Solving complex performance problems in TCP/IP and SNA environments.

Size: px
Start display at page:

Download "Solving complex performance problems in TCP/IP and SNA environments."

Transcription

1 IBM Global Services Solving complex performance problems in TCP/IP and SNA environments. Key Topics Discusses how performance analysis of networks relates to key issues in today's business environment Explains how to analyze TCP/IP networks to isolate and resolve problems Details common performance problems in traditional systems network architecture (SNA) networks Discusses the benefits of performance analysis in managing your network for successful business communications Introduction The network is crucial to communications for any large corporation.the importance of availability and performance is increased in environments where e-business is transforming business communications. The growth of the Internet, providing new services to customers and improving business-to-business communications, increases the demand for continuous operations. Performance, specifically response time, is now a key information technology (IT) measurement. Today s e-business network is primarily TCP/IP, although enterprises with SNA subarea implementations are also recognizing performance impacts, especially those migrating to Advanced Peer-to-Peer Networking (APPN). This white paper discusses the performance challenges for each of these environments and offers a successful method for analysis and resolution. Our experience focuses on end-to-end and session level performance analysis. To quickly identify where incorrect settings are causing users to experience poor performance, begin with an end-to-end analysis. Analyzing the behavior of the network requires the use of tools that provide a statistical representation of operational characteristics to identify problems, evaluate network performance and guide actions for tuning. For the purpose of this paper, we will use examples from IBM network traffic analysis (NTA) services tools that provide this level of detail for TCP/IP and SNA networks. NTA service tools use trace data captured from system trace tools, as well as standard network data capture tools. Analysis is automated for subarea data flows as well as TCP/IP packet traffic. A view of end-to-end routes experiencing problems provides a starting point for the performance analysis.

2 Analyzing TCP/IP network performance Effective analysis of the TCP/IP environment requires an understanding of the fundamental physics of network behavior, control mechanisms for TCP/IP performance and identification of performance problems by network behavior analysis. This includes an examination of TCP flows, packet sizes, window behavior, flow and congestion controls and data link operations. A high level view of all the routes in the flow is the best place to start the analysis and helps to identify which routes are experiencing problems. From this perspective, one can identify and focus on the cause of performance problems. The cause may simply be a need to make logical parameter changes or a routing adjustment to distribute the load and avoid overloaded resources. In some cases, the problem may be errors in a node or on a link. Once the problem is identified, NTA service tools can quicken resolution by automating the detailed analysis and providing specific recommended actions. When experiencing a performance problem, begin the analysis by tracing the portion of the network segment when and where the problem presents itself. The next step is to use the TCP/IP header data from this trace to understand the condition of the network at the time of the problem. Examine both the connections that experienced problems and a packetby-packet view of activity. Using NTA service tools, one can identify those connections experiencing excessive response times and determine the cause of throughput problems. Analysis is then divided into two categories: global analysis and detailed analysis. Global analysis is a high-level analysis of the trace data as a single entity. Results show a breakdown of the fourth layer protocols (such as TCP and UDP) and the amount of data transported by each. 2

3 The illustration below shows the division of the fourth layer protocol as detailed by NTA service tools. Viewing the count of data packets by protocol helps to verify that the trace data captured the problem being experienced. If the data does not match expectations, take another data capture, perhaps in another area of the network, to complete a valuable analysis. Verify that the trace data includes network traffic at the time of the problem, and continue the analysis by reviewing response times and other global information such as: Packet distribution by packet size with the packet count Trace statistic summaries Buffer size distribution, including the receiver s window size with the packet count Round trip time distribution with packet round trip times including packet count. 3

4 4 The following illustration shows an example of response time distribution.

5 After one obtains a high-level understanding of the network traffic conditions, detailed analysis begins. The detailed analysis provides an in-depth look at the data and helps identify problem connections. The following NTA service tools results show the problem routes requiring more focused analysis. The severity of the route condition is highlighted by the color-coded circles, indicating the troubled connections. 5

6 Further analysis of one of these probable problem routes provides specific statistical information for that connection. This example shows the detailed statistics for a probable problem route. Further detailed information about specific connections that aid analysis include the: Number of times the receiver window size dropped to zero Longest response time Minimum segment size Number of fragmented datagrams Number of retransmits Maximum number of unacknowledged bytes outstanding. A packet-by-packet flow may also be required to analyze data flow details by connection. 6

7 Example: Poor performance and slow downloads Performance challenges can result from improper system and network option settings. In a TCP/IP environment, users were complaining of overall poor performance and slow downloads after installation of a new version of OS/390. A trace of the problem showed that the TCP receiver s advertised window size was too large and retransmissions were occurring. The trace showed that the OS/390 window scale option was in use. This gave the sender, OS/390, permission to send enormous amounts of data into the network. The first router in the path did not have the buffer resources required to handle the data. Therefore, the router had buffer overrun and packets were discarded. The sender would eventually resend the discarded packets, but the extra time involved severely impacted network performance. The solution was to turn off the default window scale option in OS/390. Solving performance problems in traditional SNA networks Many organizations rely on well-performing SNA implementations to meet their communications needs. When beginning the analysis of SNA subarea or APPN environments, examine logical unit (LU) flows, packet sizes, window behavior, congestion, bottlenecks and data link operations. Transaction times in a network consist of processing times (service time) and delays. Some delays, such as propagation, cannot be controlled, while other delays are variable and controllable. One should focus on variable and controllable delays, especially network queues and how to control them. Delays have a direct bearing on transaction times, which can affect expenses and user satisfaction. One common performance problem in SNA environments can be caused by a blocked virtual route (VR). Usually, the symptom is data backing up in the network, resulting in increased time to get through the network. This blockage is referred to as subarea congestion and can be caused by incorrect VR pool or the VR pacing window sizes. 7

8 Analyzing VTAM Internal Trace (VIT) data helps identify the held routes. NTA service tools automatically decipher the trace data to highlight the routes that are experiencing poor performance. The following illustration is an example of the potential problem route screen showing two held VRs. As the next step, NTA identifies potential causes of the problem along with recommendations. The following is an illustration of the recommendations provided by the expert system portion of NTA. 8

9 Using the recommendations, other VR statistics, such as average path information unit (PIU) size by time, window count, and transmission group (TG) utilization, assist in completing the analysis and resolution of performance problems. The following is an illustration of TG utilization. A single view of all the VRs and their status can also be helpful in analyzing and understanding the activity in the network. 9

10 Following are some examples of network performance challenges in both SNA subarea and SNA/APPN environments. Example: Slow data transfer, slow communications This example shows how parameter settings can affect an SNA subarea network, leading to poor business communications. In this example, the key to communications was the transfer of data between a number of clients to the supplier. The supplier received a report from a client that data transfers were taking much longer than was reasonable. The transfer time was acceptable if the supplier became the primary application and received the file. However, if the client sent the file to the supplier, the transfer time was unacceptable. Network data was collected from both the unacceptable transfer and the acceptable transfer scenarios. Using NTA service tools, the analyst determined that the data rates were 240 bytes per second for the unacceptable flow and 6,200 bytes per second for the acceptable flow. Using this information, the supplier determined that, during the unacceptable transfer, the supplier was the secondary application and the window size used was set at two. Conversely, during the acceptable data transfer, the supplier was the primary application and the window size was set at 15. The analyst recommended that the client change the primary send pacing (PSNDPAC) to 15. This resolved the slow data transfer. Example: Printing slowdown impacts productivity This example involves an SNA/APPN performance problem with a series of high-speed printers. Throughout the day, printers would stop printing briefly in the middle of a print job and then start again. This condition is known as clutching. The printers were attached to an RS/6000 print server that was using CS/AIX for the SNA support. The server was connected to a VTAM host through a Token Ring. The users discovered that all the printers attached to the RS/6000 server were clutching during peak loads. This resulted in large print jobs taking an excessive time to complete, which led to a violation of a service level agreement they had with their customer. 10

11 An analyst traced the Token Ring that connected the RS/6000 printer server to the 3745 front end processor. After reviewing the trace using NTA service tools, it was determined that there was a coding mismatch between the Token Ring parameters in VTAM and in CS/AIX on the print server. This mismatch caused the host to send a number of data packets to the RS/6000 and then wait for acknowledgment before sending the next set of frames. Because CS/AIX was misconfigured, it would expect more data after the host was finished sending. When this occurred, the print server had no data to send to the printers. Eventually, a timer would expire, the acknowledgment would flow and the sequence would start over. This created long delays between data transmissions, resulting in clutching. Using the findings of this analysis, the CS/AIX was reconfigured and the problem was resolved. Benefits of performance analysis Effectively identifying and resolving complex network performance problems in TCP/IP, SNA subarea and SNA/APPN environments require the ability to quickly analyze network traffic. This ability, in turn, requires skills, specific tools and an efficient process. As the network continues to play an increasingly important role in successful business communications and operations, the ability to satisfy users and clients will be determined by the ability to quickly identify and resolve performance problems. For more information To learn more about IBM Performance Management and Capacity Planning Services and IBM Global Services, visit or contact your IBM sales representative. You can also contact us at in the U.S. and outside the U.S., or us at capacity@us.ibm.com. Bob Springsteen is a certified network consultant and Chris Lennon is a network specialist responsible for performance management of networks, with specific focus on providing remote assistance to clients using NTA service tools for IBM Performance Management and Capacity Planning Services. The capabilities of NTA service tools illustrated through examples in this white paper are available through electronic and Web access from IBM. 11

12 Copyright IBM Corporation 2000 IBM Global Services Route 100 Somers, NY Produced in the United States of America All Rights Reserved IBM, the e-business logo, OS/390 and RS/6000 are registered trademarks or trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service marks may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. IBM reserves the right to change specifications or other product information without notice. This publication may include typographical errors and technical inaccuracies and may be changed or withdrawn at any time. The content is provided as is, without warranties of any kind, either express or implied, including the implied warranties of merchantability and fitness for a particular purpose. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore this disclaimer may not apply to you. G

z/os V1R11 Communications Server system management and monitoring

z/os V1R11 Communications Server system management and monitoring IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North

More information

Network performance and capacity planning: Techniques for an e-business world

Network performance and capacity planning: Techniques for an e-business world IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications

More information

Advanced Computer Networks Project 2: File Transfer Application

Advanced Computer Networks Project 2: File Transfer Application 1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

IBM Tivoli Monitoring for Network Performance

IBM Tivoli Monitoring for Network Performance Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

SwiftBroadband and IP data connections

SwiftBroadband and IP data connections SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss White Paper File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss Introduction In today s complex networks it is often difficult to correlate different measurements that are reported by network

More information

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM Sr Consulting IT Specialist Session 10723 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.OSA Express

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM. Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM August 10, 2011: 1:30 PM-2:30 PM Session 9917 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

IBM WebSphere Application Server Communications Enabled Applications

IBM WebSphere Application Server Communications Enabled Applications IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Mike Canney Principal Network Analyst getpackets.com

Mike Canney Principal Network Analyst getpackets.com Mike Canney Principal Network Analyst getpackets.com 1 My contact info contact Mike Canney, Principal Network Analyst, getpackets.com canney@getpackets.com 319.389.1137 2 Capture Strategies capture Capture

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

TCP/IP Support Enhancements

TCP/IP Support Enhancements TPF Users Group Spring 2005 TCP/IP Support Enhancements Mark Gambino AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any references to future plans are for

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Managing Application Delivery from the User s Perspective

Managing Application Delivery from the User s Perspective Managing Application Delivery from the User s Perspective Essential Monitoring Capabilities and Metrics for Assessing End-User Experience Network managers are tasked with monitoring end-user experience,

More information

Expert Reference Series of White Papers. Troubleshooting Slow Networks with Wireshark

Expert Reference Series of White Papers. Troubleshooting Slow Networks with Wireshark Expert Reference Series of White Papers Troubleshooting Slow Networks with Wireshark 1-800-COURSES www.globalknowledge.com Troubleshooting Slow Networks with Wireshark Laura Chappell, Founder, Wireshark

More information

Mike Canney. Application Performance Analysis

Mike Canney. Application Performance Analysis Mike Canney Application Performance Analysis 1 Welcome to Sharkfest 12 contact Mike Canney, Principal Network Analyst, Tektivity, Inc. canney@getpackets.com 319-365-3336 www.getpackets.com 2 Agenda agenda

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

iseries Quality of service

iseries Quality of service iseries Quality of service iseries Quality of service Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

More information

IBM Tivoli Web Response Monitor

IBM Tivoli Web Response Monitor IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

SuperAgent and Siebel

SuperAgent and Siebel SuperAgent and Siebel Executive summary Siebel Systems provides a comprehensive family of multichannel ebusiness applications services, all within a single architecture. The Siebel architecture is an n-tier

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Linux MPS Firewall Supplement

Linux MPS Firewall Supplement Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel

More information

Introduction to LAN/WAN. Network Layer (part II)

Introduction to LAN/WAN. Network Layer (part II) Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler butlerde@us.ibm.com 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

NetView for z/os V6.1 Packet Trace Analysis

NetView for z/os V6.1 Packet Trace Analysis NetView for z/os V6.1 Packet Trace Analysis Introduction This paper provides insights into the Packet Trace Analysis feature delivered in IBM Tivoli NetView for z/os V6.1, including an explanation of the

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Using SolarWinds Orion for Cisco Assessments

Using SolarWinds Orion for Cisco Assessments Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org 1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described

More information

Best practice for SwiftBroadband

Best practice for SwiftBroadband Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

IBM RATIONAL PERFORMANCE TESTER

IBM RATIONAL PERFORMANCE TESTER IBM RATIONAL PERFORMANCE TESTER Today, a major portion of newly developed enterprise applications is based on Internet connectivity of a geographically distributed work force that all need on-line access

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

New!! - Higher performance for Windows and UNIX environments

New!! - Higher performance for Windows and UNIX environments New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)

More information

Internet Packets. Forwarding Datagrams

Internet Packets. Forwarding Datagrams Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Introduction to Mainframe (z/os) Network Management

Introduction to Mainframe (z/os) Network Management Introduction to Mainframe (z/os) Network Management Monday, August 10, 1:45-2:45 Session 17736 Dean Butler (butlerde@us.ibm.com) Agenda What is network management? Why manage the network on z/os? z/os

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Allocating Network Bandwidth to Match Business Priorities

Allocating Network Bandwidth to Match Business Priorities Allocating Network Bandwidth to Match Business Priorities Speaker Peter Sichel Chief Engineer Sustainable Softworks psichel@sustworks.com MacWorld San Francisco 2006 Session M225 12-Jan-2006 10:30 AM -

More information

Ethernet-based Storage Configuration

Ethernet-based Storage Configuration VMWARE TECHNICAL NOTE VMware ESX Server Ethernet-based Storage Configuration Using Ethernet for a storage medium is not a new idea. Network file systems such as NFS and SMB/CIFS are entering their third

More information

A Dell Technical White Paper Dell Storage Engineering

A Dell Technical White Paper Dell Storage Engineering Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

WebSphere DataPower Release 3.8.1 DNS Enhancements

WebSphere DataPower Release 3.8.1 DNS Enhancements WebSphere DataPower Release 3.8.1 DNS Enhancements XA/XS/XI/XB/XM 2010 IBM Corporation WebSphere DataPower Release 3.8.1 DNS Enhancements 381DataPowerDNSEnhancement.ppt Page 1 of 6 DNS Enhancements Table

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Network Management Quality of Service I

Network Management Quality of Service I Network Management Quality of Service I Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Basic Network Management (Recap) Introduction to QoS Packet Switched Networks (Recap) Common

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Communications Server for Linux

Communications Server for Linux Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 craig@web400.com

More information