FlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3)
|
|
|
- Ross Ford
- 10 years ago
- Views:
Transcription
1 FlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3) Gustavo Carneiro Pedro Fortuna Manuel Ricardo INESC Porto Unidade de Telecomunicações e Multimédia Faculdade de Engenharia da Universidade do Porto / NSTools 2009
2 Outline 1 Introduction Network Monitoring Simulation Overview NS-3 2 The FlowMonitor NS-3 module Requirements Architecture Flow Data Structures Basic Metrics 3 Example 4 Validation and Results Validation Performance Results 5 Conclusions Conclusions Future Work
3 Outline 1 Introduction Network Monitoring Simulation Overview NS-3 2 The FlowMonitor NS-3 module Requirements Architecture Flow Data Structures Basic Metrics 3 Example 4 Validation and Results Validation Performance Results 5 Conclusions Conclusions Future Work
4 Network Monitoring Traditional network monitoring issues: strategy: passive (just measures) or active (injects traffic to be measured) In simulation, the researcher is already injecting flows, we just need to measure them monitoring points: not every network element can be easily monitored (lack of SNMP) In simulation, every node is monitorable monitoring duration: must be large enough to enable the gathering of statistically sound results In simulation, this can be easily controlled synchronization: events to monitor must be ordered among a set of nodes Usually a time stamp in messages is required Problem: synchronizing the clocks In simulation, the clocks are always synchronized transparency: monitoring control traffic affects results In simulation, monitoring data is reported via method calls, not packets
5 Simulation Overview Writing simulations is a complex task Write a model Define a topology Add flows Debug... Measure the flows (tracing plus pre-processing) Write the flow statistics to a file for post-processing Significant portion of time dedicated to write code to measure flows and collect statistics Solution: Flow Monitor for NS-3 Just a few lines of code Measures all flows in the simulation, no questions asked Provides flow statistics as 1 Simple in-memory data structures 2 Serialized to an XML file
6 NS-3 Routing: olsr,global-routing common node helper Internet-stack (ipv4 impl.) core Devices: csma wifi... simulator mobility core base runtime system: attributes, tracing, smart pointers, callbacks common packets, buffers, and packet headers simulator event scheduler, high precision time class node network simulator fundamentals: Node, NetDevice, addresses mobility mobility models (describe the trajectory of a node) olsr the OLSR routing protocol (adhoc) global-routing GOD routing internet-stack UDP/TCP/IPv4/6 implementation csma, wifi, etc. actual implementations of the NetDevice class helper a façade that keeps scripting nice and neat
7 Outline 1 Introduction Network Monitoring Simulation Overview NS-3 2 The FlowMonitor NS-3 module Requirements Architecture Flow Data Structures Basic Metrics 3 Example 4 Validation and Results Validation Performance Results 5 Conclusions Conclusions Future Work
8 Requirements ease of use: It must be easy to use Activate with just a few lines of code Detect passing flows automatically Little or no configuration required amount of data to capture: Balanced amount of data Too much captured data: Incurs disk I/O bandwidth Slows down simulations Makes data transfer and manipulation painfully slow Too little and we may miss something important Often we do not realize it is important until too late support python: fire-and-forget approach, no callbacks NS-3 s Config::Connect uses callbacks to process per-packet events In Python, per-packet processing is unpractical, way too slow
9 Requirements output data format: must be easy to process Candidates: binary files (e.g. HDF): disk efficient, fast, difficult to read, difficult to extend ASCII traces: verbose, difficult to extend, potentially slow to read XML files: verbose, easy to extend, slow but easy to read SQL database: efficient and fast, difficult to read (table format is hidden away), difficult to extend Chosen method: XML Runner up (future work): SQL database Besides, in-memory data structures always available!
10 Requirements extensible: allow extension to monitor different kinds of flows The concept of flow is not set in stone We usually mean TCP-or-UDP L4 flows The five-tuple filter: (source IP, destination IP, protocol, source port, destination port) Sometimes we want other kinds of flows, e.g.: L2 flows: (source mac, destination mac, ethertype) The way to detect flows may vary Overlay networks Tunnels minimize overhead: monitoring adds time/memory overhead
11 Architecture
12 Architecture FlowId: 32-bit identifier of a flow PacketId: 32-bit identifier of a packet within a flow The class FlowMonitor remains unaware of whether it is monitoring IPv4, IPv6, or MAC, flows Only abstract identifiers are used, not packet headers Most of the flow monitoring design, data structures, and code is reused when extending to monitor different kinds of flows
13 Flow Data Structures
14 Flow Data Structures Per-probe flow statistics can answer: Which hop accounts for most of the packet losses? Which hop accounts for most of the end-to-end delay?
15 Flow Data Structures timefirsttxpacket, timelasttxpacket begin and end times of the flow from the point of view of the receiver timefirstrxpacket, timelastrxpacket begin and end times of the flow from the point of view of the receiver delaysum, jittersum sum of delay and jitter values txbytes, txpackets number of transmitted bytes and packets rxbytes, rxpackets number of received bytes and packets lostpackets number of definitely lost packets timesforwarded the number of times a packet has been reportedly forwarded, summed for all packets in the flow
16 Flow Data Structures delayhistogram, jitterhistogram, packetsizehistogram Histogram versions for the delay, jitter, and packet sizes, respectively packetsdropped, bytesdropped discriminates the losses by a reason code DROP NO ROUTE no IPv4 route found for a packet DROP TTL EXPIRE a packet was dropped due to an IPv4 TTL field decremented and reaching zero DROP BAD CHECKSUM a packet had a bad IPv4 header checksum and had to be dropped
17 Flow Data Structures Other metrics can be derived from the basic metrics: mean delay: delay = delaysum mean jitter: jitter = jittersum rxpackets rxpackets 1 mean transmitted packet size (byte): S tx = txbytes txpackets mean received packet size (byte): S rx = rxbytes rxpackets mean transmitted bitrate (bit/s): B tx = mean received bitrate (bit/s): B rx = 8 txbytes timelasttxpacket timefirsttxpacket 8 rxbytes timelastrxpacket timefirstrxpacket mean hop count: hopcount = 1 + timesforwarded rxpackets packet loss ratio: q = lostpackets rxpackets+lostpackets
18 Outline 1 Introduction Network Monitoring Simulation Overview NS-3 2 The FlowMonitor NS-3 module Requirements Architecture Flow Data Structures Basic Metrics 3 Example 4 Validation and Results Validation Performance Results 5 Conclusions Conclusions Future Work
19 flowmon helper = ns3. FlowMonitorHelper ( ) monitor = flowmon helper. I n s t a l l A l l ( ) monitor. S e t A t t r i b u t e ( DelayBinWidth, ns3. DoubleValue ( ) ) monitor. S e t A t t r i b u t e ( J i t t e r B i n W i d t h, ns3. DoubleValue ( ) ) monitor. S e t A t t r i b u t e ( PacketSizeBinWidth, ns3. DoubleValue ( 2 0 ) ) ns3. Simulator. Run ( ) monitor. S e r i a l i z e T o X m l F i l e ( r e s u l t s. xml, True, True ) 1 Create a new FlowMonitorHelper object; 2 Call the method InstallAll on this object FlowMonitor is created IPv4 probes are installed in all nodes 3 Configure some histogram attributes 4 Run the simulation, as before, calling ns3.simulator.run() 5 Finally, write the flow monitored results to a XML file
20 Outline 1 Introduction Network Monitoring Simulation Overview NS-3 2 The FlowMonitor NS-3 module Requirements Architecture Flow Data Structures Basic Metrics 3 Example 4 Validation and Results Validation Performance Results 5 Conclusions Conclusions Future Work
21 Validation Point-to-point links connecting the nodes Link capacities alternating between 100kbit/s and 50kbit/s Maximum queue size: 100 packets Every other nodes sends a 100 kbit/s flow to node two hops away Half the packets expected to be lost
22 Validation C 1 = bit/s S = ( ) 8 = 4336 bit d 1 = S C 1 = s C 2 = bit/s d 2 = 101 S C 2 = s d total = d 1 + d 2 = s B tx = C 1 = bit/s B rx = C 2 = bit/s Metric Measured Value (95% C. I.) Expected Value Mean Error Tx. bitrate ± % Rx. bitrate ± % Delays ± % Losses ± % Table: Validation results
23 Performance Results Run series of simulations, validation scenario Increasing the network size between 16 and 1024 nodes Measure time and memory taken to simulate scenario Compare three variants: 1 Without collecting any results 2 With flow monitoring 3 With ascii tracing to a file
24 Performance Results Memory (MiB) Time (s) Base Flow Monitor Trace File Number of Nodes Base Flow Monitor Trace File Number of Nodes Memory Overhead (%) Time Overhead (%) Flow Monitor Trace File Number of Nodes Flow Monitor Trace file Number of Nodes Figure: Performance results of the flow monitor
25 Outline 1 Introduction Network Monitoring Simulation Overview NS-3 2 The FlowMonitor NS-3 module Requirements Architecture Flow Data Structures Basic Metrics 3 Example 4 Validation and Results Validation Performance Results 5 Conclusions Conclusions Future Work
26 Conclusions A common problem was identified how to easily extract flow metrics from arbitrary simulations? Existing solutions do not solve this problem effectively The Flow Monitor solves the problem Requires significant less programming time than NS-3 callback based tracing A lot more efficient than ascii tracing
27 Future Work More data output methods (e.g. database and binary file) More options to control level of detail stored in memory Monitor multicast/broadcast flows Closer integration with NetDevices, Monitor packet drop from NetDevice s transmission queue Handle transmission errors from layer 2 Record how flow metrics evolve over time By saving a periodic snapshot of the flows metrics to a file Add convenience methods to the Histogram class to compute the values N (number of samples) µ (mean) s (standard error)
FlowMonitor - a network monitoring framework for the Network Simulator 3 (NS-3)
FlowMonitor - a network monitoring framework for the Network Simulator 3 (NS-3) Gustavo Carneiro INESC Porto Faculdade de Engenharia Universidade do Porto [email protected] Pedro Fortuna Manuel Ricardo
NS-3 Advanced Tutorial: Visualization and Data Collection
NS-3 Advanced Tutorial: Visualization and Data Collection Tom Henderson (University of Washington and Boeing Research & Technology) L. Felipe Perrone (Bucknell University) NS-3 Consortium Meeting 1 Outline
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
On real-time delay monitoring in software-defined networks
On real-time delay monitoring in software-defined networks Victor S. Altukhov Lomonosov Moscow State University Moscow, Russia [email protected] Eugene V. Chemeritskiy Applied Research Center for
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
C-GEP 100 Monitoring application user manual
C-GEP 100 Monitoring application user manual 1 Introduction: C-GEP is a very versatile platform for network monitoring applications. The ever growing need for network bandwith like HD video streaming and
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,
Technical Bulletin. Enabling Arista Advanced Monitoring. Overview
Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
QoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Chapter 46 Link Layer Discovery Protocol (LLDP)
Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Quality of Service (QoS) on Netgear switches
Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected
Planeamento e Gestão de Redes. Análise de Requisitos
Planeamento 1 Planeamento e Gestão de Redes Análise de Requisitos Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Planeamento 2 Book Top-Down Network Design, Second Edition Priscilla
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION
Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Choosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
batman-adv scalability
batman-adv scalability Layer 2 Mesh Networks - Myths and Risks Linus Lüssing Freifunk Hamburg Geekend02, Sep. 2013 Outline Introduction 1 Introduction Layer 2 Mesh Networks 2 Experiences From Lübeck 3
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
CONTROL MICROSYSTEMS DNP3. User and Reference Manual
DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
A Simple Methodology for Constructing Extensible and High-Fidelity TCP/IP Network Simulators
Proceedings of IEEE INFOCOM 99, pp. 1134-1143 A Simple Methodology for Constructing Extensible and High-Fidelity Network Simulators S. Y. Wang and H.T. Kung {shieyuan, htk}@eecs.harvard.edu Division of
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?
QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results
Intelligent Wireless Network Group Department of Computer Engineering Faculty of Engineering, Kasetsart University http://iwing.cpe.ku.ac.th ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Chapter 2 Lab 2-2, EIGRP Load Balancing
Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible successors, and feasible distances.
Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. DBA & QoS on the PON - Commonalities with Switching & Routing
Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems DBA & QoS on the PON - Commonalities with Switching & Routing Howard Frazier, Technical Director Broadcom Corporation Agenda Passive
Using a Generic Plug and Play Performance Monitor for SoC Verification
Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why
CHAPTER 3 STATIC ROUTING
CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Effect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.
4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC. Wireshark (see Section 6) is a network packet analyser. It is used to: troubleshoot network problems, examine security problems, debug protocol implementations,
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
A Quality of Experience based Approach for Wireless Mesh Networks*
A Quality of Experience based Approach for Wireless Mesh Networks* Anderson Morais, and Ana Cavalli Télécom SudParis, France {anderson.morais, ana.cavalli}@it-sudparis.eu Abstract. Wireless Mesh Network
Link Layer Discovery Protocol
12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
to-end Packet Loss Estimation for Grid Traffic Monitoring
Passive End-to to-end Packet Loss Estimation for Grid Traffic Monitoring Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science (ICS)
