An overview on Internet Measurement Methodologies, Techniques and Tools

Size: px
Start display at page:

Download "An overview on Internet Measurement Methodologies, Techniques and Tools"

Transcription

1 An overview on Internet Measurement Methodologies, Techniques and Tools AA 2012/2013

2 (Agenda) Lezione 24/04/2013 Part 1 Intro basic concepts ISP Traffic exchange (peering) Measurement Topics Active vs passive n tools overview (we will see them in the next classes) One or many obs. points Net vs App n The IPPM framework Sampling techniques Part 2 An overview of the IPPM framework (Homework)

3 (Agenda) Lezione 2/05/2012 Part 3 The most common metrics Availability Reliability Measurement Tools

4 Who need to measure Internet traffic and performance? Corporate administrators who buy network service for their organization. Smaller service providers who buy network service from a larger provider and resell it to their own customers. Anyone buying outsourced Services who must judge the service provider s ability to serve their end user community adequately.

5 Who need to measure Internet traffic and performance? Course Projects: A projects on network measurement and analysis, e.g. to collect and characterize the network traffic generated from your internet connection

6 Basic Terminology

7 Networks and Internets def. A network is a collection of hosts connected together so that they can exchange information. Hosts in a network communicate using a mutuallyagreed network protocol, i.e. they exchange packets of information An internet is a collection of networks with links between them Routers are devices with links to more than one network

8 Adjacency, Connectivity, Internet and Intranets The Internet is the internet of networks that use the TCP/IP suite of protocols The Internet can be viewed as a graph in the sense that it is a set of nodes (networks containing routers) and edges between them (links between routers)

9 Visualization from the Opte Project of the various routes through a portion of the Internet (

10 An Autonomous System (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the Internet. Old definition RFC 1771 New definition RFC 1930 A unique ASN is allocated to each AS for use in BGP routing. AS numbers are important because the ASN uniquely identifies each network on the Internet.

11 RFC: Request for Comment In computer network engineering, a Request for Comments (RFC) is a memorandum describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems RFC are usually published by the RFC Editor on behalf of the Internet Engineering Task Force (IETF),

12 Adjacency and Reachability We describe two networks as adjacent if there is at least one link directly between them A network is reachable from another network if there is a path between them reachability is one-way; X may be reachable from Y while Y is unreachable from X n e.g. VPN à Internet; Internet à VPN two networks are connected if there is a path (made up of one or more routers and/or links) between them that provides reachability in both directions

13 Connectivity A distinguishing feature of the Internet is that it provides universal connectivity to its hosts every host is connected to every other host and able to communicate with it individual hosts within a network may be prevented from communicating with Internet hosts by a firewall; such hosts do not have Internet connectivity

14 Network layers Once connectivity is established, it becomes possible for a network to provide services is one example of such a service. It is useful to think of network services as being implemented in layers. Each layer is considered an entity in itself, providing support for higher layers This allows each layer to be developed independently of the other layers, which is an effective simplification.

15 Firewall and Intranet A firewall is a hardware device or a software program running on a secure host that sits at the junction point or gateway between two networks usually a private network and a public network such as the Internet, and has connectivity to both An intranet is an internet using TCP/IP, but in which all the hosts belong to a single organization, for example a large company with office networks at various geographic locations. hosts on an intranet are only accessible to members of the organization that owns it an intranet is not part of the Internet an intranet may have some hosts that are Internet-connected (gateway/firewall)

16 Internet Service Providers Who provide connectivity

17 ISP common concept ISPs provide a complete range of services, e.g. they will Connect networks (or individual hosts) to the Internet Provide services for their customers such as , network news and Web access Provide support services such as Web hosting

18 Specialized ISP Transport providers Traffic Exchange providers (Internet Exchange Points) Service providers Content providers

19 Transport providers ISP running their own wide-area network and provide Internet connectivity for their customers via that network e.g. telecom, fastweb ISPs who focus on end-user customers can be described as access providers ISPs having high-speed networks covering large geographical areas and connecting to many other ISP networks are commonly described as backbone providers A special case of transport provider is a transit provider, i.e. one whose customers are other transport providers rather than individuals or companies.

20 E.g. Verizon transport provider

21 Many ISP cover all the layers, other only a portion

22

23 Relathionship between networks The relationships between networks are generally described by one of the following three categories: Transit (or pay) The network operator pays money (or settlement) to another network for Internet access (or transit). Peer (or swap) Two networks exchange traffic between each other's customers freely, and for mutual benefit. Customer (or sell) Another network pays a network money to provide them with Internet access.

24 Transit providers: Peering Peering: how providers agree to cooperate peering is a voluntary interconnection of administratively separate Internet networks for the purpose of exchanging traffic between the customers of each network. n The pure definition of peering is settlement-free or "sender keeps all," meaning that neither party pays the other for the exchanged traffic; instead, each derives revenue from its own customers. Peering requires physical interconnection of the networks, an exchange of routing information through the Border Gateway Protocol (BGP) routing protocol and is often accompanied by peering agreements of varying formality

25 Peering and network relathions Bilateral peering: exchange of routing information each ISP becomes aware of the other's routes to their customers' networks. Information received/transmitted is used to control the flow of traffic exchanged with the outside ISPs may or may not agree to carry traffic to some or all of those customers n the details are determined by a contract between the two providers. Transit: carry traffic on behalf of another ISP traffic may be carried with or without exchange of routing info the details are agreed between providers

26 IXP

27

28 Traffic NaMeX (RM) and MIX-IT (MI)

29 Traffic NaMeX (RM) and MIX-IT (MI)

30 Traffic NaMeX (RM) and MIX-IT (MI)

31 An access provider's network (illustrated in Figure 2) connects to other transport provider networks via fixed links with a well-defined maximum capacity, for example, a T3 link, with 45 Mbps capacity. We'll call this the proximal capacity, because it is nearer to the Internet backbone. An issues to be aware of: Oversubscription customer 1 customer N Access Provider Network Transport Provider Network Internet distal capacity proximal capacity Figure 2: Example of a (small) ISP network oversubscription ratio R R = (total distal capacity) / (proximal capacity) R>1 means oversubscription 3

32 Service providers Web hosting/housing Application service providers complex applications with web service access n Software as a Service development platform n Platform as a Service Infrastructure providers Infrastructure as a Service Large ASPs built their own network:

33 Content Providers Any network host that is the source of downloadable content Content delivery networks CDNs are used by popular commercial Web sites to reduce page download times

34 Measurement Topics Lord Kelvin said, when you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot measure it, when you cannot express it in numbers, your knowledge is of a meager and unsatisfactory kind

35 Why measurement Without measurements, you have no objective record or benchmark of how a network behaves Measurements show whether changes improve or degrade the network s performance, and by how much If you are buying Internet connectivity from an ISP you need to understand the kind of service being offered Only by measuring actual performance can you verify that you're getting what you pay for.

36 Active vs. Passive measurement Passive measurements: by observing normal network traffic Not invasive Challenging when rate increases tools: e.g. tcpdump, CoralReef, NeTraMet Active measurements: by sending test traffic into the network Invasive tools: e.g. Scamper

37 One or Many observation points Some measurements rely on observations at more than one point in the network to measure the time a packet takes to travel from A to B, you must record the times when the packet leaves A and arrives at B using accurate, synchronized clocks. For measuring traffic flows through a large network is not a good idea observing flows at many points It is difficult to correlate measurements of flows taken simultaneously at even a few different places It is much simpler to measure traffic at the ingress/egress links of your network Follow individual packets on their various paths through the network ONLY IF you need to produce a traffic matrix showing overall traffic flows through it

38 Network vs. Application Measurements Application-level measurements are needed for a clear view of overall application performance, which cannot easily be synthesized from lower level data They may also offer some insights into the performance of the client and server hosts, and of the network links between. Application measurements allow to bypass traffic filtering some ISPs today block ICMP echo packets or limit the rate at which they are processed measurements using such packets (e.g. using ping) are still useful, but the increasing use of traffic filtering is decreasing that utility RFC 2330 clarify the difference between application and network metrics

39 ISP performance evaluated using Application Measurement by

40

41 The IPPM Framework (started in 1998 still active) To clarify the differences between application and network metrics, the IETF's IP Performance Metrics (IPPM) WG has developed a Measurement Framework for measuring network performance RFC 2330: Framework for IP Performance Metrics The Framework presents terms for describing networks, explains the need for metrics to be useful, concrete, well defined, and capable of being measured repeatedly and reliably With the Framework defined, the IPPM WG has continued to specify network metrics such as A One-way Delay Metric for IPPM -- RFC IPPM metrics for measuring connectivity -- RFC 2678

42 Sampling Techniques and Traps Observing packet packet missing is not admitted if packets were missed the number of lost packets must be reported What to do when packet rate increase? sample the network traffic

43 Sampling Techniques and Traps (2) What sampling algorithm should one use? to examine every n-th packet examine packets at fixed time intervals; this is harder to implement and may be affected by aliasing (synchronization) effects (RFC 2330 discuss this issues) to measure effects that happen at frequencies of F Hz or less, you must sample the signal at least 2F times per second (from the Sampling Theorem) In practice sampling granularity depends on the phenomena we want catch the rete of packets

44 Common Metrics The IP Performance Metrics WG s view

45 Latency widely used measure of network latency is roundtrip time (RTT) the time for a packet to make the round trip from a client to a server and back

46 Network latency component times a) The time it takes a packet to travel along the physical links that make up its path through the Internet (transport time) b) The time it takes to pass through routers between those links (queuing and transmission time) c) The time required for the server to process an incoming packet and generate a response packet (server response time) (a) + (b) = { Forward delay (Client à Server) } and (c) Server delay { Reverse delay (Server à Client) } Measuring (a) and (b) requires measurement at both client and server, using one-way delay techniques such as those as described in RFC 2679

47 Measuring latency Use a method that is implemented within the server's IP stack, so that it requires very little server processing to generate a response Ping the most common used Factors influencing latency Server load Path congestion Routing algorithms (Path used, peering policies)

48 The ISP point of view An ISP can manage latency only for packets travelling within its own network. Maximum latency can be higher than the average You need to ask n how often the latency is measured, n by how much it may vary, and n over what period it is averaged. ISPs will measure latency using a tool such as ping, which uses the ICMP protocol This may not accurately represent the performance of applications that use other protocols

49 09/2011 Technical Note: Some network equipment is known to give ICMP a much lower priority than other traffic, this could make the results for ISPs that use that equipment appear to be slower than they really are. However, we perform a large number of pings, which should reduce the affects of routing equipment giving ICMP traffic a low priority.

50 Packet Loss Network packet loss is the fraction of packets lost in transit from client to server and back during a specified time interval, expressed as a percentage of the packets sent to the server during that interval TCP relies on detecting lost packets to sense congestion and control the rate at which packets are sent, we expect to see occasional packets lost from TCP streams

51 Throughput The rate at which data is sent through the network, usually expressed in bits per second (bps), bytes per second (Bps) or packets per second (pps) Throughput is measured by counting bytes transported during a specified time interval a long interval will average out short-term bursts in the data rate Short intervals imply a higher data collection rate, and may exaggerate the burstiness of the data. A good compromise is to use one- to five minute intervals, and to produce daily or weekly plots

52 SpeedTest.net

53 Performance Measurement Tools Taxonomy performance.xml

54 Availability and Reliability

55 Availability ITU-T E.800, namely: the ability of an item to be in a state to perform a required function at a given instant of time or at any instant of time within a given time interval... From the user point of view, availability over a specified time interval is the percentage of that interval during which the system was available for normal use

56 What is supposed to be available? Service availability Web service availability test Host availability Host availability test Network availability Network availability test

57 When is the service unavailable? Tests will produce latency and packet loss values for each case A service is effective if are satisfied maximum latency and minimum packet loss if the measured values fall outside these limits, the service will be considered unavailable

58 Example From the user point of view, you could decide that network availability is lost if, when you ping your ISP's access router at one-minute intervals, ping latency is worse than 10 ms or ping packet loss is greater than 1 percent. You need to be realistic when setting these limits, for example 2% packet loss may be unacceptable for Web or ftp data transfer, but 5% packet loss could be acceptable for .

59 Reporting availability Availabilities are usually reported as a single monthly figure giving the percentage of the time that the network was available One minute is approximately 0.01% of a week, hence if service availability was 99.99%, the service was unavailable for about four minutes during the month. When you discuss availability with your ISP, bear the above in mind as you work together to agree on a definition of availability ISP do not normally specify availability so carefully. Instead they use a single value of backbone availability, without specifying exactly what it means.

60 Other couse of unavailability MMTR MTTF a=mttf/(mttr+mttf) Scheduled downtime

61 Reliability Is closely related to availability Is a measure of how often you get a response back that is wrong, or get a part that is defective higher the reliability lower the frequency of getting back a wrong answer In networking a wrong response (e.g. a corrupted packet) is often equal to a no response (e.g. a lost packet)

62 Statistics Managers are effected by Mononumerosis E.C.

63 Working with statistics Mean, Median and Percentiles used to define SLA Sampling periods must be the same for comparison Averaging period impact statistics

64 Performance Measurement Tools Anonymization Topology Workload Performance Routing Multicast Measurement Infrastructures

65 Source Fundamental of Internet Measurement: A tutorial Fundamentals_of_Internet_Measurement_A_Tutorial.pdf

Fundamentals of Internet Measurement: A Tutorial

Fundamentals of Internet Measurement: A Tutorial Fundamentals of Internet Measurement: A Tutorial Nevil Brownlee, CAIDA (Cooperative Association for Internet Data Analysis) Chris Loosley, CMG (Computer Measurement Group) Many Internet users need to understand

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back

More information

The ISP Column A monthly column on all things Internet

The ISP Column A monthly column on all things Internet The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question

More information

APPLICATION LEVEL PERFORMANCE METRICS

APPLICATION LEVEL PERFORMANCE METRICS APPLICATION LEVEL PERFORMANCE METRICS WHY IS MEASURING IMPORTANT? "To measure is to know." - Lord Kelvin "If you can not measure it, you can not improve it." - Lord Kelvin "If you try to measure something

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

Distributed monitoring of IP-availability

Distributed monitoring of IP-availability IPLU-II Seminar 08.02.2008 1 Distributed monitoring of IP-availability Jorma Kilpi, VTT February 8, 2008 IPLU-II Seminar 08.02.2008 2 Availability vs. IP-Availability In this presentation Availability

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

Introduction to Performance Measurements and Monitoring. Vinayak Hegde vinayakh@gmail.com @vinayakh

Introduction to Performance Measurements and Monitoring. Vinayak Hegde vinayakh@gmail.com @vinayakh Introduction to Performance Measurements and Monitoring Vinayak Hegde vinayakh@gmail.com @vinayakh 1 Structure Part 1 Basics of Measurement (40 min) Part 2 Basic Statistics primer (40 min) Part 3 Measurement

More information

Topic 1: Internet Architecture & Addressing

Topic 1: Internet Architecture & Addressing Topic 1: Internet Architecture & Addressing Objectives Understand the general architecture of Internet Identify the main actors in the Internet architecture Identify the main organizations implied in Internet

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE

LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE Mandis Beigi, Raymond Jennings, and Dinesh Verma IBM Thomas J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532 e-mail: {mandis,

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds: Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia

More information

Introduction, Rate and Latency

Introduction, Rate and Latency Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text

More information

CSE 3214: Computer Network Protocols and Applications

CSE 3214: Computer Network Protocols and Applications CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic (vlajic@cse.yorku.ca)

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Metrics One Way. Two way. Availability Other metrics (R, BW,..?) latency packet loss Jitter delay variation. extensions of one-way metrics

Metrics One Way. Two way. Availability Other metrics (R, BW,..?) latency packet loss Jitter delay variation. extensions of one-way metrics Metrics One Way Two way latency packet loss Jitter delay variation extensions of one-way metrics Availability Other metrics (R, BW,..?) 10/3/2005 MIT IQD Meeting - Oct 4-5,2005 1 Jitter Delay variation

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

UEN GUIDELINES: NETWORK SERVICES VOICE OVER INTERNET PROTOCOL

UEN GUIDELINES: NETWORK SERVICES VOICE OVER INTERNET PROTOCOL UEN GUIDELINES: NETWORK SERVICES VOICE OVER INTERNET PROTOCOL Purpose This document outlines UEN s guidelines for implementing a VoIP communication link through its network. The implementation process

More information

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

Facility Usage Scenarios

Facility Usage Scenarios Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to

More information

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

Tab 26 Attachment A UEN Commercial VoIP Policy

Tab 26 Attachment A UEN Commercial VoIP Policy Tab 26 Attachment A UEN Commercial VoIP Policy Policy The purpose of this Policy is to clarify UEN s position regarding VoIP Services transported over the UEN network. The policy outlines the criteria

More information

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1

More information

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 The Internet is coming of age, in large part because of its ability to open up markets and to

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Overview of Network Measurement Tools

Overview of Network Measurement Tools Overview of Network Measurement Tools Jon M. Dugan Energy Sciences Network Lawrence Berkeley National Laboratory NANOG 43, Brooklyn, NY June 1, 2008 Networking for the Future of Science

More information

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

IAT-1710E Integrated Access Tester

IAT-1710E Integrated Access Tester IAT-1710E Integrated Access Tester Features A number of ways to verify channel bandwidth, support for symmetric and asymmetric RFC2544 test Original high-speed PING test function, can be arbitrary set

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS

More information

The Effect of Caches for Mobile Broadband Internet Access

The Effect of Caches for Mobile Broadband Internet Access The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access

More information

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network

More information

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding

More information

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview. Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

IP Network Monitoring and Measurements: Techniques and Experiences

IP Network Monitoring and Measurements: Techniques and Experiences IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France Owe@laas.fr 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

L4: ISPs, Backbones and Peering

L4: ISPs, Backbones and Peering L4: ISPs, Backbones and Peering 15 September 2015 (From Kobe) Bill Nace Material from Computer Networking: A Top Down Approach, 5 th edition. J.F. Kurose and K.W. Ross Administrivia Norton2010 Paper Review

More information

IP interconnect interface for SIP/SIP-I

IP interconnect interface for SIP/SIP-I Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...

More information

Chapter 2. Literature Review

Chapter 2. Literature Review Chapter 2 Literature Review This chapter presents a literature review on Load balancing based Traffic Engineering, VoIP application, Hybrid Neuro-Fuzzy System, and Intra & Inter Domain Networks. 2.1 Load

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

SIP Trunking and Voice over IP

SIP Trunking and Voice over IP SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

18: Enhanced Quality of Service

18: Enhanced Quality of Service 18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:

More information

Infrastructure for active and passive measurements at 10Gbps and beyond

Infrastructure for active and passive measurements at 10Gbps and beyond Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information