Active Measurement Data Analysis Techniques
|
|
|
- Melinda Rose
- 10 years ago
- Views:
Transcription
1 3/27/2000: This work is an Authors version, and has been submitted for publication. Copyright may be transferred without further notice and the accepted version may then be posted by the publisher. Active Measurement Data Analysis Techniques Todd Hansen 1 Jose Otero 1 Tony McGregor 2 Hans-Werner Braun 1 1 National Laboratory for Applied Network Research (NLANR) Measurement and Network Analysis Group San Diego Supercomputer Center (SDSC) 2 National Laboratory for Applied Network Research (NLANR) Measurement and Network Analysis Group University of Waikato, New Zealand Contact author: Todd Hansen National Laboratory for Applied Network Research (NLANR) Measurement and Network Analysis Group San Diego Supercomputer Center (SDSC) University of California, San Diego 9500 Gilman Drive La Jolla, Ca [email protected] (858) This work is sponsored by the National Science Foundation (NSF) under Cooperative Agreement No. ANI The government has certain rights in this material. We thank Maureen C. Curran for her editorial assistance.
2 Abstract Active measurements, examine the capabilities of networks and the internet. Through the network analysis infrastructure (NAI), these measurements can provide useful data for network analysis. The National Laboratory for Applied Network Research (NLANR) team, has developed data sets which allow identifcation of a variety of problems which range from High Performance Connectivity and Commodity Network issues. to network hardware and routing issues. We present the steps necessary to secure and analyze such data. Introduction The National Laboratory for Applied Network Research (NLANR) 5 Measurement and Analysis Team 6 conducts both active and passive measurements in order to better understand the Internet and its capabilities. Active measurements are network probes developed to measure the capabilities of the internet. Active and passive measurements can be compared to car maintenance. When you are trying to determine what is wrong with your car, you can either check your car s oil level or give your car a test drive. A test drive would be an active measurement as it changes the state of the vehicle in question, while an oil check would be a passive measurement, which generally has no effect on the state of the car. With active measurements, one can generally retrieve additional information about a network s capabilities, at the cost of adding interference. In this paper, we discuss data analysis methods for NLANR s Active Measurement Project (AMP 7 ). Our goal is to provide a basis for the understanding and analysis of active measurement data so that one can use this data to better understand their network connectivity. We detail methods, which will help one determine the overall performance of their network. This paper is designed to be an introduction to active measurements and analysis. As such, feedback 1 and suggestions on areas which are unclear, would be greatly appreciated. The AMP System The NLANR Active Measurement Project (AMP) is a distributed network of approximately 100 active monitors which systematically perform scheduled measurements between each other (Figure 1). These systems send data to a central data collector where it is made available for download (raw data) and public viewing (by Web browser 7 ). Currently, we are working on additional methods for data presentation which may be more useful for general network analysis. 2
3 Figure 1: Map of AMP Probe constellation (Dec 1999) Measurement Methods: what we measure The AMP constellation measures round trip times (RTT) between each of its systems once a minute. Every ten minutes, traceroutes are preformed to determine routes between each of the measurement boxes. We choose to measure RTT instead of one-way delay because this measurement is easier to perform and does not rely on external devices to synchronize the time between each of the monitors. Other measurement projects use Global Position System (GPS) receivers to synchronize the time between hosts. We have found that these systems are too expensive and difficult to install, for the limited amount of additional information gained. In greater detail, our RTT measurements are made once a minute (randomized by 15 seconds) using the fping program. This program sends an Internet Control Message Protocol (ICMP) echo packet to each host and waits for an ICMP reply packet. It then records the measured delay for each site. The benefit to fping is that it allows us to simultaneously ping multiple sites. (If we had to ping each site serially, it would take much longer than a minute.) A loss is determined when four ICMP echo request packets are sent and no replies are received before each timeout. Our route data is collected every 10 minutes (randomized by 15 seconds) using the traceroute program. Our Web interface allows one to view this data by host pairs. For example, after selecting a primary site (Figure 2), the Web interface shows the previous day s average RTT and loss, for each site within its mesh (Figure 3). The interface also allows one to select a secondary site, and view weekly graphs, which show the RTT between the primary and secondary sites over a weeks time (Figure 4). From this data, one can choose to look at daily RTT or loss graphs. One can also view a listing of route changes that may have occurred on a specified day (Figure 6). 3
4 Meshes and Peer Networks A full mesh is a complete interlinking of objects, in which every object is directly connected to every other object. Our AMP constellation does a full mesh of measurements. This is a data and resource intensive process, and as such, is not scalable beyond 150 machines. Therefore, it is necessary to create peer networks, which have their own network of hosts doing measurements within the full mesh. Unfortunately, this does not allow for studying networks and routes which traverse multiple peer networks. For this reason, we configure mutual peering points, a couple of hosts in each peer s network, that perform measurements within both meshes. By strategically placing these peers we should, in theory, be able to gather useful information about the connectivity between the peer networks. We are currently in the process of experimenting with peer networks; the results of this work should be available sometime in the near future. Figure 2: Main AMP Web interface page, select primary monitor to view. 4
5 Figure 3: Site information specific to the primary site chosen, showing averages for previous 24 hours. From here, the user can select a secondary site and view further measurements. 5
6 Figure 4: Primary (amp-sdsc) to secondary (amp-ncar) site data is displayed as round trip time (RTT) graphs. Yearly and weekly graphs are also presented. From this page you can choose to view a graph of a single day s data (Figure 5) or you can choose to look at the routes for a specific day (Figure 6). 6
7 Figure 5: Graph of a single day s measurements between the primary and secondary sites. This can be used to closely examine interesting anomalies within data or to more closely examine events which may not show clearly in the weekly summaries. Packet loss and round trip times (RTT) for a particular day are also presented in graphical form, on these pages. The graph above exhibits a step down in RTT as the result of a router switch. 7
8 Figure 6: This image shows routing information between the primary and secondary sites for the day selected. As you can see the page highlights route changes in blue. Using this page one can view, in graphical form, all routes for a particular day, using the Otter utility. Data Analysis Methods: What you can determine Our data is collected and organized in a hierarchical structure on the Web. 7 After entering the Web interface, select a primary site (Figure 2). Upon selection of the primary site, measurements are performed and data is sent to central data collector. You will then be presented a summary page (Figure 3), which shows the day s measurements from the primary site, to each of the secondary sites. (The secondary sites are the sites to which the measurements are made). These sites are the same ones, as seen in the primary site list. The presented summary is useful for a quick view of status and for identifying possible problem sites. From this page, choose a secondary site. After selecting the secondary site, you will be able to view measurement data collected between the primary and secondary sites (Figure 4). The top graph is a yearly summary of the measurements, followed by weekly summary graphs giving detailed information. The weekly graphs are very useful in determining the time of a network 8
9 event. From the weekly graphs you can select to view an even more detailed graph of measurements for a particular day (Figure 5). This is done by clicking on the graph or by clicking on the date to the left of the graph. You can also choose to view a listing of route changes for the day (Figure 6). In theory, using this hierarchical structure, one can view all the data that is recorded by our systems. Unfortunately, due to the high volume of data (70 Gb) this is not very releasitic. To analyze the network connectivity for a specific site: select that site as the primary site; then go through each of the secondary sites listed, looking at each of the weekly graphs. For example, if a site shows 100% loss, it is most likely because of a filter (a router that blocks certain packets). This can be verified by looking at the problem log for the site, which is available from the primary site selection page (Figure 2). It is also useful to look at the recent weekly graphs for any network events, problems or trends. In the case studies detailed below, we attempt to give you many different examples of network events. For example, you might notice that your site s connection to UC San Diego exhibits commodity link congestion curves (Case Study #2) and upon further investigation you find that this is due to excessive use of the network or simply the fact that your route to UCSD is via your commodity connection. In general, a little bit of investigation with the information we provide can lead to useful insights. However, we can never provide all of the answers. In general, if you go through all of the secondary sites for your primary site, you should get a good idea of your connectivity and where any problems may lie. Keep in mind that it may be useful to investigate a few reverse path measurements from other sites to your own. This may give you a better idea on how the world connects with you. If you want to get an idea of the overall status of the network, we recommend going through a number of different primary and secondary site pairs, almost at random. Perhaps over time you can come up with a useful list of whic sites are important or significant to you. Unfortunately, with 100 sites it would take too long to look at each of the 10,000 possible pairs. Therefore, you must decide on some way to limit your search in order to view only relevant information. Another method worth mentioning is to look at two different secondary sites for each primary site. This way you can get a good overall picture. The point of general network analysis is to get an idea of the stability of the network and the performance of the links. We are currently working on several tools to aid in this. One of these is the AMP data reports page. This allows you to get a quick summary of all the routes between each of the different sites; this can be very useful in finding problem sites. Another useful tool is the Cichlid 3-D visualization system, which can graph all of the sites RTT/Loss over the previous 24 hours. We are also working on ideas to develop event triggers and route decomposition to pinpoint when and where network problems occur. The intent of these tools is to give you an idea of the stability of the networks, as well as to alert you when something interesting occurs. One of the best ways to find trouble or to diagnose problems with a site is to look for bumps or steps in the round trip time (RTT). These bumps tend to show a routing change, or some configuration change that alters the RTT between two sites. See Figure 7 for an example. 9
10 Figure 7: Weekly graph (Dec 19 Dec 25) from SDSC to NCAR. The temporary step down is caused by the removal of a router by vbns engineering. The router was replaced on Monday. Another thing to look for is high loss. If a site has high loss it may have faulty hardware. This analysis is very basic. A more interesting understanding of your site s performance can be acquired by comparing its connectivity with that of other sites. For example, is there the same congestion on your commodity links that other sites exhibit on theirs? What about the round trip times of your vbns 9 or Abilene 10 connections? Are they relatively good or is there something in your local network that is making the RTT unstable. Another thing to look at, is how the congestion curves (of the RTT graph) are shaped: do they have a smooth shape? Are they bigger than those for other sites? If the graph shows congestion curves, then how does it affect your traffic? In general, our feeling is that a high performance network should have low RTT and no significant congestion curve. One factor to examine is what TCP window sizes within the TCP stacks, would yield maximum performance. This can show a great deal about the feasibility of high speed communication over these networks. Also, how much different is a commodity connection at noon on Friday compared to a vbns link? Hopefully the answers to these questions will help give an accurate picture of the connectivity and performance of your network connection. Cases Studies We feel that the following case studies illustrate some of the important aspects of network performance analysis. The first two case studies show the characteristics of high performance networks and commodity networks. We invite your comments and suggestions on ways to improve the tractability of these issues. 10
11 Related Projects There are a couple of related projects which have attempted to do the same sort of active analysis that we have done. Some of them, Surveyor, for example have attempted to measure one-way delays instead of round trip times. They feel that this will give them more useful information. However, all design decisions come at a cost. It would be wise to look at the platforms on which the tests are running and the size of their mesh. However, if the measurements are done properly, then their results should be as useful as ours. A listing of these related projects is included in the references section. 8 Acknowledgements This work was sponsored by the National Science Foundation under Cooperative Agreement No. ANI We thank Maureen C. Curran for her editorial assistance. References 1. Todd Hansen, [email protected], San Diego Supercomputer Center, UCSD, 9500 Gilman Dr., La Jolla, CA, , USA 2. Jose Otero, [email protected], San Diego Supercomputer Center, UCSD, 9500 Gilman Dr., La Jolla, CA, , USA 3. Hans-Werner Braun, [email protected], San Diego Supercomputer Center, UCSD, 9500 Gilman Dr., La Jolla, CA, , USA 4. Tony McGregor, [email protected], The University of Waikato, Private Bag 3107, Hamilton, New Zealand 5. National Laboratory for Applied Network Research (NLANR), 6. NLANR s Measurement and Network Analysis Team, 7. NLANR s Active Measurement Project (AMP) 8. A listing of related projects: DREN AMP (AMP peer network) Internet End-to-End Performance Monitoring at SLAC National Internet Measurement Infrastructure RIPE's Test Traffic Measurements Surveyor CAIDA s Skitter Project 9. MCI s vbns Network Internet2 s Abilene Network AMP Introduction A. J. McGregor, H-W Braun, J.A. Brown. The NLANR Network Analysis Infrastructure. Accepted for publication by IEEE Communications Magazine. 30
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Infrastructure for active and passive measurements at 10Gbps and beyond
Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Network Probe. Figure 1.1 Cacti Utilization Graph
Network Probe Description The MCNC Client Network Engineering group will install several open source network performance management tools on a computer provided by the LEA or charter school to build a
IP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France [email protected] 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
Correlating Internet Performance Changes and Route Changes to Assist in Trouble-shooting from an End-user Perspective
Correlating Internet Performance Changes and Route Changes to Assist in Trouble-shooting from an End-user Perspective Connie Logg, Jiri Navratil, and Les Cottrell Stanford Linear Accelerator Center, 2575
The Next Generation Internet Program. Mari Maeda ITO
The Next Generation Internet Program Mari Maeda ITO Today s Internet Traffic Makeup other ICMP HTTP Today s Internet Flow Size Distribution Comparison of 97 to 99 20000 Number of transfers 18000 16000
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Customer Network Assessment
--------- Customer Network Assessment Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests...
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
How To Lower Data Rate On A Network On A 2Ghz Network On An Ipnet 2 (Net 2) On A Pnet 2 On A Router On A Gbnet 2.5 (Net 1) On An Uniden Network On
Lab 8.1.10.3 QoS Classification and Policing Using CAR Objective Scenario Step 1 This lab uses Committed Access Rate (CAR) to classify and police traffic. Although the classification and policing actions
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1
Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12
--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.
--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests... 3 Tests and
Lecture 12: Network Management Architecture
Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Overview of Network Measurement Tools
Overview of Network Measurement Tools Jon M. Dugan Energy Sciences Network Lawrence Berkeley National Laboratory NANOG 43, Brooklyn, NY June 1, 2008 Networking for the Future of Science
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Measuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
Wireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology [email protected] SHARKFEST
Sample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Lab 8.9.3 QoS Classification and Policing Using CAR
Lab 8.9.3 QoS Classification and Policing Using CAR Objective Scenario Step 1 This lab uses Committed Access Rate (CAR) to classify and police traffic. Although the classification and policing actions
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
CiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
Introduction to Netsight
i to Netsight Revision History Author Issue Date Description Mark Leese V1.R1.M0 25-Jun-2009 First draft Mark Leese V1.R2.M0 09-Jul-2009 First official version Luke Woodward V1.R2.M1 22-Nov-2013 Update
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
--------- Virtual Office. Network Tests. Revision 1.0. 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.
--------- Virtual Office Network Tests Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
Instructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Panorama High Availability
Panorama High Availability Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
How To Configure A Network Monitor Probe On A Network Wire On A Microsoft Ipv6 (Networking) Device (Netware) On A Pc Or Ipv4 (Network) On An Ipv2 (Netnet) Or Ip
61700600L2-29.3D January 2014 Configuration Guide This configuration guide describes network monitoring and its use on ADTRAN Operating System (AOS) products. This guide contains information about the
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Performance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
High Performance Wireless Networking and Weather
High Performance Wireless Networking and Weather Jose Otero, Pavana Yalamanchili, Hans-Werner Braun Abstract High performance wireless networking is effected by a number of internal and external variables.
CA Nimsoft Monitor. Probe Guide for Internet Control Message Protocol Ping. icmp v1.1 series
CA Nimsoft Monitor Probe Guide for Internet Control Message Protocol Ping icmp v1.1 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
Table of Contents. Introduction
viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
How to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University
Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Network Troubleshooting
Network Troubleshooting by Othmar Kyas 18 Testing Network Performance An Agilent Technologies Publication Agilent Technologies Testing 18 Network Performance It is a capital mistake to theorize before
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Chapter 2 Lab 2-2, EIGRP Load Balancing
Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible successors, and feasible distances.
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Open Networking User Group SD-WAN Requirements Demonstration Talari Test Results
Open Networking User Group SD-WAN Requirements Demonstration Talari Test Results May 13, 2015 Talari 550 South Winchester Suite 550 San Jose, CA 95128 www.talari.com Defining the Software Defined WAN The
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Avaya P330 Load Balancing Manager User Guide
Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
First Steps to Using a PacketShaper
First Steps to Using a PacketShaper Table of Contents Table of Contents Overview... 1 Classifying Traffic on the Network... 2 Discover Traffic... 2 View the Class Tree... 3 Problems?... 4 Analyzing Network
