USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET
|
|
|
- Irma Parrish
- 10 years ago
- Views:
Transcription
1 USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET Norbert Martínez 1, Angel A. Juan 2, Joan M. Marquès 3, Javier Faulin 4 {1, 3, 5} [ [email protected], [email protected] ] Computer Science Studies Open University of Catalonia (Spain) {2} [ [email protected] ] Dep. of Applied Mathematics I Technical University of Catalonia (Spain) {4} [ [email protected] ] Dep. of Statistics and Operations Research Public University of Navarra (Spain) ABSTRACT In this paper, we present a preliminary discrete-event simulation study carried out on the computer system that gives support to the intranet of the Open University of Catalonia. The main purpose of this study, developed with the OPNET simulation software, was to help the computer network managers to obtain a better understanding of its internal operation. Other objectives of our paper are related to the discovery of possible performance problems (bottle necks, weak points in the structure, etc.), and to the testing of new designs of the network that could increase its performance, reliability and scalability levels. Finally, we discuss how discrete event simulation software can help computer networking students to improve their practical knowledge on this subject. performance, both analytical and simulation methods can be used. Analytical methods are based upon mathematical analysis that characterizes a network as a set of equations. This approximation usually implies to use several restrictive assumptions, which tend to be not too much realistic, since networks are complex systems formed up by hardware and software (protocols, applications, queueing policies, etc.). On the other hand, simulation techniques can be used to model in detail the dynamic nature of real computer networks [Law, Kelton; 2000] [Banks, et al; 2001]. Simulation allows engineers to test different network designs (even before the network physically exists) and to perform what-if analysis with models of the already existent networks without exposing them to failures or inoperative periods. Keywords: Simulation, Computer Science Applications, Network Design 1. INTRODUCTION Computer networks have become extremely important in our day-to-day life, since most companies and institutions depend on the appropriate functioning of their computer networks. In order to analyze computer networks 2. THE CASTELLDEFELS PROJECT The Open University of Catalonia (UOC) is an on-line university with about 37,000 community members, including students from Spain and Latin America, professors, managers and other staff. With this volume of potential intranet users, performance fine-tuning of the computer system that gives support to the UOC intranet becomes a major task for system managers. For that reason, a group of professors (from areas such as computer networking, operations research and simulation), network 1
2 managers and computer science students started the so called Castelldefels Project (named behind the city where the computer system is located). The main objective of this project is to improve the system performance levels (and, consequently, to increase the quality of service offered to intranet users) by selecting optimal values for configuration parameters such as network topology, hardware devices, queuing and balancing policies, protocols, etc.) [Kurose, Ross; 2005] [Peterson, Davie; 2003]. new request (since that would add unnecessary load to servers). There are different policies to maintain a user session: using the origin IP address, inserting a cookie in the user PC, etc..). At the end, quality of service will depend on how fast, reliable and error-free is the service we offer to the intranet users. Special attention has to be paid to two concrete aspects of the network system: the load balance mechanisms and the session persistence requirements. The computer system makes use of load balancing mechanisms, which allow a convenient load distribution (requests from distinct users) among different available servers. Two dedicated hardware devices perform this load balancing task. While one of the load balancers is operating, the other is in stand-by status. That way, maintenance tasks can be done without having to stop the web service and, moreover, this service will still being available even if the active load balancer fails. These load balancers are responsible for assuring readiness, at any moment, of web services (HTTP, HTTPS, FTP, SMTP and other proprietary applications). Different load assignment policies can be set up in the balancer. This way, the balancer device decides which available server will attend an incoming user request based on one of the following selection criteria: randomly, sequentially, less loaded server, smallest response-time server, etc...). In order to check if a concrete server is operative, the load balancer carries out regular tests on the servers. This monitoring process can also be configured with different optional parameters (such as elapsed time between two consecutive tets). For some services, it is also very important to maintain a specific user session in the same front-end (that is to say, to guarantee persistence of the session): when a user introduces its login and password and gets access to the intranet, all information associated to her (profile, mailbox, etc..) is loaded from the database into the front-end. Therefore it is not optimal to reassign her to a different front-end each time she does a Figure 1: Network system 3. NETWORK SYSTEM DESCRIPTION Figure 1 shows a graphical representation of the network system under consideration. When a user opens a web browser and types the University URL, a portal page is loaded into the user browser (clients requests are balanced among three portal servers). To complete that process, the client request has already passed through the frontier routers, crossed the firewalls, 2
3 and arrived to the load balancers, where a new session has been settled down with an available portal server. Once the user has introduced her login and password (and they have been validated in the database), she enters the intranet. This means that her request has been balanced and it has finally arrived to an available front-end server (there are about 25 frontends servers in the system). program can automatically perform this modeling process. The software provides models for the most popular brands of network communication hardware. OPNET modeling and simulation flow diagram is shown in Figure 2. Between the load balancers and the frontends there are also two more hardware devices: a web accelerator and two application firewalls. The first of these devices tries to compress all traffic sent by the server to the user, so that the resulting data need less bandwidth and could be delivered faster to the user. The firewalls add security to the communication process, avoiding execution of non-allowed actions inside the intranet. 4. OPNET SIMULATION SOFTWARE There are several discrete-event simulation programs specially designed for network simulation. One of these programs is the open-source OMNeT++ [Varga; 2001]. After some preliminary studies, though, we decided to use OPNET for two reasons: (i) it seemed to be the most widely tested, used and documented software in the network simulation area [Chang; 1999] [Aboelela; 2003] [Brown, Christianson; 2004] [Qadan, Guizani; 2005], and (ii) a free license for academic and research use was available from the software developer. OPNET is a very complete software composed by several modules. Opnet IT Guru, the main module, provides a Virtual Network Environment (VNE) that can model the behavior of an entire network (including routers, switches, protocols, servers, and individual applications). It can be scaled from Local Area Networks (LANs) to Wide Area Networks (WANs) formed up by thousands of workstations. VNEs can be created using a special purpose GUI interface (that is, selecting appropriate hardware elements -such as workstations, servers, routers, switches, hubs, etc.- and then connect them together according to the desired topology). On the other hand, for existing networks the Figure 2: OPNET modeling & simulation flow Another module, the Application Characterization Environment (ACE), allows modeling and analyzing the behavior of programs that reside above the topology layer a web browser or a database, for instance. That is, the software can simulate both network topology and also any high level application that runs on that network. For advanced research, OPNET Modeler offers advanced tools for model design, simulation, data mining and analysis. Using this software, it is possible to edit the source code of available hardware devices libraries. Modeler is based in a three-level design hierarchy: (1) a network model, where networks and sub-networks are defined; (2) a node model, where node s (hardware devices) internal structure is defined; and, (3) a processes model, where internal node states and functioning can be defined by using C/C++ programming [Svensson, Popescu; 2003]. 5. SYSTEM MODELING In this first stage of our project, we have focused in the partial modeling of the Castelldefels architecture. For that reason, 3
4 we have centered our efforts into the Campus network, which is the infrastructure mainly used by students and professors. Additionally, we reduced the model size of the Campus network, assuming that it had less servers and devices than the real system. In future experiments we expect to simulate the full model, that is: 25 frontends, 3 mail servers, one backup load balancer and up to 25,000 concurrent users requesting HTTP, FTP and services. The resulting OPNET model can be seen in Figure 3: Campus activity using HTTP and FTP, and 2 servers. All servers were directly connected to the load balancer. Load balancer: It is a device that decides which server will attend the next user request. Servers are assigned to balanced applications. Each application is balanced using its own policy: Round-Robin for HTTP and FTP, and Number of Connections for . All former devices were connected to a router through a firewall, which restricts the supported applications. The router was the single connection to the Internet. User Networks: several networks were setup to emulate students activity. Each network can have different number of users, from one to hundreds, and it was connected to Internet through a gateway. Services were directly requested to the Load balancer. Figure 3: Castelldefels model implemented in OPNET The main components of this model are the following: Applications: Each application defines a service that can be executed in a workstation or in a server. It also defines the load of the system. To emulate the behavior of the Campus application -a Web-based front-end with file transfer and support-, we defined three OPNET applications: HTTP (Heavy Browsing), FTP (Low Load) and (Medium Load) Profiles: A profile is a group of applications to be used by some type of users such as students, managers, visitors, etc. Each profile also defines the statistical distributions for the simulation engine. In this first model, only one general profile -with support for all applications- was defined. Servers: There were 8 servers to execute applications: 5 front-end servers to emulate the basic Some system devices were ignored in this preliminary model: several backbone and subnet switches, the database server and the redundant load balancer. In future models all of them will be integrated and fully supported. 6. SIMULATION RESULTS Since this is just a preliminary study, we will show here only two of the multiple experiments we can make in order to validate the correctness of the model as well as its suitability for pedagogical purposes. In the first experiment we wanted to: a) Study the performance of a singleserver system under different loads (number of connected users); the response time was expected to get worse as the number of users increases since more users implies more requested services b) Compare results in (a) with those of a multiple-server system under balancing policies. Ten hours of activity where simulated. The simulation was done considering four 4
5 scenarios. The first three scenarios had a single server with different number of active sessions (25, 50 and 100). The fourth scenario had 100 users connected to 5 front-ends balanced using a random policy. the one with the smaller number of user sessions). Figure 6: Experiment 1: Random balancing avg. traffic Figure 4: Experiment 1: Traffic sent (packets/sec) As can be seen in Figure 4, as the number of users increases, more traffic is generated. Observe also that, as expected, introduction of load balancing has no effect on the level of generated traffic. Finally, Figure 6 shows averages for traffic associated to each balanced server. After a warm-up period (more than 4 hours), all servers seem to converge to similar average loads. The second experiment was designed to compare performance of different load balancing policies under the same user activity. Five servers were again balanced during ten simulated hours, with 100 users requesting HTTP services. The policies considered were: (a) Round-Robin (sequential), and (b) Number of Connections. Figure 5: Experiment 1: Response time (in seconds) As can be seen in Figure 5, use of load balancing for multiple servers can significantly improve performance. The response time associated to the highest load level under balancing is lower than any other single-server configuration (including Figure 7: Experiment 2: Round-Robin average traffic Figure 7 shows averages for traffic sent (in bytes/sec) by each balanced server under the Round-Robin policy. This policy assigns 5
6 each incoming requests to the next server in the sequence. All servers tend to have the same average activity. analyze alternative scenarios and designs (what-if analysis) both for LANs and WANs. 8. FURTHER WORK The model presented here is a preliminary one and, therefore, it needs to be improved so that it matches all subtle details of the real system (including inter-arrival time distributions, more detailed balancing policies session persistence policies, etc.). CONCLUSIONS Figure 8: Experiment 2: Number of Conn. avg. traffic Finally, Figure 8 shows averages for traffic sent by all balanced servers under a Number of Connections policy. This policy seems to imply faster load stabilization for each server, but it also shows more variance among average servers load. 7. ACADEMIC APPLICATIONS It is expensive to set up a physical networking lab for university students. Moreover, even if one university made that investment, such labs would have significant limitations when dealing with different possible scenarios (what-if analysis). In fact, it is virtually impossible to cover, using a physical network, the wide diversity of existing technologies and configurations. On the other hand, only LANs could be considered in a physical lab. For that reason, use of discrete-event simulation, as a methodology to confront network design and fine-tuning problems, is not only interesting in the professional arena but also in the academic one [Theunis, et al; 2003]. Learning these technologies is really worthy: the current level of computer software and hardware allows the efficient application of simulationbased methods and algorithms to network analysis, allowing a major comprehension of networks internal functioning process. Using simulation, students are able to We have discussed the importance of using probabilistic methods to study network performance. Among the available methods, simulation techniques offer clear advantages over analytical ones, such as: (a) the opportunity of creating models which faithfully reflect the real structure characteristics and behavior, and (b) the possibility of obtaining additional information about the system internal functioning. We have used OPNET to develop a preliminary model of the computer system that gives support to the UOC intranet. The model is still far from reflect all real system details, but it allow us to start experimenting with some what-if scenarios. More work is being developed to mimic the real system characteristics, so that derived results will help managers to take strategic decisions regarding the system. Finally, we have discussed how discrete-event simulation software can add value to the network engineers training process. REFERENCES Aboelela, E. (2003): Network Simulation Experiments Manual. Morgan Kaufmann Banks, et al (2001): Discrete-Event System Simulation. Prentice-Hall Brown, K.; Christianson, L. (2004): Opnet Lab Manual. Prentice Hall. Chang, X. (1999): Network simulations with Opnet. In Proceedings of the 1999 Winter Simulation Conference, pp Kurose, J.; Ross, K. (2005): Computer Networking: A Top-Down Approach Featuring the Internet. Addison-Wesley 6
7 Law, A.; Kelton, D. (2000): Simulation Modeling and Analysis. McGraw-Hill Peterson, L.; Davie, B. (2003): Computer Networks. A Systems Approach. Morgan Kaufmann Qadan, O.; Guizani, M. (2005): OPNET Lab Manual. John Wiley & Sons Svensson, T.; Popescu, A. (2003): Development of laboratory exercises based on OPNET Modeler. Master thesis. Available at: Theunis, J.; et al (2003): "Advanced Networking Training for Master Students Through OPNET Projects". In Proceedings of the 2003 OPNETWORK Conference, Washington D.C., USA Varga, A. (2001): "The OMNeT++ Discrete Event Simulation System". In Proceedings of the European Simulation Multiconference (ESM'2001). June 6-9, Prague, Czech Republic. 7
Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia
22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
Home Networking Evaluating Internet Connection Choices for a Small Home PC Network
Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network
LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University
The Advantages of Using EIGRP on an Enterprise Network
The Advantages of Using EIGRP on an Enterprise Network By Randy Patrick Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Lab 3: Evaluating Application Performance across a WAN
Lab 3: Evaluating Application Performance across a WAN Objective In this lab, we have a small LAN with 20 users for a startup company named Deltasoft Technologies. We investigate the application performance
NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE
RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 1, SPRING 2007 NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Coyote Point Systems White Paper
Five Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance. Coyote Point Systems White Paper Load Balancing Guide for Application Server Administrators
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET Abstract: Dr. Hussein A. Mohammed*, Dr. Adnan Hussein Ali**, Hawraa Jassim Mohammed* * Iraqi Commission
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications by Samuel D. Kounev ([email protected]) Information Technology Transfer Office Abstract Modern e-commerce
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance
5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance DEPLOYMENT GUIDE Prepared by: Jim Puchbauer Coyote Point Systems Inc. The idea of load balancing
Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
How To Test A Web Server
Performance and Load Testing Part 1 Performance & Load Testing Basics Performance & Load Testing Basics Introduction to Performance Testing Difference between Performance, Load and Stress Testing Why Performance
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
White Paper How to Remotely Access Ethernet I/O Over the Internet
White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
CSE 3214: Computer Network Protocols and Applications
CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic ([email protected])
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Microsoft SharePoint 2010 Deployment with Coyote Point Equalizer
The recognized leader in proven and affordable load balancing and application delivery solutions Deployment Guide Microsoft SharePoint 2010 Deployment with Coyote Point Equalizer Coyote Point Systems,
A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS
382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Figure 41-1 IP Filter Rules
41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0
DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship
Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
Using SonicWALL NetExtender to Access FTP Servers
SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step
Resonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
Optimization of Computer Network for Efficient Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 396 402 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Optimization
Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8
Module 12: Microsoft Windows 2000 Clustering Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Information in this document is subject to change without notice.
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Small Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
Oracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
Security Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.
Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Veeramani Shanmugam [email protected] Lenin Gopal [email protected] Zeya
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization
Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization Samuel N. John 1, Charles Ndujuiba 2, Robert Okonigene 3, Ndeche Kenechukwu 4 1,2,4 Department of Electrical and Information
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Datasheet iscsi Protocol
Protocol with DCB PROTOCOL PACKAGE Industry s premiere validation system for SAN technologies Overview Load DynamiX offers SCSI over TCP/IP transport () support to its existing powerful suite of file,
Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview
Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Deployment Guide Microsoft Exchange 2013
Deployment Guide Microsoft Exchange 2013 DG_MIS_072013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Prerequisites... 4 3 Exchange Server 2010 Roles... 5 4 Accessing the ACOS Device... 5 5
Implementation of College Network Scenario Module by Using CCNA
Implementation of College Network Scenario Module by Using CCNA Jitender Singh 1, Anshu Rani 2 1 Scholar, Computer Science & Engineering, RPSGOI Mohindergarh, India 2 Scholar, Computer Science & Engineering,
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide
Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide January, 2009 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel:
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
SANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Jive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
Lab Testing Summary Report
Lab Testing Summary Report May 2007 Report 070529 Product Category: Network Acceleration Vendor Tested: Cisco Systems Product Tested: Cisco Wide Area Application Services (WAAS) v4.0.7 Key findings and
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server
Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced
White Paper ClearSCADA Architecture
White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Best Practices: Pass-Through w/bypass (Bridge Mode)
Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
Performance Comparison of Server Load Distribution with FTP and HTTP
Performance Comparison of Server Load Distribution with FTP and HTTP Yogesh Chauhan Assistant Professor HCTM Technical Campus, Kaithal Shilpa Chauhan Research Scholar University Institute of Engg & Tech,
