Solution: B. Telecom

Size: px
Start display at page:

Download "Solution: B. Telecom"

Transcription

1 Homework 9 Solutions 1.264, Fall 2004 Assessment of first cycle of spiral model software development Due: Friday, December 3, 2004 Group homework In this homework you have two separate questions: 1. Assessment of the first cycle of the development spiral, in preparation for a second. 2. Brief question on telecom A. Review of Development Cycle 1 The chemical database and Web application that you have prototyped in your first round of the spiral model of development have unexpectedly been chosen by the CTO as the basis of her software system. She would like you to develop a cost estimate for the production system by December 3, before the next meeting of the company board of directors. She understands that it's difficult to produce this estimate quickly, but the next board meeting is 3 months later, and that would delay the system three months. Take out your homework 2 solutions and revise them to reflect the knowledge gained from doing the first cycle of development. Don't rewrite the document; just make changes, additions or deletions to reflect what you've learned. They can be brief; they can refer to homeworks 2-8 as needed. Hand in the revised requirements document. Keep it the same length and organization as your original document. Update the user interface, process descriptions, resource estimates, etc. Change the error bounds on the resource estimates to reflect the later stage of development. While you would normally include the data model, sample database and prototype prototype Web application in the revised requirements (and design documents), assume that they are available and will be delivered to the management as separate documents, to which you may refer. Thus, you should assume that homeworks 2-8 are being handed in to the management as well, and that they have been appropriately edited. Again, revise only homework 1. Add two pages of comments at the beginning of your revised requirements, addressing the following questions: What do you believe the outcomes of development efforts would be in the following two cases: Contracting development of your system to a vendor based on your original homework 1 Contracting development of your system to a vendor based on a package containing your homeworks 2-8 and revised homework 1 Do you feel that the error bounds on the resources for the next cycle are reasonable? Do they reflect the uncertainty that has been removed by the first cycle of the spiral model?

2 Do you feel the current requirements can be translated into a design and system with low risk, or are there still substantial elements of uncertainty? If so, identify the substantial elements of uncertainty. The comments should cover the following: 1. Outcome of efforts in the following two cases: Contracting development to a vendor after HW1: Vendor would have stated that the requirements are inadequate and would insist on a change order process that would be invoked many times as changes are made and details are specified. It would be a slow, costly and contentious process to build a production system from your initial requirements. The data model would have to be built, processes would be changed, the user interface would be changed, etc. Contracting development to a vendor after HW7: Vendor would be pleased that the requirements are well defined and a first version of the system exists, albeit with missing parts and imperfections. Data model, processes and user interface would be quite stable. Effort would be highly likely to succeed. 2. Error bounds on next cycle. Error bounds at the Product Design level are 0.8 to 1.25 times the point estimate. At the Detailed Design level they are 0.95 to These are narrow ranges but they should be attainable as long as omitted issues are addressed in the revised requirements. Examples are database transactions, scalability to large volumes, security, etc. 3. Can requirements be translated into a design and a system? Except for the items noted immediately above (transactions, scalability, security and a few related itesm), a system could be built by a vendor. There are a lot of other issues that would have to be addressed (installation, configuration, software maintenance, etc.) but the core system could be built. B. Telecom In your chemical manufacturing facility you have three buildings separated by streets and a river as follows. (The real estate was available and cheap.)

3 Building A is the manufacturing site; building B is the information technology facility and building C is the warehouse and shipping site; it ships by water, highway and rail. Describe three ways in which the chemical manufacturer can connect these three buildings at data rates of at least 1.5Mbps. Of the three, which would you recommend, and why? The manufacturer cannot cross streets or the river with a private network; it does not have authority to cross public rights of way. If the chemical company chose one of your options, but later had to change to another one, what else would need to change, at what levels (1-4, 7) in the 7 layer model? Describe any changes briefly. Options: DSL: Distances are one kilometer, which is within DSL distance. This is inexpensive broadband and would be appropriate. Separate DSL lines would be provided for each building. Microwave. Because the distance is short and there are no buildings in the way, and there are buildings on which to place towers, digital microwave is feasible. This could provide 45 Mbps. A LAN could be run over this link. (Don t expect students to know this.) Cable modem. Similar to DSL, but because it is shared, security would be a major problem. Traffic would probably need to be encrypted, which would slow it down. T-1. T-1 lines could be leased from a telecom carrier (who would probably provide them via DSL). Frame relay is feasible and provides 1.5 Mbps data rates reliably. Cheap, reasonable to use. Wireless. GPRS not feasible: data rate too low. WiFi not feasible: distance too great. WiMax may be feasible in the future. Dark fiber. Not feasible in general. If available, it would allow a LAN to run. ATM. Suitable for higher bandwidth and more demanding network needs. Likely to be very expensive. ATM is usually used by carriers, not enterprises, at this point.

4 Recommendation: DSL is likely to be most feasible, since each building can have its own, dedicated, relatively secure broadband connection. DSL is probably the best recommendation. Dark fiber is feasible if a carrier would provide dark fiber, but it s unlikely. The company could run a LAN protocol (Ethernet or FDDI) if dark fiber were available. Microwave is feasible and effective, with a 45Mbps data rate. Cable modem is similar to DSL but would require encryption, making its performance slower. Frame relay would work well. T-1 is feasible but likely to be expensive. ATM is feasible, high bandwidth, and expensive. Wireless is not feasible. LAN? The company could implement LAN technology via dark fiber or digital microwave. DSL, cable modem and T-1 are WAN technologies provided by carriers who will not support a LAN technology. Changes? If the company changes among all these technologies, only layers 1 and 2 change. The company would still run the same layer 7 protocols (HTTP, , etc.), layer 3-4 protocols (TCP/IP). While layer 2 within the three buildings is Ethernet, Ethernet is a LAN technology and can t be carried over a WAN (carriers are working to fake it currently) The routers (layer 3) would be plugged into different equipment at layer 2 to support the different WAN links. If a LAN were used and, say, microwave was replaced by dark fiber, Ethernet would be the layer 2 protocol in both cases, and only the layer 1 equipment would change. C. System architecture The chemical company has a Web server, application server and database server in building B. Go to and look at the latest TPC-C results for sizing the database server that will process the database queries from the Web and application servers. Assume that your company has approximately 8,000 users registered on its Web site. D. Of the top results in price/performance order, which of these systems would be appropriate to consider for the chemical company? Select at least 4; explain your choice. Remember that these systems are highly tuned to the exact characteristics of the TPC-C benchmark. E. Of the systems you chose, list the number of disks and the average delay for the stock level query. Is there a correlation? Why or why not? Briefly look at the TPC-W results, in price/performance order, on Read the white paper on the TPC-W page for background information. F. Are any of the listed configurations appropriate for the chemical manufacturer, with

5 8,000 users? Why or why not? G. Discuss the steps you would take to appropriately configure the Web server: Is the virtual storage hierarchy relevant and, if so, what are the key points to consider? Assume you have a good starting point in an appropriate system based on a TPC-C benchmark. What would you consider and how might you assess what to change? 1. Select systems 1-4 from the list: Dell PowerEdge 2650, HP ProLiant ML350T03 (3 variations, listed 2, 3, 4 in the results) The others are sized for much larger numbers of users and are not needed for the chemical company. They are more expensive and offer no advantages. 2. Summary of systems: System Users Cost Disk drives Stock lev delay Dell 18,000 $30, sec HP 14,500 $27, sec HP 15,300 $29, sec HP 15,300 $30, sec There is a correlation; the system with twice the disks has roughly half the response delay. 3. All four configurations are appropriate, and would probably just barely suffice. Their being highly tuned for about 15,000 users means they probably would work well for half that number in actual use. 4. The virtual storage hierarchy is highly relevant, as it always is! Steps to consider, based on the lecture notes: Adjust memory based on user, 5 minute or 1-5% rules. Don t accept benchmark memory based on its 180MB database size. Compute your own. Memory is critical. Processors (CPU) are based on number of users, so TPC benchmark should be fine. Disks should be fine. Check that capacity is sufficient, but usually capacity is not the determining factor. Throughput is, which is based on number of users, which the benchmark models well. Cache is from the benchmark is fine (2MB) Network card is fine; it s based on users and network traffic. Backup is not considered in the benchmark. You must add backup components (tape or FibreChannel off-site disks). With three nearby buildings, FibreChannel connected disks are feasible and should be considered. A. Assignment Turn in an MS Word document for your revised requirements and additional material from question A, and another, separate MS Word document for questions B and C.

TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2

TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2 TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2 1 INTRODUCTION How does one determine server performance and price/performance for an Internet commerce, Ecommerce,

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Schools and Libraries Universal Service Support Mechanism Eligible Services List

Schools and Libraries Universal Service Support Mechanism Eligible Services List Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Broadband Bonding Network Appliance TRUFFLE BBNA6401

Broadband Bonding Network Appliance TRUFFLE BBNA6401 Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable

More information

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Broadband Bonding Network Appliance TRUFFLE BBNA6401

Broadband Bonding Network Appliance TRUFFLE BBNA6401 Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class 1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Virtual Server in SP883

Virtual Server in SP883 Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

How To Make A Network More Reliable With A Virtualization System

How To Make A Network More Reliable With A Virtualization System A Talari Networks White Paper WAN Virtualization Transforming the Enterprise WAN! A Talari White Paper 2 WAN Virtualization - Transforming the Enterprise WAN Introduction IT departments face pressures

More information

Uninterrupted Internet:

Uninterrupted Internet: Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover White Paper Page 1 Table of Contents Executive Summary... 3 Considering The Options: Upgrades, Redundancy and

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

SAN RFP Questions and Answers

SAN RFP Questions and Answers SAN RFP Questions and Answers Questions for week ending 10/4/13 Questions from Sterling Computers What is the snapshot retention policy is and percent of change for the primary SAN? a. Is it just a 1 day

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

For the purpose of setting up a home network, all you need to worry about are two major categories of components: Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn

More information

White Paper: Virtual Leased Line

White Paper: Virtual Leased Line Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution

Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution 1. Chapter 3. Review Question 2 (Page 66) Comment on the statement, "The CPU is the brain of the computer." The CPU selects instructions,

More information

Fixed Wireless Broadband

Fixed Wireless Broadband Fixed Wireless Broadband An overview of the benefits of Dreamtilt fixed wireless broadband Copyright 2013 Dreamtilt Pty Ltd A wireless network utilizes connections between nodes without the use of wires.

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

CPET 581 E-Commerce & Business Technologies. Topics

CPET 581 E-Commerce & Business Technologies. Topics CPET 581 E-Commerce & Business Technologies E-Commerce Infrastructure Lecture Note 2 of 2 References: *Chapter 3. E-Commerce Infrastructure: The Internet, Web, and Mobile Platform of text book: e-commerce:

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Introduction. Network Basics. Workstations. Server. Hub

Introduction. Network Basics. Workstations. Server. Hub Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you

More information

A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper

A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper A Talari Networks White Paper Turbo Charging WAN Optimization with WAN Virtualization A Talari White Paper 2 Introduction WAN Virtualization is revolutionizing Enterprise Wide Area Network (WAN) economics,

More information

A Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper

A Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures

More information

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0 (CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without

More information

White Paper: Broadband Bonding with Truffle PART I - Single Office Setups

White Paper: Broadband Bonding with Truffle PART I - Single Office Setups PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

51-30-21 Selecting a Web Server Connection Rate Gilbert Held

51-30-21 Selecting a Web Server Connection Rate Gilbert Held 51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence

More information

Reliable high throughput data connections with low-cost & diverse transport technologies

Reliable high throughput data connections with low-cost & diverse transport technologies Virtual Leased Line (VLL) for Communications between Offices Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband Bonding Network

More information

A Talari Networks White Paper. Adaptive Private Networking Reliably Enabling Next Generation MSP / VNO / Outsourcing Services. A Talari White Paper

A Talari Networks White Paper. Adaptive Private Networking Reliably Enabling Next Generation MSP / VNO / Outsourcing Services. A Talari White Paper ATalariNetworksWhitePaper Adaptive Private Networking Reliably Enabling Next GenerationMSP/VNO/OutsourcingServices ATalariWhitePaper 2 AdaptivePrivateNetworkingforMSPs ExecutiveSummary Innovative MSPs,

More information

1.264 Lecture 36 (Solutions)

1.264 Lecture 36 (Solutions) 1.264 Lecture 36 (Solutions) Telecom: Wireless networks Next class: Green chapter 31,33, 36, 39. No exercise. 1 Exercise Design a system for an intercity rail passenger train to provide Internet access

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8 INDEX Introduction Page 2 Understanding Bandwidth Units Page 3 Internet Bandwidth V/s Download Speed Page 4 Factors Affecting Download Speed Page 5-7 Optimum Utilization of Bandwidth Page 8 Conclusion

More information

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming

More information

1.264 Lecture 30. System architecture

1.264 Lecture 30. System architecture 1.264 Lecture 30 System architecture Next class: Exercise due after class Please start Visual Paradigm-we ll use it in class today No zip file to download-it s online 1 Three tier architecture Web client

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Gorilla CRM System Requirements

Gorilla CRM System Requirements Gorilla CRM System Requirements A Supplement to the Bill Good Marketing System Proposal Bill Good Marketing System April 2010 White Paper Bill Good, Chairman of Bill Good Marketing, Inc. 1 PREFACE This

More information

Ethernet Passive Optical Networks EPON

Ethernet Passive Optical Networks EPON Ethernet Passive Optical Networks EPON IEEE 802.3 Ethernet in the First Mile Study Group January 8-9, 2001, Irvine, CA Gerry Pesavento Alloptic, Inc. Tel 925-245-7647 Email gerry.pesavento@alloptic.com

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

TRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes

TRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes TRACE PERFORMANCE TESTING APPROACH Overview Approach Flow Attributes INTRODUCTION Software Testing Testing is not just finding out the defects. Testing is not just seeing the requirements are satisfied.

More information

XROADS NETWORKS WHITE PAPER

XROADS NETWORKS WHITE PAPER XROADS NETWORKS WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy XROADS NETWORKS - WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy Redundancy

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Expand Your Enterprise With a Wireless Network

Expand Your Enterprise With a Wireless Network Expand Your Enterprise With a Wireless Network The Challenge: You have two weeks to build IT infrastructure for a new building on the other side of town. How can you connect this facility to the enterprise

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc. on Cellular Data Networking for SCADA system networks Presented by Teamwork Solutions, Inc. Wireless (Cellular) Data Networking Internet SCADA Server How Wireless (Cellular) Data Networking Works Dynamic

More information

Eligible Services Fall 2014 Applicant Trainings

Eligible Services Fall 2014 Applicant Trainings E rate Program Eligible Services Fall 2014 Applicant Trainings Overview Draft Eligible Services List (ESL) Category One Category Two Eligible Services Broadband Voice Services Eliminated Services Eligibility

More information

By: Mohsen Aminifar Fall 2014

By: Mohsen Aminifar Fall 2014 By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: m.aminifar@modares.ac.ir admin@parsenet.ir Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Optimize your network for voice.

Optimize your network for voice. RingCentral Office Optimize your network for voice. To contact RingCentral, please visit www.ringcentral.com RingCentral or call 1-800-574-5290. Office 1 Complete Business Phone System Design your network

More information

LAN TCP/IP and DHCP Setup

LAN TCP/IP and DHCP Setup CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are

More information

MPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d.

MPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. MPLS@NLBd.d. Janko Jager * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. Telecommunications, Portorož, 04.10.2008 NLB d.d. 1 Foreword This presentation is about NLB d.d. experience

More information

Hosted Voice. Best Practice Recommendations for VoIP Deployments

Hosted Voice. Best Practice Recommendations for VoIP Deployments Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband

More information

Server must be connected to the internet via high-speed internet connection.

Server must be connected to the internet via high-speed internet connection. Server Based System Requirements Database Server Component / Number of users 1-10 Users 11-25 Users 28-50 Users Processor Recommended 4 Cores 6 Cores 8 Cores Processor Minimum 2 Cores 4 Cores 6 Cores Memory

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Conceitos de Redes e Arquitecturas - Networks and Architectures

More information

High-performance VoIP Traffic Optimizer Client Solution

High-performance VoIP Traffic Optimizer Client Solution AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features

More information

How To Send Video At 8Mbps On A Network (Mpv) At A Faster Speed (Mpb) At Lower Cost (Mpg) At Higher Speed (Mpl) At Faster Speed On A Computer (Mpf) At The

How To Send Video At 8Mbps On A Network (Mpv) At A Faster Speed (Mpb) At Lower Cost (Mpg) At Higher Speed (Mpl) At Faster Speed On A Computer (Mpf) At The Will MPEG Video Kill Your Network? The thought that more bandwidth will cure network ills is an illusion like the thought that more money will ensure human happiness. Certainly more is better. But when

More information

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu PeteDulany@yahoo.com, ChangSooKim@yahoo.com, jyu@cs.depaul.edu School of Computer Science,

More information

Product Overview. Steve Erickson

Product Overview. Steve Erickson Product Overview Steve Erickson Memorylink products GPS-100C Flanger About Flanger TDM over IP, wired or wireless applications Wireless T1/E1 using Ethernet radios 1-4 T1 s or E1 s per unit Additional

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

APPOSITE TECHNOLOGIES Smoothing the Transition to 10 Gbps. WAN Emulation Made Easy

APPOSITE TECHNOLOGIES Smoothing the Transition to 10 Gbps. WAN Emulation Made Easy APPOSITE TECHNOLOGIES Smoothing the Transition to 10 Gbps WAN Emulation Made Easy The Transition to 10 Gbps 1. THE PROBLEM - Application Performance 2. THE SOLUTION - Performance Validation Using WAN Emulation

More information

Chapter 5: Understanding Internetworking Infrastructure

Chapter 5: Understanding Internetworking Infrastructure Chapter 5: Understanding Internetworking Infrastructure Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future? A Graphical

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

Network performance and capacity planning: Techniques for an e-business world

Network performance and capacity planning: Techniques for an e-business world IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,

More information

Transporting Legacy Switched Digital Circuits Using a Packet Network

Transporting Legacy Switched Digital Circuits Using a Packet Network Transporting Legacy Switched Digital Circuits Using a Packet Network Engage Communication is the manufacturer of high-speed data communications products, specifically targeting the growing market for converting

More information

Chapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Thirteen Network Design and Management Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Recognize the systems

More information

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1 Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Effective NZ Small Business Redundancy and Disaster Recovery

Effective NZ Small Business Redundancy and Disaster Recovery Effective NZ Small Business Most small enterprises prepare for catastrophic events such as fire, theft or natural disasters by purchasing insurance and writing documentation. Unfortunately, in a significant

More information

Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies

Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies Page 1 Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies Introduction This paper explains the concepts of Storage Area Network or SAN, iscsi technology and how

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information