Performance test of network devices
|
|
|
- Adam Shaw
- 9 years ago
- Views:
Transcription
1 Annales UMCS Informatica AI XIII, 2 (2013) DOI: /v Performance test of network devices Marek Bolanowski 1, Andrzej Paszkiewicz 1 1 Department of Distributed Systems, Rzeszów University of Technology, al. Powstańców Warszawy 12, Rzeszów, Poland Abstract Selection of components in contemporary computer networks is extremely important, not only because of the project budget but also because of the network performance. Therefore, it is necessary to perform tests before deploying devices. In this paper the authors show that the performance of test network devices is dependent on the nature of network traffic including its statistical properties. Also a new hybrid model of the system for testing the network device based on the q-additivity of traffic flows was proposed. 1 Introduction One of the elements of an effective network devices choice for specific communication tasks is to determine their performance. Currently, there are several applications and hardware solutions which are used to generate the test traffic which load the examined network device. In this paper we check whether the statistical properties of the generated traffic have an impact on performance of the tested device. The purchase price of advanced, highly specialized network devices is very high. Such a purchase, without previous performance tests simulating the conditions in which the equipment will work, can be very risky for the project budget. Performance testing can make a preliminary assessment of the equipment suitability in the context of the challenges posed to it. Currently the measurements mainly relate to: one-way delay, maximum delay, delay variation, packet loss rate, bandwidth, file transfer time, resource consumption (cpu, memory, buffers, queue) [1, 2, 3, 4, 5, 6, 7, 8]. Modern methods of performance measurement can be divided into two types: theoretical, using mathematical models of network traffic and practical - based on research [email protected] [email protected]
2 30 Performance test of network devices results. It is often necessary to use specialized measurement tools [9, 10]. The authors of theoretical models consider only a simplified view of the real network, focusing on a small number of its parameters [11, 12]. Currently used methodologies mainly focus on the topological aspects in performed tests, they often use the Gaussian distribution, analyze device performance from the point of view of a few chosen traffic parameters [13, 14]. However, it is necessary to check whether the holistic traffic has an impact on the test results of particular parameters of a device. 2 Test traffic generation Generation of traffic loading the tested device is often based on quantitative summation of the partial streams, assuming a simple additivity of information streams [8]. Let us assume that the intensity of streams flowing on the path i will be denoted as N Pi. According to the classical approach, the total intensity of the flow will be SN: SN = N P1 + N P N Pi. (1) In this case, the use of non-equilibrium dynamics is more appropriate than the use, of non-extensive q-algebra which derives from the Tsallis s entropy [15, 16]. It is based on q operations which lead to generalizations of the classic algebra. From the point of view of our considerations, the most interesting is q sum of two streams x and y which is based on a non-extensive operator of sum q defined as: x q y = x + y +(1 q)xy. (2) Equation (2) shows that the q sum contains an equilibrium, additive term (x + y) and dynamic non equilibrium term (1 q)xy which symbolizes non extensivity and the sensitivity to initial conditions [17, 18]. Taking these assumptions into account, we can conclude that the equation (1) is only a special case of the sum of simple streams with no memory effect. It is therefore purposeful to examine the sensitivity of the device to test flows which have different thermodynamic properties. Research of the real network traffic detects the internal correlation in streams [19, 20]. The development of new network services cause that traffic is characterized by a much stronger, long-range correlation. Accordingly, new models of streams with a long memory were created. To analyze statistical, properties which are of interest to us the Hurst exponent is used. Hurst exponent (H) is an indicator used, inter alia, to classify time series. On its basis, it is possible to distinguish a random from non-random series. Its value may be within the range from 0 to 1. It is possible to define three ranges of the Hurst exponent: H =0.5 the series are random and uncorrelated events, 0 H<0.5 the series are antipersistent or ergodic, this range is very rare in the case of real world (real network traffic) time series, 0.5 <H<1, the series are persistent, have a memory effect, a lot of real world time series have such a value of H [6, 19, 20]. The tests will be performed on a number of network devices with the connection scheme presented in Fig. 1.
3 Marek Bolanowski, Andrzej Paszkiewicz 31 Fig. 1. Stress test connection diagram. 3 Results of the stress tests In this scenario, on the tested network device mechanism for traffic shaping (Q S) was implemented and then the queues and CPU load were analyzed. The traffic was generated at a constant speed equal to 10Gb/s and came from three different sources. 3.1 Traffic generation using the hardware generator In this section the network devices were tested using the traffic coming from the hardware generator (JDSU) in which the streams and protocol parameters were defined up to 4 layers of the ISO/OSI model and varied pseudo-randomly. The JDSU generated at the same time up to 4096 streams that totally gives traffic of 10Gb/s. The parameters of generated traffic are shown in Fig. 2 and Table 1. Fig. 2. Traffic generated with the hardware generator. The percentage of bandwidth utilization. The traffic generated with the hardware generator JDSU is a series with a constant level of fluctuation. Traffic generated in this manner does not reflect fully the conditions that occur in real networks. The H exponent for particular process parameters received
4 32 Performance test of network devices Table 1 the minimum value for the average packet size (H =0.099) and the maximum for the percentage of the bandwidth use (H =0.227). Specific Hurst exponents for the generated traffic are similar, within the range 0 0.5, which indicates that there is an antipersistent or ergodic time series. Tested device was able to smoothly manage the traffic, the CPU load increase was imperceptible, the band was formed accordance with the assumptions of the QOS rules. The main reason for such smooth traffic service by the device appears to be a simple character of generated traffic in which there were no changes of the characteristics during the entire performance test. 3.2 Traffic generation using the software generator In this section the network devices were tested using the traffic coming from the software generator (Iperf) in which the streams and protocol parameters were defined up to 4 layers of the ISO/OSI, totally gives traffic of 10Gb/s. The parameters of generated traffic are shown in Fig. 3 and Table 2. Fig. 3. Traffic generated with the software generator. bandwidth utilization. The percentage of The traffic generated with Iperf program traffic generator is characterized by a greater change than it was in the case of JDSU. The H exponent for particular process
5 Marek Bolanowski, Andrzej Paszkiewicz 33 Table 2 parameters received the minimum value for the average packet size (H =0.233) and the maximum for the number of TCP packets (H =0.492). The values of the exponents H are greater than those which characterized the traffic form JDSU hardware, but still H<0.5. The series are defined as "returning to the mean". During the test band was formed accordance with the assumptions of the QOS rules. In comparison to the test with the JDSU generator, the network device CPU load increased in the range of 15 to 24%. 3.3 Testing network device with a real traffic In this section the network devices were tested using the real traffic coming from the real computer network. Bandwidth saturation was significantly lower than previous cases and ranged at 1 Gb/s. The parameters of the generated traffic are shown in Fig. 4 and Table 3. Fig. 4. The real network traffic. The percentage of bandwidth utilization. Traffic from the real network has a high complexity. The frequent and major changes in its characteristics can be found. In the case of traffic from a real network H exponent for particular process parameters received the minimum value for the number of TCP packets (H =0.569) and the maximum for the number of UDP (H =0.684). For this traffic the value of the exponent H>0.5, which indicates that it is persistent, keeping a positive correlation between states, indicates the existence of a trend. It
6 34 Performance test of network devices Table 3 can be said that this traffic has a long-term memory. During the test a band was not formed in accordance with the assumptions of the QOS rules (QOS did not work properly). Compared to the test with the JDSU generator, the network device CPU load increased in the range of 20 to 35%. Then on the test network device the QOS algorithm was changed - from standard to Three-colour Marking. After this change the QOS worked properly. 4 Conclusions The research identified the relationship between the statistical properties of the traffic and the load of tested device components in particular QOS mechanisms. This allows to conclude that apart from quantitative tests (for example the number of entries in the routing table, the number of VPN sessions supported at the same time, the number of supported queues,...) the statistical parameter of the traffic should be taken into consideration. The research found that the test traffic originating from a real network led to overload the standard QOS mechanism, and enforced the use of TCM. Taking into account the paper [18] and in particular, the properties of equation (2) the authors propose a new model for network devices stress tests using the hybrid model shown in Fig. 5. The use of real traffic, which is optimal for testing new equipment is subject to many restrictions: problems in its recording and playback, storage problems, the confidentiality of the data. The traffic from hardware and software generators is relatively simple, contains no memory effect and poorly reflects the explosive nature of the TCP protocol. However, it can easily provide significant load to switching matrix (or routing engine) of tested device. On the other hand, the real traffic allows to provide to a test stream a non-extensive long-term nature of the events occurring in the real network environments. Therefore, the use of the model shown in Fig. 5 allows to control the components of the test traffic (which is the q-sum of streams from different generators and real traffic) to get closer to the actual conditions in which the tested device will operate. The task of the External Data Collector and Analyzer module is to gather test results from all devices and make recapitulation. In the further work the authors want to focus on developing software traffic generator that will create traffic with given statistical parameters.
7 Marek Bolanowski, Andrzej Paszkiewicz 35 Fig. 5. The hybrid model of the system for testing the network device. References [1] Comer D. E., Sieci komputerowe TCP/IP. 1, Zasady protokoły i architektura, Wydawnictwa Naukowo-Techniczne, Warszawa (1998). [2] Nowicki K., Woźniak J., Sieci LAN, MAN i WAN - protokoły komunikacyjne, Wydawnictwo Fundacji Postępu Telekomunikacji, Kraków (2000). [3] Pytel K., Systemy operacyjne i sieci komputerowe, Wydawnictwa Szkolne i Pedagogiczne, Warszawa (2010). [4] Hassan M., Jain R., Wysoko wydajne sieci TCP/IP, Wydawnictwo Helion, Gliwice (2004). [5] Grzech A., Sterowanie ruchem w sieciach teleinformatycznych, Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław (2002). [6] Kolbusz J., Paszczyński S., Comparison of traffic self-similarity in two different computer networks, Tools of Information Technology, Procedings of the 2-nd conference, Rzeszów, Poland, 21 September (2007): 85. [7] [8] [9] Zatwarnicka A., Sposoby szacowania czasu transmisji pakietów przez Internet, Wysokowydajne sieci komputerowe. Zastosowania i bezpieczeństwo, Wydawnictwa Komunikacji i Łączności, Warszawa (2005). [10] EtherNet/IP Performance Workgroup, Performance Terminology for EtherNet/IP Devices, EtherNet/IP Implementors Workshop (2004). [11] Bradner S., Benchmarking Terminology for Network Interconnection Devices, Internet Engineering Task Force (IETF), RFC 1242 (1991). [12] Bradner S., McQuaid J., Benchmarking Methodology for Network Interconnection Devices, Internet Engineering Task Force (IETF), RFC 2544 (1999). [13] BreakingPoint, Rethink Firewall Testing A Methodology to measure the performance, security, and stability of firewalls under realistic conditions, BreakingPoint (2010). [14] Jiang D., Fei M., Wang H., Li T., Wireless Network Performance Test in Hybrid Wired Wireless Network System, Proceedings of the 8th World Congress On Intelligent Control and Automation June , Taipei, Taiwan (2011). [15] Borges P. B., A possible deformed algebra and calculus inspired in nonextensive thermostatistics, Physica A 340 (2004): 95.
8 36 Performance test of network devices [16] Nivanen L., Le Méhauté A., Wang Q.A., Generalized algebra within a nonextensive statistics, Reports on Mathematical Physics 52 (2003): 437. [17] Tsallis C., Plastino A. R., Zheng W. M., Power law sensitivity to initial conditions, Chaos, Solitons & Fractals 8 (1997): 885. [18] Grabowski F., Nonextensive model of self-organizing systems, Complexity, Wiley (2013). [19] Jęruś S., Modele multifraktalne natężenia ruchu sieciowego z uwzględnieniem samopodobieństwa statystycznego, Telekomunikacja Cyfrowa Technologie i Usługi, 4 (2001/2002). [20] Wójcicki R., Nowe metody modelowania samopodobnego ruchu w sieciach w oparciu o procesy Poissona z markowską modulacją, Studia Informatica 24( 2(63)) (2005).
Computer Networks as Complex Systems in Nonextensive Approach
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 2 (2013), pp. 31-44 Computer Networks as Complex Systems in Nonextensive Approach Franciszek Grabowski, Andrzej Paszkiewicz, Marek Bolanowski Rzeszow University
The multilayer complex network design with use of the arbiter
The multilayer complex network design with use of the arbiter 1 Marek Bolanowski, 1 Andrzej Paszkiewicz, 2 Tadeusz Kwater, Bogdan Kwiatkowski 1 Department of Distributed Systems Rzeszow University of Technology
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
VoIP network planning guide
VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead
Programming Assignments for Graduate Students using GENI
Programming Assignments for Graduate Students using GENI 1 Copyright c 2011 Purdue University Please direct comments regarding this document to [email protected]. 1 OVERVIEW 2 1 Overview This document
19 Comparison of Ethernet Systems
Frithjof Klasen Ever since the end of the 90 s, the usage of industrial Ethernet in automation has been a pursued target. Along with this, the desire emerged to have a universal and standard communication
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Optimization of Computer Network for Efficient Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 396 402 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Optimization
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems
Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems Baochun Li Electrical and Computer Engineering University of Toronto [email protected] Klara Nahrstedt Department of Computer
AE64 TELECOMMUNICATION SWITCHING SYSTEMS
Q2. a. Draw the schematic of a 1000 line strowger switching system and explain how subscribers get connected. Ans: (Page: 61 of Text book 1 and 56 of Text book 2) b. Explain the various design parameters
Workload Generation for ns. Simulations of Wide Area Networks
1 Workload Generation for ns Simulations of Wide Area Networks and the Internet 1 M. Yuksel y, B. Sikdar z K. S. Vastola z and B. Szymanski y y Department of Computer Science z Department of Electrical
Design call center management system of e-commerce based on BP neural network and multifractal
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce
ISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
Characterizing Task Usage Shapes in Google s Compute Clusters
Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key
Digital Advisory Services Professional Service Description Network Assessment
Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Course Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
Comparisons between HTCP and GridFTP over file transfer
Comparisons between HTCP and GridFTP over file transfer Andrew McNab and Yibiao Li Abstract: A comparison between GridFTP [1] and HTCP [2] protocols on file transfer speed is given here, based on experimental
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Performance Test Methodology for EtherNet/IP Devices
Performance Test Methodology for EtherNet/IP Devices Version 1.0 March 14, 2005 PUB00081R1 Published by EtherNet/IP Implementors Workshop ODVA Document Revision Log Revision Section Remarks Date Author(s)
Service Level Analysis of Video Conferencing over Wireless Local Area Network
Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Advanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
The Network Layer Functions: Congestion Control
The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and
CNE Network Assessment
+ CNE Network Assessment Overview The purpose of the network assessment is to measure, analyze, and document network functionality and performance. Areas of assessment include: Local Area Network (wired
Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
IP Office Technical Tip
IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
CCNA Discovery: Designing and Supporting Computer Networks
CCNA Discovery: Designing and Supporting Computer Networks Overview of Case Studies Karen Alderson [email protected] 1 CCNA Discovery Course Sequence CCNA Discovery Networking for Home and Small Businesses
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
Chapter 2. Literature Review
Chapter 2 Literature Review This chapter presents a literature review on Load balancing based Traffic Engineering, VoIP application, Hybrid Neuro-Fuzzy System, and Intra & Inter Domain Networks. 2.1 Load
Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies
Page 1 Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies Introduction This paper explains the concepts of Storage Area Network or SAN, iscsi technology and how
Rivista ISI 2007 SCOPUS SCIMAGOJR Mathscinet Zentralblatt Econlit
Rivista ISI 2007 SCOPUS SCIMAGOJR Mathscinet Zentralblatt Econlit Advances in Applied Mathematics 0,718 NO 0,061 SI SI NO Advances in Applied Probability 0,991 SI 0,069 SI SI NO Advances in Difference
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
QOS IN NETWORK TRAFFIC MANAGEMENT
24 Acta Electrotechnica et Informatica, Vol. 10, No. 4, 2010, 24 28 QOS IN NETWORK TRAFFIC MANAGEMENT Peter FECIĽAK, Katarína KLEINOVÁ, Jozef JANITOR Department of Computers and Informatics, Faculty of
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
NGN Network Architecture
ITU/BDT Regional Seminar on Costs and Tariffs for Member Countries of the Tariff Group for Africa (TAF) Midrand,, South Africa, June 2005 NGN Network Architecture Oscar González Soto ITU Consultant Expert
for guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
Network Design Performance Evaluation, and Simulation #6
Network Design Performance Evaluation, and Simulation #6 1 Network Design Problem Goal Given QoS metric, e.g., Average delay Loss probability Characterization of the traffic, e.g., Average interarrival
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as:
Performance Testing Definition: Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program or device. This process can involve
Introduction to Performance Measurements and Monitoring. Vinayak Hegde [email protected] @vinayakh
Introduction to Performance Measurements and Monitoring Vinayak Hegde [email protected] @vinayakh 1 Structure Part 1 Basics of Measurement (40 min) Part 2 Basic Statistics primer (40 min) Part 3 Measurement
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
Using LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks
LiveAction Application Note Using LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks September 2012 http://www.actionpacked.com Table of Contents
Optimization models for congestion control with multipath routing in TCP/IP networks
Optimization models for congestion control with multipath routing in TCP/IP networks Roberto Cominetti Cristóbal Guzmán Departamento de Ingeniería Industrial Universidad de Chile Workshop on Optimization,
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Networking (Exploration 1)
Unit 105: CCNA Fundamentals of Networking (Exploration 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose A/601/7537 BTEC in IT This unit introduces the architecture,
OPNET - Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
Computing the Fractal Dimension of Stock Market Indices
Computing the Fractal Dimension of Stock Market Indices Melina Kompella, COSMOS 2014 Chaos is an ancient idea that only recently was developed into a field of mathematics. Before the development of scientific
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
CME: A Middleware Architecture for Network-Aware Adaptive Applications
CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani
Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
