Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University

Size: px
Start display at page:

Download "Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University"

Transcription

1 Network Performance Evaluation Throughput by Troy Bennett Computer Science Department School of Engineering California Polytechnic State University 1998 Date Submitted: Advisor:

2 TABLE OF CONTENTS Page ABSTRACT... III LIST OF FIGURES...IV LIST OF TABLES...V THROUGHPUT...6 TCP/IP HISTORY...7 LAYERS...7 APPLICATIONLAYER...7 TCP/IP...7 ETHERNET...9 TEST PLATFORM...11 NETWORK HARDWARE...11 TESTING TOOLS...11 Netperf...11 Internet Advisor...12 Surveyor...12 EXPERIMENTS...12 EXPECTATIONS...12 EXPERIMENT EXPERIMENT EXPERIMENT EXPERIMENT NOTES TO FUTURE STUDENT RESEARCHERS...19 BIBLIOGRAPHY...20 ii

3 Abstract This document discusses the value of throughput as a performance measurement and presents the outcomes of a series of experiments conducted to measure network throughput. The objective was to determine network bandwidth overheads associated with packet processing. Also reported are some other performance measures of interest to the 3com project. iii

4 LIST OF FIGURES 1 Figure 1 TCP Packet Format... 8 Figure 2 IP Datagram Format... 9 Figure Ethernet frame... 9 Figure 4 RFC 894:Ethernet Encapsulation Figure 5 Throughput Graph : 10MBPS Figure 6 CPU Utilization : 10MBPS Figure 7 Throughput Graph : 100MBPS Figure 8 CPU Utilization : 100MBPS Figures 1-3 Are from the CSc 404 lecture notes of Dr. S. Ron Oliver iv

5 LIST OF TABLES Table I Throughput Loss : 10MBPS Table II Throughput Loss : 100MBPS v

6 Throughput What is throughput? Why use it as a criterion in evaluation of performance? Throughput is defined as the..number of user information bits transmitted per unit time 2 The key words here are user and by extension user information. A user can be a person or an application. Who or what the user is is relative to where you are looking in the data flow model. User information does not include things such as packet headers tagged on to the users information by a lower level. While a link may be said to be capable of transmitting 1,000 BPS, if the process of transmission uses 200 BPS the maximum throughput for the user is only 800 BPS (the link would be said to have an 80% efficiency). Throughput is a useful measure for this project in that we are trying to determine how much user data is getting through at various levels in the TCP/IP - Ethernet transmission scheme. By comparing the throughput at different levels, we can see how much capacity is lost at each layer. By comparing the measured throughput to theoretical values based on the number of header bytes added to a packet by the protocols in the layers involved, we can also determine the time used at each layer for overhead. 2 Dr. S. Ron Oliver CSc404 Notes Lecture 2 6

7 TCP/IP History In 1969 the Defense Advanced Research Projects Agency (DARPA) started research into a packet switching network for use by defense agencies. In 1975 this network (ARPANET) went from an experiment into an accepted production tool. The TCP/IP suite of tools was adopted as a military standard in 1983 and all hosts on the ARPANET (which became the MILNET) were required to convert to TCP/IP. Layers From initially requiring each program to handle its own communication network protocols have evolved into layers. The TCP/IP protocol, sponsored by Department of Defense, provided the ability for applications to communicate across a wide variety of different computer types without having to understand the intricacies of each type. Application Layer The Application layer sits above the TCP/IP protocol. It is in this layer that a particular program such as Telnet interfaces with the network without needing to understand the specifics of the services provided below. In terms of the OSI model the TCP/IP Application layer encompasses both the Application and Presentation layers and are the programs themselves. TCP/IP TCP: Transmission Control Protocol is a transport layer connection-oriented protocol for connections between hosts. Reliability is provided at this level by positive acknowledgments and, if needed, retransmission. The TCP delivers the data received from IP to applications based on a port number identification. There is also an unreliable transport layer service, known as User Datagram Protocol (UDP), that is used for non-critical or real-time data transport where missed packets are tolerable as in network device status monitoring. 7

8 Figure 1 TCP Packet Format IP: At the network layer, the internet protocol supports the basic communication of independent hosts over a network. It is in this layer that routing using Internet addresses is performed. IP routes the packets to the appropriate destination host. IP also performs fragmentation of datagrams as needed. Note: IP does not provide error control or acknowledgment and relies on Transport layer protocols to initiate connections and perform error-checking if needed. 8

9 Figure 2 IP Datagram Format Ethernet Ethernet is a Medium Access Control (MAC) layer Carrier Sense Medium Access w/collision Detection (CSMA/CD) protocol. This means that any Ethernet node that wishes to transmit data checks for a quiet wire (or other medium) before transmission and then sends its packet. If a collision with another packet occurs this is detected and a random time interval, from the exponential back-off algorithm, is selected before the next transmission attempt will take place. An Ethernet Packet consists of the following parts: Figure Ethernet frame The Preamble is a 7 octet pattern used for bit synchronization. SFD: Start of Frame Delimiter. 9

10 DA: Destination Address SA: Source Address FCS: Frame Check Sequence Length: length in octets I-Field: Contains the information being transmitted PAD: Used as needed to maintain 64 octet minimum packet size for collision detection FCS: Frame Check Sequence 10

11 Test Platform Network Hardware The LAN used for our tests consists of a Hewlett Packard Netserver LH Pro and four HP Vectra VL series 4 workstations. Each machine contains a 3C905 Fast Ethernet XL network adapter capable of 10 and 100MBPS speeds. The machines all run Windows NT. The 10 MBPS experiments were run using a 3C16700 hub and the 100 MBPS tests used the 8/TP100 hub, both of which are 8 port BASE-T. The workstations are configured as follows: Workstation 200MHZ Pentium 96 MB RAM Quantum Fireball 2.4GB Hard Drive Matrox Millennium 2MB video card Windows NT Workstation 4.0 Tests were run between workstations and did not directly involve the server. Testing Tools Netperf Netperf is an application level benchmark program which measures throughput for variable size messages. Netperf communicates with its companion Netserve using either TCP/IP or UDP/IP as selected by the user. Netserve is set up on the host machine with parameters to listen to a specific port. Netperf, the client, is then given the address of the Netserve machine, the desired protocol, message size and length of the trial to be run. In the following experiments TCP/IP and the default run time of 10 seconds are always used. 11

12 Internet Advisor The Hewlett Packard Internet Advisor is a laptop personal computer configured to run HP s proprietary network analysis software. The Internet Advisor is connected to a port on the Ethernet hub and monitors all the frames on the network. The Internet Advisor is capable of analyzing Ethernet and Token Ring frames as well as deciphering higher layer protocols such as TCP/IP and IPX. In addition, it is capable of reporting network usage in terms of percent utilization. Surveyor Somiti Surveyor is a software protocol analyzer that uses the Network Interface Card NIC of a Windows 95 or NT machine to perform functions similar to that of the Internet Advisor. Since the version of Internet Advisor at Cal Poly is not capable of connecting to 100MBPS Ethernet networks, Surveyor was substituted to monitor the 100MBPS trials. Experiments The purpose of our experiments overall is to determine throughput at different layers. The experiment is not interested in overall network performance per se and since Ethernet is a CSMA/CD protocol the tests are conducted on a single connection between two machines in order to exclude the occurrence of a vast number of collisions. In order to acquire data at each network level under a load that is consistent, tests at different layers will be conducted simultaneously when possible. When ever two or more benchmark measurements cannot be obtained concurrently, separate tests are run with loads as closely matched as possible. Expectations It is always useful to perform a theoretical prediction of the results expected from an experiment. This will prevent one from blindly accepting improbable outcomes, and will provide a basis for any necessary revision in our hypotheses. For example, at the base level the Ethernet connection has a stated speed of 10Mbps. Assuming this is correct we can then work up the protocol stack. Ethernet uses a header of 26 octets per packet (208 bits) and has a maximum data field of 1,500 octets (12,000bits). 12

13 Hence approximately 1.73% (208/12,000) of the available bandwidth is used for headers, resulting in a maximum throughput of 9.827Mbps for payload data carrying upper-layer packets. Throughput at the higher layers depends on the packet size used. TCP and IP each add 20 bytes per Ethernet frame and each TCP/IP packet typically is fragmented into a number of Ethernet frames. Experiment 1 Throughput loss between the Transport and the Network Access Layers on a 10MBPS LAN The first experiment compares the throughput at the transport layer, as measured by Netperf, to the MAC layer, as measured by the Internet Advisor. Since the Internet Advisor does not provide direct throughput measurement, the test was conducted using the measure of utilization over the intervals of the test. Utilization is the percentage of the maximum capacity of the network used over a time interval. The resulting values were then multiplied by the available bandwidth (Throughput = Utilization * Bandwidth), and a loss in the throughput calculated. Besides the overhead associated with bits lost to headers, there is also the factor of the time required for encapsulation of the higher layer packets into data frames. Our test results, presented below, indicate that the average loss between the Throughput and MAC layers is 550 KBPS. Error! Not a valid link. Table I For these tests continuous sampling was used, the display of data on the Internet Advisor was halted after each Netperf run to collect the data, since the default buffer size of the Internet Advisor could not handle even the 10 second default trial time of Netperf. The message size used was the default 8,192 bytes. Using the standard statistics functions in Microsoft Excel to analyze the data collected, we see that there is a 95% probability that the average loss will fall between 528 and 565KBPS. How much of this is due to the differences in packet sizes and how much is due to the time it takes to process the packets in each layer? The expected loss due to the differences in packet size is calculated as follows: 13

14 From the transmission point of view we look at the message size of 8,192 bytes. From my initial reading it seemed a single TCP header of 20 bytes was added and a 20 byte IP header for a total of 8,232 bytes and this would be split into 1,500byte data packets. However this did not coincide with the frames I analyzed. My conclusion is that on our network the IEEE 802 standard Ethernet frame is not in use; after some investigation I found that instead, Ethernet Encapsulation (RFC 894) is used. The latter frame format uses six bytes each for destination and source addresses, 2 bytes for type and a 4 byte CRC for a total of 18 bytes of header. The maximum amount of data that an Ethernet frame can carry under this standard is 1,500 bytes, with a minimum data size of 46 bytes. This makes the minimum frame size 64 (46+18) bytes. Thus, a TCP/IP acknowledgment, which is 40 bytes in length, is padded with 6 bytes to make the 46 bytes required minimally. Figure 4 RFC 894:Ethernet Encapsulation Each Ethernet frame carries the TCP/IP header for recompilation at the destination. Each 8,192 byte message generated by Netperf is fragmented into 5 full frames (1,518 bytes each) and a frame with a 892 byte data field (950 bytes). The data overhead in transmission should therefor be ((TCP:20+IP:20+Ethernet:18)*6) / (Message Size: ( )*6) = (348/8540)bytes or Error! Not a valid link.. For our average Ethernet level throughput this would translate into a loss of Error! Not a valid link.kps instead of the 550 indicated. However, the TCP acknowledgments of the packets must also be taken into consideration. Adding six 64bit acknowledgments to our figures, the loss between Netperf and the analyzer would be (Error! Not a valid link./error! Not a valid link.) orerror! Not a valid link. which still only accounts for a loss of Error! Not a valid link.kbps. Assuming the destination receive window is large enough the rest of the loss, 176BPS ( ), can be assumed to be due to the latency between successive network layers on the computer and in the NIC. 14

15 Experiment 2 The impact of message size on throughput and CPU utilization on a 10MBPS Ethernet. This experiment studies the relation among message size, the amount of processor activity and the network throughput. The throughput numbers are those reported by Netperf. The CPU % data was gathered using, PERFMON, the Windows NT built in performance monitor. CPU utilization numbers reported are the average over the time period of the experiment. From our previous analysis, we expect that we should get the best throughput when the message size is an exact multiple of 1460 bytes. Since the TCP/IP headers will each occupy 20 bytes per frame and the maximum data size is 1,500. In other words 1,460 is the application message size with the minimum overhead. Throughput vs Message Size 10MBPS Throughput (MBPS) MessageSize(bytes) Throughput in MBPS Figure 5 Throughput Graph : 10MBPS Unexpectedly, the message sizes with the best throughput were both multiples of approximately one half of 1,460 (730) 8,192 (5.6 multiple of 1,460) and 32,768 (22.4 multiple of 1,460). We do not have an explanation for this observation at this time. In CPU utilization we expect to see a decrease with message size increases as the time between the generation of successive datagrams will be farther apart and the overhead per message decreases up to the 1,460 byte message size. 15

16 Message Size vs. CPU Utilization 10MBPS CPU Utilization CPU % Message Size (bytes) Figure 6 CPU Utilization : 10MBPS There were no surprises in this trial, the CPU utilization does decrease as expected. Interestingly, the CPU utilization levels off as the message size is increased beyond bytes. The presumed explanation for the leveling off of is that the CPU utilization is that once the NIC is saturated the CPU generates a constant stream of datagrams to fill the available bandwidth. Experiment 3 Throughput loss between the Transport and Network Access Layers on a 100MBPS LAN The Internet Advisor at Cal Poly is not equipped to measure 100MBPS traffic. As an alternate method, I acquired a demo version of Surveyor, a software protocol analyzer from Shomiti Software at The software was installed on R100B4, a workstation not directly involved in the test, so as to avoid overburdening one CPU or NIC during the test. The software version does not output a discrete percent utilization table as the Internet Advisor does so averages for utilization were taken manually from the graphic display. While this method is not as precise as in experiment one the data may be accurate enough for estimating loss percentages. It should also be noted that since this is a software 16

17 tool using a standard Ethernet card the possibility exists that there may be packet loss due to the lack of data buffering on the card. The results obtained are presented below. Error! Not a valid link. Table II Note that the average loss indicated by the table is less than 2%. While we would expect that since the utilization is not as close to maximum bandwidth as it was in experiment one, perhaps the number of collisions would be less and the percent loss would be lower than the percent loss of experiment one, 2% is theoretically not possible. The theoretical minimum loss due to overhead is the same as given in experiment one : 4.30%. The expected loss from the Transport Layer to Network Access Layer at 61 MBPS would be 2.5MBPS minimum. Looking at the packets in Surveyor they are the same, Ethernet Encapsulated, as in experiment one. It is clear the graph readings are not accurate enough to produce a meaningful loss test. Experiment 4 100MBPS Variable size messages throughput and CPU utilization This experiment is a repeat of Experiment 2 using the 3com 100MPBS hub. Data was gathered using Netperf and the Windows NT performance monitor. What is interesting to note is the difference in CPU utilization. The processor has to work harder to keep up with the increased bandwidth and does not level out as quickly as during the 10MBPS trials. The first hint of dropping below 100% utilization was a blip 17

18 in the 512 byte trial. Since the CPU was not as quick to drop the message sizes tested were extended to Throughput vs Message Size 100MBPS Throughput (MBPS) Throughput in MBPS Message Size (bytes) 512kB. Figure 7 Throughput Graph : 100MBPS M essage Size vs. CPU Utiliza tion 100MBPS CPU Utilization CPU % Message Size (bytes) Figure 8 CPU Utilization : 100MBPS 18

19 Notes to future student researchers. To measure the throughput losses between transport(tcp) and Internet(IP) layers, a thorough look at how TCP/IP is implemented in Windows NT will be helpful, if benchmarks are to be developed to measure the losses between them. A simpler way to measure the IP throughput would perhaps be to use UDP datagrams this would eliminate the acknowledgments and therefore the dependence on the destination window. Shomiti Surveyor can decode each of the layers and has a plug-in module Packet Blaster to generate network traffic that should be useful. It is as yet unknown if Surveyor can measure interlayer throughput. Check the accuracy of the Surveyor throughput tests by analyzing the capture buffer for frame overflow. The NIC in the test system does not have an especially large buffer (8K). 19

20 Bibliography Craig Hunt, TCP/IP Network Administration, Sebastapol; O reilly & Associates, Inc., 1993 Averill M Law & David Kelton, Simulation Modeling and Analysis New York; McGraw-Hill, Inc., 1991 W. Richard Stevens, TCP/IP Illustrated, Volume 1 : The Protocols New York; Addison-Wesley Publishing Company, 1994 William Stallings, Ph.D., Data and Computer Communications New York; MacMillan Publishing Company,

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core

10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core 1 Introduction The implements, in conjunction with a triple speed 10/100/1000 MAC, Layer 3 network acceleration functions, which are designed to accelerate the processing of various common networking protocols

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

LAN Performance Measurements Lab

LAN Performance Measurements Lab LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Network Models OSI vs. TCP/IP

Network Models OSI vs. TCP/IP Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Verifying Network Bandwidth

Verifying Network Bandwidth Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

10/100/1000Mbps Ethernet MAC with Protocol Acceleration MAC-NET Core with Avalon Interface

10/100/1000Mbps Ethernet MAC with Protocol Acceleration MAC-NET Core with Avalon Interface 1 Introduction Ethernet is available in different speeds (10/100/1000 and 10000Mbps) and provides connectivity to meet a wide range of needs from desktop to switches. MorethanIP IP solutions provide a

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

MEASURING WIRELESS NETWORK CONNECTION QUALITY

MEASURING WIRELESS NETWORK CONNECTION QUALITY Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

Network Troubleshooting with the LinkView Classic Network Analyzer

Network Troubleshooting with the LinkView Classic Network Analyzer November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Lesson 2-3: Ethernet Basics

Lesson 2-3: Ethernet Basics Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

From Fieldbus to toreal Time Ethernet

From Fieldbus to toreal Time Ethernet Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Getting the most TCP/IP from your Embedded Processor

Getting the most TCP/IP from your Embedded Processor Getting the most TCP/IP from your Embedded Processor Overview Introduction to TCP/IP Protocol Suite Embedded TCP/IP Applications TCP Termination Challenges TCP Acceleration Techniques 2 Getting the most

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

Visio Enabled Solution: One-Click Switched Network Vision

Visio Enabled Solution: One-Click Switched Network Vision Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

The TCP/IP Reference Model

The TCP/IP Reference Model The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

AFDX networks. Computers and Real-Time Group, University of Cantabria

AFDX networks. Computers and Real-Time Group, University of Cantabria AFDX networks By: J. Javier Gutiérrez (gutierjj@unican.es) Computers and Real-Time Group, University of Cantabria ArtistDesign Workshop on Real-Time System Models for Schedulability Analysis Santander,

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software TCP/IP Programming Joel Snyder, Opus1 Geoff Bryant, Process Software Portions Copyright 1996 TGV Software, Inc., Copyright 1996 Process Software Corp. Copyright 1996 Opus1 Course Roadmap Slide 2 NM055

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult: How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

VXLAN Performance Evaluation on VMware vsphere 5.1

VXLAN Performance Evaluation on VMware vsphere 5.1 VXLAN Performance Evaluation on VMware vsphere 5.1 Performance Study TECHNICAL WHITEPAPER Table of Contents Introduction... 3 VXLAN Performance Considerations... 3 Test Configuration... 4 Results... 5

More information

VoIP Bandwidth Calculation

VoIP Bandwidth Calculation VoIP Bandwidth Calculation AI0106A VoIP Bandwidth Calculation Executive Summary Calculating how much bandwidth a Voice over IP call occupies can feel a bit like trying to answer the question; How elastic

More information