Monitoring Android Apps using the logcat and iperf tools. 22 May 2015
|
|
|
- Joel Young
- 10 years ago
- Views:
Transcription
1 Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis Tutorial: HY May
2 Outline Introduction Monitoring the Android App usage Open source applications Closed source applications Monitoring the network QoS Passive measurements Active measurements Ping Iperf NDT
3 Introduction Application QoE vs. Network QoS The Quality of Experience (QoE) of an Android application can be influenced by network Quality of Service (QoS). How can we assess this in influence? We need to monitor: Events of application usage (e.g. clicks on specific buttons, progress in the usage scenarios) User experience Network performance
4 Outline Introduction Monitoring the Android App usage Open source applications Closed source applications Monitoring the network QoS Passive measurements Active measurements Ping Iperf NDT
5 Monitoring the Android app usage How do we monitor the App usage? Case 1: We have access to the App source code (e.g., App is open-source or developed by us) Case 2: We have no access to the source code (e.g., closed-source commercial application)
6 Monitoring the Android app usage Case 1: We have access to the App source code We can add code snippets on specific locations of the App source code. Write events in a text file Write events in a database Broadcast Intents or use a ContentProvider to send events on a monitor App.
7 Monitoring the Android app usage Case 2: We have no access to the source code Use logcat to read the logs of the App. The Android logging system provides a mechanism for collecting and viewing system debug output. Logs from various applications and portions of the system are collected in a series of circular buffers, which then can be viewed and filtered by the logcat command. [adb] logcat [<option>]... [<filter-spec>]... Android Apps can execute a logcat process and parse its stdout stream.
8 Outline Introduction Monitoring the Android App usage Open source applications Closed source applications Monitoring the network QoS Passive measurements Active measurements Ping Iperf NDT
9 How do we monitor network QoS? Case 1: We have access to the App source code We have also access on the App s sockets & packet streams. Passively record measurements on these packet streams (e.g., measure packet loss, jitter, bitrate). Case 2: We have no access to the source code Solution 1: Use rooted Androids and tcpdump/wireshark (This would provide access to the App s packet streams). Solution 2: Send/receive additional packets and record measurements on these packet streams (Active Probing).
10 Case 1: We have access to the App source code Passive measurements: Add some code in specific locations of the App s source (e.g., where packets are received/sent) to record network measurements. Example: long t; while (true) { // Wait to receive a datagram socket.receive(packet); } // Record interarrival time long now = System.currentTimeMillis(); interarrival = now t; t= now;
11 Case 2: We have no access to the source code Active probing: The monitor application creates additional packet streams that at which it has access and performs measurements on these additional packet streams. The active probing approach degrades network performance in order to measure it! (if possible, choose a small transmission rate) Popular tools for active probing: ping, iperf, NDT
12 Ping Ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. Syntax: ping [-QRadfnqrv] [-c count] [-i wait] [-l preload] [-p pattern] [-P policy] [-s packetsize] [-S src_addr] [-t timeout] [host [-L] [-I interface] [-T ttl] mcast-group]
13 Ping Example: ping localhost Output: PING localhost ( ) 56(84) bytes of data. 64 bytes from localhost ( ): icmp_seq=1 ttl=64 time=0.051 ms 64 bytes from localhost ( ): icmp_seq=2 ttl=64 time=0.055 ms ^C --- localhost ping statistics packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.051/0.053/0.055/0.002 ms
14 Iperf iperf is a tool for performing network throughput measurements. It can test either TCP or UDP throughput. To perform an iperf test the user must establish both a server (to discard traffic) and a client (to generate traffic). Syntax: iperf -s [ options ] iperf -c server [ options ] iperf -u -s [ options ] iperf -u -c server [ options ]
15 Example (server-side): #iperf -s -u -i 1 Iperf Output: Server listening on UDP port 5001 Receiving 1470 byte datagrams UDP buffer size: 8.00 KByte (default) [904] local port 5001 connected with port [ ID] Interval Transfer Bandwidth Jitter Lost/Total Datagrams [904] sec 1.17 MBytes 9.84 Mbits/sec ms 0/ 837 (0%) [904] sec 1.18 MBytes 9.94 Mbits/sec ms 5/ 850 (0.59%) [904] sec 1.19 MBytes 9.98 Mbits/sec ms 2/ 851 (0.24%) [904] sec 1.19 MBytes 10.0 Mbits/sec ms 0/ 850 (0%) [904] sec 1.19 MBytes 9.98 Mbits/sec ms 1/ 850 (0.12%) [904] sec 1.19 MBytes 10.0 Mbits/sec ms 0/ 851 (0%) [904] sec 1.06 MBytes 8.87 Mbits/sec ms 1/ 755 (0.13%) [904] sec 1.19 MBytes 10.0 Mbits/sec ms 0/ 850 (0%) [904] sec 1.19 MBytes 10.0 Mbits/sec ms 0/ 850 (0%) [904] sec 1.19 MBytes 10.0 Mbits/sec ms 0/ 851 (0%) [904] sec 11.8 MBytes 9.86 Mbits/sec ms 9/ 8409 (0.11%)
16 Iperf Example (client-side): #iperf -c u -b 10m Output: Client connecting to , UDP port 5001 Sending 1470 byte datagrams UDP buffer size: 108 KByte (default) [ 3] local port connected with port 5001 [ 3] sec 11.8 MBytes 9.89 Mbits/sec [ 3] Sent 8409 datagrams [ 3] Server Report: [ 3] sec 11.8 MBytes 9.86 Mbits/sec ms 9/ 8409 (0.11%)
17 Iperf Iperf for Android:
18 NDT NDT (Network Diagnostic Tool) provides a sophisticated speed and diagnostic test. An NDT test reports more than just the upload and download speeds. It also attempts to determine what, if any, problems limited these speeds, differentiating between computer configuration and network infrastructure problems. While the diagnostic messages are most useful for expert users, they can also help novice users by allowing them to provide detailed trouble reports to their network administrator.
19 NDT NDT Android client screenshots:
20 Data receiver geo-db PHP application Active prober HTTP server QoE Nova monitor GO HF App tracker server server Iperf Internet Monitored Nova GO infrastructure App server Back-end interface DB Iperf Active Prober Monitor Location Monitored App Nova GO client Log GUI QoE Perf. estimator Nova QoE GO monitor HF tracker Appclient Logcat parser GUI Circular buffer Android smartphone feedback video Customer User
Network testing with iperf
Network testing with iperf Bill Farrow [email protected] Why use iperf? What does it run on? TCP example UDP example Use Case: Network Server Appliance Use Case: Embedded Video Streaming Use Case:
Iperf Tutorial. Jon Dugan <[email protected]> Summer JointTechs 2010, Columbus, OH
Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
WiFiPerf User Guide 1.5
WiFiPerf User Guide 1.5 AccessAgility LLC 2012 AccessAgility LLC. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any
TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.
TCP Labs WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.2015 Hands-on session We ll explore practical aspects of TCP Checking the effect
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Measuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
itvsense Probe M-301/M-304
implementing next generation IT and communications solutions Service Assurance for Digital Video and IP-based Multiplay Networks itvsense Probe M-301/M-304 telecommunication networks it networks research
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Network Monitoring. Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
Network Monitoring Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda What is network
Hands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
IxChariot Pro Active Network Assessment and Monitoring Platform
IxChariot Pro Active Network Assessment and Monitoring Platform Network performance and user experience are critical aspects of your business. It is vital to understand customers perception of your website,
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler [email protected] 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
1000Mbps Ethernet Performance Test Report 2014.4
1000Mbps Ethernet Performance Test Report 2014.4 Test Setup: Test Equipment Used: Lenovo ThinkPad T420 Laptop Intel Core i5-2540m CPU - 2.60 GHz 4GB DDR3 Memory Intel 82579LM Gigabit Ethernet Adapter CentOS
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Test Methodology White Paper. Author: SamKnows Limited
Test Methodology White Paper Author: SamKnows Limited Contents 1 INTRODUCTION 3 2 THE ARCHITECTURE 4 2.1 Whiteboxes 4 2.2 Firmware Integration 4 2.3 Deployment 4 2.4 Operation 5 2.5 Communications 5 2.6
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Configuring and Monitoring the Client Desktop Component
Configuring and Monitoring the Client Desktop Component eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
+ iptables. packet filtering && firewall
+ iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1
Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Who am I? David Attias Installing VoIP systems for over 7 years Mikrotik user for 5 years Mikrotik certifications MTCNA, MTCRE
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
This Technical Support Note shows the different options available in the Firewall menu of the ADTRAN OS Web GUI.
TECHNICAL SUPPORT NOTE Introduction to the Firewall Menu in the Web GUI Featuring ADTRAN OS and the Web GUI Introduction This Technical Support Note shows the different options available in the Firewall
Network Management and Debugging. Jing Zhou
Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Follow these steps to prepare the module and evaluation board for testing.
2 Getting Started 2.1. Hardware Installation Procedure Follow these steps to prepare the module and evaluation board for testing. STEP1: Plug the EG-SR-7100A module into the sockets on the test board.
Lab 6: Wireless Networks
Lab 6: Wireless Networks EE299 Winter 2008 Due: In lab, the week of March 10-14. Objectives This lab will show a correlation among different network performance statistics with multimedia experiences,
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
OCS Training Workshop LAB14. Email Setup
OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
PIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Skywire TCP Socket Examples
Skywire TCP Socket Examples NimbeLink, LLC Published: April 2014 PN 30015 rev 1 NimbeLink, LLC All Rights Reserved. 1 1. TCP SOCKET OPERATIONS The following examples illustrate a few TCP socket operations
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
Provisioning and configuring the SIP Spider
Provisioning and configuring the SIP Spider Administrator Guide Table of Contents 1. Introduction... 3 2. Manual Provisioning... 4 3. Automatic Provisioning... 5 3.1 Concept... 5 3.2 Preparing the configuration
TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Configuring Health Monitoring Using Health Probes
CHAPTER10 Configuring Health Monitoring Using Health Probes This chapter describes how to configure a health probe on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains
Integration with CA Transaction Impact Monitor
Integration with CA Transaction Impact Monitor CA Application Delivery Analysis Multi-Port Monitor Version 10.1 This Documentation, which includes embedded help systems and electronically distributed materials,
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
Using IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose
Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine
MULTI WAN TECHNICAL OVERVIEW
MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter
BIT COMMANDER Serial RS232 / RS485 to Ethernet Converter (Part US2000A) Copyrights U.S. Converters 1 Contents Overview and Features... 3 Functions..5 TCP Server Mode... 5 Httpd Client Mode.5 TCP Auto mode....6
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
DLink-655 Router Configuration Guide for VoIP
MyOwn Telco, your own 100% Canadian VoIP Provider DLink-655 Router Configuration Guide for VoIP Especially brought to you by: MyOwnTelco.net 2014 http://www.myowntelco.net 1 The following steps will guide
1:1 NAT in ZeroShell. Requirements. Overview. Network Setup
1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already
Network Interface Failover using FONA
Network Interface Failover using FONA Created by Adam Kohring Last updated on 2014-10-20 12:30:12 PM EDT Guide Contents Guide Contents Overview Prerequisites Wiring Raspberry Pi to Fona ifacefailover Service
IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms
IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms Rob VandenBrink June 2009 GIAC GSEC gold, GSNA, GAWN, GCIA gold, GCIH, GPEN SANS Technology Institute - Candidate for Master of Science Degree 1
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
MFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1
MFPConnect Monitoring Monitoring with IPCheck Server Monitor Integration Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. INTRODUCTION...3 2. REQUIREMENTS...4 3. RESTRICTIONS...5 4. INSTALLATION...6
Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.
Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...
12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, [email protected]
FortiOS Handbook - Load Balancing VERSION 5.2.2
FortiOS Handbook - Load Balancing VERSION 5.2.2 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
Application Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Internet Technology Voice over IP
Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
Control of Multiple Packet Schedulers for Improving QoS on OpenFlow/SDN Networking
Control of Multiple Packet Schedulers for Improving QoS on OpenFlow/SDN Networking Airton Ishimori, Fernando Farias, Eduardo Cerqueira, Antônio Abelém Federal University of Pará GERCOM Lab Belém, Brazil
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure the use of Cisco Intrusion
Firewall Load Balancing
Firewall Load Balancing 2015-04-28 17:50:12 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Firewall Load Balancing... 3 Firewall Load Balancing...
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
