Goals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?

Size: px
Start display at page:

Download "Goals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?"

Transcription

1 Gols of Routing Protocols 10: Inter nd intr AS, RIP, OSPF, GP, Router Architecture Lst Modified: 3/24/2003 2:39:16 PM Find the optiml route Rpid Convergence Robustness Configurble to respond to chnges in mny vribles (chnges in bndwidth, dely, queue size, policy, etc.) Ese of configurtion 4: Network Lyer 4-1 4: Network Lyer 4-2 Rel Internet Routing? CIDR? Dynmic routing protocols running between every router? Recll CIDR We lredy tlked bout how routing bsed on hierrchicl lloction of IP ddress spce cn llows efficient dvertisement of routing informtion: Orgniztion /23 Orgniztion /23 Orgniztion /23 Orgniztion /23.. Fly-y-Night-ISP ISPs-R-Us Send me nything with ddresses beginning /20 Send me nything with ddresses beginning /16 Internet 4: Network Lyer 4-3 4: Network Lyer 4-4 CIDR? Dynmic Routing? CIDR by itself is nice ide but.. Hrd to mintin Work round existing IP ddress spce lloctions Wht bout redundnt pths? Dynmic routing protocols? They mintin/updte themselves Allow for redundnt pths ut could every router in the Internet be node in the grph? Dynmic Routing Protocols? Our study of dynmic routing protocols thus fr = idelized grph problem ll routers identicl network flt not true in prctice scle: with 50 million destintions: cn t store ll destintions in routing tbles! routing tble exchnge would swmp links! Neither link stte nor distnce vector could hndle the whole Internet! 4: Network Lyer 4-5 4: Network Lyer 4-6

2 Routing in the Internet Administrtive Autonomy Internet = network of networks Ech network controls routing in its own network Globl routing system to route between Autonomous Systems (AS) Two-level routing: Intr-AS: dministrtor is responsible for choice Inter-AS: unique stndrd Hierrchicl Routing Routers in sme AS run routing protocol chosen by dministrtors of tht domin intr-as routing protocol routers in different AS cn run different intr- AS routing protocol gtewy routers specil routers in AS run intr-as routing protocol with ll other routers in AS lso responsible for routing to destintions outside AS run inter-as routing protocol with other gtewy routers 4: Network Lyer 4-7 4: Network Lyer 4-8 Internet AS Hierrchy Intr-AS nd Inter-AS routing Intr-AS border (exterior gtewy) routers C.b b C d A A. b A.c c. c Gtewys: perform inter-as routing mongst themselves b perform intr-as routers with other routers in their AS Inter-AS interior (gtewy) routers inter-as, intr-as routing in gtewy A.c network lyer link lyer physicl lyer 4: Network Lyer 4-9 4: Network Lyer 4-10 Intr-AS nd Inter-AS routing Inter-AS C.b routing between A. A nd b A.c C Host d h1 c A b Intr-AS routing within AS A. Host c h2 b Intr-AS routing within AS Single dtgrm is often routed over mny hops vi routes estblished by severl intr-as routing protocols nd n inter-as routing protocol 4: Network Lyer 4-11 Intr vs Inter AS Routing protcols For Intr AS routing protocols: mny choices; For Inter AS routing protocols: stndrd Why does this mke sense? Intr AS routing protocols focus on performnce optimiztion; Inter AS routing protocols focus on dministrtive issues Why does this mke sense? Choice in Intr-AS Intr-AS often sttic routing bsed on CIDR, cn lso be dynmic (usully RIP or OSPF) Stndrd Inter-AS GP is dynmic 4: Network Lyer 4-12

3 Intr-AS Routing RIP ( Routing Informtion Protocol) Also known s Interior Gtewy Protocols (IGP) Most common IGPs: RIP: Routing Informtion Protocol OSPF: Open Shortest Pth First IGRP: Interior Gtewy Routing Protocol (Cisco proprietry) Cn lso be sttic (vi CIDR) but tht is not clled n IGP Distnce vector lgorithm Included in SD-UNIX Distribution in 1982 Single Distnce metric: # of hops (mx = 15 hops) Cn you guess why? Count to infinity less pinful if infinity = 16 ut limits RIP to networks with dimeter of 15 hops Distnce vectors: exchnged every 30 sec vi Response Messge (lso clled dvertisement) Ech dvertisement: route to up to 25 destintion nets 4: Network Lyer : Network Lyer 4-14 RIP: Link Filure nd Recovery If no dvertisement herd fter 180 sec --> neighbor/link declred ded routes vi neighbor invlidted new dvertisements sent to neighbors neighbors in turn send out new dvertisements (if tbles chnged) link filure info quickly propgtes to entire net poison reverse used to prevent smll loops infinite distnce = 16 hops to mke mke problem with lrger loops less pinful RIP Tble processing RIP routing tbles mnged by ppliction-level process clled route-d (demon) dvertisements sent in UDP pckets, periodiclly repeted Periodiclly inform kernel of routing tble to use 4: Network Lyer : Network Lyer 4-16 RIP Tble exmple: netstt -rn OSPF (Open Shortest Pth First) Destintion Gtewy Flgs Ref Use Interfce UH lo U 2 13 f U le U 2 25 q U 3 0 le0 defult UG Three ttched clss C networks (LANs) Router only knows routes to ttched LANs Defult router used to go up Route multicst ddress: Loopbck interfce (for debugging) 4: Network Lyer 4-17 open : publicly vilble Uses Link Stte lgorithm LS pcket dissemintion Topology mp t ech node Route computtion using Dijkstr s lgorithm OSPF dvertisement crries one entry per neighbor router (i.e. cost to ech neighbor) Advertisements disseminted to entire AS (vi flooding) 4: Network Lyer 4-18

4 OSPF dvnced fetures (not in RIP) Hierrchicl OSPF: Mini Internet Mny hve nothing to do with link-stte vs distnce vector!! Security: ll OSPF messges uthenticted (to prevent mlicious intrusion); TCP connections used Multiple sme-cost pths cn be used t once (single pth need not be chosen s in RIP) For ech link, multiple cost metrics for different TOS (eg, high W, high dely stellite link cost my set low for best effort; high for rel time) Integrted uni- nd multicst support: Multicst OSPF (MOSPF) uses sme topology dt bse s OSPF Hierrchicl OSPF in lrge domins Within ech re, border router responsible for routing outside the re Exctly one re is bckbone re ckbone re contins ll re border routers nd possibly others Full brodcst in ech sub domin only 4: Network Lyer : Network Lyer 4-20 Hierrchicl OSPF Two-level hierrchy: locl re, bckbone. Link-stte dvertisements only in re ech nodes hs detiled re topology; only know direction (shortest pth) to nets in other res. Are border routers: summrize distnces to nets in own re, dvertise to other Are order routers. ckbone routers: run OSPF routing limited to bckbone. oundry routers: connect to other ASs. IGRP (Interior Gtewy Routing Protocol) CISCO proprietry; successor of RIP (mid 80s) Distnce Vector, like RIP but with dvnced fetures like OSPF severl cost metrics (dely, bndwidth, relibility, lod etc); dminister decides which cost metrics to use uses TCP to exchnge routing updtes Loop-free routing vi Distributed Updting Alg. (DUAL) bsed on diffused computtion 4: Network Lyer : Network Lyer 4-22 Now on to Inter-AS routing Autonomous systems The Globl Internet consists of Autonomous Systems (AS) interconnected with ech other: Stub AS: smll corportion Multihomed AS: lrge corportion (no trnsit trffic) Trnsit AS: provider (crries trnsit trffic) Mjor gol of Inter-AS routing protocol is to reduce trnsit trffic 4: Network Lyer : Network Lyer 4-24

5 Internet inter-as routing: GP Internet inter-as routing: GP GP (order Gtewy Protocol): the de fcto stndrd Pth Vector protocol: similr to Distnce Vector protocol Avoids count-to-infinity problem by identifying yourself in pth dvertised to you ech order Gtewy brodcst to neighbors (peers) entire pth (I.e, sequence of ASs) to destintion E.g., Gtewy X my send its pth to dest. Z: Suppose: gtewy X send its pth to peer gtewy W W my or my not select pth offered by X cost, policy (don t route vi competitors AS!), loop prevention resons. If W selects pth dvertised by X, then: Pth (W,Z) = w, Pth (X,Z) Note: X cn control incoming trffic by controlling its route dvertisements to peers: e.g., don t wnt to route trffic to Z -> don t dvertise ny routes to Z Pth (X,Z) = X,Y1,Y2,Y3,,Z 4: Network Lyer : Network Lyer 4-26 Internet inter-as routing: GP Internet Mp GP messges exchnged using TCP. GP messges: OPEN: opens TCP connection to peer nd uthentictes sender UPDATE: dvertises new pth (or withdrws old) KEEPALIVE keeps connection live in bsence of UPDATES; lso ACKs OPEN request NOTIFICATION: reports errors in previous msg; lso used to close connec tion Now tht we know bout utonomous systems nd intr nd inter AS routing protocols Wht does the Internet relly look like? Tht is ctully hrd question to nswer Internet Atls Project Techniques, softwre, nd protocols for mpping the Internet, focusing on Internet topology, performnce, worklod, nd routing dt 4: Network Lyer : Network Lyer 4-28 The Internet round 1990 CAIDA: NSFNET growth until 1995 ckbone nodes elevted 4: Network Lyer 4-29 Low Trffic Volume High 4: Network Lyer 4-30

6 NSF Networking Architecture of Lte 1990s NSFNET ckbone Project successfully trnsitioned to new networking rchitecture in vns ( very high speed ckbone Network Services) - NSF funded, provided by MCI 4 originl Network Access Points (NSF wrded) NSF funded Routing Arbiter project Network Service Providers (not NSF funded) Network Access Point Allows Internet Service Providers (ISPs), government, reserch, nd eductionl orgniztions to interconnect nd exchnge informtion ISPs connect their networks to the NAP for the purpose of exchnging trffic with other ISPs Such exchnge of Internet trffic is often referred to s "peering" 4: Network Lyer : Network Lyer 4-32 The Internet in 1997 CAIDA s skitter plot Loction (longitude) Top 15 ASes re in North Americ (14 in US, 1 in Cnd) Highly connected Mny links US to Asi nd Europe; few direct Asi/Europe Links Asi Few connections Europe Skitter dt 16 monitors probing pproximtely 400,000 destintions 626,773 IP ddresses 1, IP links 48,302 (52%) of globlly routble network prefixes 4: Network Lyer 4-33 North Americ 4: Network Lyer 4-34 Economics of Internet Connectivity Upstrem ISPs chrge downstrem ISPs for connectivity (trnsit trffic) Downstrem ISPs chnge customers Upper level ISPs exchnge trffic t NAPs for mutul convenience Rodmp Mechnics of Routing Sending dtgrm to destintion on sme network Sending dtgrm to destintion on different network Router Architecture Router Configurtion Demo 4: Network Lyer : Network Lyer 4-36

7 Getting dtgrm from source to dest. IP dtgrm: misc fields source IP ddr dest IP ddr dt dtgrm remins unchnged, s it trvels source to destintion ddr fields of interest here A routing tble in A Dest. Net. next router Nhops E Destintion on sme network s source misc fields dt Strting t A, given IP dtgrm ddressed to : look up net. ddress of find is on sme net. s A link lyer will send dtgrm directly to inside link-lyer frme nd A re directly connected A Dest. Net. next router Nhops E : Network Lyer : Network Lyer 4-38 Destintion on different network thn source, Step 1 misc fields dt Strting t A, dest. E: look up network ddress of E E on different network A, E not directly ttched routing tble: next hop router to E is link lyer sends dtgrm to router inside linklyer frme dtgrm rrives t continued.. A Dest. Net. next router Nhops E : Network Lyer 4-39 Destintion on different network thn source, Step 2 Dest. next misc fields dt network router Nhops interfce Arriving t , destined for look up network ddress of E A E on sme network s router s interfce router, E directly ttched link lyer sends dtgrm to inside link-lyer E frme vi interfce dtgrm rrives t !!! (hoory!) 4: Network Lyer 4-40 Router Architecture Overview Two key router functions: run routing lgorithms/protocol (RIP, OSPF, GP) switching dtgrms from incoming to outgoing link Input Port Functions Physicl lyer: bit-level reception Dt link lyer: e.g., Ethernet Decentrlized switching: given dtgrm dest., lookup output port using routing tble in input port memory gol: complete input port processing t line speed queuing: if dtgrms rrive fster thn forwrding rte into switch fbric 4: Network Lyer : Network Lyer 4-42

8 Input Port Queuing Three types of switching fbrics Fbric slower tht input ports combined -> queueing my occur t input queues Hed-of-the-Line (HOL) blocking: queued dtgrm t front of queue prevents others in queue from moving forwrd queueing dely nd loss due to input buffer overflow! 4: Network Lyer : Network Lyer 4-44 Switching Vi Memory First genertion routers: pcket copied by system s (single) CPU speed limited by memory bndwidth (2 bus crossings per dtgrm) Input Port Modern routers: Memory Output Port System us input port processor performs lookup, copy into memory Exmple: Cisco Ctlyst : Network Lyer 4-45 Switching Vi us dtgrm from input port memory to output port memory vi shred bus bus contention: switching speed limited by bus bndwidth 1 Gbps bus (Exmple: Cisco 1900): sufficient speed for ccess nd enterprise routers (not regionl or bckbone) 4: Network Lyer 4-46 Switching Vi An Interconnection Network Output Ports overcome bus bndwidth limittions nyn networks, other interconnection nets initilly developed to connect processors in multiprocessor Consider things like cross sectionl W Used s interconnection network in the router insted of simple crossbr Advnced design: frgmenting dtgrm into fixed length cells, switch cells through the fbric. Exmple: Cisco switches Gbps through the interconnection network uffering required when dtgrms rrive from fbric fster thn the trnsmission rte Scheduling discipline chooses mong queued dtgrms for trnsmission 4: Network Lyer : Network Lyer 4-48

9 Output port queueing Router Hrdwre buffering when rrivl rte vi switch exceeds ouput line speed queueing (dely) nd loss due to output port buffer overflow! 4: Network Lyer : Network Lyer 4-50 Router Configurtion Outtkes Router Softwre: operting system with built in pplictions (commnd line interpreters, web servers) Configure Ech Interfce Configure Routing Protocol 4: Network Lyer : Network Lyer 4-52 A typicl Network Access Point (NAP) A smll Internet router MCI Pc.ell link ol.com Division A FDDI ADSU = ATM Dt Service Unit IDSU = Intelligent Dt Service Unit 4: Network Lyer 4-53 ethernet host Division 4: Network Lyer 4-54

10 Why different Intr- nd Inter-AS routing? Policy: Inter-AS: dmin wnts control over how its trffic routed, who routes through its net. Intr-AS: single dmin, so no policy decisions needed Scle: hierrchicl routing sves tble size, reduced updte trffic Performnce: Intr-AS: cn focus on performnce Inter-AS: policy my dominte over performnce CAIDA: Lyout showing Mjor ISPs 4: Network Lyer : Network Lyer 4-56

Fragmentering och hopsättning. Network Layer. The Internet Network layer. IP Fragmentation and Reassembly. IP datagram format

Fragmentering och hopsättning. Network Layer. The Internet Network layer. IP Fragmentation and Reassembly. IP datagram format Network Lyer Frgmentering och hopsättning Gols: understnd principles behind network lyer services: routing (pth selection) deling with scle how router works dvnced topics: IPv6, multicst instntition nd

More information

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing Routing Protocols scale: with 200 million destinations: can t store all dest s in routing tables! routing table exchange would swamp links! Hierarchical Routing Our routing study thus far - idealization

More information

Inter-domain Routing

Inter-domain Routing COMP 631: COMPUTER NETWORKS Inter-domin Routing Jsleen Kur Fll 2014 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit the notion of

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

More information

IFC3 India-Android Application Development

IFC3 India-Android Application Development IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students

More information

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

SCRIBE: A large-scale and decentralized application-level multicast infrastructure

SCRIBE: A large-scale and decentralized application-level multicast infrastructure !! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

BGP. 1. Internet Routing

BGP. 1. Internet Routing BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Data Center Networks and Basic Switching Technologies

Data Center Networks and Basic Switching Technologies Data Center Networks and Basic Switching Technologies Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 15, 2014 Slides used and

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Dynamic TDMA Slot Assignment in Ad Hoc Networks

Dynamic TDMA Slot Assignment in Ad Hoc Networks Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

Routing Protocols (RIP, OSPF, BGP)

Routing Protocols (RIP, OSPF, BGP) Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to

More information

Allocation Strategies of Virtual Resources in Cloud-Computing Networks

Allocation Strategies of Virtual Resources in Cloud-Computing Networks RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,

More information

Border Gateway Protocol (BGP-4)

Border Gateway Protocol (BGP-4) Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights

More information

PROGRAMOWANIE STRUKTUR CYFROWYCH

PROGRAMOWANIE STRUKTUR CYFROWYCH PROGRAMOWANIE STRUKTUR CYFROWYCH FPGA r inż. Igncy Pryk, UJK Kielce Mteriły źrółowe:. Slies to ccompny the textbook Digitl Design, First Eition, by Frnk Vhi, John Wiley n Sons Publishers, 7, http://www.vhi.com.

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Abusfian Elgelany, Nader Nada Sudan University, Khartoum, Sudan, Fatih University, Istanbul,Turkey

Abusfian Elgelany, Nader Nada Sudan University, Khartoum, Sudan, Fatih University, Istanbul,Turkey IN: 2277-3754 Interntionl Journl of Engineering nd Innovtive Technology (IJEIT) Energy Efficiency for Dt Center nd Cloud Computing: A Literture Review Abusfin Elgelny, Nder Nd udn University, Khrtoum,

More information

Introduction to LAN/WAN. Network Layer (part II)

Introduction to LAN/WAN. Network Layer (part II) Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Secure routing for structured peer-to-peer overlay networks

Secure routing for structured peer-to-peer overlay networks Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009 CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information