MONITORING AND MEASUREMENT OF COMPUTER NETWORK PERFORMANCE
|
|
|
- Meghan Watson
- 10 years ago
- Views:
Transcription
1 G. Martinovic, B. Petrisevac, D. Zagar MONITORING AND MEASUREMENT OF COMPUTER NETWORK PERFORMANCE ISSN UDC/UDK : Goran Martinovic, Bruno Petrisevac, Drago Zagar Original scientific paper Regardless of fast performance improvements in the field of network technologies and their pervasiveness, today's computer-demanding and service-oriented applications require efficient management of networks. Besides monitoring collision, broadcast and errors, utilization measurement of a local commutated network was carried out by means of a software tool. Measurement was carried out at two different levels of artificially generated continuous workload and by varying workload caused by intensive use of network resources. In our experiments, the monitored network showed that it is resistant to collisions and errors, but also sensitive to workload dynamics characterized by utilization changes. These changes show certain regularity and periodicity and can be considered as a good behavior pattern of a network. The approach proposed enables prediction of accessibility of computer resources by their engagement in complex distributed computer environments. Key words: network behavior pattern, operational analysis, performance monitoring, utilization measurement Izvorni znanstveni članak Bez obzira na brzo poboljšanje performansi mrežnih tehnologija i njihove prodornosti, današnji računalno zahtjevni i uslugama usmjereni primjenski programi, zahtijevaju učinkovito upravljanje mrežom. Uz nadzor srazova, prijenosa i pogrešaka, programskim alatom obavljeno je i mjerenje korisnosti. Mjerenje je provedeno na dvije različite razine umjetno generiranog opterećenja, te promjenjivog opterećenja izazvanog intenzivnom uporabom mrežnih resursa. U provedenim eksperimentima, nadzirana mreža pokazala je otpornost na srazove i pogreške, ali i osjetljivost na dinamičnost opterećenja, odnosno promjene korisnosti. Takve promjene pokazuju određenu pravilnost i periodnost, te se mogu smatrati dobrim uzorkom ponašanja mreže. Predloženi pristup omogućava predviđanje dostupnosti računalnih resursa pri njihovom uključivanju u složene raspodijeljene računalne okoline. Ključne riječi: nadzor performansi, mjerenje korisnosti, operacijska analiza, uzorak ponašanja mreže 1 Introduction Uvod When we talk about computer intensive and timecritical applications, i.e. service-oriented applications and applications on demand, special attention should be paid to efficient network management. The aforementioned is additionally worsened by many users, their heterogeneity, service providers and network infrastructure [1]. As to these conditions, it is necessary to detect factors determining network performances and to have an overview of performance evaluation possibilities. According to [2], out of all network performance modeling and evaluation tools, the most complete overview of real performances as well as prediction of performance patterns can be provided by operational analysis. It can be used if network performance monitoring is enabled by corresponding software and hardware tools which yield necessary experimental results referring to the observed interval. According to [3, 4, 5], one of the important performance indicators is definitely network utilization. Section 2 outlines most important factors determining network performance, stressing also the problem of network congestion. Section 3 describes arguments for performance evaluation, as well as tools, i.e. modeling and evaluation modes. Section 4 presents software tools for traffic generation and performance monitoring, as well as the commutator importance in design of a network. Section 5 gives an overview of two experiments in which we measured network utilization and some other performance indicators at two levels of continuous workload by additional varying workload [6]. In the same section, network performance was analyzed with reference to the performance pattern within the observed interval of 24 hours. 2 Network Performance Indicators Pokazatelji performansi mreže 2.1 Factors affecting network performance Čimbenici koji utječu na performanse mreže Network communication is according to [7] limited by various factors, such as available bandwidth, network congestion, delay, server performance, and complexity of the protocol for network management. In addition to a great number of network users, there are several factors which, when combined, test usability bounds of a traditional local area network (LAN): - Multitasking environment present in current operating systems enables concurrent network transactions. - Intensive network applications such as the World Wide Web have also been used increasingly. - Applications based on the client-server model do not require workstations to store information or to ensure space on the hard disk for their storage. According to [8], such applications will be probably used more significantly, but in a more sophisticated form. According to [1, 9, 10], performance of the LAN common medium Ethernet/802.3 can be affected negatively by many factors. Ethernet uses the carrier sense multiple access/collision detect (CSMA/CD) method described in [11] and supports high transmission rates. The goal of the Ethernet is to offer the best possible delivery services and enable all devices on the common media to have equal conditions referring to data transmission. Collisions take place regularly on the Ethernet networks and can become a major problem. Technical Gazette 17, 3(2010),
2 Monitoring and measurement of computer network performance G. Martinovic, B. Petrisevac, D. Zagar 2.2 Network congestion Zagušenje mreže A combination of powerful workstations and intensive network applications, i.e. usage of huge files, real-video, as well as demanding multimedia applications in general, requires an increasingly greater network throughput. On the other hand, the number of network users is on the rise as well. Network congestion is caused by an increase in the number of users using the network for sharing big files, access to file servers, and connection to the Internet. The consequences are increased response time, slower transmissions of files, and thereby less productive network users [12]. In order to reduce network congestion, what is necessary is either a larger bandwidth or a more effective use of the available bandwidth. Network efficiency is improved significantly by monitoring and management of its performance. 3 Performance Evaluation Vrednovanje performansi 3.1 Need for performance evaluation Potreba za vrednovanjem performansi According to [2], computer architecture, operating system, database and LAN represent elements for improvement of efficiency of application execution. In case of improper use, efficiency might be reduced. Computer systems based on decentralized, parallel and distributed architectures are constantly being designed and brought into use [13]. Computer system components are becoming more complex, and at the same time requests referring to reliability and availability are higher, as in [14, 15]. 3.2 Modeling tools Alati za vrednovanje According to [2], main types of modeling tools are analytic, simulation, testbed and operational analysis. Section 5 describes utilization measurement of a local network based on operational analysis of the existing system. Analytic modeling tools refer to a skill of describing a model by means of mathematical expressions. If the system can be considered as a set of queues by which service delivery time and waiting time may be defined analytically, then queuing analyses can be applied to problem solving. Simulation implies that a real system model is shown by means of a certain programming language for simulation execution. Simulations enable laboratory conditions for system testing without influencing the real system. Testbeds are used for studying system components and their mutual interaction in order to reach the heart of the real system. They are made of prototypes and parts of components of the real system. This method is focused on a subset of the whole systems. It might be used for the analysis of various components of networks. According to [16], compression and simplification of the system are not important in operational analysis, but rather getting information from the real system. Analysis of this information provides a good projection of future behavior, i.e. system operation. Operational analysis covers measurement and estimation of the real system. Measurements are carried out by using software and hardware monitoring devices. Hardware monitoring devices include probes and sensors, counters, as well as devices for data display and recording. Software monitoring records certain events and information about the system state. Analysis results can be used for improving performances and setting up new bounds of the system, i.e. for improvement of the existing system. 3.3 Selection criteria for modeling and evaluation tools Kriteriji izbora alata za modeliranje i vrednovanje As in [17], selection of a more appropriate performance evaluation method is directed by the following criteria: level of computer system development, limitation of time necessary for analysis, hardware and software tools availability, possibility of a simple and complete comparison of various methods and costs of performance analysis. Due to its advantages described in [18], Network Inspector, a software tool for network monitoring [9], is selected for utilization measurement and monitoring of the local network. 4 Testing Environment Ispitna okolina 4.1 Network Inspector Network inspektor As described in [18, 23], Network Inspector is a Windows application. In combination with Fluke Networks equipment it enables network monitoring, capacity planning and error detection. The version used in this research can enable an insight into the network as well as the state of devices. It also generates network collisions, warnings and messages. Network Inspector consists of the following components: 1. Agent Manager, which detects and analyzes information about network and subnetworks. 2. Microsoft Access ODBC (Open DataBase Connectivity) database, in which the Agent stores information about network and devices. 3. Console, which enables the information from the selected database, as well as a general or detailed overview of this information. It is possible to select a display of the problems that have emerged, devices detected on the network and information about a particular device as well as local networks [19, 20]. Network Inspector can make the following reports: Top Interfaces by Collision Rate, Top Interfaces by Broadcast Rate, Top Interfaces by Error Rate, Top Interfaces by Average Utilization, Switch Performance, Details and Problem Log. Utilization is, according to [2, 23], a measure of effective activity of the resources observed. A utilization diagram shows the percentage of available bandwidth used on that port. Network Inspector generates a warning if utilization crosses the warning threshold of 50 %. Also, if the error threshold is crossed (greater than 80 %), an error report is generated. Utilization in percents is calculated according to expression (1): 318 Tehnič ki vjesnik 17, 3(2010),
3 G. Martinovic, B. Petrisevac, D. Zagar in out in out 8 20 n n n n, u packets packets octets octets (1) bw where: u - utilization n - total number of input packets in packets out npackets in octets out octets - total number of output packets n - number of input octets n - number of output octets bw - network bandwidth. 4.2 Cisco Catalyst 2950SX-24 commutator Cisco Catalyst 2950SX-24 komutator Cisco Catalyst 2950SX-24 described in [21] is a controlled commutator with two permanent 1000BASE-X ascending connections, which enables users' connection. It is very suitable for optical networks. Also, it is characterized by increased redundancy and availability, as well as adequate commutator connection. For the Catalyst 2950 series a Cisco Network Assistant is available, a free application for centralized management which simplifies administration tasks referring to Cisco commutators, routers and wireless access points. 5 Analysis of Experimental Results Analiza eksperimentalnih rezultata 5.1 Experimental environment Pokusna okolina Measurements were carried out on a local network with 20 desktop and mobile computers and two servers networked through a commutator [21]. Computers are characterized by processors with clock frequency ranging from 1, 5 to 2, 8 GHz and RAM ranging from 512 MB to 2 GB, and the MS Windows XP. Servers have the same processor and capacity. All computers are networked by previously described Cisco Catalyst 2950SX-24 commutator. Network monitoring is carried out by Fluke Network Inspector, which communicates with the Cisco commutator. Traffic generator TfGen [22] generates increased workload of the commutated LAN. Two measurements were carried out for 24 hours, as proposed in [23]. Network behavior was monitored by continuous workload of 50 % and 80 % and usual network workload. Network utilization was measured on every possible port on the commutator. In accordance with capacities of the Network Inspector tool, results are displayed for ten ports with the greatest utilization. 5.2 Experiment 1 by continuous workload Eksperiment 1 pri stalnom opterećenju The first measurement started at 10:00 a.m. and ended at 10:00 a.m. next day. Continuous network workload of 80 % is produced by a traffic generator TfGen, whereas additional workload is achieved by searching the Internet, data transfer, video and audio streaming, and copying 4 GB images from the server, similarly to [24]. In terms of generated and usual network traffic, the commutator enables that computers receive the data simultaneously from the preceding computer and transmit them to the next computer. For the purpose of transmission and reception of generated traffic 40 % of the bandwidth was used, which combined gives continuous network workload of 80 % at every port with speed of 100 Mbps. After one day, Network Inspector reported us about 10 ports with the greatest network utilization. According to Fig. 1.a, great network utilization u is reached at port 22 to which the server is connected from which the network is monitored. Average utilization was 82,38 %, while peak utilization upeak was 84,26 % at 15:21 p.m. The second port was 12 (Fig. 1.b) at which was equal to 81,65 %, and upeak 84,11 % at 13:32 p.m. At port 11 (Fig. 1.c) had the greatest value of 81,53%, and upeak was equal to 84,11 % at 3:40 p.m. At port 8 (Fig. 1.d) the measured was 81,36 % and upeak was 88,61 % at 18:29 a.m. At port 21 (Fig. 1.e) was 81,33 % while upeak was 83,27 % at 12:05 a.m. On all five ports, a change in u is noticeable during the day in comparison to an approximately constant u value during the night. Within the 24 hours under observation, at those ports computers exerted network workload of 80 % and communicated successfully, ran the traffic generator, downloaded data from the Internet and the server. There follows port 15 (Fig. 1.f) at which at 9:05 p.m. and upeak were equal to 64, 14 % and 83, 97 %, respectively. A significant change in values of u can be noticed during the day, whereas a utilization decrease to about 40 % is noticeable between midnight and 9:00 a.m. This is caused by computer overload, and it caused failures of certain computers. Within that failure interval, the computer at port 15 was only receiving traffic from the neighboring computer connected to port 16, but it was not able to generate and transmit traffic to the computer connected to port 14, which failed. At port 18 (Fig. 1.g) at 3:55 p.m. was measured to be 56,32 % and upeak was 84,16 %. A considerable change in daytime values is noticeable, with no communication at all (i.e. u was 0) in the period between 1:00 and 9:00 a.m. Within that period, the computer at port 18 neither generated nor transmitted traffic, which means that both neighboring computers connected to ports 17 and 19 failed. At port 16 (Fig. 1.h) at 1:10 p.m. and upeak were 56,07 % and 86,98 %, respectively. An expected utilization change in daytime values is noticeable, but between 6:00 p.m. and 9:00 a.m. u was about 40 %. During that period the computer was only transmitting traffic to the next computer at port 15, but it did not receive any traffic from the preceding computer at port 9, which was out of order. There follows port 10 (Fig. 1.i) at which at 10:47 a.m. the measured and upeak were 56,02 % and 87,31 %, respectively. A significant change in daytime values is noticeable, and a decrease of u to about 40 % between 6:00 and 9:00 a.m. During that time, the computer at port 10 was only receiving traffic from the computer at port 11, but it could neither generate nor transmit traffic since the neighboring computer at port 9 failed. Finally, at port 24 (Fig. 1.j) at 9:12 a.m. and upeak were 50,86 % and 84,43 %, respectively. A significant change of u is noticeable by 3:00 p.m., and after that by 9:00 a.m. u was about 40 %. After that, the computer did not receive traffic from port 17, which failed, but it only transmitted traffic to port 22. Technical Gazette 17, 3(2010),
4 Monitoring and measurement of computer network performance G. Martinovic, B. Petrisevac, D. Zagar Figure 1.a-e Utilization at first 5 ports with the greatest utilization in Experiment 1 Slika 1.a-e. Korisnost na prvih 5 pristupa prema razini korisnosti u Eksperimentu 1 Tab. 1 shows and upeak at every port for Experiment 1, as proposed in [19]. The total average network utilization at these ten ports is 71,20 %. The standard deviation is 12,88 %, because of the range of single (at ports) from the highest 82,38 % to the lowest ulow 50,86 %. Fig. 2 shows values, upeak and for Experiment 1. The greatest positive deviation from the total average value is present at port 22 (+13,14 %), whereas port 24 records the greatest negative offset of 20,34 %. Computers at ports with measured values that are greater than have successfully completed their testing jobs, achieving between 80 and 85 %. Computers connected to ports at which individual measured values of are less than did not meet the mentioned values of, due to failures of computers they communicated with because of higher workload. Peak utilizations upeak are equal at almost all ports, with the exception of port 8 with u of peak 320 Tehnič ki vjesnik 17, 3(2010),
5 G. Martinovic, B. Petrisevac, D. Zagar Figure 1.f-j Utilization at second 5 ports with the greatest utilization in Experiment 1 Slika 1.f-j. Korisnost na drugih 5 pristupa prema razini korisnosti u Eksperimentu 1 88,61 %. There was no network congestion during the experiment. 5.3 Experiment 2 by varying workload Eksperiment 2 pri promjenjivom opterećenju The second measurement started at 1:30 p.m. and ended at 1:30 p.m. next day. Similarly to [25], continuous network workload of 50 % is achieved by means of a traffic generator TfGen, whereas additional workload is achieved by searching the Internet, data transfer, video and audio streaming, and copying 2 GB images from the server. Artificially generated traffic was carried out pairwise. By means of a traffic generator and through the commutator, every computer received the data simultaneously from the computer it was paired to and transmitted the data to the Technical Gazette 17, 3(2010),
6 Monitoring and measurement of computer network performance G. Martinovic, B. Petrisevac, D. Zagar same computer. For the purpose of reception and transmission of generated traffic 25 % of the bandwidth was used, which combined gives continuous network workload of 50 % at every port with the speed of 100 Mbps. After 24 hours Network Inspector recorded 10 ports with the greatest network utilization. The greatest network utilization is reached at port 7 (Fig. 3.a) to which the server is connected at which the antivirus software is replenished and from which a 2 GB image was copied to other computers. The second server connected to port 8 generated traffic by means of a TfGen which exerted continuous network workload of 50 % at port 7. At 2:20 p.m. the values of and upeak were 58,27 % and 95,21 %, respectively. A noticeable high value of u is observed during daytime due to jobs executed by this server, and more uniform values of about 50 % during night. Network utilization at port 7 usually crossed 80 %, and that is the value at which Network Inspector reports an error ( ). When the utilization value is 50 %, a warning ( ) is reported. These messages are recorded in Problem Log and they indicated that the network administrator should react and prevent possible network congestion. Measurement equipment listed problems containing error messages due to network utilization greater than 80 % at port 7, as well as warning messages due to network utilization greater than 50 % at other ports. The second is port 8 (Fig. 3.b) to which the server is connected from which network monitoring is carried out and which generated and transmitted traffic to the server with antivirus software at port 7. At 1:01 a.m. the value of was 52 %, and of upeak 55,96 %. At port 22 (Fig. 3.c) at 1:01 p.m., and u were 51,67 % and 61,32 %, respectively. 322 Table 1 Network utilizations in Experiment 1 Tablica 1. Korisnost mreže u Eksperimentu 1 Port u/% u peak/% u total/% u/ % 22 82,38 84, ,65 84, ,53 84, ,36 88, ,33 83, ,14 83, ,32 84, ,07 86, ,02 87, ,86 84,43 peak 71,20 12,88 Figure 2 Network utilization for Experiment 1 Slika 2. Korisnost mreže za Eksperiment 1 The value of u was greater during daytime and continuous during night, but its value decreased to about 25 % between 9:00 and 10:00 a.m. During that period the computer at port 22 was only transmitting data to the computer connected to port 24, but it did not receive any traffic from it. At 12:40 p.m., at port 15 (Fig. 3.d) the values of and upeakwere 51,51 % and 62,73 %, respectively. At 4:31 p.m. at port 16 (Fig. 3.e) and upeak were 51,42 % and 63,04 %, respectively. A significant change of u is noticeable during daytime, primarily because of copying images from the server. Then it is continuous during the night, after which it fails to communicate between 9:00 and 10:00 a.m. In that period, computers neither mutually transmitted nor received data at ports 15 and 16. At 00:11 a.m., at port 24 (Fig. 3.f) and upeak were 51,25 % and 56,40 %, respectively. A slight difference of u is noticeable during daytime, continuous u is recorded during the night, but between 9:00 and 10:00 a.m. u is reduced to about 25 %. Within that one hour the computer at this port did not generate traffic, but it only received traffic from the computer at port 22 it was in pair with. At 12:12 p.m., at port 21 (Fig. 3.g) and upeak were measured 43,08 % and 61,23 %, respectively. The change of u during daytime was expected, but between 1:00 and 10:00 a.m. it was reduced to about 25 %, which caused failure as to traffic generation. At 1:21 p.m., at port 17 (Fig. 3.h) and upeak were 43,05 % and 60,52 %, respectively. The u changed during daytime and decreased to about 25 % between 1:00 and 10:00 a.m. During that period, the computer at port 17 generated and transmitted traffic to the computer connected to port 21, but it did not receive any traffic from it. At 12:20 p.m., at port 19 (Fig. 3.i) and upeak were measured 41,82 % and 61,11 %, respectively. A change of u is recorded in daytime, which is then reduced to about 25 % between 1:00 and 9:00 a.m., after which there is no traffic flow between 9:00 and 10:00 a.m. As of 1:00 a.m. the computer at port 19 did not receive, but it only generated and transmitted traffic to the computer at port 18. Between 9:00 and 10:00 a.m. computers failed at ports 18 and 19, which caused a break in traffic transmission and reception. At 12:40 p.m., at port 18 (Fig. 3.j) and upeak were 41,69 % and 62,09 %, respectively. The corresponding utilization diagram is similar to the previous one, since these computers operated in pairs. A change of u is noticed during daytime, utilization is reduced to about 25 % between 1:00 and 9:00 a.m., when the computer at port 18 stopped generating traffic and only received traffic from the computer at port 19. Between 9:00 and 10:00 a.m. both reception and transmission were stopped because of the failure of computers at ports 18 and 19. Tab. 2 shows measurement results referring to network utilization in Experiment 2 for ten ports with the greatest values of, upeak and, which amounts to 48,57 % at these ten ports, whereas standard deviation is equal to 5,71 %. Individual average utilizations at ports range between the highest 58,27 % and the lowest 41,69 %. Fig. 4 shows a network utilization diagram for ten ports with the highest measured values in Experiment 2. The greatest positive offset from the total average value at port 7 is +9,70 %, while at port 18 the greatest negative offset of was 6,88 %. At six ports individual are greater than. Computers at these ports did their job with minor failures and greater than 50 %. Computers connected to ports at which individually measured are less than did not reach the expected of 50 %. The reason for that are computer failures in specific periods of Tehnič ki vjesnik 17, 3(2010),
7 G. Martinovic, B. Petrisevac, D. Zagar Figure 3.a-e Utilization at first 5 ports with the greatest utilization in Experiment 2 Slika 3.a-e. Korisnost na prvih 5 pristupa prema razini korisnosti u Eksperimentu 2 time, i.e. a break in data generation and transmission due to high workload. Values of upeak are almost equal at all ports, excluding port 7 at which the antivirus software server is placed, so that the greatest upeak of 95,21 % was measured exactly at it. No network congestion was recorded during measurements. Network utilization measurements at generated constant workload of 80 % in Experiment 1 and 50 % in Experiment 2 resulted in average utilization values of 69,44 %, i.e. 48,57 %. In both experiments no congestion of the commutated network was recorded, and neither were collisions and errors, but values of were lower than expected, mostly due to failures of particular computers, but partly because of insufficient processor capacity for the given working conditions. Accuracy of network parameters measurement is described in [26] and [27]. Technical Gazette 17, 3(2010),
8 Monitoring and measurement of computer network performance G. Martinovic, B. Petrisevac, D. Zagar Figure 3.f-j Utilization at second 5 ports with the greatest utilization in Experiment 2 Slika 3.f-j. Korisnost na drugih 5 pristupa prema razini korisnosti u Eksperimentu 2 6 Conclusion Zaključak Pervasive and rapid development of network technologies and computer systems needs precise performance monitoring, evaluation and control. This also implies not only active network monitoring and management by the administrator, but also a series of procedures related to autonomous network management 324 possibly supported by hardware and software components. That management was executed at operational, information, communication and functional level. Operational analysis provides the best insight into network performance. Local commutated network utilization and other performance indicators were measured. Network utilization and other parameters were measured in duration of 24 hours through two experiments. Workload was generated by the traffic generator made by means of software. In the first and the second experiment continuous Tehnič ki vjesnik 17, 3(2010),
9 G. Martinovic, B. Petrisevac, D. Zagar Table 2 Utilization in Experiment 2 Tablica 2. Korisnost u eksperimentu 2 Port u/% u peak/ % u total/% u /% 7 58,27 95, ,00 55, ,66 61, ,51 62, ,42 63, ,25 56,40 48,57 5, ,08 61, ,04 60, ,82 61, ,69 62,09 Figure 4 Utilization for Experiment 2 Slika 4. Korisnost mreže za Eksperiment 2 workload was 80 % and 50 %, respectively. In addition to that continuous workload, varying workload consisted of various data transfers from the local server and the Internet. By observing performance indicators we concluded that the commutated network is not liable to errors, congestion and collision. Utilization at monitored ports indicates a possibility for determination of a utilization, performance and network capacity behavior patterns. For a more complete insight into network performance pattern, it is necessary to carry out measurements in a longer period of time and observe seasonal changes. Network parameter patterns provide important information which can initiate engagement of additional capacities of the observed network segment. In other words, intervals in which the network is overloaded even without additional workload (low utilization) are proposed and no high performance is to be expected from it. Current and further research deals with higher network complexity, heterogeneity and dynamics. It is targeted to inclusion of non-dedicated computers and wireless network resources in computational clusters and grid infrastructure. 8 Acknowledgement Zahvala This work was supported by research project grant No from the Ministry of Science, Education and Sports of the Republic of Croatia. 9 References Literatura [1] Guoqiang, M.; Habibi, D. Loss Performance Analysis for Heterogeneous on-off Sources with Application to Connection Admission Control.// IEEE/ACM Transactions on Networking, 10, 1( 2002 ), [2] Fortier, P. J.; Michel, H. E. Computer Systems Performance Evaluation and Prediction, Digital Press, USA, [3] Green, K. Internet Game Network Utilization on College Campuses.// Journal of Computing Sciences in Colleges, 20, 5( 2005 ), Consortium for Computing Sciences in Colleges, [4] Shiomoto, K.; Chaki, S.; Yamanaka, N. A Simple Bandwidth Management Strategy Based on Measurements of Instantaneous Virtual Path Utilization in ATM Networks.// IEEE/ACM Transactions on Networking, 6, 5( 1998 ), [5] Weiguang, S.; MacGregor, M. H.; Gburzynski, P. Load Balancing for Parallel Forwarding. // IEEE/ACM Transactions on Networking, 13, 4( 2005 ), [6] el Allali, H.; Heijenk, G.; Lo, A.; Niemegeers, I. A Measurement-Based Admission Control Algorithm for Resource Management in Diffserv IP Networks.// in Proc. of th IEEE 17 Int. Symp. Personal, Indoor and Mobile Radio Communications, 2006., 1-5. [7] Parthasarathy, M. Analysis of Network Management of Remote Network Elements, in Proc. of Int. Conf. on Networking, Systems and Mobile Communications and Learning Technologies, 2006., pp. 57. [8] Nieh, J.; Yang, S. J.; Novik, N.Measuring Thin-Client Performance Using Slow-Motion Benchmarking.// ACM Transactions on Computer Systems, 21, 1( 2003 ), [ 9] Breitbart, Y.; Chee-Yong, C.; Garofalakis, M.; Rastogi, R.; Silberschatz, A. Efficiently Monitoring Bandwidth and th Latency in IP Networks.// in Proc. 20 Annual Joint Conf. of the IEEE Computer and Communications Societies, 2001., pp [10] Li, M.; Sandrasegaran, K. Network Management Challenges th for Next Generation Networks.// in Proc. of 30 Annual IEEE Conference on Local Computer Networks, 2005., [ 11] Harfoush, K.; Bestavros, A.; Byers, J. Measuring Bottleneck nd Bandwidth of Targeted Path Segments.// in Proc. of 22 IEEE Annual Joint Conf. of the Computer and Communications Societies, 2003., pp [ 12] Zhao, Yong-xiang; Li, Chun-xi; Chen, Chang-jia. Sandwich: a New Tool That Can Identify Bottleneck Link by End to End Measurement.// in Proc. of Int. Conf. on Communication Technology, 2006., pp [ 13] Lowekamp, B. B. Combining Active and Passive Network Measurements to Build Scalable Monitoring Systems on the Grid, ACM SIGMETRICS Performance Evaluation Review, 30, 4( 2003), pp [ 14] Egyhazy, M. W.; Yao, L. Predicted Sum: A Robust Measurement-Based Admission Control with Online Traffic Prediction.// IEEE Communications Letters, 11, 2( 2007 ), [15] Jain, M.; Dovrolis, C. End-to-End Available Bandwidth: Measurement Methodology, Dynamics, and Relation with TCPThroughput.// IEEE/ACM Transactions on Networking, 11, 4( 2003 ), [ 16] Papagiannaki, K.; Cruz, R.; Diot, C. Characterization: Network Performance Monitoring at Small Time Scales.// in rd Proc. of 3 ACM SIGCOMM Conf. on Internet Measurement, 2003., pp [17] Montes, M.; Swiatczak, J.; Lesniewski, P. J.; Thomas, J. C.; Golczak, M. Universal Laboratory Networking System (ULabNet). // in Proc. of IEEE Instrumentation and Measurement Technology Conf., 2006., pp [18] Fluke Networks, Technical Gazette 17, 3(2010),
10 Monitoring and measurement of computer network performance G. Martinovic, B. Petrisevac, D. Zagar [19] Hanemann, A.; Jeliazkov, V.; Kvittem, O.; Marta, L.; Metzger, J.; Velimirovic, I. Complementary Visualization of perfsonar Network Performance Measurements.// in Proc. of 2006 Int. Conf. Internet Surveillance and Protection, 2006., pp [20] Habib, A.; Fahmy, S.; Bhargava, B. Monitoring and Controlling QoS Network Domains. // Int. Journal of Network Management, 15, 1( 2005 ), [21] Cisco Systems, Inc., [22] Traffic Generator, TfGen, [23] Martinovic, G.; Zagar, D.; Tomic, D. Network performance monitoring and utilization measurement.// in Proceedings of the European Computing Conference, Vol. 1, Lecture Notes in Electrical Engineering Vol. 27 (N. Mastorakis, V. Mladenov, V. Kontargyri, Eds.), Springer, New York, 2009., pp [24] Bergeron, R. J. Measurement of a Scientific Workload Using the IBM Hardware Performance Monitor.// in Proc ACM/IEEE Conference on Supercomputing, 1998., pp. 49. [ 25 ] Raz, D. Efficient Network and Traffic Monitoring. // in Proc. th 10 IEEE/IFIP Symposium on Network Operations and Management Symposium, 2006., pp [ 26] Roughan, M. Fundamental Bounds on the Accuracy of Network Performance Measurements, ACM SIGMETRICS Performance Evaluation Review.// 33, Issue 1, ACM Press, 2005., pp [27] Saito, H.; Chusho, T. Design and Implementation of a Network Performance Evaluation System through Client th Observation. // in Proc. of 10 Annual Internet Society Conference, Authors' Address Adrese autora Associate Professor Goran Martinovic, PhD Faculty of Electrical Engineering J. J. Strossmayer University of Osijek Kneza Trpimira 2b Osijek, Croatia Phone: Fax: [email protected] Bruno Petrisevac, BSc Faculty of Electrical Engineering J. J. Strossmayer University of Osijek Kneza Trpimira 2b Osijek, Croatia Full Professor Drago Zagar, PhD Faculty of Electrical Engineering J. J. Strossmayer University of Osijek Kneza Trpimira 2b Osijek, Croatia 326 Tehnič ki vjesnik 17, 3(2010),
Network Performance Evaluation of Latest Windows Operating Systems
Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia
EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS Shubhangi Rastogi 1, Samir Srivastava 2 M.Tech Student, Computer Science and Engineering, KNIT, Sultanpur, India 1 Associate
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Measuring the Impact of Security Protocols for Bandwidth
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 131-137 MEACSE Publications http://www.meacse.org/ijcar Measuring the Impact of Security
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
VoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia [email protected] QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
Product Overview. Steve Erickson
Product Overview Steve Erickson Memorylink products GPS-100C Flanger About Flanger TDM over IP, wired or wireless applications Wireless T1/E1 using Ethernet radios 1-4 T1 s or E1 s per unit Additional
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3
Contents 1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 2.1. SERVER-BASED COMPONENTS:... 3 2.1.1. Interception Server... 3 2.1.2. Database server... 3 2.1.3. Data processing server... 3 2.1.3.1. Search
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
How To Model A System
Web Applications Engineering: Performance Analysis: Operational Laws Service Oriented Computing Group, CSE, UNSW Week 11 Material in these Lecture Notes is derived from: Performance by Design: Computer
Implementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
A Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: [email protected] Bulgaria
Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
Analysis of QoS Routing Approach and the starvation`s evaluation in LAN
www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,
Self-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
QoS in VoIP. Rahul Singhai Parijat Garg
QoS in VoIP Rahul Singhai Parijat Garg Outline Introduction The VoIP Setting QoS Issues Service Models Techniques for QoS Voice Quality Monitoring Sample solution from industry Conclusion Introduction
Comparing the Network Performance of Windows File Sharing Environments
Technical Report Comparing the Network Performance of Windows File Sharing Environments Dan Chilton, Srinivas Addanki, NetApp September 2010 TR-3869 EXECUTIVE SUMMARY This technical report presents the
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China [email protected]
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University
VoIP Performance Over different service Classes Under Various Scheduling Techniques
Australian Journal of Basic and Applied Sciences, 5(11): 1416-1422-CC, 211 ISSN 1991-8178 VoIP Performance Over different service Classes Under Various Scheduling Techniques Ahmad Karim Bahauddin Zakariya
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Performance analysis and comparison of virtualization protocols, RDP and PCoIP
Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang
1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Development of Monitoring Tools for Measuring Network Performances: A Passive Approach
IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun,
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Distributed applications monitoring at system and network level
Distributed applications monitoring at system and network level Monarc Collaboration 1 Abstract Most of the distributed applications are presently based on architectural models that don t involve real-time
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
D-Link DES-1024D 24-Port 10/100Mbps Ethernet Switch. Manual
D-Link DES-1024D 24-Port 10/100Mbps Ethernet Switch Manual TABLE OF CONTENTS About This Guide... 1 PURPOSE...1 TERMS/USAGE...1 OVERVIEW OF THIS USER S GUIDE...1 Introduction... 2 FAST ETHERNET TECHNOLOGY...2
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Research Article Average Bandwidth Allocation Model of WFQ
Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications
Multimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: [email protected]
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization
Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization Samuel N. John 1, Charles Ndujuiba 2, Robert Okonigene 3, Ndeche Kenechukwu 4 1,2,4 Department of Electrical and Information
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Java Based VoIP Performance Monitoring Tool
, October 20-22, 2010, San Francisco, USA Java Based VoIP Performance Monitoring Tool Husna Zainol Abidin, Mohd Ameer Yuslan Razmi, Farah Yasmin Abdul Rahman, Ihsan Mohd Yassin Abstract This paper describes
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY
CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon E-mail: [email protected] ABSTRACT This paper presents
Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus
Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus Shahbaz Akhatar Siddiqui Student MS (Telecom) Hamdard University Karachi Junior Lecturer in National
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous Environment
30 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications
Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, 500 03 Hradec Kralove Czech
The Conversion Technology Experts. Quality of Service (QoS) in High-Priority Applications
The Conversion Technology Experts Quality of Service (QoS) in High-Priority Applications Abstract It is apparent that with the introduction of new technologies such as Voice over IP and digital video,
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET Abstract: Dr. Hussein A. Mohammed*, Dr. Adnan Hussein Ali**, Hawraa Jassim Mohammed* * Iraqi Commission
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Efficient DNS based Load Balancing for Bursty Web Application Traffic
ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
