Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University
|
|
- Kelley Glenn
- 7 years ago
- Views:
Transcription
1 Network Performance Evaluation Throughput by Troy Bennett Computer Science Department School of Engineering California Polytechnic State University 1998 Date Submitted: Advisor:
2 TABLE OF CONTENTS Page ABSTRACT... III LIST OF FIGURES...IV LIST OF TABLES...V THROUGHPUT...6 TCP/IP HISTORY...7 LAYERS...7 APPLICATIONLAYER...7 TCP/IP...7 ETHERNET...9 TEST PLATFORM...11 NETWORK HARDWARE...11 TESTING TOOLS...11 Netperf...11 Internet Advisor...12 Surveyor...12 EXPERIMENTS...12 EXPECTATIONS...12 EXPERIMENT EXPERIMENT EXPERIMENT EXPERIMENT NOTES TO FUTURE STUDENT RESEARCHERS...19 BIBLIOGRAPHY...20 ii
3 Abstract This document discusses the value of throughput as a performance measurement and presents the outcomes of a series of experiments conducted to measure network throughput. The objective was to determine network bandwidth overheads associated with packet processing. Also reported are some other performance measures of interest to the 3com project. iii
4 LIST OF FIGURES 1 Figure 1 TCP Packet Format... 8 Figure 2 IP Datagram Format... 9 Figure Ethernet frame... 9 Figure 4 RFC 894:Ethernet Encapsulation Figure 5 Throughput Graph : 10MBPS Figure 6 CPU Utilization : 10MBPS Figure 7 Throughput Graph : 100MBPS Figure 8 CPU Utilization : 100MBPS Figures 1-3 Are from the CSc 404 lecture notes of Dr. S. Ron Oliver iv
5 LIST OF TABLES Table I Throughput Loss : 10MBPS Table II Throughput Loss : 100MBPS v
6 Throughput What is throughput? Why use it as a criterion in evaluation of performance? Throughput is defined as the..number of user information bits transmitted per unit time 2 The key words here are user and by extension user information. A user can be a person or an application. Who or what the user is is relative to where you are looking in the data flow model. User information does not include things such as packet headers tagged on to the users information by a lower level. While a link may be said to be capable of transmitting 1,000 BPS, if the process of transmission uses 200 BPS the maximum throughput for the user is only 800 BPS (the link would be said to have an 80% efficiency). Throughput is a useful measure for this project in that we are trying to determine how much user data is getting through at various levels in the TCP/IP - Ethernet transmission scheme. By comparing the throughput at different levels, we can see how much capacity is lost at each layer. By comparing the measured throughput to theoretical values based on the number of header bytes added to a packet by the protocols in the layers involved, we can also determine the time used at each layer for overhead. 2 Dr. S. Ron Oliver CSc404 Notes Lecture 2 6
7 TCP/IP History In 1969 the Defense Advanced Research Projects Agency (DARPA) started research into a packet switching network for use by defense agencies. In 1975 this network (ARPANET) went from an experiment into an accepted production tool. The TCP/IP suite of tools was adopted as a military standard in 1983 and all hosts on the ARPANET (which became the MILNET) were required to convert to TCP/IP. Layers From initially requiring each program to handle its own communication network protocols have evolved into layers. The TCP/IP protocol, sponsored by Department of Defense, provided the ability for applications to communicate across a wide variety of different computer types without having to understand the intricacies of each type. Application Layer The Application layer sits above the TCP/IP protocol. It is in this layer that a particular program such as Telnet interfaces with the network without needing to understand the specifics of the services provided below. In terms of the OSI model the TCP/IP Application layer encompasses both the Application and Presentation layers and are the programs themselves. TCP/IP TCP: Transmission Control Protocol is a transport layer connection-oriented protocol for connections between hosts. Reliability is provided at this level by positive acknowledgments and, if needed, retransmission. The TCP delivers the data received from IP to applications based on a port number identification. There is also an unreliable transport layer service, known as User Datagram Protocol (UDP), that is used for non-critical or real-time data transport where missed packets are tolerable as in network device status monitoring. 7
8 Figure 1 TCP Packet Format IP: At the network layer, the internet protocol supports the basic communication of independent hosts over a network. It is in this layer that routing using Internet addresses is performed. IP routes the packets to the appropriate destination host. IP also performs fragmentation of datagrams as needed. Note: IP does not provide error control or acknowledgment and relies on Transport layer protocols to initiate connections and perform error-checking if needed. 8
9 Figure 2 IP Datagram Format Ethernet Ethernet is a Medium Access Control (MAC) layer Carrier Sense Medium Access w/collision Detection (CSMA/CD) protocol. This means that any Ethernet node that wishes to transmit data checks for a quiet wire (or other medium) before transmission and then sends its packet. If a collision with another packet occurs this is detected and a random time interval, from the exponential back-off algorithm, is selected before the next transmission attempt will take place. An Ethernet Packet consists of the following parts: Figure Ethernet frame The Preamble is a 7 octet pattern used for bit synchronization. SFD: Start of Frame Delimiter. 9
10 DA: Destination Address SA: Source Address FCS: Frame Check Sequence Length: length in octets I-Field: Contains the information being transmitted PAD: Used as needed to maintain 64 octet minimum packet size for collision detection FCS: Frame Check Sequence 10
11 Test Platform Network Hardware The LAN used for our tests consists of a Hewlett Packard Netserver LH Pro and four HP Vectra VL series 4 workstations. Each machine contains a 3C905 Fast Ethernet XL network adapter capable of 10 and 100MBPS speeds. The machines all run Windows NT. The 10 MBPS experiments were run using a 3C16700 hub and the 100 MBPS tests used the 8/TP100 hub, both of which are 8 port BASE-T. The workstations are configured as follows: Workstation 200MHZ Pentium 96 MB RAM Quantum Fireball 2.4GB Hard Drive Matrox Millennium 2MB video card Windows NT Workstation 4.0 Tests were run between workstations and did not directly involve the server. Testing Tools Netperf Netperf is an application level benchmark program which measures throughput for variable size messages. Netperf communicates with its companion Netserve using either TCP/IP or UDP/IP as selected by the user. Netserve is set up on the host machine with parameters to listen to a specific port. Netperf, the client, is then given the address of the Netserve machine, the desired protocol, message size and length of the trial to be run. In the following experiments TCP/IP and the default run time of 10 seconds are always used. 11
12 Internet Advisor The Hewlett Packard Internet Advisor is a laptop personal computer configured to run HP s proprietary network analysis software. The Internet Advisor is connected to a port on the Ethernet hub and monitors all the frames on the network. The Internet Advisor is capable of analyzing Ethernet and Token Ring frames as well as deciphering higher layer protocols such as TCP/IP and IPX. In addition, it is capable of reporting network usage in terms of percent utilization. Surveyor Somiti Surveyor is a software protocol analyzer that uses the Network Interface Card NIC of a Windows 95 or NT machine to perform functions similar to that of the Internet Advisor. Since the version of Internet Advisor at Cal Poly is not capable of connecting to 100MBPS Ethernet networks, Surveyor was substituted to monitor the 100MBPS trials. Experiments The purpose of our experiments overall is to determine throughput at different layers. The experiment is not interested in overall network performance per se and since Ethernet is a CSMA/CD protocol the tests are conducted on a single connection between two machines in order to exclude the occurrence of a vast number of collisions. In order to acquire data at each network level under a load that is consistent, tests at different layers will be conducted simultaneously when possible. When ever two or more benchmark measurements cannot be obtained concurrently, separate tests are run with loads as closely matched as possible. Expectations It is always useful to perform a theoretical prediction of the results expected from an experiment. This will prevent one from blindly accepting improbable outcomes, and will provide a basis for any necessary revision in our hypotheses. For example, at the base level the Ethernet connection has a stated speed of 10Mbps. Assuming this is correct we can then work up the protocol stack. Ethernet uses a header of 26 octets per packet (208 bits) and has a maximum data field of 1,500 octets (12,000bits). 12
13 Hence approximately 1.73% (208/12,000) of the available bandwidth is used for headers, resulting in a maximum throughput of 9.827Mbps for payload data carrying upper-layer packets. Throughput at the higher layers depends on the packet size used. TCP and IP each add 20 bytes per Ethernet frame and each TCP/IP packet typically is fragmented into a number of Ethernet frames. Experiment 1 Throughput loss between the Transport and the Network Access Layers on a 10MBPS LAN The first experiment compares the throughput at the transport layer, as measured by Netperf, to the MAC layer, as measured by the Internet Advisor. Since the Internet Advisor does not provide direct throughput measurement, the test was conducted using the measure of utilization over the intervals of the test. Utilization is the percentage of the maximum capacity of the network used over a time interval. The resulting values were then multiplied by the available bandwidth (Throughput = Utilization * Bandwidth), and a loss in the throughput calculated. Besides the overhead associated with bits lost to headers, there is also the factor of the time required for encapsulation of the higher layer packets into data frames. Our test results, presented below, indicate that the average loss between the Throughput and MAC layers is 550 KBPS. Error! Not a valid link. Table I For these tests continuous sampling was used, the display of data on the Internet Advisor was halted after each Netperf run to collect the data, since the default buffer size of the Internet Advisor could not handle even the 10 second default trial time of Netperf. The message size used was the default 8,192 bytes. Using the standard statistics functions in Microsoft Excel to analyze the data collected, we see that there is a 95% probability that the average loss will fall between 528 and 565KBPS. How much of this is due to the differences in packet sizes and how much is due to the time it takes to process the packets in each layer? The expected loss due to the differences in packet size is calculated as follows: 13
14 From the transmission point of view we look at the message size of 8,192 bytes. From my initial reading it seemed a single TCP header of 20 bytes was added and a 20 byte IP header for a total of 8,232 bytes and this would be split into 1,500byte data packets. However this did not coincide with the frames I analyzed. My conclusion is that on our network the IEEE 802 standard Ethernet frame is not in use; after some investigation I found that instead, Ethernet Encapsulation (RFC 894) is used. The latter frame format uses six bytes each for destination and source addresses, 2 bytes for type and a 4 byte CRC for a total of 18 bytes of header. The maximum amount of data that an Ethernet frame can carry under this standard is 1,500 bytes, with a minimum data size of 46 bytes. This makes the minimum frame size 64 (46+18) bytes. Thus, a TCP/IP acknowledgment, which is 40 bytes in length, is padded with 6 bytes to make the 46 bytes required minimally. Figure 4 RFC 894:Ethernet Encapsulation Each Ethernet frame carries the TCP/IP header for recompilation at the destination. Each 8,192 byte message generated by Netperf is fragmented into 5 full frames (1,518 bytes each) and a frame with a 892 byte data field (950 bytes). The data overhead in transmission should therefor be ((TCP:20+IP:20+Ethernet:18)*6) / (Message Size: ( )*6) = (348/8540)bytes or Error! Not a valid link.. For our average Ethernet level throughput this would translate into a loss of Error! Not a valid link.kps instead of the 550 indicated. However, the TCP acknowledgments of the packets must also be taken into consideration. Adding six 64bit acknowledgments to our figures, the loss between Netperf and the analyzer would be (Error! Not a valid link./error! Not a valid link.) orerror! Not a valid link. which still only accounts for a loss of Error! Not a valid link.kbps. Assuming the destination receive window is large enough the rest of the loss, 176BPS ( ), can be assumed to be due to the latency between successive network layers on the computer and in the NIC. 14
15 Experiment 2 The impact of message size on throughput and CPU utilization on a 10MBPS Ethernet. This experiment studies the relation among message size, the amount of processor activity and the network throughput. The throughput numbers are those reported by Netperf. The CPU % data was gathered using, PERFMON, the Windows NT built in performance monitor. CPU utilization numbers reported are the average over the time period of the experiment. From our previous analysis, we expect that we should get the best throughput when the message size is an exact multiple of 1460 bytes. Since the TCP/IP headers will each occupy 20 bytes per frame and the maximum data size is 1,500. In other words 1,460 is the application message size with the minimum overhead. Throughput vs Message Size 10MBPS Throughput (MBPS) MessageSize(bytes) Throughput in MBPS Figure 5 Throughput Graph : 10MBPS Unexpectedly, the message sizes with the best throughput were both multiples of approximately one half of 1,460 (730) 8,192 (5.6 multiple of 1,460) and 32,768 (22.4 multiple of 1,460). We do not have an explanation for this observation at this time. In CPU utilization we expect to see a decrease with message size increases as the time between the generation of successive datagrams will be farther apart and the overhead per message decreases up to the 1,460 byte message size. 15
16 Message Size vs. CPU Utilization 10MBPS CPU Utilization CPU % Message Size (bytes) Figure 6 CPU Utilization : 10MBPS There were no surprises in this trial, the CPU utilization does decrease as expected. Interestingly, the CPU utilization levels off as the message size is increased beyond bytes. The presumed explanation for the leveling off of is that the CPU utilization is that once the NIC is saturated the CPU generates a constant stream of datagrams to fill the available bandwidth. Experiment 3 Throughput loss between the Transport and Network Access Layers on a 100MBPS LAN The Internet Advisor at Cal Poly is not equipped to measure 100MBPS traffic. As an alternate method, I acquired a demo version of Surveyor, a software protocol analyzer from Shomiti Software at The software was installed on R100B4, a workstation not directly involved in the test, so as to avoid overburdening one CPU or NIC during the test. The software version does not output a discrete percent utilization table as the Internet Advisor does so averages for utilization were taken manually from the graphic display. While this method is not as precise as in experiment one the data may be accurate enough for estimating loss percentages. It should also be noted that since this is a software 16
17 tool using a standard Ethernet card the possibility exists that there may be packet loss due to the lack of data buffering on the card. The results obtained are presented below. Error! Not a valid link. Table II Note that the average loss indicated by the table is less than 2%. While we would expect that since the utilization is not as close to maximum bandwidth as it was in experiment one, perhaps the number of collisions would be less and the percent loss would be lower than the percent loss of experiment one, 2% is theoretically not possible. The theoretical minimum loss due to overhead is the same as given in experiment one : 4.30%. The expected loss from the Transport Layer to Network Access Layer at 61 MBPS would be 2.5MBPS minimum. Looking at the packets in Surveyor they are the same, Ethernet Encapsulated, as in experiment one. It is clear the graph readings are not accurate enough to produce a meaningful loss test. Experiment 4 100MBPS Variable size messages throughput and CPU utilization This experiment is a repeat of Experiment 2 using the 3com 100MPBS hub. Data was gathered using Netperf and the Windows NT performance monitor. What is interesting to note is the difference in CPU utilization. The processor has to work harder to keep up with the increased bandwidth and does not level out as quickly as during the 10MBPS trials. The first hint of dropping below 100% utilization was a blip 17
18 in the 512 byte trial. Since the CPU was not as quick to drop the message sizes tested were extended to Throughput vs Message Size 100MBPS Throughput (MBPS) Throughput in MBPS Message Size (bytes) 512kB. Figure 7 Throughput Graph : 100MBPS M essage Size vs. CPU Utiliza tion 100MBPS CPU Utilization CPU % Message Size (bytes) Figure 8 CPU Utilization : 100MBPS 18
19 Notes to future student researchers. To measure the throughput losses between transport(tcp) and Internet(IP) layers, a thorough look at how TCP/IP is implemented in Windows NT will be helpful, if benchmarks are to be developed to measure the losses between them. A simpler way to measure the IP throughput would perhaps be to use UDP datagrams this would eliminate the acknowledgments and therefore the dependence on the destination window. Shomiti Surveyor can decode each of the layers and has a plug-in module Packet Blaster to generate network traffic that should be useful. It is as yet unknown if Surveyor can measure interlayer throughput. Check the accuracy of the Surveyor throughput tests by analyzing the capture buffer for frame overflow. The NIC in the test system does not have an especially large buffer (8K). 19
20 Bibliography Craig Hunt, TCP/IP Network Administration, Sebastapol; O reilly & Associates, Inc., 1993 Averill M Law & David Kelton, Simulation Modeling and Analysis New York; McGraw-Hill, Inc., 1991 W. Richard Stevens, TCP/IP Illustrated, Volume 1 : The Protocols New York; Addison-Wesley Publishing Company, 1994 William Stallings, Ph.D., Data and Computer Communications New York; MacMillan Publishing Company,
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationUnit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More information10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core
1 Introduction The implements, in conjunction with a triple speed 10/100/1000 MAC, Layer 3 network acceleration functions, which are designed to accelerate the processing of various common networking protocols
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationVMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationLAN Performance Measurements Lab
LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationNetwork Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
More informationLAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
More informationVerifying Network Bandwidth
Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More information10/100/1000Mbps Ethernet MAC with Protocol Acceleration MAC-NET Core with Avalon Interface
1 Introduction Ethernet is available in different speeds (10/100/1000 and 10000Mbps) and provides connectivity to meet a wide range of needs from desktop to switches. MorethanIP IP solutions provide a
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationMEASURING WIRELESS NETWORK CONNECTION QUALITY
Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationNetwork Troubleshooting with the LinkView Classic Network Analyzer
November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationPART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationLesson 2-3: Ethernet Basics
Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationFrom Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
More informationICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
More informationApplication Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More informationGetting the most TCP/IP from your Embedded Processor
Getting the most TCP/IP from your Embedded Processor Overview Introduction to TCP/IP Protocol Suite Embedded TCP/IP Applications TCP Termination Challenges TCP Acceleration Techniques 2 Getting the most
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationHow To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
More informationThe new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationVisio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationThe TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
More informationGigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
More informationSPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
More informationD1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,
More informationVoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
More informationTHE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS
THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationAFDX networks. Computers and Real-Time Group, University of Cantabria
AFDX networks By: J. Javier Gutiérrez (gutierjj@unican.es) Computers and Real-Time Group, University of Cantabria ArtistDesign Workshop on Real-Time System Models for Schedulability Analysis Santander,
More informationThis topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationTCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software
TCP/IP Programming Joel Snyder, Opus1 Geoff Bryant, Process Software Portions Copyright 1996 TGV Software, Inc., Copyright 1996 Process Software Corp. Copyright 1996 Opus1 Course Roadmap Slide 2 NM055
More information52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationVXLAN Performance Evaluation on VMware vsphere 5.1
VXLAN Performance Evaluation on VMware vsphere 5.1 Performance Study TECHNICAL WHITEPAPER Table of Contents Introduction... 3 VXLAN Performance Considerations... 3 Test Configuration... 4 Results... 5
More informationVoIP Bandwidth Calculation
VoIP Bandwidth Calculation AI0106A VoIP Bandwidth Calculation Executive Summary Calculating how much bandwidth a Voice over IP call occupies can feel a bit like trying to answer the question; How elastic
More information