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies
Page 1 Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies Introduction This paper explains the concepts of Storage Area Network or SAN, iscsi technology and how
More informationA Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
More information