MEASURING WIRELESS NETWORK CONNECTION QUALITY
|
|
|
- Pauline McDowell
- 9 years ago
- Views:
Transcription
1 Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: Recommended Citation Mu, Mike and Pennarun, Avery, "MEASURING WIRELESS NETWORK CONNECTION QUALITY", Technical Disclosure Commons, ( January 27, 2016) This work is licensed under a Creative Commons Attribution 4.0 License. This Article is brought to you for free and open access by Technical Disclosure Commons. It has been accepted for inclusion in Defensive Publications Series by an authorized administrator of Technical Disclosure Commons.
2 Mu and Pennarun: MEASURING WIRELESS NETWORK CONNECTION QUALITY PUBLICATION MEASURING WIRELESS NETWORK CONNECTION QUALITY Authors: Avery Pennarun and Mike Mu ABSTRACT A system can run network tests to determine throughput for a wireless network connection between two devices. For example, a testing device can send a number of intentionally invalid test packets to a receiving device. The wireless MAC layer of the receiving device automatically sends back acknowledgment packets indicating that the test packets have been received. The timing and/or counts of the test packets and acknowledgment packets can be analyzed to determine throughput on the wireless network connection. Described features can measure network performance for any kind of wireless (e.g., Wifi ) device without installing any software on that device and without requiring any user interaction to initiate or perform tests. BACKGROUND In order to tune features of some types of wireless network deployments (such as coordinated channel selection, band steering, and assisted roaming), tests in the field must be performed with different algorithms and parameters, and end results compared. Lab and quality assurance tests are sufficient to find errors in the software operation, but not sufficient to determine if, in the field, the system works as well as it did in the lab. Wireless communication such as Wifi in particular tends to perform very differently for end users than it does in a test or isolation chamber. The ability to objectively evaluate test results is desirable to determine if a particular test made network conditions better or worse. However, current data sources to obtain data for such evaluation are limited. Data sets are incomplete, e.g., device applications may only run on particular types or brands of devices, and/or tests are typically triggered only by humans, so are biased as to the conditions under which the data is collected. For example, Wifi performance is highly variable but network performance testing web sites (e.g., the speedtest.net website) only measure performance under very specific circumstances, such as when a customer actually runs 1 Published by Technical Disclosure Commons,
3 Defensive Publications Series, Art. 127 [2016] the test. This manual triggering of the web site tests can lead to sampling bias. Aggregate speedtest.net statistics are available, but browsers do not have access to useful information like client device type, Wifi connection speed, channel signal strength, etc., so cannot submit this information to the test server. Thus, measurements tend to be biased, infrequent, and hard to sort. Alternatively, test information could be obtained by using a native application running on the client device and server. However, these applications typically must be triggered by a human, must be installed by hand, and only run on certain device types (which further increases bias in results). Thus, testing of wireless network connectivity and evaluation of test results is limited using existing techniques. DESCRIPTION The present disclosure describes features related to measuring data throughput of a wireless network connection, such as a Wifi (e.g., IEEE ) connection. Features described in this publication can measure performance against any kind of wireless (e.g., Wificompatible) device without installing any software on that device or requiring any user interaction. Described features provide wireless network tests which can be initiated entirely by a wireless access point or other device, and do not require any software to be installed on the client device, thus alleviating problems of prior wireless network tests and enabling regularly scheduled tests with unbiased results. Maximum throughput can be determined, at any time, without requiring any special software to be installed on the client device and without any user interaction. Such features can use wireless network media access control (MAC) layer acknowledgements, such as Wifi (IEEE standard) MAC layer acknowledgements, to determine if and/or when packets have been received. Because Wifi MAC layer acknowledgements are sent automatically by the network device hardware using the Wifi standard (e.g., network device chipset), they don't differ between device types (e.g., phone vs. tablet vs. laptop computer) or operating systems. Thus, unbiased test samples (i.e., across all devices) can be obtained at arbitrary or scheduled times that are not triggered by user interaction. For example, these tests can be triggered entirely from Wifi access point firmware, which can be controlled by a software or hardware developer
4 Mu and Pennarun: MEASURING WIRELESS NETWORK CONNECTION QUALITY Features described herein are enabled only with permission from the user. For example, the system can ask for user consent to gather information about the user's devices, software, activities, network configurations, and other metadata, and to perform connectivity tests as described herein. Operation Examples Figure 1 shows a simplified system including a testing device 1 that is connected to a receiving device 2 via a wireless connection 3 of a wireless network. For example, testing device 1 can be any electronic device, including a network device, desktop computer, portable device (e.g., cell phone, tablet device, wearable device, etc.), game device, etc. In some examples, testing device 1 can be a wireless access point, e.g., network router, (such as a Wifi router), and/or other network device (switch, hub, etc.). Similarly, receiving device 2 can be any type of electronic device. Wireless network 3 can include any type of wireless network, e.g., a Wifi network, cell phone network, etc. Devices 1 and 2 include hardware and software capable of transmitting and receiving wireless signals enabling the transmission of information between the devices. The overall process to perform the described wireless network throughput test is as follows. The testing device 1 sends wireless test packets to the connected receiving device 2. The wireless hardware of the receiving device 2 sends back response acknowledgments that are captured by the testing device 1. The test data can then be analyzed for loss, latency, and throughput information for the wireless connection 3. The described technique involves intentionally sending a number of intentionally invalid packets from the testing device 1 (e.g., a wireless access point) to the receiving device 2 (e.g., a connection station on the network). The testing device 1 initiates a one-way test transmission of one or more "raw" test data packets to the receiving device 2. For example, the test packets can contain useless or random data. The test packets can be of any suitable type, e.g., TCP/IP, UDP, non-ip, etc. A large number of test packets can be sent. The packets in the test transmission are formed so that they do not elicit a standard protocol reply from a station (e.g., receiving device 2) receiving the packets. Thus, the receiving device 2 will not interpret the test packets. For example, a transmitted TCP/IP packet will 3 Published by Technical Disclosure Commons,
5 Defensive Publications Series, Art. 127 [2016] normally cause the receiving device 2 to send back a TCP acknowledgment, which is avoided in this testing technique. To cause the receiving device 2 to skip or omit interpreting the packets and sending a standard protocol reply to the transmitting device, one of several different options can be employed. For example, a non-ip EtherType value (e.g., a subtype) can be provided in the Ethernet frame of each transmitted packet so that the packet will not be recognized as an IP packet. In other examples, an invalid destination IP address can be provided for each transmitted packet so that the packets will not be seen as valid. In another example, a random UDP port number that is not in use can be included in each transmitted packet. For example, a closed UDP port will have its Internet Control Message Protocol (ICMP) errors rate limited in short order, so the return traffic should not be significant. In another example, a non-standard IP sub protocol can be used (e.g., not UDP). In any of these examples, the kernel on the receiving device 2 will typically drop the packet right away without attempting to send back any kind of protocol response. Thus the transmission packets are queued in the transmit queue of the testing device 1, sent through the wireless network to the receiving device (e.g., a Wifi card of the receiving device), and then promptly thrown away. However, an acknowledgment is automatically sent from the Wifi MAC layer of the receiving device 2. Since the test transmission is sent over a wireless network such as a Wifi network, the Wifi MAC layer of the receiving device 2 will receive a packet and will reply by sending a wireless acknowledgement packet back to the testing device 1. For packets received over a wired network connection, the MAC layer of the receiving device 2 does not send a reply back to the transmitting device. Wireless networks (such as Wifi networks), however, typically use a MAC layer that includes its own acknowledge (ACK) and retransmit system, e.g., independent from the MAC layer in a protocol such as TCP. This wireless MAC layer is included in all compatible wireless network devices due to the probability of wireless packet loss typically being high (e.g., often greater than 50%) even in fairly good transmission conditions, where the reply mechanism is useful to enable retransmission of lost packets. The wireless ACKs are usually implemented in hardware of the wireless chipset providing wireless network 4 5
6 Mu and Pennarun: MEASURING WIRELESS NETWORK CONNECTION QUALITY capability, thus enabling that the acknowledgement packets are sent in a timely fashion, and are sent regardless of the packet content or operating system in use on the receiving device 2. Thus, a replied wireless acknowledgement is sent back to the transmitting device, and the transmitting device can transmit the next queued packet. In some implementations, the transmitting device can resend a particular transmitted packet if no wireless acknowledgement packet is received for that packet in a particular amount of time after sending it. In some implementations, e.g., newer Wifi standards (802.11n and later), multiple wireless acknowledgments can be included in a single batch acknowledgment packet (batch ACK) sent to the transmitting device by the wireless MAC layer of the receiving device after multiple packets have been received. This allows processing of the ACK responses for a highspeed, unidirectional data stream to take a small fraction of the CPU resources needed to generate the packets in the original transmission. Analyzing Test Data After a number of test packets have been transmitted and wireless acknowledgments have been received at the testing device, test data can be analyzed to determine measurements of characteristics of the wireless connection 3 from the testing device 1 to the receiving device 2. Test data can be analyzed for loss, latency, and throughput information. For example, the measurements of when and how the packets were delivered can be obtained in various ways. One technique is to analyze the wireless MAC acknowledgement / batch acknowledgement packets (e.g., as they are received, or from storage) to determine which packets were delivered at what times. For example, the times when the acknowledgment packets are received back at the testing device can be obtained. The testing device needs to be able to measure the time difference between when the original test packet was sent and when it was acknowledged. Examining acknowledgment packets using this technique may require more processing time than some other implementations. In some example implementations, a Linux cfg80211 monitor (e.g., Radiotap) interface can be used, e.g., filtered (in hardware) to only examine Wifi control frames, which can keep the processing overhead relatively low. For example, on a 5 Published by Technical Disclosure Commons,
7 Defensive Publications Series, Art. 127 [2016] very fast link, transmit aggregates may be about 64 packets per frame, and thus an acknowledgement may only need to be examined (parsed) for 1/64 of the transmitted packets. Another technique to obtain measurements is to examine driver level packet counters that have counted various types of packets that have been received and/or sent, to obtain aggregate results. For example, count values from counters for transmit, receive, and retry operations can be retrieved. Based on the counter values, it can be determined how many transmitted packets were sent in a predetermined time period, as well as how many wireless ACKs were received in that time period, to determine throughput and error rate for the wireless connection. This technique can be faster, requiring less processing resources. Another technique to obtain measurements is to set a status flag on transmitted packets so that a different process will determine the acknowledgment status of flagged packets and send that status to the testing process/ hardware. For example, a TX_STATUS flag can be set on all transmitted packets, which is recognized by the kernel of an operating system running on the testing device. The kernel examines receives wireless acknowledgment packets and sends the testing process a notification packet for each particular transmitted packet in response to that packet being acknowledged. This allows the testing process to obtain timestamps of acknowledgments without having to parse the packets, but may take processing time to generate notification packets. Other Implementation Details and Features Saturating the link: The test packets are intended to be transmitted using a saturated link so that maximum throughput can be determined. In very high quality link conditions, it might be more difficult to fully saturate the transmit queue on the test device 1. Packets forwarded via the hardware forwarding engine may generally achieve a higher throughput than packets generated on the local device, due to reduced CPU overhead. Thus, some implementations can generate packets further upstream from the test device 1 and the hardware in testing device 1 can forward those packets, thus saturating the transmit queue. In other implementations, a low overhead packet generation mechanism can be used to generate the test packets at the desired high rate. For example, packet generation features built 6 7
8 Mu and Pennarun: MEASURING WIRELESS NETWORK CONNECTION QUALITY into the Wifi driver can be used. In one example, the Linux kernel s pktgen can be used. Since the transmitted packets will all be almost identical, it can save a lot of CPU processing in comparison to using the kernel s normal networking stack. For example, the counts from packet counters (as described above) can be used to determine throughput from such generated packets. In other implementations, a ceiling can be placed on measured bitrates for the test. For example, tests can be intended to examine particular throughput rates, e.g., less than 200 Mbps, at which it should be easy to saturate the link. Any measurement above the ceiling (e.g., 200 Mbps) can be treated as exactly the ceiling bitrate (e.g., 200 Mbps), which still allows performance differences in the range of interest to be examined. Retransmitting Packets: When a packet is lost in transit, the testing device wireless chipset can do one of two things: retransmit the lost packet, or give up and process the next packet. Retransmission time should be accounted for in determining the throughput of a wireless connection. For example, the connectivity test should differentiate between low throughput and high packet loss rate. A stream can be defined for a transmitter to provide particular retransmit characteristics. For example, the WMM standard (mandatory in n because it is used for all aggregation) allows transmitters to define more than one stream, each called a TID, with different characteristics. In some implementations, a stream can be defined to have retransmits enabled. To determine the throughput on a retransmit link, a series of wireless batch acknowledgment packets that refer to a given sequence number of transmitted packets can be selected. Using these acknowledgment packets as an average sample, measurements can be determined for the number of times a typical packet needs to be retransmitted, and the typical latency of a packet, to determine actual throughput. In other implementations, a special transmit mode (e.g., TID stream) can be defined to never retransmit packets lost in transit. The raw data indicating the number of packets transmitted and indicating which (or how many) transmitted packets were never acknowledged (e.g., error rate) can be used to determine the actual throughput. Using this method might result in simpler measurements with fewer edge cases. For example, a retransmit-capable stream might 7 Published by Technical Disclosure Commons,
9 Defensive Publications Series, Art. 127 [2016] fill up a queue and stop transmitting new packets until it is sure an old packet has arrived at the destination, thus causing artificial decrease in total throughput. A non-retransmitting stream will always send data at the maximum possible rate. Testing Length and Initiation: A test cycle can have a length determined by any of various factors. For example, each test cycle can have a length that is balanced between unnecessarily loading the network (causing performance glitches for both the user of the testing device and any other devices on the communication channel) and getting statistically significant data (for example, some Wifi drivers might take time before they achieve their maximum transmit rate). A test can be triggered to initiate in a variety of ways. For example a command line tool can be used. The tool can run a test against a list of receiving devices (e.g., communication stations identified by MAC address) or all attached receiving devices, either sequentially or in parallel, and print the results in a machine-parseable format. In some implementations, a connected server can trigger a test with a request sent to the testing device. Options can be provided to run tests periodically and log the results. In some cases, periodic tests can try to avoid times when the network is being heavily used. In other cases, periodic tests can spread the test sampling to different times to more easily measure performance under heavy load conditions of the network. Output of Results: Test results can be sent to and stored in a system log containing device information and metadata (as described below). The logs can be processed to generate aggregated reports that can be output in any of various ways. For example, a table of overall system performance can be displayed in a configuration user interface (UI). Such a table can be used to help users view connectivity status and debug connectivity problems. Network connection information based on the described measurements can be displayed in a customer UI (e.g., a wireless router UI) and/or a customer service UI. Figures 2 and 3 show example output that can be displayed, e.g., in a user interface to a user, network administrator, etc. on a display of an electronic device. Fig. 2 shows one example of a graphical display presenting network connectivity data in the form of a graph. The graph shows a signal strength (RSSI) in the in the horizontal direction and a throughput value in 8 9
10 Mu and Pennarun: MEASURING WIRELESS NETWORK CONNECTION QUALITY megabits per second in the vertical direction. The data obtained from the network tests described above can be used to form the displayed plots on the graph. Different plots can be shown for different frequency bands used by the wireless network, such as 2.4 GHz and 5 GHz in this example. Fig. 3 shows another example of a displayed graph presenting network connectivity data. In this example, signal strength (RSSI) vs. throughput value in megabits per second is shown for various percentiles, including maximum, 90th percentile, 10th percentile, average, and predicted results. A variety of other forms of graphs, statistics, tables, and/or data formats can be displayed to present network test data and results. Metadata Collection and Privacy Some implementations can collect metadata describing the characteristics of the testing device 1, the network connection 3, and/or other related system components, if such information is available. For example, such information can assist in analyzing network connectivity characteristics and problems. Examples of such metadata can include user account ID, MAC address of the testing (e.g., client) device, MAC Organizationally Unique Identifier (OUI) of client device, DHCP Hostname of client device, DHCP Fingerprint of client device, operating system and web browser application reported by device, serial number / model number / software version of client device (e.g., access point), Wifi signal strength (RSSI), Wifi average PHY rate (if available), Wifi number of antennas available, Wifi channel width in use (e.g., 20/40/80), Wifi band (e.g., 2.4 vs. 5 GHz), Wifi standard supported, Wifi channel number, number of Wifi stations on same access point, total number of Wifi access points on a LAN or other network, total number of stations on a LAN or other network, ping time, download speed, and upload speed. In various examples, a metadata server or other storage can be used to store metadata, which can be accessed when providing wireless connection analysis, or providing results to a user interface. Privacy of the user can be maintained by requesting user consent for measuring network connection status and/or using data describing the user's account, testing devices, and/or network connections. In some cases, user metadata entries can be expired after a predetermined time limit elapses after the information is stored. 9 Published by Technical Disclosure Commons,
11 Defensive Publications Series, Art. 127 [2016] In some examples, privacy features can be used for collected information about testing devices. For example, instead of the actual MAC address of the device, a pre-anonymized variant of the MAC address, with a random salt, can be used to allow differentiating test results between clients without allowing identification and tracking of clients. Metadata can be used in the analysis of network test data to assist determining the cause of network errors or reduction in performance. For example, the test data and metadata may show that one type of device, at a given wireless network configuration, performs with throughput of less than the expected amount for 25% of time, but a different type of device performs as expected for 100% of time. This may indicate that particular types of devices are suitable for particular configurations. Statistical modeling can allow compatibility problems to be detected and their causes found. The described techniques may be implemented in a software program, by computer hardware, or by a combination of software and hardware
12 Mu and Pennarun: MEASURING WIRELESS NETWORK CONNECTION QUALITY 11 Published by Technical Disclosure Commons,
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Performance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0
54M/150M/300Mbps USB WIRELESS ADAPTER User s Manual Version 2.0 1. Introduction User s Manual Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup.
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8
54M/150M/300Mbps USB WIRELESS ADAPTER User s Manual Version 1.8 Introduction User s Manual Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup.
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
MOBILITY AND MOBILE NETWORK OPTIMIZATION
MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn
ProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
CWNA Instructor Led Course Outline
CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Allocating Network Bandwidth to Match Business Priorities
Allocating Network Bandwidth to Match Business Priorities Speaker Peter Sichel Chief Engineer Sustainable Softworks [email protected] MacWorld San Francisco 2006 Session M225 12-Jan-2006 10:30 AM -
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
What s so smart about Smart-hopping?
What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
AC 750. Wireless Dual Band 4G LTE Router. Highlights
AC 750 Wireless Dual Band 4G LTE Router Highlights Share Your 4G LTE Network Share your 4G LTE network with multiple Wi-Fi devices and enjoy download speeds of up to 150Mbps Great Coverage Powerful, integrated
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
300Mbps. Wi-Fi Range Extender TL-WA855RE. Highlights. Description
300Mbps Wi-Fi Range Extender Highlights Expanded Wi-Fi coverage Delivers fast and reliable wired and wireless connectivity External Antennas For better Wi-Fi coverage and more reliable connections AP Mode
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
Configuring QoS in a Wireless Environment
12 CHAPTER This chapter describes how to configure quality of service (QoS) on your Cisco wireless mobile interface card (WMIC). With this feature, you can provide preferential treatment to certain traffic
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011
POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES Updated November 19, 2011 Consistent with FCC regulations, 1 Pottawatomie Telephone Company provides this information about our broadband
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011
SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Updated November 20, 2011 Consistent with FCC regulations, 1 Shidler Telephone Company provides this information about our broadband Internet
Remote Serial over IP Introduction on serial connections via IP/Ethernet
Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013
LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES Updated September, 2013 Consistent with FCC regulations, 1 Lake Region Electric Cooperative, Inc. provides this information
Surveillance System Using Wireless Sensor Networks
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA [email protected] [email protected] Abstract The
IP SAN Fundamentals: An Introduction to IP SANs and iscsi
IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This
Ethernet-based Storage Configuration
VMWARE TECHNICAL NOTE VMware ESX Server Ethernet-based Storage Configuration Using Ethernet for a storage medium is not a new idea. Network file systems such as NFS and SMB/CIFS are entering their third
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
Lab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router
Dual Band Concurrent Router ESR7750 2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router PRODUCT DESCRIPTION ESR7750 is a Dual Band Concurrent Wireless 11N Broadband Router with dual CPU that offers user unprecedented
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
The Elements of GigE Vision
What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions
Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Comparing the Network Performance of Windows File Sharing Environments
Technical Report Comparing the Network Performance of Windows File Sharing Environments Dan Chilton, Srinivas Addanki, NetApp September 2010 TR-3869 EXECUTIVE SUMMARY This technical report presents the
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
The changes in each specification and how they compare is shown in the table below. Following the table is a discussion of each of these changes.
Introduction There are many interconnect technologies connect components in a system and an embedded designer is faced with an array of standards and technologies choose from. This paper explores the latest
Application Note Connect to a Rockwell PLC over Netbiter Remote Access
Application Note Connect to a Rockwell PLC over Netbiter Remote Access Doc: HMSI 27-239 Rev: 1.0 Connecting Devices TM HALMSTAD CHICAGO KARLSRUHE TOKYO BEIJING MILANO MULHOUSE COVENTRY PUNE COPENHAGEN
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
How To Monitor Bandwidth On A Computer Network
Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I [email protected], II [email protected]
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
YUKON-WALTZ TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES
Updated November 2012 YUKON-WALTZ TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, we provide this information about our broadband Internet access services. Our
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Document ID: 108184. Contents. Introduction. Prerequisites. Requirements. Components Used. Related Products. Conventions. 802.
Products & Services Configure 802.11n on the WLC Document ID: 108184 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions 802.11n - An Overview How Does 802.11n
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
visual packet analysis
visual packet analysis Eye P.A. by MetaGeek USER GUIDE page 1 Eye P.A. visual packet analysis SYSTEM REQUIREMENTS INSTALLATION DIRECT CAPTURE COMPATIBLE FILE FORMATS MAIN VIEWS Work Flow Filter Bar Multi-Layered
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
AC 3200. Wireless Tri-Band Gigabit Router. Highlights
AC 3200 Wireless Tri-Band Gigabit Router Highlights Tri-Band technology Three separate Wi-Fi bands for connecting more devices to your network without a drop in performance Up to 3200Mbps Wi-Fi speed 600Mbps
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Linksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
ESR7550 KEY FEATURES PRODUCT DESCRIPTION
PRODUCT DESCRIPTION ESR7750 is a Dual Band Concurrent Wireless 11N Broadband Router with dual CPU that offers user unprecedented network performance. WMM support boosts streaming and multimedia intensive
Output Power (without antenna) 5GHz 2.4GHz
Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Whitepaper. 802.11n The Next Generation in Wireless Technology
Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
Nokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
