Measuring the Impact of Security Protocols for Bandwidth
|
|
|
- Joshua Barton
- 10 years ago
- Views:
Transcription
1 International Journal of Computing Academic Research (IJCAR) ISSN Volume 3, Number 6(December 2014), pp MEACSE Publications Measuring the Impact of Security Protocols for Bandwidth Milos Orgon and Lubomir Fackovec Department of Telecommunication, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, Slovakia Abstract This paper will assess the impact of the use of security protocols for bandwidth in wireless networks [1,2,3]. Two scenarios were created one without network operation quality impairment, and the other one with additionally impaired operation quality by means of software tools IxChariot and NetDisturb, which artificially undermined the operation of the network by generating of delay, jitter, limited bandwidth, packet loss rate increases, the generation of duplicate packets and modifying packets transmitted, etc. Keywords: Wireless networks, bandwidth, security protocols, transfer rate. Introduction Examination of the impact of security protocols on the transfer rate was carried out in laboratory conditions at the Institute of Telecommunications of FEI STU in Bratislava. For the test we used a PC with Windows XP (32-bit version) with installed software tool designed to simulate application-generated data stream IxChariot. The second PC had an installed software emulator NetDisturb with two network adapters. In both scenarios another notebook (running Windows 7-32-bit version) was used. The notebook was connected to a wireless network through an access point on the router Cisco WRVS4400N - EU. IxChariot can be characterized as a test tool for simulating the real-life application under the conditions of a real load by generating additional data streams. It also enables the testing of security protocols. It allows testing of both wired and wireless networks. It consists of IxChariot console with a graphical interface, which is used to run simulations and evaluate their results. Through the endpoints (Performance Endpoints) it is possible to generate the use and collect data, which are used to evaluate the simulation. These end points must be placed upon at least two of the terminal devices (creating communication pair), so that the simulation can take place [4,5]. The two terminal devices are set up using IP addresses in the software tool of the IxChariot console. In our case it was the IP address of the computer used to generate traffic and at which this application was lodged. The other endpoint consisted of a notebook connected to the wireless network. During the testing, the network protocol TCP was set up and used for all simulations HTTP text script, which describes the behaviour of endpoints. The script can be set up choosing from a wide variety of scripts for testing: FTP, DNS or applications such as Citrix, LDAP, database servers or voice signalising, and many others [4,5]. NetDisturb is a network software emulator that can artificially reduce the quality of network operation by degrading network traffic by the means of generating different delays and jitters, it also allows limiting bandwidth, increasing packet loss, generating duplicates of packet flows, modifying transmitted packets and the like. Furthermore, it also allows impairing streams over IP networks and therefore studying the behaviour of applications, devices and services in a networked environment exposed to disturbance. NetDisturb is inserted between two Ethernet segments acting as a bridge and operates bi-directional packet transfer on Ethernet, FastEthernet and GigabitEthernet [6,7]. The NetDisturb network emulator is built at the client-server architecture and uses the HTTP protocol and XML (Extensible Markup Language) format for the exchange of packets between client and server. Two configurations are possible: either the server and the client are located at the same computer 131
2 (local governance), either the server and the client are placed at different computers (remote management). NetDisturber supports protocols IPv4 and IPv6. The role of software tool NetDisturb is to manage, disrupt and in other ways harm packet streams. For the operation of this instrument two NIC cards are required. Each of them has an interface A and B and, for each direction A B and B A, 16 flows can be defined, and at the same time a depreciation of transfer can be set up for each flow, such as loss or duplication of packets, generation of delays and the like [6,7]. Principles of operation of the software tool NetDisturb is as follows. Depending on the predefined streams, the incoming packet is controlled, whether it meets the criteria of set packet flow filters. In the event that the packet satisfies the flow filter, it is identified whether the packet should be lost or duplicated and / or delayed and / or damaged. In the event that it does not match any of the filters, the specific flow is considered to be unfiltered. Each packet received on the interface is analyzed by filters in order from 1 to 16, before it is assigned as an unfiltered stream [6,7]. Scenarios of measuring the impact of protocols on bandwidth In the scenario of measuring the impact of protocols on bandwidth without operation impairment, was tested the impact of security protocols on the transfer rate without degradation of data transfer. Despite of the fact that the measurement was performed in the laboratory, laboratory conditions were not fully met, because nearby the measuring workplace were located other wireless networks affecting the testing. Fig. 1 provides an overview of wireless networks that were in range of the testing workplace and the figure also shows the availability of each channel. After the auto-occupation of the channel No. 6 by an access point, this setting was changed to the working channel No GHz (network CISCOSB) to take advantage of the less overwhelmed part of the band. Near the workplace were also found other sources of interference out of our control - microwave ovens, electrical machinery and equipment, which could have affected the measurement. The shown utilization of channel (Fig. 1) can cause problems in communication - collisions and decrease of transfer rate may occur, particularly when the same channel is occupied by several networks at the same time. During the testing, functions of the access points associated with affecting the quality of service QoS were disabled. Working mode was set to b/g/n standard mixed. Fig. 1 Occurrence of wireless networks within range of the measuring workplace The topology of the testing facility is illustrated by Fig. 2. In both scenarios the same connection was used, data traffic passes through the instrument NetDisturb without damage. The computer on which this tool was located, had two network cards. A notebook was placed at a distance of one meter from the AP without obstacles. Fig. 2 The testing facility 132
3 During the testing, the IP address on the computer IxChariot was set up as a gateway for notebook and vice versa. Thus, both computers were connected via an access point. On the computer on which the tool NetDisturb was installed, no network address was set up, but all services were disabled. On the notebook, it was necessary to allow network discovery to allow other computes to recognize it in the network. (a) (b) Fig. 3 Throughput of an unsecured network a) with non-imparied operation b) with impaired operation (a) Fig. 4 Network throughput when using WEP security a) with non-imparied operation b) with impaired operation (b) 133
4 (a) Fig. 5 Network throughput when using WPA- Personal a) with non-impaired operation b) with impaired operation While implementing the first scenario, three tests were performed without network operation impairment, whereby each test lasted two minutes. The obtained values are shown in Table. 1 and the related graphs with non-impaired operation are shown in Fig. 3a, Fig. 4a, and Fig. 6a. While implementing the second scenario, three tests were carried out, each test took again two minutes, while the operation was impaired. The obtained values are also shown in Table. 1 and the related graphs with impaired operation are shown in Fig. 3b, Fig. 4b and Fig. 5b.The testing of the impact of the used security protocols on data transfer rate in network with impaired packet transfer by a network emulator NetDisturb was implemented in the same testing facility and under the same conditions as in the previous scenario. The working channel is the channel no GHz (network CISCOSB) and the working mode is the b/g/n mixed. When performing measurements, the devices were connected to the same topology as in the precedent case (Fig. 2). (b) Used security protocol Unsecured network WEP WPA2 (AES) Table 1 The impact of the used security protocol on the transfer rate vs. m Maximu Minimum Average Response Transfer transfer response time Impaired transfer rate rate time Min/Max network rate [Mbit/s] [s] [s] operation [Mbit/s] net 0,671 0,017 2,537 0,015 0,004/0,620 Impaired net 0,126 0,016 0,217 0,083 0,048/0,649 net 0,794 0,017 3,467 0,013 0,003/0,611 Impaired net 0,126 0,016 0,217 0,083 0,048/0,649 net 0,694 0,012 2,476 0,015 0,004/0,897 Impaired net 0,172 0,029 0,217 0,060 0,048/0,
5 Fig. 6 Adjusting the constant delay and exponential jitter in the network emulator NetDisturb Depreciation of the network operation was carried out through the network emulator NetDisturb by setting exponential constant delay and jitter. The setting up of the values of the network emulator is shown in Fig. 8. Constant delay was set up to 10 ms (this value can be set from 1 ms to 100 s). Exponential jitter is calculated from the parameter lambda, while for purposes of this test the lambda value was not changed remaining set up to the default value of 10. The value of exponential jitter is added to the constant delay, which affects bandwidth, as described below. The probability density function for the specified parameter lambda can be expressed by the following formula: The operation was influenced by setting the stream 1 on HTTP. We used a filter to drive delay for HTTP traffic in both directions A B and B A. In the first test, no network security protocol was used. The average transfer rate with non-impaired operation was Mbps, and respectively Mbps with impaired operation (Table 1). The minimum transfer rate with non-impaired operation was Mbps, and respectively Mbps with impaired operation. The maximum transfer rate with the non-impaired operation was Mbps, and respectively Mbps with impaired operation. In the second test, the security protocol WEP was used to ensure network security. The average transfer rate with the non-impaired operation was Mbps, and respectively Mbps with impaired operation. The minimum transfer rate with the non-impaired operation was Mbps, and respectively Mbps with impaired operation (both values are the same as in the previous case - without the use of a 135 (1)
6 security protocol). The maximum transfer rate with the non-impaired operation was Mbps (the highest of all measured values), and respectively Mbps with impaired operation (same value as in the previous case - without the use of a security protocol). While comparing the values listed in Table 1, it appears that the maximum transfer rate is the highest. In the third test, the security protocol WPA2-Personal was used to ensure network security. The average transfer rate with the non-impaired operation was Mbps, and respectively Mbps with impaired operation. The minimum transfer rate with the non-impaired operation was Mbps, and respectively Mbps with impaired operation (both values are the same as in the previous case - without the use of a security protocol). The maximum transfer rate with the non-impaired operation was Mbps (the highest of all measured values), and respectively Mbps with impaired operation (the same value as in the first two cases). As it is also apparent from Table 1, the minimum transfer rate was the same as in the first two tests in with impaired operation. As evidenced in the above Table 1, the differences between the achieved transfer rates are minimal. Although, based on the knowledge of the protocol frame structure, it was possible to predict the reduction of the transfer rate when using secure protocols. The former was confirmed, but only in a small extent - the difference of transfer rates was only minimal. However, the important finding is the following: a significant increase of security using security protocol WPA2 Personal instead of WEP was not reflected by an increased decrease of the transfer rate. During the testing the assumption that the influence of a different frame structure would result into the reduction of the transfer rate was confirmed - by introducing artificial delay via the network emulator NetDisturb in both directions. The Tab. 1 shows a reduction in the average transfer rate of 0.5 Mbit / s under the impact of the operation impairment and that the maximum transfer rate dropped by more than 2.2 Mbps. The Effect of delay may be observed as well when comparing the instantaneous transfer rate shown in Fig. 3a, Fig. 4a and Fig. 5a (no degradation of service) with waveforms shown in Fig. 3b, Fig. 4b and Fig. 5b (which were measured when the network traffic network was deteriorated by the emulator NetDisturb). Measured flows of the instantaneous bit rate with operation impairment have significantly" less dense" course. Another factor should be taken into account - the relatively high availability of channels in the surrounding of the test facility (Fig. 3). Conclusion The aim of the contribution was to investigate the impact of using security protocols for bandwidth in wireless networks. For the network testing we used two scenarios one without network operation quality impairment and the other with additionally impaired operation quality by means of software tools IxChariot and NetDisturb, which artificially devalued the network operation by generating traffic delay and delay variation, limited bandwidth, increased loss rates, generated duplicates of packet flows, modified transmitted packets and so on. The wireless network tests led to the discovery of a negative impact of the impaired network operation (via a network emulator NetDisturb), which was expressed by the degradation of the instantaneous transfer rate. The reduced transfer rate was more significant particularly while using security protocols WEP, WPA2 compared to an unsecured network. Acknowledgement This article was created with the support of the Ministry of Education, Science, Research and Sport of the Slovak Republic within the Research and Development Operational Programme for the project "University Science Park of STU Bratislava", ITMS , co-funded by the European Regional Development Fund and his article is a part of research activities conducted at Slovak University of Technology Bratislava, Faculty of Electrical Engineering and Information Technology, Institute of Telecommunications, within the scope of the project KEGA No. 039STU-4/2013 Utilization of Web-based Training and Learning Systems at the Development of New Educational Programs in the Area of Optical Transmission Media. References 136
7 [1] Rita Pužmanová: Bezpečnost bezdrátové komunikace (Security of wireless communication), Brno, CP Books, 2005, ISBN [2] Mandjid Nakhjiri, Mahsa Nakhjiri: AAA and network security for mobile Access, Chichester GB, John Wiley and Sons, 2005, ISBN [3] Hakima Chaouchi, Maryline Laurent Maknavicius: Wireless and Mobile Network Security, London GB, ISTE Ltd, 2009, ISBN [4] IxChariot User Guide: Release Rev. and, IXIA pp [5] IxChariot Application Scripts, Release Rev. A, December 2005 [6] Impairment Emulator Software for IP Networks (IPv4 & IPv6): User Guide. [online]. Plumbing, 2013, _Guide_V6.0.pdf [7] NetDisturb - IP Network Impairment Simulator Standard Edition - Software, 137
Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot
TEST PLAN Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot www.ixiacom.com 915-6649-01, 2006 Contents Testing Packet Switched Network Performance of Mobile Wireless Networks...3
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
VoIP Testing IxChariot
TEST PLAN VoIP Testing IxChariot www.ixiacom.com 915-6680-01, 2005 Contents 1. VoIP Testing with IxChariot... 1 1.1 Key Facts... 1 2. Determine Voice Quality Deterioration with Increasing Application
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
Analysis of Performance of VoIP
ENSC 427 Communication Networks Analysis of Performance of VoIP Over various scenarios OPNET 14.0 Spring 2012 Final Report Group 11 Yue Pan Jeffery Chung ZiYue Zhang Website : http://www.sfu.ca/~ypa11/ensc%20427/427.html
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004
Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract
Denial of Service (DOS) Testing IxChariot
TEST PLAN Denial of Service (DOS) Testing IxChariot www.ixiacom.com 915-6681-01, 2005 Contents Overview of Denial of Service functionality in IxChariot...3 A brief outline of the DoS attack types supported
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Measuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected]
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected] I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited
EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
IxChariot Virtualization Performance Test Plan
WHITE PAPER IxChariot Virtualization Performance Test Plan Test Methodologies The following test plan gives a brief overview of the trend toward virtualization, and how IxChariot can be used to validate
Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers
Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers Overview A leading provider of voice, video, and data services to the residential and businesses communities designed
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Linksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
NATed Network Testing IxChariot
TEST PLAN NATed Network Testing IxChariot www.ixiacom.com 915-6648-01, 2004 Contents 1. Test Overview...3 2. Configuring IxChariot for traditional static NAT...3 3. Configuring IxChariot for NAPT...7 Copyright
EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
IP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
diversifeye Application Note
diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs
White Paper. Wireless Network Considerations for Mobile Collaboration
White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
USER GUIDE Cisco Small Business
USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Lab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
VOIP under: WLAN 802.11g. VS Telephone Landline. ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam jta6@sfu.
VOIP under: WLAN 802.11g and Ethernet connection VS Telephone Landline ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam [email protected] Project Website: www.sfu.ca/~kta2 2 Introduction
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
CT505-30 LANforge-FIRE VoIP Call Generator
1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Top-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) [email protected], [email protected] Abstract.
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
WI-FI PERFORMANCE BENCHMARK TESTING: Aruba Networks AP-225 and Cisco Aironet 3702i
WI-FI PERFORMANCE BENCHMARK TESTING: Networks AP-225 and Cisco Aironet 3702i Conducted at the Proof-of-Concept Lab January 24, 2014 Statement of Test Result Confidence makes every attempt to optimize all
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Voice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
Virtual Server in SP883
Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not
Network Performance Evaluation of Latest Windows Operating Systems
Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia
Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)
Introduction En Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a computer for transmission
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Usage of Erlang Formula in IP Networks
ommunications and Network, 2011, 3, 161-167 doi:10.4236/cn.2011.33020 Published Online August 2011 (http://www.scirp.org/journal/cn) Usage of Erlang Formula in IP Networks Erik hromy, Jan Suran, Matus
AC 750. Wireless Dual Band 4G LTE Router. Highlights
AC 750 Wireless Dual Band 4G LTE Router Highlights Share Your 4G LTE Network Share your 4G LTE network with multiple Wi-Fi devices and enjoy download speeds of up to 150Mbps Great Coverage Powerful, integrated
YO-301AP POE AP Datasheet
YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Comparison of Wireless Protocols. Paweł Ciepliński
Comparison of Wireless Protocols Comparison of Wireless Protocols Field test and comparing 82.11 protocol vs nstreme In Point To Multipoint scenarios IDEA? What force me to make such a comparison. Testing
GW-300NAS. Giga WAN Port. Giga LAN Port. Wireless 2T2R 300Mbps Giga NAS Router 2T2R. Mbps. 802.11 Green Router. IPTV Pass- Through
GW-300NAS Wireless 2T2R 300Mbps NAS Router T he GW-300NAS is the Wireless 2T2R 300Mbps NAS Router. This product is specifically designed for those who need to have the file sharing and P2P download services
Output Power (without antenna) 5GHz 2.4GHz
Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,
NETGEAR N600 WIRELESS DUAL BAND GIGABIT ROUTER Premium Edition
Reviewer s Guide for NETGEAR N600 WIRELESS DUAL BAND GIGABIT ROUTER Premium Edition (WNDR3800) Product Description (Learn More at www.netgear.com/wndr3800) The NETGEAR N600 Wireless Dual Band Gigabit Router
VoIP Conformance Labs
VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP
Lab Testing Summary Report
Lab Testing Summary Report July 2006 Report 060725 Product Category: WAN Optimization Appliances Vendors Tested: Citrix Systems TM Riverbed Technology TM Key findings and conclusions: The WANScaler 8800
Frequently Asked Questions: Home Networking, Wireless Adapters, and Powerline Adapters for the BRAVIA Internet Video Link
Frequently Asked Questions: Home Networking, Wireless Adapters, and Powerline Adapters for the BRAVIA Internet Video Link What is a home network? A home network is a way of connecting your BRAVIA Internet
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview
Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended
Secure Wireless Networking
Secure Wireless Networking In today s connected world, people expect seamless connectivity to their networks and the Internet. That s why Cisco Small Business Wireless s offer expanded range and coverage
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Internet Public Network
Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications
TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure
I.J. Wireless and Microwave Technologies, 2012, 6, 29-36 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.05 Available online at http://www.mecs-press.net/ijwmt
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simulation Environment
International Journal of Research in Electronics ISSN : 2348-9065 (Online) Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simulation Environment I Dhobale J V, II Dr. Kalyankar
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
Version 1.01 12/09/2013. User Manual. DAP-1650 Wireless AC1200 Dual-band Gigabit Range Extender DAP-1650
Version 1.01 12/09/2013 User Manual DAP-1650 Wireless AC1200 Dual-band Gigabit Range Extender DAP-1650 Table of Contents Product Overview... 4 Package Contents... 4 System Requirements... 5 Introduction...
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
