Solving complex performance problems in TCP/IP and SNA environments.
|
|
- Janis Daniels
- 8 years ago
- Views:
Transcription
1 IBM Global Services Solving complex performance problems in TCP/IP and SNA environments. Key Topics Discusses how performance analysis of networks relates to key issues in today's business environment Explains how to analyze TCP/IP networks to isolate and resolve problems Details common performance problems in traditional systems network architecture (SNA) networks Discusses the benefits of performance analysis in managing your network for successful business communications Introduction The network is crucial to communications for any large corporation.the importance of availability and performance is increased in environments where e-business is transforming business communications. The growth of the Internet, providing new services to customers and improving business-to-business communications, increases the demand for continuous operations. Performance, specifically response time, is now a key information technology (IT) measurement. Today s e-business network is primarily TCP/IP, although enterprises with SNA subarea implementations are also recognizing performance impacts, especially those migrating to Advanced Peer-to-Peer Networking (APPN). This white paper discusses the performance challenges for each of these environments and offers a successful method for analysis and resolution. Our experience focuses on end-to-end and session level performance analysis. To quickly identify where incorrect settings are causing users to experience poor performance, begin with an end-to-end analysis. Analyzing the behavior of the network requires the use of tools that provide a statistical representation of operational characteristics to identify problems, evaluate network performance and guide actions for tuning. For the purpose of this paper, we will use examples from IBM network traffic analysis (NTA) services tools that provide this level of detail for TCP/IP and SNA networks. NTA service tools use trace data captured from system trace tools, as well as standard network data capture tools. Analysis is automated for subarea data flows as well as TCP/IP packet traffic. A view of end-to-end routes experiencing problems provides a starting point for the performance analysis.
2 Analyzing TCP/IP network performance Effective analysis of the TCP/IP environment requires an understanding of the fundamental physics of network behavior, control mechanisms for TCP/IP performance and identification of performance problems by network behavior analysis. This includes an examination of TCP flows, packet sizes, window behavior, flow and congestion controls and data link operations. A high level view of all the routes in the flow is the best place to start the analysis and helps to identify which routes are experiencing problems. From this perspective, one can identify and focus on the cause of performance problems. The cause may simply be a need to make logical parameter changes or a routing adjustment to distribute the load and avoid overloaded resources. In some cases, the problem may be errors in a node or on a link. Once the problem is identified, NTA service tools can quicken resolution by automating the detailed analysis and providing specific recommended actions. When experiencing a performance problem, begin the analysis by tracing the portion of the network segment when and where the problem presents itself. The next step is to use the TCP/IP header data from this trace to understand the condition of the network at the time of the problem. Examine both the connections that experienced problems and a packetby-packet view of activity. Using NTA service tools, one can identify those connections experiencing excessive response times and determine the cause of throughput problems. Analysis is then divided into two categories: global analysis and detailed analysis. Global analysis is a high-level analysis of the trace data as a single entity. Results show a breakdown of the fourth layer protocols (such as TCP and UDP) and the amount of data transported by each. 2
3 The illustration below shows the division of the fourth layer protocol as detailed by NTA service tools. Viewing the count of data packets by protocol helps to verify that the trace data captured the problem being experienced. If the data does not match expectations, take another data capture, perhaps in another area of the network, to complete a valuable analysis. Verify that the trace data includes network traffic at the time of the problem, and continue the analysis by reviewing response times and other global information such as: Packet distribution by packet size with the packet count Trace statistic summaries Buffer size distribution, including the receiver s window size with the packet count Round trip time distribution with packet round trip times including packet count. 3
4 4 The following illustration shows an example of response time distribution.
5 After one obtains a high-level understanding of the network traffic conditions, detailed analysis begins. The detailed analysis provides an in-depth look at the data and helps identify problem connections. The following NTA service tools results show the problem routes requiring more focused analysis. The severity of the route condition is highlighted by the color-coded circles, indicating the troubled connections. 5
6 Further analysis of one of these probable problem routes provides specific statistical information for that connection. This example shows the detailed statistics for a probable problem route. Further detailed information about specific connections that aid analysis include the: Number of times the receiver window size dropped to zero Longest response time Minimum segment size Number of fragmented datagrams Number of retransmits Maximum number of unacknowledged bytes outstanding. A packet-by-packet flow may also be required to analyze data flow details by connection. 6
7 Example: Poor performance and slow downloads Performance challenges can result from improper system and network option settings. In a TCP/IP environment, users were complaining of overall poor performance and slow downloads after installation of a new version of OS/390. A trace of the problem showed that the TCP receiver s advertised window size was too large and retransmissions were occurring. The trace showed that the OS/390 window scale option was in use. This gave the sender, OS/390, permission to send enormous amounts of data into the network. The first router in the path did not have the buffer resources required to handle the data. Therefore, the router had buffer overrun and packets were discarded. The sender would eventually resend the discarded packets, but the extra time involved severely impacted network performance. The solution was to turn off the default window scale option in OS/390. Solving performance problems in traditional SNA networks Many organizations rely on well-performing SNA implementations to meet their communications needs. When beginning the analysis of SNA subarea or APPN environments, examine logical unit (LU) flows, packet sizes, window behavior, congestion, bottlenecks and data link operations. Transaction times in a network consist of processing times (service time) and delays. Some delays, such as propagation, cannot be controlled, while other delays are variable and controllable. One should focus on variable and controllable delays, especially network queues and how to control them. Delays have a direct bearing on transaction times, which can affect expenses and user satisfaction. One common performance problem in SNA environments can be caused by a blocked virtual route (VR). Usually, the symptom is data backing up in the network, resulting in increased time to get through the network. This blockage is referred to as subarea congestion and can be caused by incorrect VR pool or the VR pacing window sizes. 7
8 Analyzing VTAM Internal Trace (VIT) data helps identify the held routes. NTA service tools automatically decipher the trace data to highlight the routes that are experiencing poor performance. The following illustration is an example of the potential problem route screen showing two held VRs. As the next step, NTA identifies potential causes of the problem along with recommendations. The following is an illustration of the recommendations provided by the expert system portion of NTA. 8
9 Using the recommendations, other VR statistics, such as average path information unit (PIU) size by time, window count, and transmission group (TG) utilization, assist in completing the analysis and resolution of performance problems. The following is an illustration of TG utilization. A single view of all the VRs and their status can also be helpful in analyzing and understanding the activity in the network. 9
10 Following are some examples of network performance challenges in both SNA subarea and SNA/APPN environments. Example: Slow data transfer, slow communications This example shows how parameter settings can affect an SNA subarea network, leading to poor business communications. In this example, the key to communications was the transfer of data between a number of clients to the supplier. The supplier received a report from a client that data transfers were taking much longer than was reasonable. The transfer time was acceptable if the supplier became the primary application and received the file. However, if the client sent the file to the supplier, the transfer time was unacceptable. Network data was collected from both the unacceptable transfer and the acceptable transfer scenarios. Using NTA service tools, the analyst determined that the data rates were 240 bytes per second for the unacceptable flow and 6,200 bytes per second for the acceptable flow. Using this information, the supplier determined that, during the unacceptable transfer, the supplier was the secondary application and the window size used was set at two. Conversely, during the acceptable data transfer, the supplier was the primary application and the window size was set at 15. The analyst recommended that the client change the primary send pacing (PSNDPAC) to 15. This resolved the slow data transfer. Example: Printing slowdown impacts productivity This example involves an SNA/APPN performance problem with a series of high-speed printers. Throughout the day, printers would stop printing briefly in the middle of a print job and then start again. This condition is known as clutching. The printers were attached to an RS/6000 print server that was using CS/AIX for the SNA support. The server was connected to a VTAM host through a Token Ring. The users discovered that all the printers attached to the RS/6000 server were clutching during peak loads. This resulted in large print jobs taking an excessive time to complete, which led to a violation of a service level agreement they had with their customer. 10
11 An analyst traced the Token Ring that connected the RS/6000 printer server to the 3745 front end processor. After reviewing the trace using NTA service tools, it was determined that there was a coding mismatch between the Token Ring parameters in VTAM and in CS/AIX on the print server. This mismatch caused the host to send a number of data packets to the RS/6000 and then wait for acknowledgment before sending the next set of frames. Because CS/AIX was misconfigured, it would expect more data after the host was finished sending. When this occurred, the print server had no data to send to the printers. Eventually, a timer would expire, the acknowledgment would flow and the sequence would start over. This created long delays between data transmissions, resulting in clutching. Using the findings of this analysis, the CS/AIX was reconfigured and the problem was resolved. Benefits of performance analysis Effectively identifying and resolving complex network performance problems in TCP/IP, SNA subarea and SNA/APPN environments require the ability to quickly analyze network traffic. This ability, in turn, requires skills, specific tools and an efficient process. As the network continues to play an increasingly important role in successful business communications and operations, the ability to satisfy users and clients will be determined by the ability to quickly identify and resolve performance problems. For more information To learn more about IBM Performance Management and Capacity Planning Services and IBM Global Services, visit or contact your IBM sales representative. You can also contact us at in the U.S. and outside the U.S., or us at capacity@us.ibm.com. Bob Springsteen is a certified network consultant and Chris Lennon is a network specialist responsible for performance management of networks, with specific focus on providing remote assistance to clients using NTA service tools for IBM Performance Management and Capacity Planning Services. The capabilities of NTA service tools illustrated through examples in this white paper are available through electronic and Web access from IBM. 11
12 Copyright IBM Corporation 2000 IBM Global Services Route 100 Somers, NY Produced in the United States of America All Rights Reserved IBM, the e-business logo, OS/390 and RS/6000 are registered trademarks or trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service marks may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. IBM reserves the right to change specifications or other product information without notice. This publication may include typographical errors and technical inaccuracies and may be changed or withdrawn at any time. The content is provided as is, without warranties of any kind, either express or implied, including the implied warranties of merchantability and fitness for a particular purpose. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore this disclaimer may not apply to you. G
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
More informationNetwork performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
More information1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationz/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
More informationAdvanced Computer Networks Project 2: File Transfer Application
1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationIBM Tivoli Monitoring for Network Performance
Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationSwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationFile Transfer Protocol (FTP) Throughput Testing by Rachel Weiss
White Paper File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss Introduction In today s complex networks it is often difficult to correlate different measurements that are reported by network
More informationTop 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM Sr Consulting IT Specialist Session 10723 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.OSA Express
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationTop 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM August 10, 2011: 1:30 PM-2:30 PM Session 9917 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationUsing TrueSpeed VNF to Test TCP Throughput in a Call Center Environment
Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationIntegration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationIBM WebSphere Application Server Communications Enabled Applications
IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationThis sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
More informationModule 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationMike Canney Principal Network Analyst getpackets.com
Mike Canney Principal Network Analyst getpackets.com 1 My contact info contact Mike Canney, Principal Network Analyst, getpackets.com canney@getpackets.com 319.389.1137 2 Capture Strategies capture Capture
More informationCOMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
More informationMidterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
More informationIP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationOutline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
More informationTCP/IP Support Enhancements
TPF Users Group Spring 2005 TCP/IP Support Enhancements Mark Gambino AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any references to future plans are for
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationApplication Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationManaging Application Delivery from the User s Perspective
Managing Application Delivery from the User s Perspective Essential Monitoring Capabilities and Metrics for Assessing End-User Experience Network managers are tasked with monitoring end-user experience,
More informationExpert Reference Series of White Papers. Troubleshooting Slow Networks with Wireshark
Expert Reference Series of White Papers Troubleshooting Slow Networks with Wireshark 1-800-COURSES www.globalknowledge.com Troubleshooting Slow Networks with Wireshark Laura Chappell, Founder, Wireshark
More informationMike Canney. Application Performance Analysis
Mike Canney Application Performance Analysis 1 Welcome to Sharkfest 12 contact Mike Canney, Principal Network Analyst, Tektivity, Inc. canney@getpackets.com 319-365-3336 www.getpackets.com 2 Agenda agenda
More informationWHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationiseries Quality of service
iseries Quality of service iseries Quality of service Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
More informationIBM Tivoli Web Response Monitor
IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationSuperAgent and Siebel
SuperAgent and Siebel Executive summary Siebel Systems provides a comprehensive family of multichannel ebusiness applications services, all within a single architecture. The Siebel architecture is an n-tier
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationLinux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
More informationIntroduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
More informationThe Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationTop 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler butlerde@us.ibm.com 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
More informationAERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationNetView for z/os V6.1 Packet Trace Analysis
NetView for z/os V6.1 Packet Trace Analysis Introduction This paper provides insights into the Packet Trace Analysis feature delivered in IBM Tivoli NetView for z/os V6.1, including an explanation of the
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More informationDell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationThree Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationUsing SolarWinds Orion for Cisco Assessments
Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling
More informationIPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
More informationNetwork Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
More informationBest practice for SwiftBroadband
Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationLow-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
More informationVPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationIBM RATIONAL PERFORMANCE TESTER
IBM RATIONAL PERFORMANCE TESTER Today, a major portion of newly developed enterprise applications is based on Internet connectivity of a geographically distributed work force that all need on-line access
More informationCongestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationNew!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationIntroduction to Mainframe (z/os) Network Management
Introduction to Mainframe (z/os) Network Management Monday, August 10, 1:45-2:45 Session 17736 Dean Butler (butlerde@us.ibm.com) Agenda What is network management? Why manage the network on z/os? z/os
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationAllocating Network Bandwidth to Match Business Priorities
Allocating Network Bandwidth to Match Business Priorities Speaker Peter Sichel Chief Engineer Sustainable Softworks psichel@sustworks.com MacWorld San Francisco 2006 Session M225 12-Jan-2006 10:30 AM -
More informationEthernet-based Storage Configuration
VMWARE TECHNICAL NOTE VMware ESX Server Ethernet-based Storage Configuration Using Ethernet for a storage medium is not a new idea. Network file systems such as NFS and SMB/CIFS are entering their third
More informationA Dell Technical White Paper Dell Storage Engineering
Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More informationWebSphere DataPower Release 3.8.1 DNS Enhancements
WebSphere DataPower Release 3.8.1 DNS Enhancements XA/XS/XI/XB/XM 2010 IBM Corporation WebSphere DataPower Release 3.8.1 DNS Enhancements 381DataPowerDNSEnhancement.ppt Page 1 of 6 DNS Enhancements Table
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationNetwork Management Quality of Service I
Network Management Quality of Service I Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Basic Network Management (Recap) Introduction to QoS Packet Switched Networks (Recap) Common
More informationCongestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationCommunications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationCraig Pelkie Bits & Bytes Programming, Inc. craig@web400.com
Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 craig@web400.com
More information