AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling
|
|
- Eleanore Jones
- 8 years ago
- Views:
Transcription
1 AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling
2 Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview This white paper models the time it takes a client (e.g. a web browser) to fetch an http resource from the origin server, based on a small set of parameters, and compare the expected performance of the direct (=BGP) client-origin path with a CDN (e.g. Akamai SureRoute ) client-edge-intermediary-origin path. Along the way, we highlight the main parameters impacting performance, and provide origin settings recommendations to improve end-user experience. Based on this model, we created an interactive web page where the reader can visualize the expected download time of a website dynamic resource as a function of the distance client-server. Introduction Despite the relentless progress in processing power and the ever increasing network bandwidths, web pages on average are taking longer to load (see HTTP Archive). Yet at the same time, it is now well established that end-user satisfaction is directly impacted by the speed at which a page is served. An obvious solution is to cache content at the edge, reducing considerably its latency. However, even the cached pages once in a while have to be refreshed from the origin, and there are whole categories of resources that cannot be cached altogether, either because they cannot afford any staleness, or they hold non-shareable information. To address the non-cached resource acceleration issue, Akamai uses the SureRoute technology, which picks the fastest of up to 3 concurrent paths from an edge server to the origin infrastructure, one of them going directly (=BGP driven) to the origin (when not protected by SiteShield ), the other 2 going thru intermediary servers. Given the myriad of parameters contributing to web resource latencies and some of the complexity inherent to the TCP protocol, it is not surprising that little information has been made available so far on the internet allowing a reader to fully understand, let alone predict, the time it takes a client device to download a web resource from its origin server. Main Parameters Impacting Http Downloads Performance ISP/Carrier Exit point Global Settings: Http vs Https Resource size Max. Transmission Unit Client Settings: Origin Infrastructure Rwin = TCP receiving buffer size New or Existing Connection Connection Persistence Last Mile: Bandwidth RTT Loss Middle Mile: RTT Loss First Mile: Response Generation TCP initial congestion window Connection Persistence
3 Delivering Dynamic Web Content in Cloud Computing Applications 2 This document aims at filling this gap. Using empirical measurements from the Akamai platform, well documented TCP behaviors and the latest State of the Internet report data, we implemented a predictive model and layered a graphical representation on top of it, so the reader can visually gauge the performance differences, whether Akamai SureRoute is used or not to fetch content from the origin. Round Trip Time (RTT) This is one of the main parameters influencing the download times, yet has proven difficult to model either mathematically or empirically. RTT does have a lower bound, computed by the time it would take a ray of light in a vacuum to travel in a straight line between the client and its origin server and back. However in real life situations, the RTT of a single packet is much slower for the following reasons: First-mile: In most cases, origin infrastructure first-mile does not incur significant additional rtt times, and we ll therefore omit it for the rest of the document. Middle-mile: Non-straight lines between the source and the destination - This is primarily the result of ISP business peering relationships, not always motivated by ensuring fastest IP packet delivery! It is common to see the internet public route, driven by BGP tables, be more than twice as long as the geometrical distance. Light speed in fiber optic is about 40 % slower than in vacuum Congestions and delays incurred in routers and other internet hops. Unreliable networks. Hardware failures, DDoS attacks, mis-configurations, cable cuts or de-peering can all combine to increased latency or even plain failures in extreme cases Last-mile: Many residential users connect to the internet backbone thru a less efficient line provided by their ISP, incurring a last-mile RTT penalty, typically in the 20 to 45 ms range. When using mobile devices, this penalty jumps to 60 ms for 4G LTE and up to 300 ms for older 3G networks. Let s call RTT Ratio, or RTTR, the ratio between the fastest theoretical RTT and the observed RTT on the public internet. In order to model its middle-mile value, we leveraged the large footprint of the Akamai platform and conducted sets of ping point measurements spread across the world. Throughout the US and Europe, we tracked the RTTR values against the geometric distance between the source and the destination: We found that, on average and for distances greater than 500 miles: RTTR is geographically uniform and fairly independent from the distance source-target, at least throughout Americas and Europe It holds the same value over time It has a median value of 2.9, with a vast majority of data points between 2 and 4
4 Delivering Dynamic Web Content in Cloud Computing Applications 3 From these experimental results, we can therefore model: Observed RTT (ms) = Last-mile RTT (ms) + RTTR * * Distance (miles), or based on empirical results: Middle-Mile RTT (ms) ~ 3.1 % * Distance (miles) We can now plot the expected RTTs as a function of client-origin distance for common use-cases: Expected RTT (ms) Average RTT (30 ms ISP RTT, RTTR=3) Lower-Bound RTT (5 ms LAN RTT, RTTR=2) Higher-Bound RTT (200 ms mobile RTT, RTTR=4) Distance (miles) Throughput Next to RTT, throughput is another important factor to determine a resource download latency. It is the maximum amount of data that can be downloaded by unit of time. 3 factors limit it: The maximum data that is yet to be acknowledged by the client (in flight) Throughput <= RWIN / RTT. The client receiving window (RWIN), is commonly set to a value of 65.7 KB. The connection packet loss probability Throughput <= C * MSS / (RTT* (packet loss)), where the maximum segment size (MSS) is 1460 bytes for a vast majority of connections. 1<=C<=1.3, we ll use C=1 for the remainder of this document. The maximum bandwidth provided by the ISP to the user, usually in the 2 to 20+ Mbps range for residential users, much higher for LAN settings.
5 Delivering Dynamic Web Content in Cloud Computing Applications 4 Let s review their relative impact. The graph below represents the maximum bandwidth as a function of the packet loss percentage for various values of RTT: The line break is hit for probability of about 0.05%. For smaller loss probability, RWIN limits the throughput. For higher ones, the loss probability bounds it. 24 Max Throughput (Mbps) RTT = 25 ms RTT = 50 ms RTT = 100 ms RTT = 200 ms Percent Packet Loss (log) From information gathered by Akamai in their State of the Internet quarterly reports (dated Q4 2013) we know that the average worldwide connection speed for end users is about 4 Mbps (10 Mbps in the US) with peak average values over 20 Mbps (over 40 Mbps in the US). 20 Mbps is also the maximum throughput allowed by a RWIN of 65.7 K for an RTT of 25 ms. Since the last-mile connection time alone for most users is 25 ms or more, it is reasonable to assess that the ISP maximum provided bandwidth is rarely a limiting factor. Users with close or direct access to the internet backbone, with virtually no last-mile time penalty, usually also enjoy very large bandwidths, so even for shorter TTLs the bandwidth is rarely a bottleneck. Similarly, because most RTT values are greater than 25 ms and loss probability is greater than 0.05%, the RWIN size is not generally a limiting factor for TCP object download. For users close to the backbone, enjoying a virtually lossless connection and very high bandwidth, the prevalent value of 65.7 K RWIN may become a bottleneck for large file download and users may consider augmenting it. However for these users, performance is generally not a significant issue so the need for optimization is not as critical. To conclude this chapter, we ve shown that for most users and most websites, the time it takes to download objects is not limited by either the last-mile advertised bandwidth or the standard receiving client buffer size
6 Delivering Dynamic Web Content in Cloud Computing Applications 5 Resource Download Time Before we can compute the overall latency of a downloaded object, and due to TCP s implementation behavior, we have to consider 2 separate cases, whether the object is downloaded thru an existing connection or whether it initiates a new one. New Connection The amount of data transferred during each round trip is dictated by the TCP slow-start mechanism, where the payload doubles in size with each round trip after the initial connection is established. This initial connection takes one round trip for non-secure (HTTP) communications, or 3 round trips for secure ones (HTTPS). With a maximum segment size of 1460 bytes, we can graph the amount of data transferred per round trip as a function of the initial window size (in number of packets, or frames): 80 Data transferred by round trip (KB), loseless connection initcwnd = 3, http initcwnd = 10, http initcwnd = 3, https initcwnd = 10, https Round Trip # We readily see the significant impact of the initial window size on the amount of data transferred for new connections. A draft IETF recommendation to set the default size up to 10 segments has been submitted for this purpose. This graph also emphasizes the benefits for both the clients and the servers to keep their connections open, so they can be reused for subsequent object downloads. Existing Connections The graph above is only valid at the beginning of the connection. At some point in time, the throughput becomes bound by the formula highlighted in the throughput section above and reaches an average steady state value: Average Steady State Throughput (KB/ms) = Minimum of [ 1.46 / (RTT*packet loss) and RWIN / RTT ]
7 Delivering Dynamic Web Content in Cloud Computing Applications 6 CDN Intermediaries Impact on Latency Since the majority of high traffic websites leverage the services of Akamai or other CDN, it is worth investigating their impact on the delivery of non-cached website content, especially over long distances. When SureRoute is used, an http request flows from the client to an edge server, located close to the user (or his/her ISP exit point), through an intermediary, and to the origin infrastructure. As such, 2 extra sets of connections are established compared to the direct-to-origin route: Client Public (=BGP) route. Origin Server Optimized (=CDN) route. CDN Edge Server CDN Intermediary Overall latency is computed by adding the latency from the client to the edge server, plus the latency from the edge server to the intermediary server and finally the latency from the intermediary to the origin. Although the initial requests spawn 3 distinct connections on its way to the origin infrastructure, the positioning of the Akamai servers relative to the client and origin, their internal TCP settings and their ability to pick alternate routes (compared to the default one picked by BGP) makes this alternate path faster in most instances. Putting it all together Based on the data modelling detailed above, we created an interactive web page where the reader can visualize the expected download time of a website dynamic resources as a function of the distance client-server, with and without SureRoute intermediaries. As the global leader in Content Delivery Network (CDN) services, Akamai makes the Internet fast, reliable and secure for its customers. The company s advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionizing how businesses optimize consumer, enterprise and entertainment experiences for any device, anywhere. To learn how Akamai solutions and its team of Internet experts are helping businesses move faster forward, please visit or blogs.akamai.com, and on Twitter. Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 40 offices around the world. Our services and renowned customer care enable businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject to change without notice. Published 05/15.
THE AKAMAI SERVICE CONSULTING PACKAGE 10FOR10 IMPROVES YOUR WEB PERFORMANCE METRIC(S) BY AT LEAST 10%! AKAMAI 10For10 AKAMAI INDUSTRY BROCHURE
AKAMAI 10For10 THE AKAMAI SERVICE CONSULTING PACKAGE 10FOR10 IMPROVES YOUR WEB PERFORMANCE METRIC(S) BY AT LEAST 10%! Whether delivering web applications from behind the firewall, hosting in the cloud,
More informationTeridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com
Teridion The Internet. Lightning Fast. Rethinking Network Performance Technical White Paper July, 2015 www.teridion.com Executive summary Online services face the growing dual challenge of supporting many
More informationMeasuring CDN Performance. Hooman Beheshti, VP Technology
Measuring CDN Performance Hooman Beheshti, VP Technology Why this matters Performance is one of the main reasons we use a CDN Seems easy to measure, but isn t Performance is an easy way to comparison shop
More informationAKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
More informationAccount Checkers and Fraud
kamai Technologies Inc. Account Checkers and Fraud Carders in Action VERSION: 2013-0005-G Table of Contents Executive Summary... 2 Observed Behavior... 2 Attacker Tactics, Techniques and Procedures...
More informationTraffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012
Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back
More informationImproving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008
Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 When you buy a broadband Wide Area Network (WAN) you want to put the entire bandwidth capacity to
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationAKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry
AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL
More informationnetworks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER
Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption
More informationSSDP REFLECTION DDOS ATTACKS
TLP: AMBER GSI ID: 1079 SSDP REFLECTION DDOS ATTACKS RISK FACTOR - HIGH 1.1 OVERVIEW / PLXsert has observed the use of a new reflection and amplification distributed denial of service (DDoS) attack that
More informationWeb Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
More informationVPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
More informationHIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security
HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security HIMSS Survey Uncovers Critical Weaknesses in Hospital Web Security 2 HIMSS Analytics, in partnership with Akamai, recently conducted a
More informationUsing TrueSpeed VNF to Test TCP Throughput in a Call Center Environment
Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationAkamai for Software as a Service (SaaS)
Do your customers suffer from application performance and availability problems due to WAN related issues outside of your data-center? Trust Akamai to boost the satisfaction of your global customers while
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationImproving Online Video Quality and Accelerating Downloads
White Paper Improving Online Video Quality and Accelerating Downloads The FastTCP Network Enhancement Table of Contents Overview 1 The Need For Speed 2 Transmission Control Protocol: Evolution & Limitations
More informationAkamai for SAP Acceleration:
Do your SAP users suffer from poor performing and unreliable applications due to WAN related issues outside of your data-center? Trust to boost worker productivity and your bottom line. Want to know whether
More informationAKAMAI WHITE PAPER. How To Deliver Fast, Engaging Responsive Web Design Sites
AKAMAI WHITE PAPER How To Deliver Fast, Engaging Responsive Web Design Sites TABLE OF CONTENTS MOBILE IMPACTS THE BOTTOM LINE 1 RESPONSIVE WEB DESIGN ADOPTION IS GROWING FAST 1 FAST, QUALITY WEB EXPERIENCES
More informationKey Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
More informationAkamai s EdgePlatform for Application Acceleration
Akamai s EdgePlatform for Application Acceleration Transform the Internet into a Business-Ready Application Delivery Platform Fast Enterprise Applications, No Hardware Required Table of Contents Overview...................................................
More informationThe server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
More informationA Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper
A Talari Networks White Paper Turbo Charging WAN Optimization with WAN Virtualization A Talari White Paper 2 Introduction WAN Virtualization is revolutionizing Enterprise Wide Area Network (WAN) economics,
More informationWhite Paper. How To Deliver Fast, Engaging Responsive Web Design Sites
White Paper How To Deliver Fast, Engaging Responsive Web Design Sites Table of Contents MOBILE IMPACTS THE BOTTOM LINE...1 RESPONSIVE WEB DESIGN ADOPTION GROWING FAST...2 FAST, QUALITY WEB EXPERIENCES
More informationAcceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1
Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 December 2015 Table of Contents 1 PAT... 1 1.1 Network Quality Report (Pre-test Evaluation)... 1 1.1.1 Raw MTR Data... 4 2 Executing
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationMaking the Internet Business-Ready
Making the Internet Business-Ready If you ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you ve probably used Akamai. Our solutions help to deliver the best
More informationComputer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
More informationSecure Content Delivery Network
kamai Technologies Inc. Secure Content Delivery Network Physical Access Information May 13, 2014 Table of Contents Purpose... 2 Risk Analysis... 2 Physical Access... 2 Issue/Response... 3 Records... 4
More informationAKAMAI WHITE PAPER. Accelerate and Protect your E-learning Initiatives using Akamai s Cloud Based Intelligent Platform TM
AKAMAI WHITE PAPER Accelerate and Protect your E-learning Initiatives using Akamai s Cloud Based Intelligent Platform TM TABLE OF CONTENTS EXECUTIVE SUMMARY 1 THE AKAMAI ADVANTAGE 1 ABOUT E-LEARNING 1
More informationakamai s [state of the internet] Q 3 2015 executive review
akamai s [state of the internet] Q 3 2015 executive review about the review / Akamai, the world s leading content delivery network (CDN) provider, uses its globally distributed Intelligent Platform TM
More informationOperating Systems and Networks Sample Solution 1
Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation
More informationTRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationVideo Streaming Without Interruption
Video Streaming Without Interruption Adaptive bitrate and content delivery networks: Are they enough to achieve high quality, uninterrupted Internet video streaming? WHITE PAPER Abstract The increasing
More informationMike Canney Principal Network Analyst getpackets.com
Mike Canney Principal Network Analyst getpackets.com 1 My contact info contact Mike Canney, Principal Network Analyst, getpackets.com canney@getpackets.com 319.389.1137 2 Capture Strategies capture Capture
More informationA Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationMaking the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com>
Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationHow the Netflix ISP Speed Index Documents Netflix Congestion Problems
How the Netflix ISP Speed Index Documents Netflix Congestion Problems By Peter Sevcik June 2014 NetForecast Report NFR5117 2014 NetForecast, Inc. As of this writing, a comedic YouTube video featuring Netflix
More informationOverclocking the Yahoo! CDN for Faster Web Page Loads
Overclocking the Yahoo! CDN for Faster Web Page Loads Mohammad Al-Fares,, Khaled Elmeleegy, Benjamin Reed, and Igor Gashinsky Computer Science and Engineering Yahoo! Research Yahoo! Inc. UC San Diego malfares@cs.ucsd.edu
More informationHIGH-SPEED BRIDGE TO CLOUD STORAGE
HIGH-SPEED BRIDGE TO CLOUD STORAGE Addressing throughput bottlenecks with Signiant s SkyDrop 2 The heart of the Internet is a pulsing movement of data circulating among billions of devices worldwide between
More informationA SENSIBLE GUIDE TO LATENCY MANAGEMENT
A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former
More informationBit-Rate and Application Performance in Ultra BroadBand Networks
Bit-Rate and Application Performance in Ultra BroadBand Networks Gianfranco Ciccarella - Telecom Italia Vice President Global Advisory Services 4ºFocus: Gianfranco Ciccarella - Telecom Index QoE platforms:
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationOptimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management
Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Executive Summary Organizations
More informationResults-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper
Results-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper Table of Contents Executive Summary...3 Why Website Performance Matters...3 What Affects Website Performance...5
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationRigorous Performance Testing on the Web. Grant Ellis Senior Performance Architect, Instart Logic
Rigorous Performance Testing on the Web Grant Ellis Senior Performance Architect, Instart Logic Who is Instart Logic? Software company focused on Application Delivery We work with globally known brands
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationThe OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere.
The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere. Network Performance Users devices create multiple simultaneous connections each time we exchange data with other Internet
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationTHE INTERNET GETS BETTER WHEN WE WORK TOGETHER
THE INTERNET GETS BETTER WHEN WE WORK TOGETHER FASTER FORWARD. TOGETHER. Since it s inception, the creation and constant improvement of the Internet has been, by design, a team effort. And nowhere do we
More informationHow To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
More informationChallenges of Sending Large Files Over Public Internet
Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting
More informationMike Canney. Application Performance Analysis
Mike Canney Application Performance Analysis 1 Welcome to Sharkfest 12 contact Mike Canney, Principal Network Analyst, Tektivity, Inc. canney@getpackets.com 319-365-3336 www.getpackets.com 2 Agenda agenda
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationTRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
More informationBurst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty
Burst Testing Emerging high-speed protocols in mobility and access networks, combined with qualityof-service demands from business customers for services such as cloud computing, place increased performance
More informationFile Transfer Protocol (FTP) Throughput Testing by Rachel Weiss
White Paper File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss Introduction In today s complex networks it is often difficult to correlate different measurements that are reported by network
More informationHomework Assignment #1 Solutions
Homework Assignment #1 Solutions EE122: Introduction to Communication Networks (Fall 2007) Department of Electrical Engineering and Computer Sciences College of Engineering University of California, Berkeley
More informationApplication Performance Analysis and Troubleshooting
Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency
More informationThe Effect of Caches for Mobile Broadband Internet Access
The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationSix Steps for Hosting Providers to Sell CDN Services
Six Steps for Hosting Providers to Sell CDN Services By Rebecca Wetzel March 2013 This report was sponsored by Introduction CDN services are a promising way for many hosting providers to grow their businesses.
More informationThe Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network
More informationEssential Ingredients for Optimizing End User Experience Monitoring
Essential Ingredients for Optimizing End User Experience Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Neustar IT MANAGEMENT RESEARCH, Table of Contents Executive Summary...1
More informationIntegration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationStrategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
More informationCisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationThe Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN
The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Background and Goal Many papers have been written
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationNetwork Management Practices Policy
Network Management Practices Policy Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the policies of
More informationFIVE WAYS TO OPTIMIZE MOBILE WEBSITE PERFORMANCE WITH PAGE SPEED
WHITE PAPER: MOBILE WEBSITE PERFORMANCE FIVE WAYS TO OPTIMIZE MOBILE WEBSITE PERFORMANCE WITH PAGE SPEED SNOOZE, YOU LOSE. TODAY S MOBILE USERS EXPECT PERFORMANCE DELIVERED FAST. For those of us who depend
More informationApplication Response Time Improvements with Transparent Turn Reduction
Application Response Time Improvements with Transparent Turn Reduction By Peter Sevcik and John Bartlett September 2003 As corporations expand geographically and use Web-based approaches to operate their
More informationApplication Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
More information1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed.
SLAC-PUB-8384 February 2000 1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed. W. Matthews, L. Cottrell, R. Nitzan Presented at International Conference On Computing In High Energy Physics And
More informationNetworking part 3: the transport layer
Networking part 3: the transport layer Juliusz Chroboczek Université de Paris-Diderot (Paris 7) September 2011 Summary of the previous episodes Episode 1: switching, packet switching and the Internet.
More informationIntelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
More informationRFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do
RFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do RFC 6349 is the new transmission control protocol (TCP) throughput test methodology that JDSU co-authored along with
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationPictureTel H.323 Videoconferencing Network Bandwidth Analysis
PictureTel H.323 Videoconferencing Network Bandwidth Analysis by John Bartlett NSD Engineering PictureTel Corporation August 25, 1997 Introduction This document evaluates the network bandwidth required
More informationCSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto
CSC2231: Akamai http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Project proposals due today!!! No lecture on Monday:
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationNetwork Performance Optimisation: The Technical Analytics Understood Mike Gold VP Sales, Europe, Russia and Israel Comtech EF Data May 2013
Network Performance Optimisation: The Technical Analytics Understood Mike Gold VP Sales, Europe, Russia and Israel Comtech EF Data May 2013 Copyright 2013 Comtech EF Data Corporation Network Performance
More informationJOOMLA REFLECTION DDOS-FOR-HIRE
1 TLP: GREEN GSI ID: 1085 JOOMLA REFLECTION DDOS-FOR-HIRE RISK FACTOR - HIGH 1.1 / OVERVIEW / Following a series of vulnerability disclosures throughout 2014, the popular content management framework Joomla
More informationPERFORMANCE MATTERS CONSUMER INSIGHTS FROM THE UNITED KINGDOM
PERFORMANCE MATTERS CONSUMER INSIGHTS FROM THE UNITED KINGDOM In the new hyperconnected world, we no longer go online, we are online. The ubiquity of mobile devices, the increase in WiFi availability and
More informationThe Value of a Content Delivery Network
September 2010 White Paper The Value of a Content Delivery Network Table of Contents Introduction... 3 Performance... 3 The Second Generation of CDNs... 6 Conclusion... 7 About NTT America... 8 Introduction
More informationResearch of User Experience Centric Network in MBB Era ---Service Waiting Time
Research of User Experience Centric Network in MBB ---Service Waiting Time Content Content 1 Introduction... 1 1.1 Key Findings... 1 1.2 Research Methodology... 2 2 Explorer Excellent MBB Network Experience
More information