Network Troubleshooting
|
|
|
- Amie Simmons
- 9 years ago
- Views:
Transcription
1 Network Troubleshooting by Othmar Kyas 18 Testing Network Performance An Agilent Technologies Publication Agilent Technologies
2 Testing 18 Network Performance It is a capital mistake to theorize before one has data. SIR ARTHUR CONAN DOYLE Unsatisfactory network performance is a major problem that occurs continually in data networks. Because the causes of this condition can vary widely, it is very important to supplement such terms as a slow network, a slow server, or long response times with objective measurements. The two crucial parameters to be determined are data throughput and response time. The first step in determining the network performance is to analyze the structure of the applications in use. Application architectures can be divided into three main categories: Peer-to-peer (Level 1) Client-server (Level 2) Client to primary application server and secondary data/application servers (Level 3) While no dedicated server is involved in peer-to-peer communication (for example, file transfer between two network nodes), a Level 3 application architecture involves not only the client and a primary application server, but also other servers that may function as database or application servers to the primary server. Typical Level 3 application architectures include application or Web servers with back-end connections to database servers. Response Time Measurements Once the application architecture and the network topology have been analyzed, the first step in determining and evaluating response times should be to calculate the theoretical communication delay. This figure can then be used to estimate the expected response times. Typical values for one-way transmission delays over WAN links are best obtained from the service provider or tested using a protocol analyzer. Typical values for Frame Relay links are between 30 and 60 ms. For ATM (STM-1), values of 6 µs/km and 2 ms/switch can be assumed. For a line length of 1,000 km with five ATM switches, this yields a transmission delay of 6.01 ms.
3 626 TESTING NETWORK PERFORMANCE 6 O F A B E K = A = O F A H6OI FA AC AB J E K = A = O F A H I A C =?? E C J I J = I =?? H@ E C J I = H@ I - J D A H A J * = I A # $ # I - J D A H A J * = I A ' # I - J D A H A J * H $ " I - J D A H A J * = I A. 2 # I - J D A H A J. 1 4 # I - J D A H A J * = I A # " I - J D A H A J * = I A 6 I - J D A H A J * = I A. * I - J D A H A J * = I A. I - J D A H A J * = I A 6 " # % I - J D A H A J * = I A 6 : # # $ I - J D A H A J * = I A. : " I - J D A H A J ) 7 1 # % I - J D A H A J 1 1 # I 6 O F E? A = O.,, 1 `! I 5 M EJ? D > EJ I - J D A H A J! I 5 M EJ? D 6 A 4 E C! I 5 M EJ? D 1 I 5 M EJ? D * = I A 6 I 4 K J A H # ` I Figure 18.1 Transmission delays in LAN topologies The actual response time measurements are made, in the simplest case, using Internet Control Message Protocol (ICMP) ping packets. Ping uses the ICMP Echo command to send a packet to the destination and back again. In addition to the response time, the ping command also counts the number of intermediate stations (hops) through which the packet is routed. Each hop reduces the packet s Time to Live (TTL) counter by one. If the initial TTL value is known, subtracting the final TTL yields the number of hops along the path. Initial TTL values are: Windows 3.x/95 32 Windows 98/2000/NT Routers 255 UNIX 64 or 255 C:\WINDOWS>ping Pinging with 32 bytes of data: Reply from : bytes=32 time=54 ms TTL=120 Reply from : bytes=32 time=51 ms TTL=120 Reply from : bytes=32 time=53 ms TTL=120 Reply from : bytes=32 time=54 ms TTL=120 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 51 ms, Maximum = 54 ms, Average = 53 ms Figure 18.2 Results of a response time test using the ping command
4 627 TESTING NETWORK PERFORMANCE Figure 18.2 shows the results of such a response time test. The measured response time varies within a relatively narrow range, from 51 to 54 ms. This means that the communication links involved in this example are not under excessive loads and are able to provide consistent response times. High variations in response time indicates that at least one network segment is under a heavy load. To determine the delay values for individual segments of the network connection, the tracert command (in UNIX: traceroute) can be used. The traceroute command performs a series of ICMP Echo requests, beginning with a TTL value of 1. Each request is repeated three times, then the TTL value is increased by one, and so on until the TTL is sufficient for the packet to reach its destination. The output of the traceroute command displays the response time for each of the three echo packets with each TTL value (see Figure 18.3). 1 <10 ms <10 ms 10 ms center1-west-wien.chello.at [ ] 2 10 ms 10 ms <10 ms rt113.chello.at [ ] 3 <10 ms 10 ms 10 ms vienna-bgp1-fe aorta.com [ ] 4 40 ms 10 ms 10 ms tk-uni-eb3-pos aorta.com [ ] 5 50 ms 60 ms 60 ms atvie202-ta.ebone.network [ ] 6 60 ms 50 ms 61 ms demun701-tb-p0-3.ebone.network [ ] 7 50 ms 60 ms 60 ms frpar601-tb-p0-2.ebone.network [ ] 8 50 ms 60 ms 60 ms frpar205-tc-p9-0.ebone.network [ ] 9 60 ms 80 ms 80 ms gblon303-tc-p1-0.ebone.network [ ] ms 70 ms 60 ms gblon304-tb-p2-0.ebone.network [ ] ms 140 ms 150 ms usnyk106-tc-p0-2.ebone.network [ ] ms 140 ms 140 ms uspen201-tb-p1-3.ebone.network [ ] ms 150 ms icm-bb11-pen-3-0.icp.network [ ] ms icm-bb10-pen-9-0.icp.network [ ] ms 141 ms icm-bb4-pen icp.network [ ] ms 161 ms 140 ms sprint-nap.cerf.network [ ] ms 141 ms 180 ms pos m.phl-bb2.cerf.network [ ] ms 161 ms 170 ms ser3-5-45m.chi-bb3.cerf.network [ ] ms pos m.sfo-bb4.cerf.network [ ] ms 210 ms 200 ms pos m.sfo-bb3.cerf.network [ ] ms 230 ms pos m.sea-bb2.cerf.network [ ] ms 221 ms pos m.sea-bb1.cerf.network [ ] ms 231 ms 220 ms boeing-gw.sea-bb1.cerf.network [ ] ms 220 ms 220 ms ms 230 ms www1.boeing.com [ ] ms 230 ms www1.boeing.com [ ] Figure 18.3 Results of a response time test using the TRACERT command
5 628 TESTING NETWORK PERFORMANCE The drawback of response time testing by the ping and traceroute methods is that the server s processing time is reflected along with the network transmission delay. The transmission delay caused by the network alone can be measured using two protocol analyzers or network probes. Response Time Measurements Using Two Protocol Analyzers Place one analyzer on either side of the network or network component to be measured. Then send a ping across the network (or component) under test. When the ping passes analyzer A, the analyzer records the arrival time A 1. When it passes analyzer B, this analyzer records arrival time B 1. When the echo response packet returns, it first passes analyzer B, which records arrival time B 2, then analyzer A, which records arrival time A 2. The latency of the device can now be calculated as ((A 2 A 1 ) (B 2 B 1 ))/2. 2 E C 6 ) 2 E C 6 * 6 ) 6 * 2 E C 4 A F O 2 E C 4 A F A 2 H J? ) = O A H ) A J M H A H 6 A I J 2 H J? ) = O A H A 6 ) ` 6 ) ` 6 * ` 6 * A M = O, A = O Figure 18.4 Network transfer delay measurements using two protocol analyzers Throughput Measurements Like response time measurements, throughput tests should also be preceded by a calculation of the theoretical maximum frame rate and throughput. Note that the throughput over a connection path can never be higher than the throughput over the link with the lowest capacity. Actual throughput is best measured by means of an File Transfer Protocol (FTP) or Server Message Block Protocol (SMB) file transfer between two stations whose data traffic is being traced with a protocol analyzer. The packets transfered should be close to the maximum size of the transport network, called the
6 629 TESTING NETWORK PERFORMANCE Maximum Transfer Unit or MTU. The average throughput of forty or fifty successive packets can be measured to yield a distribution of the connection s throughput capacity over time. An important factor in analyzing throughput is the client system. Often the client s performance has a significant influence on the measured throughput. Use a protocol analyzer to measure the time between the server s last response packet and the client s next request packet to obtain an indication of the client s speed in processing the server s responses, which has an effect on throughput as well as response time. Figures 18.5a and 18.5b show the calculation of the theoretical maximum frame rate and throughput for the various Ethernet topologies. 6 F C O 6 D A H A J E? = = N E K B H = A H = J A J D H K C D F > EJ I - J D A H A J. H = A H = J A *. 1 2 * J H = I EI I E > M E@ J D. BH= A I E A E > EJI 2 A C J D B F H A = > A 1 E J A H B H = A C = F = N E K B H = A H = J A > EJ I # ' " $ & & $ " B H = A I I = N E K J D H K C D F K J M E J D E E K B H = A I E A " & & B H = A I #% $ > EJ I> E J I 9 EJ D = B H = A I E A B # & > O J A I J D A = N E K B M D E? D A G K = I ' & % K JE E = JE H= JD H K C D F K J - JD A H A JEI = > A J =? D EA L A JD EI L = K A EB O JM > EJ I - JD A H A J. H= A H= JA *. 1 2 * JH= I EI I E 0 = B, K F A N = N E K B H = A H = J A I D = A JM H > EJ I # " & & ' ' $ B H = $ " A I I = N E K J D H K C D F K J M E J D E E K B H = A I E A " & & ' BH= A I I # % $ > ' EJI> EJ I 9 EJ D = B H = A I E A B # & > O J A I J D A = N E K B EI & % M D E? D A G K = I ' & % K JE E = JE H= JD ' & $ ' > EJ I - J D A H A J EI = > A J =? D EA L A J D EI L = K A EB O J M > EJ I - JD A= H N EA J K J D H K C D F K J M E J D E E K B H = A I E A. K, K F A N " & & ' BH= A I% I $ # ' > > EJ I EJI F E J J F E BJ H A =? E H A? J E I H A? A E L A. K F A N E J D H K C D F K J M E J D E E K B H = # ' > EJ I 9 EJ D = B H = A I E A B # & > O J A I J D A = N E K B A =? EH A? J E EI & % M D E? D A G K = I ' & % K J E J D H K C D F K J B ' & $ ' > EJ I 6 D A = N E K B K J D H K C D F K J M EJ D = N E K B H = A I E A A G K = I ' % Figure 18.5a Theoretical throughput rates for Ethernet network topologies
7 630 TESTING NETWORK PERFORMANCE 6 F C O 6 D A H A J E? = = N E K B H = A H = J A J D H K C D F / EC = > EJ- JD A H A J. H= A H= JA M EJD K JBH= A > K HI JE C * 7 JE E = JE M EJD > K HI JE C K. = N 5. * J H = I EI I E > M E@ J D. BH= A I E A E > EJI 5 I JJE A 2 A C J D B F H A = > A 1 E JA H BH= A C = F K > A H B? I A? K JEL A BH= A I JH= I E > K HI J= BJA HBEHI JBH= A = N E K B H = A H = J A M E J D K J > K H I J E C > EJ I " ' $! ' " $ ' $ $ " B H = A I I = N E K J D H K C D F K J K I E C E E K B H = A I E > K H I J E C! " ' $ BH= A I I #! > EJI > EJ I K JE E = JE 7 JE E = JE M EJD > K HI JE K HE C > K HI J K I E C E E K B H = A I E A $ # #! $ " ' $ # $ " ' $ ' K > A H BBH= A K HE C > K HI JK I E C E E K B K '! # " ' $ % ' $ %@ K H E C ' B H = A > K = N E K B H = A H = J A M E J D > K H I J E K H E C ' B H > EJ I % " # # $ B H = A I I / EC = > EJ - J D A H A= JN E K BH= A H= JA F A H@ EHA? JE M EJD E E K. K, K F A N > EJ I # " & & ' $ ' # $ B H " = A I I F E J J F E J = N E K J D H K C D F K J F A E H A? J E M E J D E E " & & ' # BH= A I I N% # $ ' > EJI > E J I. K F A N E J D H K C D F K J M E J D E E K B H = #! & > E J I 9 EJ D = B H = A I E A B # & > O J A I J D A = N E K B A =? EHA? JE EI & % " M D E? D A G K = I ' & % K JD H K C D F K J B' & $ ' > EJ I 6 D A = N E K K J D H K C D F K J M EJ D = N E K B H = A I E A A G K = I ' % Figure 18.5b Theoretical throughput rates for Ethernet network topologies
8 Index p1 TESTING NETWORK PERFORMANCE Index of chapter 18 L Long response times 625 R Response time measurements 625 S Slow network 625 Slow server 625 T Throughput measurements 628 Throughput rates for Ethernet 629 TRACERT 627 Transmission delays 626
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Sample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Lab - Mapping the Internet
Objectives Part 1: Test Network Connectivity Using Ping Part 2: Trace a Route to a Remote Server Using Windows Tracert Part 3: Trace a Route to a Remote Server Using Web-Based and Software Tools Part 4:
Instructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site!
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site! This is a set of questions to help you prepared for the CompTIA Network+ certification examination. You should not exceed twenty
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Application Performance Analysis and Troubleshooting
Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Operating Systems and Networks Sample Solution 1
Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
CCProxy. Server Installation
CCProxy Proxy Server for Win98/NT/2000/XP/2003/Vista/2008 www.youngzsoft.net Server Installation 2009.02 1 Content 1 Content...1 2 LAN networks configuration...2 3 Internet connection configuration...4
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
IMPLEMENTING VOICE OVER IP
51-20-78 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network
HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Effect of Windows XP Firewall on Network Simulation and Testing
Issues in Informing Science and Information Technology Volume 4, 2007 Effect of Windows XP Firewall on Network Simulation and Testing Akram Al-Rawi College of CS & IT, King Faisal University, Al-Hassa,
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Traceroute The Internet s Diagnostic Tool
Traceroute The Internet s Diagnostic Tool NTT Communications Global IP Network White Paper By Charles Sellers, CISSP May, 2006 NTT, NTT Communications, and the NTT Communications logo are registered trademarks
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,
Lab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
BOB BuchanAN, The NETWORK JERNAL 1.1
SECTION I SECTION II SECTION III SECTION IV SECTION V BASIC CONCEPTS Excerpts taken from: Network Troubleshooting By Othmar Kyas An Agilent Technologies Publication Section I Basic Concepts Chapter 1 Network
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
PictureTel H.323 Videoconferencing Network Bandwidth Analysis
PictureTel H.323 Videoconferencing Network Bandwidth Analysis by John Bartlett NSD Engineering PictureTel Corporation August 25, 1997 Introduction This document evaluates the network bandwidth required
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Sample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
1 PC to WX64 direction connection with crossover cable or hub/switch
1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network
File transfer and login using IPv6, plus What to do when things don t work
File transfer and login using IPv6, plus What to do when things don t work Introduction Usually file transfers to remote computers and logins just work. But sometimes they don t. This article reviews the
REMOTE MONITORING MATRIX
802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
Hands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
IST 220 Honors Project. Subnets with Variable Length Subnet Masks
IST 220 Honors Project Subnets with Variable Length Subnet Masks Project Objectives: In this project, you will subnet the IP address 193.170.10.0 according to needs of the organization. Overview a) Perform
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)
Computer Networks Delay, loss and throughput Layered architectures How do loss and delay occur? packets queue in router buffers packet arrival rate to exceeds output capacity packets queue, wait for turn
The Internet and Its Uses
CHAPTER 1 The Internet and Its Uses Objectives After completing this chapter, you should be able to answer the following questions: How is the Internet evolving? How do businesses and individuals use the
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Network Configuration Example
Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Firewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
Chapter 2 Lab 2-2, EIGRP Load Balancing
Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible successors, and feasible distances.
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010
IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010 Network configuration Reminder, configure your network in /etc/ rc.conf ( x = your IP, from.10 to...) ifconfig_bge0= 41.215.76.x/24
IP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper
White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Network Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
1.0 Basic Principles of TCP/IP Network Communications
Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
