Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Size: px
Start display at page:

Download "Real-Time Analysis of CDN in an Academic Institute: A Simulation Study"

Transcription

1 Journal of Algorithms & Computational Technology Vol. 6 No Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management Kozhikode + Sri Vasavi College, Erode psperode@yahoo.com Received: 01/03/2011; Accepted: 26/04/2012 ABSTRACT This paper examines the website performance analysis of the Content Delivery Network (CDN) against the normal webhosting method, by using the existing resources available in an academic institute. It also compares the collected real-time data with CDN simulation software. In this experiment, URL rewriting is the method adopted for the CDN and reverse proxy. It aims to improve the response time of access to the web site by overcoming the flash crowd and provide the content of the web site in the most efficient manner. The significance of this method is that it allows for using the existing and available local resources and it calls for no additional investment on infrastructure from the part of the organization. A detailed real-time account of both the methods and analyses, towards finding out the best suitable method is illustrated. 1. INTRODUCTION The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time, as there were only very few users. However, over the years, there has been drastic increase in the number of users accessing the web content over the network. The web content providers are unable to deliver the quality of service due to variety of reasons, say, bandwidth, server load, response time, flash crowd, denial of service, system architecture etc. In order to address the above issues, different technologies evolved and emerged from time to time, such as the web caching and Ajax for quick response, Captcha for reducing flash crowd, etc. However, these technologies are not capable of addressing all the complex * Corresponding author. raman@iimk.ac.in

2 484 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study issues relating to content sharing. The Content Delivery Network (CDN) [1] is only capable of resolving all the above issues. Researchers have widely considered CDNs to be an effective solution [2] to reduce flash crowd, denial of service, server load, bandwidth, system architecture, etc., apart from providing an efficient website access with good response time. Outsourcing to CDN providers being a costly solution, it is mostly beyond the reach of most of the small, medium size organizations and academic institutes. At the same time, most of the organizations and academic institutions have many IT resources lying underused and underutilized. By using CDN techniques in-house, we can effectively utilize the underused resources in academic institutes, small and medium organizations without any financial implication. CDN uses either the DNS redirection or URL rewriting technique. In this context, we have implemented the CDN technique URL rewriting and reverse proxy to address the above issues by looking at the possibilities of improved, dynamic, intelligent and secured content provision at significant speed and response time. It further compares the CDN performance with realtime data which is generated by setting up a real-time simulation, against the simulation data, which is generated by the simulation software CDNSim. Although a very limited literature is available in this area, a detailed review of the same revealed that such an attempt has not been made yet. 2. METHODOLOGY This section explains about the existing IT setup of an academic institute, simulation software which was used for this experiment and the implementation of CDN in an academic institute using the existing resources for real time experiment Overview of Academic IT Setup Every academic institute has at least one computer laboratory comprising 50 desktops, with minimum configurations of Pentium IV, 512 MB RAM and at least 40 GB Hard disk. The newly setup labs have much more capacity than the above, though they do not really need such a high-end configuration. It is not just because of the dire need or immediate utility, but it is because of the mere availability of such configurations in the market. As per the data collected from various academic institutes in India, the utilization of the systems is about 40% only. On the other hand, most of their services like website hosting, mail server, DNS server, etc., are outsourced justifying that there is lack of infrastructure.

3 Journal of Algorithms & Computational Technology Vol. 6 No Overview of Simulation Software - CDNSim CDNSim is free open source simulation software for modeling and simulation framework for CDNs [3]. Main features of this software, as per the software documentation, are: 1. Cooperative push based content management policy; 2. Non-Cooperative push based content management policy; 3. Cooperative pull based content management policy; 4. Non-Cooperative pull based content management policy; 5. LRU cache replacement policy; 6. STATIC cache policy; 7. TCP / IP networking; 8. Wizard for creating self-contained simulations (bottles); 9. Utility for executing unattended simulations; 10. Utility for automatically generating results reports; 11. Utility for extracting statistics related to net-utility; 12. Utility for converting Apache log files into CDNSim trace files; 13. Extensible by implementing modules in the form of libraries. This software is widely used by well renowned institutions around the world. However, CDNSim has some limitations too. It is exclusively designed for CDN setup. It receives only inputs like number of origin server, number of surrogate servers, number of clients, bandwidth, etc. Maximum end user customization cannot be achieved CDN Configuration in an Academic Institute In this setup, the server which acts as CDN server was placed in the demilitarized zone, though it is not mandatory. The CDN nodes were placed in the militarized zone. If the militarized and demilitarized zone is not implemented in the institute then both CDN server and CDN nodes were placed within the LAN. The CDN technique URL rewriting page and reverse proxy were configured in CDN server. The web contents were placed in all the CDN nodes. Figure 1 shows the CDN implementation in an academic institute. Only constraint here is that the default web server Internet Information Services (IIS) of Windows desktop operating system cannot be used as the web server in the nodes, due to limited connectivity. The default web server IIS of Windows desktop operating system supports only 10 concurrent sessions. In order to overcome this, any other web server, say apache, which supports more concurrent sessions, is to be deployed in the place of IIS.

4 486 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Demilitarized zone Port 1 Firewall Port 3 Client Militarized zone Port 2 Reverse proxy & URL rewriting Stack switch Client Web content Client Web content Client Web content Client Web content Client Web content Figure 1. CDN setup. 3. EXPERIMENT In this experiment, three different simulations were implemented. They are: 1. Normal Web hosting Vs CDN Web hosting; 2. CDN setup using simulation Software CDNSim; 3. Real-time CDN Simulation Normal Web Hosting Vs CDN Web Hosting: In this simulation, eight different web hosting methods were examined to analyze the performance of http port response time, using scripts. They are: 1. Normal web hosting using Server. 2. Normal web hosting using Desktop. 3. Server act as CDN and website hosted in 2 nodes. 4. Node act as CDN and website hosted in 2 nodes. 5. Server act as CDN and website hosted in 5 nodes. 6. Node act as CDN and website hosted in 5 nodes. 7. Server act as CDN and website hosted in 10 nodes. 8. Node act as CDN and website hosted in 10 nodes. Each method was tested 3 times.

5 Journal of Algorithms & Computational Technology Vol. 6 No In the first method, the website was hosted in a server class machine. The server s configuration is dual xeon 2.3 GHz processor with 1 GB DDR2 with ECC RAM. Figure 2 shows the sample data which was tested with 4742 hits per minute and the average response time taken was approximately 0.1 milliseconds. In the second method, the website was hosted in one of the nodes. The node s configuration is Pentium IV processor with 256 MB DDR1 RAM. The sample data was tested with 4745 hits per minute and the average response time taken was approximately 0.17 milliseconds. In the third method, URL rewriting page and the reverse proxy were configured in the server class machine and the website was hosted in 2 nodes. The Node s configuration is Pentium IV 2.8 GHz with 1 GB DDR2 RAM & Dual core 2Duo 2.93 GHz with 2 GB DDR2 RAM. Figure 3 shows the sample data tested with 2545 hits per minute and the average response time taken is 0.52 milliseconds approximately. In the fourth method, URL rewriting script page and reverse proxy were configured in the node and the website was hosted in 2 nodes. The sample data was tested with 3671 hits per minute and the average response time taken is 0.57 milliseconds approximately. Figure 2. Sample data, web hosting in server.

6 488 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Figure 3. Sample data, web hosting in CDN with 2 nodes. In the fifth method, URL rewriting script page and reverse proxy were configured in the server and the website was hosted in 5 nodes. Figure 4 shows the sample data tested with 2529 hits per minute and the average response time taken is 0.43 milliseconds approximately. In the sixth method, URL rewriting script page and the reverse proxy were configured in desktop and the website was hosted in 5 nodes. The sample data was tested with 4682 hits per minute and the average response time taken is 0.43 milliseconds approximately. In the seventh method, URL rewriting script page and the reverse proxy were configured in server and the website was hosted in 10 nodes. Figure 5 shows the sample data tested with 5146 hits per minute and the average response time taken is 0.39 milliseconds approximately. In the eighth method, URL rewriting script page and the reverse proxy were configured in desktop and the website was hosted in 10 nodes. The sample data was tested with 5146 hits per minute and the average response time taken is 0.44 milliseconds approximately.

7 Journal of Algorithms & Computational Technology Vol. 6 No Figure 4. Sample data, web hosting in CDN with 5 nodes CDN Setup Using simulation Software CDNSim In this simulation, the inputs were given in 5 different steps. Figure 6 represents the first step, in which the cooperative environment (closest surrogate) was selected. Subsequently in the second step the inputs regarding routers, link speed, number of outgoing connections, number of clients, number of retries, mean waiting per retry, number of incoming and outgoing connections of both surrogate servers and origin servers, number of surrogate servers and origin servers were provided. Input values are illustrated in figure 7. Figure 8 represents step 3 and in this step the website object ID, object size and traffic in a text format are given as input. Figure 9 represents step 4 and this step configures each surrogate server s local cache. The configuration is set by a file, which describes the contents, the capacity and the cache replacement policy of every surrogate server. The file contains records, each one referring to a surrogate server.

8 490 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Figure 5. Sample data, web hosting in CDN with 10 nodes. CDNsim - Bottle wizard - CDNpolicy CDN policy Cooperative environment (closest surrogate) Non - cooperative environment (closest origin) Cooperative environment (random surrogate) Cooperative environment (surrogate load balance) Next > Figure 6. CDNSim policy setup. Figure 10 represents the final step in which the output directory is set and the bottle name in which the collected data will be stored. This simulation setup repeated three times using 2, 5 and 10 surrogate servers.

9 Journal of Algorithms & Computational Technology Vol. 6 No CDNsim - Bottle wizard - network topology 2/5 Routers /home/cdnsim/router open Links speed in Mbits/sec 100 Outgoing connections 1000 Outgoing connections 1000 Surrogate servers 10 Incoming connections 1000 Clients 100 Number of retries 10 Mean waiting time per retry Origin servers 1 Incoming connections < Back Next > Figure 7. CDNSim network topology. CDNsim - Bottle wizard - Dataset 3/5 Website /home/cdnsim/website/access_log open Traffic /home/cdnsim/traffic/trace_file50000.text open < Back Next > Figure 8. CDNSim dataset. Placement /home/cdnsim/placement/pushbased_lru_s Open Shrink caches' capacity to fit exactly the objects in placements file < Back Next > Figure 9. CDNSim cache management.

10 492 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Output directory /home/cdnsim/output set dir New bottle's name CDN10 >>KREATE BOTTLE<< < Back Go to begining>>> Figure 10. CDNSim create bottle Real-time CDN Simulation Three different web hosting methods were examined to analyze the performance of the website. They are: 1. Node acting as CDN and website hosted in 10 nodes; 2. Node acting as CDN and website hosted in 5 nodes; 3. Node acting as CDN and website hosted in 2 nodes. Nodes configuration that we used in this experiment is Pentium IV processor with 2 GB RAM. Web page access time data was collected by using the web tool websitepulse.com while the hit was around 2500 per minute. The hits were simulated by using script. Figure 11 shows the sample data. Web page test results URL tested: Test performed from: Seattle, WA Test performed at: :13:32 (GMT -08:00) 1 URL Time (seconds) DNS Connect Redirect First byte Last byte Error # URL Status Time DNS (sec) Connect (sec) Redirect (sec) First (sec) Last (sec) Total (sec) Size (kb) 1 OK 02:13: cat2009.iimk.ac.in/cdn101. OK 02:13: Total Figure 11. Web page test result (sample).

11 Journal of Algorithms & Computational Technology Vol. 6 No DATA ANALYSIS All the data obtained from three simulations are analyzed in this section Normal Web Hosting Vs CDN Web Hosting The results showed that the first method served the pages with very less response time 0.09 milliseconds. The second method was also showing relatively good response time 0.17 milliseconds. This being tested in a desktop, it will not sustain the load, nor will it long last and be reliable. Third and fourth methods were tested with 2 nodes and it took more response time of 0.52 milliseconds and 0.57 milliseconds respectively. This may be due to few numbers of nodes. Fifth and sixth methods were tested with 5 nodes and the response time was 0.43 milliseconds for both. In the last two methods, the test was performed with 10 nodes and the response time was 0.39 milliseconds and 0.43 milliseconds respectively. Figure 12 shows the detailed analysis of all the methods. The analysis clearly shows that if CDN technology is used, then the class of machine, as to whether it is a server or a node, does not make any difference. That is, in all the 3 CDN methods were implemented and tested on both server and node, the response Figure 12. Data analysis of normal web hosting Vs CDN web hosting.

12 494 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Response time in milliseconds Comparision chart First method Second method Third method Fourth method Fifth Method Sixth method Seventh method Eighth method Figure 13. Performance analysis of normal web hosting Vs CDN web hosting. time was almost the same. Secondly, if fewer nodes were used, then it would have taken little longer response time. Figure 13 gives a graphical illustration of the relative performances of the deployed experiments Simulation Software - CDNSim Figure 14 shows CDNSim data report. As the chart shows, in the first method, which involved 2 surrogate servers, the mean response time is 4.33 seconds. In the second and third method, that is, 5 and 10 surrogate severs, the response time is 2.44 seconds each Real-time CDN Figure 15 shows real-time CDN data report. It can be found that, in the first method, which involved 2 surrogate servers, the mean response time is 4.44 seconds. In the second and third method, that is, 5 and 10 surrogate severs, the response time is 2.76 and 2.73 seconds respectively CDNSim Vs Real-time CDN Figure 16 shows performance analysis chart of both CDNSim simulation software and Real-Time CDN data analysis. If we compare both, the difference is approximately 0.3 seconds higher than the CDNSim software, which is insignificant.

13 Journal of Algorithms & Computational Technology Vol. 6 No CDNSim data analysis Response time in seconds 4.33 CDN 2 CDN 5 CDN Figure 14. Data analysis of CDNSim. Real time data analysis Response time in seconds CDN 2 CDN 5 CDN 10 Figure 15. Data analysis of real-time. CDNSim Vs real time Response time in seconds CDNSim Real time CDN 2 CDN 5 CDN 10 Surrogate servers Figure 16. Performance analysis of CDNSim Vs real-time.

14 496 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study 5. CONCLUSION CDN is a proven technology for avoiding flash crowd with good response time. This study has tested the CDN technologies for efficient web site access in a small academic setting. It has showed promising results on the response time of access to the web site by overcoming the flash crowd and provides the content of the web site in the most efficient manner by deploying and utilizing the existing resources using affordable and appropriate technologies, which are relevant to practical Indian situations. Especially, in academic institutions and small organizations, where many a nodes are underutilized, could be put to optimum use by making use of this technique without disturbing the existing network. If the response time of stand alone server against CDN server and CDNSim software against real-time CDN were compared, the difference is hardly 0.3 seconds, which is insignificant. In stand alone server method, in the event of a single point of failure, as no redundant server class machine were available, it will result in server down-time. It may also lead to data loss due to hard disk crash. If CDN technology with minimum of 4 or 5 nodes, by replicating the data in all nodes were deployed, chances of data loss will not be there. Further, even if one or more of the nodes are down, it will not have any effect on the site access. Therefore it can be considered as a very institution friendly solution as it ensures efficient content delivery over the network, capitalizing on the available resources for optimum utilization. However, it has been observed that in most of the organizations and academic institutes, the nodes are switched OFF after office hours. But the nodes which are used for the CDN setup should be ON round the clock for uninterrupted web service. In this scenario, it will consume more power and also may result in hardware depreciation. However if we compare this with outsourcing cost, it will be cheaper. 6. FUTURE SCOPE As highlighted in the software overview above, CDNSim has certain inherent shortcomings and this could be overcome by analyzing the same setup using different simulation software like NS2, Opnet, etc. Also, this study has considered only textual data as the web site content, whereas future scope lies in considering multimedia content such as audio, video, animations, graphics etc. and their relative content access performance.

15 Journal of Algorithms & Computational Technology Vol. 6 No REFERENCES [1] A. Vakali and G. Pallis, Content Delivery Networks: Status and Trends, IEEE Internet Computing, November 2003, pp [2] B. Krishnamoorthy, C. Wills, and Y. Zhang, On the Use and Performance of Content Distribution Networks, Proc. 1 st Int l Internet Measurement Workshop, ACM Press, 2001, pp [3] [4] Al-Mukaddim Khan Pathan and Rajkumar Buyya, A Taxonomy and Survey of Content Delivery Networks, [5] Y. Jung, B. Krishnamurthy, and M. Rabinovich, Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites, Proc. 11 th Int l World Wide Web Conf. (WWW 02), ACM Press, 2002, pp [6] J. Coppens et al., Design and performance of a self organizing adaptive content distribution network, IEEE/IFIP Network Operations Management Symposium 2006, Vancouver, Canada, April 2006, pp

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

Microsoft Exchange Server 2003 Deployment Considerations

Microsoft Exchange Server 2003 Deployment Considerations Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

The Effectiveness of Request Redirection on CDN Robustness

The Effectiveness of Request Redirection on CDN Robustness The Effectiveness of Request Redirection on CDN Robustness Limin Wang, Vivek Pai and Larry Peterson Presented by: Eric Leshay Ian McBride Kai Rasmussen 1 Outline! Introduction! Redirection Strategies!

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

How To Understand The Power Of A Content Delivery Network (Cdn)

How To Understand The Power Of A Content Delivery Network (Cdn) Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation

More information

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

OBSERVEIT DEPLOYMENT SIZING GUIDE

OBSERVEIT DEPLOYMENT SIZING GUIDE OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Peter Triantafillou (contact author) Department of Computer Engineering and Informatics, University of Patras Rio

More information

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

SyncLockStatus Evaluator s Guide

SyncLockStatus Evaluator s Guide SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server) Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2

More information

LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment

LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment Evaluation report prepared under contract with LSI Corporation Introduction Interest in solid-state storage (SSS) is high, and

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

CS312 Solutions #6. March 13, 2015

CS312 Solutions #6. March 13, 2015 CS312 Solutions #6 March 13, 2015 Solutions 1. (1pt) Define in detail what a load balancer is and what problem it s trying to solve. Give at least two examples of where using a load balancer might be useful,

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Stratusphere UX Prerequisites & Preparation Overview. Stratusphere Requirements... 2. Stratusphere Hub Appliance (SHA)... 2

Stratusphere UX Prerequisites & Preparation Overview. Stratusphere Requirements... 2. Stratusphere Hub Appliance (SHA)... 2 Table of Contents Stratusphere Requirements... 2 Stratusphere Hub Appliance (SHA)... 2 Stratusphere Database Appliance (SDA)... 2 Stratusphere Network Station (SNS)... 3 Stratusphere Software Download...

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran

by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst

More information

Tableau Server 7.0 scalability

Tableau Server 7.0 scalability Tableau Server 7.0 scalability February 2012 p2 Executive summary In January 2012, we performed scalability tests on Tableau Server to help our customers plan for large deployments. We tested three different

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

Efficient DNS based Load Balancing for Bursty Web Application Traffic

Efficient DNS based Load Balancing for Bursty Web Application Traffic ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Content Delivery Networks. Shaxun Chen April 21, 2009

Content Delivery Networks. Shaxun Chen April 21, 2009 Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Content Delivery Networks (CDN) Dr. Yingwu Zhu

Content Delivery Networks (CDN) Dr. Yingwu Zhu Content Delivery Networks (CDN) Dr. Yingwu Zhu Web Cache Architecure Local ISP cache cdn Reverse Reverse Proxy Reverse Proxy Reverse Proxy Proxy L4 Switch Content Content Content Server Content Server

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

FedEx Ship Manager Software. Installation Guide

FedEx Ship Manager Software. Installation Guide FedEx Ship Manager Software Installation Guide Before you start Check here to see that your PC has what it needs to run FedEx Ship Manager Software: Minimum System and Hardware Requirements Intel Pentium

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

Mirtrak 6 Powered by Cyclope

Mirtrak 6 Powered by Cyclope Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough

More information

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

1. Comments on reviews a. Need to avoid just summarizing web page asks you for: 1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of

More information

Performance Analysis of Web based Applications on Single and Multi Core Servers

Performance Analysis of Web based Applications on Single and Multi Core Servers Performance Analysis of Web based Applications on Single and Multi Core Servers Gitika Khare, Diptikant Pathy, Alpana Rajan, Alok Jain, Anil Rawat Raja Ramanna Centre for Advanced Technology Department

More information

PROXY SETUP WITH IIS USING URL REWRITE, APPLICATION REQUEST ROUTING AND WEB FARM FRAMEWORK OR APACHE HTTP SERVER FOR EMC DOCUMENTUM EROOM

PROXY SETUP WITH IIS USING URL REWRITE, APPLICATION REQUEST ROUTING AND WEB FARM FRAMEWORK OR APACHE HTTP SERVER FOR EMC DOCUMENTUM EROOM White Paper PROXY SETUP WITH IIS USING URL REWRITE, APPLICATION REQUEST ROUTING AND WEB FARM FRAMEWORK OR APACHE HTTP SERVER FOR EMC DOCUMENTUM EROOM Abstract This white paper explains how to setup Proxy

More information

Networking Topology For Your System

Networking Topology For Your System This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. Caching, Content Distribution and Load Balancing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. Caching, Content Distribution and Load Balancing Department of Computer Science Institute for System Architecture, Chair for Computer Networks Caching, Content Distribution and Load Balancing Motivation Which optimization means do exist? Where should

More information

Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F

Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F Getting Started The Firebox X Core and Peak e-series is a line of high performance, real-time

More information

SOFTWARE LICENSE LIMITED WARRANTY

SOFTWARE LICENSE LIMITED WARRANTY CYBEROAM INSTALLATION GUIDE VERSION: 6..0..0..0 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty

More information

Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers:

Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers: Webinar Information Title: Websense Remote Filtering Audio information: This presentation incorporates STREAMING AUDIO. Use of speakers or headsets is required. If unable to hear streaming audio or it

More information

Very Large Enterprise Network Deployment, 25,000+ Users

Very Large Enterprise Network Deployment, 25,000+ Users Very Large Enterprise Network Deployment, 25,000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015 CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail

More information

Flash Crowds & Denial of Service Attacks

Flash Crowds & Denial of Service Attacks Flash Crowds & Denial of Service Attacks Characterization and Implications for CDNs and Web sites Jaeyeon Jung MIT Laboratory for Computer Science Balachander Krishnamurthy and Michael Rabinovich AT&T

More information

Cisco Videoscape Distribution Suite Service Broker

Cisco Videoscape Distribution Suite Service Broker Data Sheet Cisco Videoscape Distribution Suite Service Broker Product Overview Cisco Videoscape Distribution Suite Service Broker (VDS-SB) encompasses a broad range of capabilities, particularly in accelerating

More information

Configuring Load Balancing

Configuring Load Balancing When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Optimization of Cluster Web Server Scheduling from Site Access Statistics

Optimization of Cluster Web Server Scheduling from Site Access Statistics Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Configuration Guide. Websense Web Security Solutions Version 7.8.1 Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution

More information

Asta Powerproject Enterprise

Asta Powerproject Enterprise Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

POSIX and Object Distributed Storage Systems

POSIX and Object Distributed Storage Systems 1 POSIX and Object Distributed Storage Systems Performance Comparison Studies With Real-Life Scenarios in an Experimental Data Taking Context Leveraging OpenStack Swift & Ceph by Michael Poat, Dr. Jerome

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Designing and Implementing a Server Infrastructure Course Title Designing and Implementing a Server Infrastructure

More information

WINSCRIBE HARDWARE SPECIFICATIONS

WINSCRIBE HARDWARE SPECIFICATIONS WINSCRIBE HARDWARE SPECIFICATIONS Technology Overview proposes centralization of resources by providing a networked solution that fits into the existing framework of your server environment with minimal

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Implementing Network Address Translation and Port Redirection in epipe

Implementing Network Address Translation and Port Redirection in epipe Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

System Requirements Table of contents

System Requirements Table of contents Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

Microsoft Dynamics AX 2012 System Requirements. Microsoft Corporation Published: November 2011

Microsoft Dynamics AX 2012 System Requirements. Microsoft Corporation Published: November 2011 2012 System Requirements Microsoft Corporation Published: November 2011 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and your people to make business

More information

24online FAQs. 24Online FAQs. Copyright Elitecore Technologies Ltd., Ahmedabad, INDIA. Elitecore Technologies ltd. 1

24online FAQs. 24Online FAQs. Copyright Elitecore Technologies Ltd., Ahmedabad, INDIA. Elitecore Technologies ltd. 1 x 24Online FAQs Copyright Elitecore Technologies Ltd., Ahmedabad, INDIA Elitecore Technologies ltd. 1 Installation FAQs Contents Installation FAQs...3 General FAQs...4 Installation FAQs Q: Is anything

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying

More information

Mediasite EX server deployment guide

Mediasite EX server deployment guide Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies

More information

Enterprise Network Deployment, 10,000 25,000 Users

Enterprise Network Deployment, 10,000 25,000 Users Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

MID-TIER DEPLOYMENT KB

MID-TIER DEPLOYMENT KB MID-TIER DEPLOYMENT KB Author: BMC Software, Inc. Date: 23 Dec 2011 PAGE 1 OF 16 23/12/2011 Table of Contents 1. Overview 3 2. Sizing guidelines 3 3. Virtual Environment Notes 4 4. Physical Environment

More information

Working With Virtual Hosts on Pramati Server

Working With Virtual Hosts on Pramati Server Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name

More information

Scalability of web applications. CSCI 470: Web Science Keith Vertanen

Scalability of web applications. CSCI 470: Web Science Keith Vertanen Scalability of web applications CSCI 470: Web Science Keith Vertanen Scalability questions Overview What's important in order to build scalable web sites? High availability vs. load balancing Approaches

More information

System Requirements and Prerequisites

System Requirements and Prerequisites System Requirements and Prerequisites for the Sage 200 Suite v2011 SP5 Copyright statement Sage (UK) Limited, 2012. All rights reserved. If this documentation includes advice or information relating to

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Installation and Connection Guide to the simulation environment GLOBAL VISION

Installation and Connection Guide to the simulation environment GLOBAL VISION Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class

More information

Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server

Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing

More information