CRC32 Based Signature Generation Methods for URL Routing
|
|
|
- Teresa Carson
- 9 years ago
- Views:
Transcription
1 CRC32 Based Signature Generation Methods for URL Routing Zornitza Genova Prodanoff and Ronnie King Department of Computer and Information Sciences University of North Florida 4567 Saint Johns Bluff Road Jacksonville, Florida {zprodano, unf.edu Keywords: CDNs, URL routers, HTTP redirection, NDIS drivers. ABSTRACT Signature algorithms have already been proposed for use in URL routers. Cyclic Redundancy Check (CRC) codes can be used as URL signatures. When a packet is received, CRCs are generated on the fly with the use of a very simple hardware circuits. Existing network adapters are not programmed to generate CRCs on packet subfields. However, it is possible to use the single CRC circuit of a network adapter to simultaneously generate the packet CRC and CRCs on any subfield (such as the URL string in the HTTP GET request header) of the packet. The available from the CRC circuit intermediate CRC codes can then be used to produce a URL signature for each incoming HTTP request and do URL routing table look-up. In this paper we evaluate alternatives for URL signature generation that rely on hardware or software computation of CRC32 codes. Our results indicate that the delay of producing the signature in software is smaller (100s of nanoseconds) as compared to the alternative of using the CRC circuit in existing adapters (10s of microseconds). 1. INTRODUCTION Content Distribution Networks (CDNs) allow for a single document or service to be contained in multiple servers and caches throughout the Internet. A key challenge is how to select the best content source for a given request. The criteria for a best source include minimizing network load while satisfying a response time requirement for the client. Typically, the goal is for a client to access the nearest copy of a document or service. Client based methods (e.g., [1]) use a ping type approach to find the fastest responding server for a given request. These methods generate excessive and redundant overhead traffic. Anycasting and centralized approaches have been studied ([5],[13]) as well, where routers or specialized services determine the best server. These methods are high in overhead or require infrastructure changes. In Internet caching systems, sharing of URL lists enables routing or forwarding of requests between the cache sites ([4],[12]). Figure 1 shows a CDN where a given document can be found in its origin server s directory, in a temporary server (e.g., via a distribution service that shares servers on demand), and/or in an Internet cache structure. In the Web, a variable length URL identifies a document or service. It may be desirable that a single URL map to multiple content sources with the best source containing the document that is sent to the client. For a given site, the number of URLs is typically very large (1000 s to 100,000 s) and their existence can be transient (e.g., due to aging-out of documents in caches). This is in contrast to IP addresses, which are typically few and fixed for a given site. In a URL router [18], an HTTP request resolves into an IP address based on the known state of URL locations at content sources. For each such request the processing is performed at the application (or HTTP aware communications layer). The URL string from each incoming request is examined and a look up into a URL based routing table is then performed. The URL routers are front-end nodes to edge-based servers and caches. Sharing of URL lists, along with knowledge of network and server state, is necessary in order to build URL routing tables in the URL routers. Client Sharing of URL lists IP switch HTTP request to the best source URL switch router Figure 1. A CDN Origin server Caches Temporary server
2 Given the very large number of URLs and their rate of change, methods have been investigated of compression for sharing the lists of URLs contained at content sources. These compressed lists of URLs are called URL digests. Routing tables for URL routers [6] can be built based on the information communicated in the digests. URL routers need routing tables similar to IP routing tables in IP routers. However, the methods used for IP routing cannot scale to URL routing. In URL routing the number of destination addresses (URLs) greatly exceeds the number of IP addresses. In addition, URLs are not stable new ones are constantly created and old ones disappear. The large size of URLs, their very large number, and their dynamic nature makes URL routing a difficult problem. Signature algorithms have already been proposed for use in Web routers [xx]. The use of signatures can help both reduce size of digests and improve look-up performance of URL routing tables in URL routers. Cyclic Redundancy Check (CRC) codes can be used to produce signatures for incoming URLs when a packet is received. These signatures are generated on the fly and then being used to do routing table look-up. This will enable the use of greatly reduced in size routing tables, where each URL is represented by its signature. This reduction is caused by substituting a variable length string, about 50 byte long on an average [x10challenges], with a 32 bit fixed length signature value. A signature algorithm using CRC32 codes will result in 2 32 possible signatures, providing a sufficiently large signature space for most server directory sizes. There are two general alternatives for on the fly signature generation. In the case of a one armed URL router [6], the network adapter can generate the CRC or the CRC can be generated by software. The hardware required to generate a CRC is a serial shift register and XOR circuit and is an integral part of all network adapters. At the URL router, all incoming HTTP requests have their URLs serially encoded into a CRC. Existing network adapters are not designed to generate CRCs on subfields within a received packet. However, it is possible to use the single CRC circuit of a network adapter to simultaneously generate the packet CRC and CRCs on any subfields of the packet if partial CRC values can be accessed. This study evaluate the performance of the two general alternatives for generating CRC32 signatures for the purposes of URL routing software vs. hardware generation. The remainder of the paper is organized as follows. Section 2 provides a brief overview of hardware computation of CRC, and Section 3 describes a previously introduced idea to compute CRC using existing network adapters and intermediate CRC values for packet subfields. Section 4 presents an evaluation and comparison of hardware vs. software generation of CRC32 signatures as used by URL router applications. The last section Section 5 presents a brief Summary and outlines Future work. 2. HARDWARE GENERATION OF CRC Cyclic Redundancy Check (CRC) codes have been widely used for nearly 40 years in communication networks. CRCs introduce control redundancy into the data in order to provide error detection. Over the years the implementation methods used to generate CRC have constantly changed. The motivation for these changes has been driven by the need to support transmission speeds on a cost-sensitive market for Network Terminal (NT) hardware [11]. The basic idea behind CRC is simply to use the remainder generated by dividing one polynomial by another. For example, Ethernet uses a well-known divisor polynomial D(x) of degree 32 to allow a sender to view their data as a polynomial P(x) that is transmitted over a link alone with a 32- bit remainder that comes from dividing P(x) by D(x). So once a sender and receiver agree on a divisor polynomial, the CRC algorithm can be implemented in either software or hardware. However, the obvious drawback to a software solution is speed compared to a dedicated hardware solution. Traditional hardware implementations rely on the fact that the remainder is just the bitwise exclusive-or of the polynomials P(x) and D(x). As a result, the CRC algorithm is easily implemented in hardware using a linear shift register and a few XOR gates attached to a serial data stream. The number of bits in the shift register equals the degree of the divisor polynomial D(x), which is 32 bits in the case of Ethernet. The number of XOR gates and their positions is determined by D(x). If there is a term x n in the divisor polynomial then an XOR gate would be needed in front of bit n in the shift register, assuming the bits in the register are numbered zero to one less then the degree of the divisor polynomial. Figure 2 shows the traditional hardware used to produce the CRC for the divisor polynomial given by x 3 + x 2 + x 0. Serial Data Stream P(x) XOR gate D(x 0 ) Traditional Hardware CRC Calculation Using Linear Shift Register x 0 x 1 x 2 XOR gate D(x 2 ) The XOR gates position depends on the terms in the divisor polynomial and is one less then the number of terms. D(x) = x 3 + x 2 + x 0 Figure 2. An r-bit Feedback Shift Register [17]
3 Traditional implementations have two main problems. First, it is difficult to keep pace with today s high speed communication systems while using sequential hardware designed to compute CRCs. Second, it is not possible to reconfigure fixed logic to support a need to change the divisor polynomial. To overcome the speed limitations of a linear shift register a parallel solution has been introduced. The speed-up factor is over four times faster then using a traditional linear shift register approach [15]. Existing network adapters are not programmed to generate CRCs on subfields within a packet such as the URL field. However, the problem of generating CRCs for subfields within a packet can be solved by allowing the intermediate values form the packet CRC calculation to be accessed later as elaborated on in the next section. 3. PACKET CRC AND CRC32 URL SIGNATURES A single CRC32 circuit can be used to simultaneously generate an overall packet CRC32 and a CRC32 code for a subfield of the packet. The idea of using the CRC value of subfields within a packet to reduce the time to recalculate the packet CRC was introduced in [6]. This concept allows packet CRCs to be recomputed many times within a network at a low cost. A packet CRC is being recomputed on various network hops. For example, virtual circuit switching type protocols such as Multiprotocol Label Switching (MPLS) or ATM, often have to recalculate CRC values at each output port. Any node that receives a packet usually needs to swap the virtual circuit identifier (VCI) with a different value. Since the VCI is embedded within the payload, the CRC must be checked and recomputed at each hop in the network. Solutions to the problem of how to recalculate the CRC of a packet with an altered field are given in [10],[3], and [7]. The main idea in these solutions is to combine the CRC from the original (unaltered packet) and the CRC of the altered section of the packet. By applying a property introduced in [3] the packet CRC can be updated after a computation over the altered fields: f1 + f 2 f1 f 2 Rem = Rem + Re m (1) P P P Where f 1 and f 2 are shifted message polynomials and P is the CRC generator polynomial. This property becomes clear once we take a look at an example. Suppose the generator 3 2 polynomial P ( x) = x + x + 1, in which case the polynomial would be of degree three. Now consider the message m ( x) = x + x + x + x (i.e., ). Let m 1 represents the first four bits of the message and m 2 the last four bits, i.e m 1 represents the message polynomial x + 0x + 0x + x ( ), while m 2 equals x + 0x + x (1010). To produce the shifted message polynomial f 1, we multiply m 1 by 3 x since the degree of our generator polynomial is three, this step will append three zeros on the right side of m 1 ( ). The same technique is used to produce f 2 ( ). Note: f 1 + f 2 equals m (x) shifted left three spaces. A simple use of polynomial arithmetic modulo 2 and long division to divide ( f 1 + f 2 ) by P(x) will confirm the CRC value (remainder) is five. A quick check will also reveal that the CRC given by dividing F1 by P(x) is four and the CRC for f is one. This result agrees with Equation (1) above. 2 If we assume the value of a network adapter CRC32 shift register can be sampled at the byte boundary of the last byte before the URL in the HTTP request and again at the last byte in the URL, then these partial CRCs can be easily combined to generate a URL signature. Let A 0 be the bit sequence from the beginning of the packet to the last byte before the URL and A 1 be the bit sequence from the beginning of the packet to the last byte of the URL. Then the CRC of the URL is given by A2 A1 A0 Rem = Rem where A 2 is the bit sequence of P P the URL field. To take advantage of the simultaneous generation of the overall packet CRC32 and a CRC32 code for a subfield, an URL router application needs to be supplied intermediate CRCs values. For this purpose there are two alternatives one option is to modify the hardware of existing interface cards to add logic to recognize HTTP layer URL string delimiters (part of the HTTP GET request header), and then scan the CRC32 circuit to extract the corresponding intermediate CRC32 values. An alternative is to modify existing miniport drivers to supply to the URL router application CRC32 values in parallel with supplying packet bits. In the evaluation, provided next in this paper, we consider the second solution, since it does not require modification of the interface card hardware. 4. EVALUATION Our testbed consisted of a 3.06GHz Dell Optiplex Pentium 4 PC with a WindowsXP Pro operating system. When implementing the subfield CRC generation, we first evaluated the delay caused by accessing an IEEE Ethernet compliant network interface card. Hence, we first measure the I/O delay. For the purposes of this measurement, we used the winpcap set of library calls [20]. Since the URL router is HTTP aware, we conducted the measurements in user mode, but surpassing operating system services such as TCP/IP protocol logic. This application was running at the MS protocol driver layer, since miniport and intermediate drivers cannot communicate with user-mode applications (see [14] for elaboration). A possible implementation was assumed to rely on a modification (not
4 implemented as part of this evaluation) at the NDIS miniport driver level, where the content of the CRC32 circuit is scanned and propagated to the URL router application under a single I/O operation, bundled within the packet bits. We evaluated the performance of a hardware solution to the CRC32 signature generation for the purposes of URL routing as described in Section 3. Our results provide a pessimistic estimate of the time needed to transfer the two CRC32 signatures, at the beginning and the end of the URL string, to the URL router application, since only a single I/O operation was assumed to be sufficient for the transfer of packet bits, as well as signature bits. We measured the delay to access the network interface card and perform a raw send() of 1000 packets, each consisting of 84 bytes, including overhead bytes at all layers above the MAC layer. All the 1000 packets are submitted to the adapter via a single I/O operation. We choose this large number of bytes in order to ensure a valid granularity of timing results. On an average, it takes about 3 microseconds to transfer a single byte. Ignoring additional circuit delays, this would suggest that the delay for accessing the content of the CRC32 circuit will be at least four times that value, since the signatures are four bytes long. In order to produce a CRC32 signature with this implementation, the content of the CRC32 circuit will need to be scanned twice once at the byte boundary, where the URL strings begins, and once at the end of the URL. Hence, on an average, hardware based CRC32 generation will require a minimum delay of about 24 microseconds. We have also evaluated the generation of CRC32 in software based on an implementation used in [8],[19]. This implementation is adapted from an algorithm introduced in [16]. The algorithm uses an 8-bit table look up method of generating CRCs and is implemented in C language, using the Borland C compiler. Timing results were produced by using the timeb library calls and data type definitions. The code used is available on-line [2]. Figures 3 and 4 show the C code for the two main parts of the algorithm: a CRC32 generation function and a table initialization function. typedef unsigned short int word16; typedef unsigned int word32; #define POLYNOMIAL 0x04c11db7L static word32 crc_table[256]; word32 update_crc(word32 crc_accum, byte *data_blk_ptr, word32 data_blk_size){ register word32 i, j; for (j=0; j<data_blk_size; j++){ i=((int)(crc_accum>>24)^*data_blk_ptr++)&0xff; crc_accum = (crc_accum << 8) ^ crc_table[i];} crc_accum = ~crc_accum; return crc_accum; } Figure 3. CRC32 Code Generation typedef unsigned short int word16; typedef unsigned int word32; #define POLYNOMIAL 0x04c11db7L static word32 crc_table[256]; void gen_crc_table(void){ register word16 i, j; register word32 crc_accum; for (i=0; i<256; i++){ crc_accum = ( (word32) i << 24 ); for ( j = 0; j < 8; j++ ){ if ( crc_accum & 0x L ) crc_accum = (crc_accum << 1) ^ POLYNOMIAL; else crc_accum = (crc_accum << 1); } crc_table[i] = crc_accum; } } Figure 4. CRC32 Table Initialization We have produced CRC32 signatures for a total of 254,727 unique URL strings. These URLs were extracted from HTTP trace from a NASA Web server [9]. The original number of URLs in this trace was a total of 1,569,898. To achieve the expected level of precision and obtain valid timing results, for each URL string there were a total of 1,000,000 CRC32 calculations produced at each iteration of the CRC generation function. The results indicate that on an average it would take about 236 nsec to generate a CRC32 signature for a single URL. These results show that a software generation of CRC32 signatures as used for the purposes of URL routing can result in several magnitudes lower delays as compared to methods using the CRC32 circuits within existing network adapters. 5. SUMMARY AND FUTURE WORK In this paper we have shown that the software generation of CRC32 signatures, as used for table look up in URL routers, results in smaller delays as compared to using a hardware based implementation that takes advantage of existing network adapter logic. Future work will consist of problems related to the scaling of Web services from local server clusters to globally distributed CDNs with automatic server selection. For example, we plan to address the application of signature methods to high-speed URL switching suitable for 10-Gigabit Ethernet networks. However, the applications of signatures to switching are not limited to routing in CDNs. Future work may include the use of signature methods for routing table look-up in IPv6 routing. REFERENCES [1] R. L. C. Carter, M.E., "Dynamic server selection in the Internet," presented at Third IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems (HPCS95), [2] K.J. Christensen, Tools Page, URL:
5 [3] S. Dravida, Error Control Aspects of High Speed Networks, Proceedings of IEEE INFOCOM 92, pp , 1992 [4] L. C. Fan, P.; Almeida, J.; Broder, A.Z., "Summary Cache: a scalable wide-area Web cache sharing protocol," presented at SIGCOMM'98 Conference. Applications, Technologies, Architectures, and Protocols for Computer Communication, Vancouver, BC, Canada, [5] Z.-M. B. Fei, S.; Zegura, E.W.; Ammar, M.H., "A novel server selection technique for improving the response time of a replicated service," presented at IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies., San Francisco, CA, USA, [6] Z. Genova and K. Christensen, Using Signatures to Improve URL Routing, Proceedings of IEEE International Performance, Computing, and Communications Conference, pp , April [7] M. Gutman, A Method for Updating a Cyclic Redundancy Code, IEEE Transactions on Communications, Vol. 40, No. 6, pp , June 1992 [8] C. M. Heard, Implementation of CRC32 in Software. URL: [9] HTTP requests to the NASA Web server, URL: ftp://ita.ee.lbl.gov/traces/. [10] D. Irvin, Preserving the Integrity of Cyclic-Redundancy Checks when Fully Protected Text is intentionally Altered, IBM Journal of Research and Development, Vol. 33, No. 6, pp , November [11] J. Kadambi et al, Gigabit Ethernet, Prentice Hall PRT, ISBN , [12] B. S. N. Michel, K.; Reiher, P.; Lixia Zhang, "URL forwarding and compression in adaptive Web caching," presented at IEEE INFOCOM Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, [13] K. Moore, "SONAR: A network proximity service version 1," [14] MSDN Library, Network Devices and Protocols: Network Drivers, URL: en-us/network/hh/network/101rm_0odj.asp. [15] T. B. Pei and C. Zukowski, High-speed parallel CRC cicuits in VLSI, IEEE Transaction Communication, Vol. 40, No. 4, pp , [16] A. Perez, "Byte-wise CRC Calculations," IEEE Micro 3, 40 (1983). [17] T.R.N. Rao and E. Fujiwara, Error-Control Coding for Computer Systems, Prentice-Hall, [18] A. Roginsky, K. Christensen, and S. Polge, Efficient Computation of Packet CRC from Partial CRCs with Application to the Cells-in-Frames Protocol, Computer Communications, Vol. 21, No. 7, pp , June [19] D. Sarwate, Computation of Cyclic Redundancy Checks via Look-up Table, Communications of the ACM, Vol. 31, No. 8, pp , August [20] WinPcap: the Free Packet Capture Architecture for Windows, Version 3.0, URL: BIOGRAPHIES Zornitza Genova Prodanoff is currently an Assistant Professor in the Department of Computer and Information Sciences at the University of North Florida. She holds a PhD in Computer Science and Engineering from the University of South Florida, an MS in Computer Science, and a BA in Information Systems Management. She is the author, and coauthor of several book chapters, journal articles, and conference papers on topics including performance evaluation of computer networks, network programming, time-constrained multimedia presentations, and database design. Her professional affiliations include IEEE, IEEE Women in Engineering, ACM, and ASEE. Ron King is currently an Assistant Professor at the University of North Florida in the College of Computing, Engineering, and Construction. The University of South Florida awarded Dr. King a doctorate in 1997 for his doctoral dissertation entitled Modular Design for Large Broadband ATM Switching Fabric. In 1997, Dr. King took a position with the Defense Information Systems Agency as senior technical advisor within the Center for Computer Systems Engineering, Fall Church, Virginia, supporting various Department of Defense information systems, including the White House Communications.
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Voice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
CYCLIC REDUNDANCY CHECKS IN USB. Introduction. Two-minute mathematical background
CYCLIC REDUNDANCY CHECKS IN USB Introduction The USB specification calls for the use of Cyclic Redundancy Checksums (CRC) to protect all non-pid fields in token and data packets from errors during transmission.
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
Performance Measurement of TCP/IP Header Compression
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 4 (2011), pp. 399-404 International Research Publication House http://www.irphouse.com Performance Measurement
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!
Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel
Experimentation with the YouTube Content Delivery Network (CDN)
Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland [email protected] Sami Karvonen Department of Computer Science
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Using MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Bandwidth Measurement in xdsl Networks
Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
PCI Express Overview. And, by the way, they need to do it in less time.
PCI Express Overview Introduction This paper is intended to introduce design engineers, system architects and business managers to the PCI Express protocol and how this interconnect technology fits into
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
The Design and Implementation of Content Switch On IXP12EB
The Design and Implementation of Content Switch On IXP12EB Thesis Proposal by Longhua Li Computer Science Department University of Colorado at Colorado Springs 5/15/2001 Approved by: Dr. Edward Chow (Advisor)
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
How To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C
esafe Gateway/Mail v. 3.x Load Balancing for esafe Gateway 3.x with Cisco Web NS and CSS Switches Design and implementation guide esafe Gateway provides fast and transparent real-time inspection of Internet
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: [email protected] Bulgaria
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Review of Error Detection of Data Link Layer in Computer Network
Middle-East Journal of Scientific Research 18 (8): 1105-1110, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.18.8.11835 Review of Error Detection of Data Link Layer in Computer
Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
High-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
WAN Performance Analysis A Study on the Impact of Windows 7
A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Protocol Overhead in IP/ATM Networks
Protocol Overhead in IP/ATM Networks John David Cavanaugh * Minnesota Supercomputer Center, Inc. This paper discusses the sources of protocol overhead in an IP/ATM protocol stack. It quantifies the amount
DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
Calculating Bandwidth Requirements
Calculating Bandwidth Requirements Codec Bandwidths This topic describes the bandwidth that each codec uses and illustrates its impact on total bandwidth. Bandwidth Implications of Codec 22 One of the
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck
Sockets vs. RDMA Interface over 1-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Pavan Balaji Hemal V. Shah D. K. Panda Network Based Computing Lab Computer Science and Engineering
Ethernet (LAN switching)
Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type
Wireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
