Department of Electronic and Electrical Engineering, Loughborough University

Size: px
Start display at page:

Download "Department of Electronic and Electrical Engineering, Loughborough University"

Transcription

1 SMDS PEFOMANCE MONITOING : TAFFIC GENEATION, INFOMATION POCESSING & ANALYSIS Omar Bashir, Iain Phillips & David Parish + Abstract Many aspects of the performance of data communication networks can be determined from the delay experienced by the packets and the number of packets lost and duplicated during communication. These characteristics are generally determined by monitoring the network links intrusively using dedicated monitoring equipment. The intrusively monitored data are usually not retrieved by the existing network management protocols (e.g. SNMP) and therefore do not form part of the basic Management Information Base (MIB). Thus the generation of test traffic, the management of measurement data and processing and analysis of performance information demand special consideration. This paper describes an extensive network performance monitoring environment developed at Loughborough University. This includes the description of the monitoring apparatus, test methodology, database architecture, information structures, processing algorithms and analysis procedures. 1 Introduction The delay, loss and duplication characteristics of data communication networks can be determined by intrusively monitoring the network links. In the most basic form, a transmitting test station composes special time stamped test packets and transmits these towards a receiving test station at a regular rate. The receiving test station logs the arrival of these test packets. The number of test packets lost and duplicated and the delay they experience indicate the performance of the monitored links with respect to the traffic on these links. The clocks at both the test stations need to be synchronised so that accurate packet delay information may be calculated. This synchronisation may be achieved by acquiring timing information from external global timing agencies, for e.g. the ugby Clock 1 or the Global Positioning System 2. Alternately the time and the frequency offset of the remote clocks may be estimated using techniques such as least square regression analysis as described by oppel 3. Monitor Station Data Summary Generator Summaries Incidents Status and Configuration Analysis Incident Correlation Figure - 1 : Monitoring and Analysis Effects The task of monitoring a distributed system does not end at data collection. Data collection is viewed as the lowest level of the entire monitoring process 4. The collected data needs to be summarised appropriately. Summary derivation is a computationally intensive process. Issues that need to be addressed at this stage include the type of summaries that need to be derived and appropriate levels of granularity. These summaries are analysed in conjunction with the primitive data and the network configuration and status information. This allows different network events or incidents that occurred over monitored links to be detected. These include events such as excessive packet losses, significant delay variations, loss of service etc. ecurring and correlated incidents are categorised into network effects (Figure - 1). + Department of Electronic and Electrical Engineering, Loughborough University

2 The test stations are generally low cost platforms dedicated to collecting the primitive performance data. The primitive performance data are periodically downloaded to a separate control and data processing workstation for processing and analysis of the historical performance information. This workstation may also be used to control the test stations. The receiving test station may communicate the details of each received test packet to an alarm station. The alarm station may log only sufficient information to perform real time determination of error conditions and faults such as excessive delays and losses (Figure - 2). This paper describes a scalable distributed monitoring system that has evolved from the systems described by Phillips et al 2,5. This system is currently being used to monitor different links of the BT's Switched MultiMegabit Data Service (SMDS) wide area network. 2 Monitoring Apparatus & Testing Methodology Different sets of test stations are used to conduct different types of tests on the same or different parts of the network. One test varies from another on the basis of the test traffic (e.g. test packet size, sampling rate etc.) and the routes monitored. The test traffic consists of time stamped UDP/IP packets. eceived Test Packet Data eceive eceiving Test Station Alarm Station eceived Data Logs Control Information eceived Test Packet Control & Data Processing Stn Monitored Transmitted Data Logs Control Information Transmitted Test Packet Transmitting In order to provide a cost effective solution to the distributed monitoring problem, the test station hardware needs to be inexpensive. The monitoring system described here uses IBM 386 and 486 PCs executing the test programs under DOS. These test stations are dedicated to the generation and measurement of test traffic. Each set of test stations is managed usually by a separate control and data processing workstation. The test stations use Ethernet as the access network to the SMDS. Each test station uses a custom timing card to Figure - 2 : Monitoring System provide accurate timing information. The timing card uses a GPS receiver for timing synchronisation between remote test stations. This timing card is capable of providing time of day information accurate to 10 microseconds 5. The control and data processing workstations execute software to manage the test stations, process the performance measurements and analyse this information to detect various network performance trends, events and faults. Test station management activities include scheduling of tests, termination of tests, retrieval of logs, deletion of unwanted logs, execution of test station BIT (Built In Test) at regular intervals and recovery of a crashed test station. Walsall Suite GPS Suite Loughborough LEGEND : Control & Data Processing Workstation : AS : Alarm Station : outer Megastream Links Oxford Brookes SMDS AS Walsall Focused Lancaster Backup Figure - 3 : BT's SMDS Monitoring Infrastructure This requires the control and data processing workstation to be a high performance platform with significant disk space to manage enormous amounts of primitive data and processed information. SUN workstations and Pentium PCs using the Solaris operating system are generally used as control and data processing workstations. Currently Loughborough University is operating 2 monitoring suites. One suite consists of 3 test stations located at the BT Operations Centre at Walsall (Walsall Suite). These test stations are connected to five routers via an Ethernet. These routers are connected via Megastream links to 5 geographically separate points on the SMDS, Birmingham, Bristol, Edinburgh, London and Manchester 2. Transmit

3 One of these test stations performs 40 background tests on the links between the above mentioned sites. Another test station is used as a backup test station but can be used with the third test station to perform focused tests on a subset of the above mentioned links with higher sampling rates. Sophisticated focused tests can be conducted at sub-second granularities to detect fine grained network effects such as short breaks. These test stations are controlled from Loughborough by a SUN Sparc10 workstation. ecently a Pentium PC has been configured as a control and data processing workstation and installed at Walsall. This allows the BT staff to locally manage the focused test operations. This set-up also includes an alarm station developed by BT esearch Labs. This alarm station provides real time indication of network faults (Figure - 3). The second suite consists of three test stations at Loughborough University, Oxford Brookes University and Lancaster University respectively (GPS Suite). These test stations test the local access networks as well as the links between these sites. A SUN UltraSparc at Loughborough is used as a control and data processing workstation for this suite (Figure - 3). 3 Information Processing & Management In the simplest case, a number of information processing applications access a common primitive database to generate the required results. Most of the applications processing network performance data proceed through a number of similar processing stages. Some of these applications require information that can be generated by other applications. In such situations it may be tempting to access the information that has already been derived by other applications to generate the required information (Figure - 4). However it is important to note that most of the information processing applications generally have significantly shorter lives than the data they process. These may be developed to satisfy short term requirements or may be modified frequently to provide different information elements. Monitoring System Monitored Data Merge Interface App 1 App 2 App 3 Figure -4 : Information Sharing Across Applications The performance information requirements for different network management activities vary significantly. In some cases (for example research and development) the processing requirements may be extremely dynamic and may not be known accurately during the system analysis stage. Moreover the network performance analysis is an iterative process. Analysis of performance summaries usually generate further information requirements. These may dictate the derivation of different summaries at various levels of granularity. Monitoring System Monitored Data Merge Intermediate Information Generator Applications Interface Intermediate Information Base Figure - 5 : Information Processing based on Intermediate Information App 1 App 2 App 3 Thus designing the information processing component of the monitoring system on the basis of a few applications may be a short sighted decision. If some applications change, others may be adversely effected. The efficiency of the information processing algorithms and applications can be enhanced significantly by employing reusable information structures. This is accomplished by preprocessing the primitive data so that these can fulfil multiple information requirements. These pre-processed or intermediate information elements are derived at the finest possible level of granularity and are cached in the Intermediate Information Base (Figure - 5). These elements can be combined appropriately to generate intermediate information at the required levels of granularity. As multiple information requirements can be fulfilled directly from the pre-processed intermediate information, access to the primitive database is reduced significantly, thus enhancing the efficiency of the information processing applications.

4 esearch has previously been conducted towards the reusability of statistical summaries in databases and information processing systems 6,7. However most of this work is aimed at reusing additive summaries and summaries that can easily be decomposed into additive primitives. Unfortunately some of the information elements required for valid analysis applications are not additive in nature (e.g. percentiles). To overcome this, a flexible intermediate information structure is needed. The frequency distribution of test packet delays (Delay Distributions) for a specific analysis window represents such an intermediate information element 8. Frequency distributions along with the corresponding cumulative frequency distributions can be used to derive several additive and non-additive statistical summaries such as different averages, variances and percentiles. Moreover Delay Distributions derived for smaller non-overlapping windows can be added to provide Delay Distributions for a larger analysis window, if the granular Delay Distributions contain equal numbers of bins of the same bin size. Thus reusing Delay Distributions to derive the required packet delay summaries is more efficient than deriving the same summaries directly from the primitive data. The accuracy of information derived from a Delay Distribution is dependant on its bin size. Errors are significant for larger bin sizes (and therefore fewer bins) but decrease with an increase in the number of bins. Counts of lost and duplicated packets are additive in nature. These summaries pre-processed for smaller nonoverlapping windows may simply be added to provide packet loss and duplication summaries at coarser levels of granularity. 4 An Example Test Session Figures 6 and 7 show the results of monitoring the network link between Loughborough and Lancaster as well as the local links. The test stations at the respective Universities were set up to conduct 4 tests each. Two different test packet sizes were used, i.e. 64 bytes and 1500 bytes. Test packets were transmitted at a rate of one per second (one test packet per test every 4 seconds). Average Delay (Microseconds) / 4/ 1/ / 4/ 1/ / 4/ 1/ / 4/ 1/ / 4/ 2/ / 4/ 2/ / 4/ 2/ / 4/ 2/ / 4/ 3/ / 4/ 3/ / 4/ 3/ / 4/ 3/ / 4/ 4/ 0.00 Lancaster to Loughborough Loughborough to Lancaster 1997/ 4/ 4/ 6.00 Lancaster Local Loughborough Local Figure - 6 : Average Delay of 95% Fastest 64 Byte Packets 1997/ 4/ 4/ / 4/ 4/ / 4/ 5/ / 4/ 5/ / 4/ 5/ / 4/ 5/ / 4/ 6/ / 4/ 6/ / 4/ 6/ / 4/ 6/18.00 Average Delay (Micro-seconds) / 4/ 1/ / 4/ 1/ / 4/ 1/ / 4/ 1/ / 4/ 2/ / 4/ 2/ / 4/ 2/ / 4/ 2/ / 4/ 3/ / 4/ 3/ / 4/ 3/ / 4/ 3/ / 4/ 4/ / 4/ 4/ / 4/ 4/ / 4/ 4/18.00 Lancaster to Loughborough Loughborough to Lancaster Lancaster Local Loughborough Local Figure - 7 : Average Delay of 95% Fastest 1500 Byte Packets 1997/ 4/ 5/ / 4/ 5/ / 4/ 5/ / 4/ 5/ / 4/ 6/ / 4/ 6/ / 4/ 6/ / 4/ 6/18.00 The local links were tested by transmitting test packets with Ethernet address of the local routers but the IP address of the generating test station. On reception, the routers would re-transmit these test packets back to the test stations that generated them. The LAN at Loughborough is a special network connecting few hosts. The LAN at Lancaster is the main network used by the Computer Centre and therefore has a significant amount of traffic on it. The results show two distinct effects. One is the time of day variation of the delay. This effect is more prominent on the LAN at Lancaster due to the relatively large amount of traffic on it. Moreover the average delay experience by test packets on that network is higher than that experienced by test packets on the Loughborough local network. It can also be seen that the delay experienced by the test packets travelling over the wide area connections is affected significantly by the performance of the local links. The delay variations on the wide area connection correspond to the delay variations on the Lancaster LAN.

5 5 Conclusions The experience gained in operating the above mentioned systems has provided significant information for the future research and development of network performance monitoring architectures and methodologies. Loughborough University is currently developing a portable monitoring system for BT. It consists of two portable based monitor stations and a portable Pentium based control station. This system will assist in monitoring the end to end network performance from subscribers' sites. This information will help troubleshooting performance problems experienced by specific subscribers. Some experimental test stations at Loughborough are being used as test beds to develop software components and algorithms for an adaptive monitoring system 9. This system uses a central software component that can automatically initiate tests on the basis of user queries as well as the results of previous tests. Moreover the system will also be capable of disseminating the performance information appropriately to users and other computing platforms performing various network management activities. eferences 1. Siddiqui, M H: " Measurement Methodology for Integrated Services s", PhD thesis, Loughborough University of Technology, Phillips, I, Parish, D J, and odgers, C: " Measurements of the SMDS", IEE Colloquium on SMDS, London, October oppel, C: "In-service Monitoring Techniques for Cell Transfer Delay and Cell Delay Variation in ATM s", High ing edited by. Puigjaner, Chapman & Hall, 1995, pp Jain, : "The Art of Computer Systems Analysis : Techniques for Experimental Design, Measurement, Simulation and Modelling", John Wiley & Sons, Phillips, I, Tunnicliffe, M, Parish, D J and odgers, C: "On the Monitoring and Measurement of Quality of Service of SuperJanet", 13 th Teletraffic Symposium, Strathclyde, March Mumick, I S, Quass, D, and Mumick, B S: "Maintenance of Data Cubes and Summary Tables in a Warehouse", SIGMOD 97, Lenz, H, and Shoshani, A: "Summarizability in OLAP and Statistical s", SSDBM 97, Bashir, O, Phillips, I, and Parish, D: "Warehousing Communication Monitoring Data", IEE Colloquium on IT Strategies for Information Overload, London, December Phillips, I, Bashir, O, and Parish D: " Monitoring of s : Architecture, Operation and Dissemination", Presented at the BT's UI (University esearch Initiative) Workshop, University College London, April 1997.

Rocky Mountain Technology Ventures

Rocky Mountain Technology Ventures Rocky Mountain Technology Ventures Comparing and Contrasting Online Analytical Processing (OLAP) and Online Transactional Processing (OLTP) Architectures 3/19/2006 Introduction One of the most important

More information

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

What is the fundamental purpose of a communication system? Discuss the communication model s elements. What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The

More information

Data Warehouse Design Using Row and Column Data Distribution

Data Warehouse Design Using Row and Column Data Distribution Int'l Conf. Information and Knowledge Engineering IKE'15 55 Data Warehouse Design Using Row and Column Data Distribution Behrooz Seyed-Abbassi and Vivekanand Madesi School of Computing, University of North

More information

PTA Control System Architecture

PTA Control System Architecture PTA Control System Architecture Robert Ackermann January 30, 2002 1 Introduction This document establishes the PTA Control System architecture. It contains a high-level description of the proposed hardware

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Architecture for the management and presentation of communication network performance data

Architecture for the management and presentation of communication network performance data Loughborough University Institutional Repository Architecture for the management and presentation of communication network performance data This item was submitted to Loughborough University's Institutional

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

Managing Obsolescence in Information Technology

Managing Obsolescence in Information Technology Managing Obsolescence in Information Technology By Omar Bashir, Department of Avionics Engineering, College of Aeronautical Engineering, National University of Science and Technology E-mail: obashir@yahoo.com

More information

Chapter 17: Distributed-File Systems. Operating System Concepts 8 th Edition,

Chapter 17: Distributed-File Systems. Operating System Concepts 8 th Edition, Chapter 17: Distributed-File Systems, Silberschatz, Galvin and Gagne 2009 Chapter 17 Distributed-File Systems Background Naming and Transparency Remote File Access Stateful versus Stateless Service File

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Background. 20: Distributed File Systems. DFS Structure. Naming and Transparency. Naming Structures. Naming Schemes Three Main Approaches

Background. 20: Distributed File Systems. DFS Structure. Naming and Transparency. Naming Structures. Naming Schemes Three Main Approaches Background 20: Distributed File Systems Last Modified: 12/4/2002 9:26:20 PM Distributed file system (DFS) a distributed implementation of the classical time-sharing model of a file system, where multiple

More information

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA M. GAUS, G. R. JOUBERT, O. KAO, S. RIEDEL AND S. STAPEL Technical University of Clausthal, Department of Computer Science Julius-Albert-Str. 4, 38678

More information

An Architecture for Network Resource Monitoring in a Distributed Environment

An Architecture for Network Resource Monitoring in a Distributed Environment An Architecture for Monitoring in a Distributed Environment Philip M. Irey IV, Robert W. Hott, David T. Marlow NSWC-DD Code B35 17320 Dahlgren Road Dahlgren, VA 22448-5100 pirey, rhott, dmarlow@nswc.navy.mil

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Why You Should Consider a Hardware Based Protocol Analyzer?

Why You Should Consider a Hardware Based Protocol Analyzer? Why You Should Consider a Hardware Based Protocol Analyzer? Software-only protocol analyzers are limited to accessing network traffic through the utilization of mirroring. While this is the most convenient

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File-Systems, Silberschatz, Galvin and Gagne 2009 Chapter 11: Implementing File Systems File-System Structure File-System Implementation ti Directory Implementation Allocation

More information

A Design and Implementation of Network Traffic Monitoring System for PC-room Management

A Design and Implementation of Network Traffic Monitoring System for PC-room Management A Design and Implementation of Network Traffic Monitoring System for PC-room Management Yonghak Ahn, Oksam Chae Dept. of Computer Engineering, Kyunghee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do

More information

Hands-On Troubleshooting IPTV with WireShark

Hands-On Troubleshooting IPTV with WireShark Hands-On Course Description This Hands-On course will enable attendees to upgrade their knowledge about how Video and Television is carried over IP in state-of-the art systems. At the end of the course

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

An Integrated Synchronization and Consistency Protocol for the Implementation of a High-Level Parallel Programming Language

An Integrated Synchronization and Consistency Protocol for the Implementation of a High-Level Parallel Programming Language An Integrated Synchronization and Consistency Protocol for the Implementation of a High-Level Parallel Programming Language Martin C. Rinard (martin@cs.ucsb.edu) Department of Computer Science University

More information

A Capacity Planning Methodology for Distributed E-Commerce Applications

A Capacity Planning Methodology for Distributed E-Commerce Applications A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The

More information

The DETER Testbed: Overview 25 August 2004

The DETER Testbed: Overview 25 August 2004 The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security

More information

Parallel Data Lab Research Overview

Parallel Data Lab Research Overview Parallel Data Lab Research Overview Garth A. Gibson http://www.cs.cmu.edu/web/groups/pdl/ Reliable, Parallel Storage Subsystems configurable architectures; rapid prototyping Discovering and Managing Storage

More information

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

An Optimized Search Mechanism for Large Distributed Systems

An Optimized Search Mechanism for Large Distributed Systems An Optimized Search Mechanism for Large Distributed Systems Herwig Unger 1, Thomas Böhme, Markus Wulff 1, Gilbert Babin 3, and Peter Kropf 1 Fachbereich Informatik Universität Rostock D-1051 Rostock, Germany

More information

Free upgrade of computer power with Java, web-base technology and parallel computing

Free upgrade of computer power with Java, web-base technology and parallel computing Free upgrade of computer power with Java, web-base technology and parallel computing Alfred Loo\ Y.K. Choi * and Chris Bloor* *Lingnan University, Hong Kong *City University of Hong Kong, Hong Kong ^University

More information

LAN Based Radio Synchronization

LAN Based Radio Synchronization LAN Based Radio Synchronization Introduction The latest generation of Spectralink IP-DECT base stations supports to use Local Area Network (LAN) for synchronization of the DECT radios when running software

More information

The Industrial Intranet: a Cause For Change

The Industrial Intranet: a Cause For Change The Industrial Intranet: a Cause For Change by S Graham, Schneider Automation Electricity + Control March 2000 Most plant data collection applications today use a batch approach, where data is transmitted

More information

Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 (WowKiVS 2009)

Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 (WowKiVS 2009) Electronic Communications of the EASST Volume 17 (2009) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 (WowKiVS 2009) Flowstream Architectures Adam Greenhalgh, Mark

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

File-System Structure

File-System Structure Chapter 12: File System Implementation File System Structure File System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured

More information

Chapter 11: Implementing File-Systems

Chapter 11: Implementing File-Systems Chapter 11: Implementing File-Systems Chapter 11 File-System Implementation 11.1 File-System Structure 11.2 File-System Implementation 11.3 Directory Implementation 11.4 Allocation Methods 11.5 Free-Space

More information

Manchester University Tiny Network Element Monitor (MUTiny NEM) A Network/Systems Management Tool

Manchester University Tiny Network Element Monitor (MUTiny NEM) A Network/Systems Management Tool Manchester University Tiny Network Element Monitor (MUTiny NEM) A Network/Systems Management Tool Facilitating the management of the G-MING and NetNorthWest networks, in particular the management of the

More information

1 Dulcian, Inc., 2001 All rights reserved. Oracle9i Data Warehouse Review. Agenda

1 Dulcian, Inc., 2001 All rights reserved. Oracle9i Data Warehouse Review. Agenda Agenda Oracle9i Warehouse Review Dulcian, Inc. Oracle9i Server OLAP Server Analytical SQL Mining ETL Infrastructure 9i Warehouse Builder Oracle 9i Server Overview E-Business Intelligence Platform 9i Server:

More information

Measuring the Processing Performance of NetSniff

Measuring the Processing Performance of NetSniff Measuring the Processing Performance of NetSniff Julie-Anne Bussiere *, Jason But Centre for Advanced Internet Architectures. Technical Report 050823A Swinburne University of Technology Melbourne, Australia

More information

Cisco Broadband Troubleshooter 3.3

Cisco Broadband Troubleshooter 3.3 Cisco Broadband Troubleshooter 3.3 Cisco Broadband Troubleshooter is an easy-to-use tool with a GUI that helps network administrators and technicians to streamline RF problem resolution. The tool dynamically

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters

More information

NAT Router Performance Evaluation

NAT Router Performance Evaluation University of Aizu, Graduation Thesis. Mar, 22 17173 1 NAT Performance Evaluation HAYASHI yu-ichi 17173 Supervised by Atsushi Kara Abstract This thesis describes a quantitative analysis of NAT routers

More information

Monitoring Multicast Traffic in Wireless Heterogeneous Networks

Monitoring Multicast Traffic in Wireless Heterogeneous Networks Monitoring Multicast Traffic in Wireless Heterogeneous Networks Filipe Sousa 1 DEEC Faculdade de Engenharia da Universidade do Porto (FEUP) Rua Dr. Roberto Frias, s/n 4200-465 Porto PORTUGAL mpt09014@fe.up.pt

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments CHAPTER Troubleshooting Transparent Bridging Environments Transparent bridges were first developed at Digital Equipment Corporation (Digital) in the early 1980s and are now very popular in Ethernet/IEEE

More information

Hands-On IP Multicasting for Multimedia Distribution Networks

Hands-On IP Multicasting for Multimedia Distribution Networks Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

Performance Evaluation of National Knowledge Network Connectivity

Performance Evaluation of National Knowledge Network Connectivity International Journal of Computer Applications (975 888) Performance Evaluation of National Knowledge Network Connectivity Vipin Saxena, PhD. Department of Computer Science B.B. Ambedkar University (A

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

MANAGEMENT OF LAN DESIGN FOR BUSINESS APPLICATIONS USING HIERARCHICAL SWITCHING: SIMPLICITY VERSUS ADDED DELAY

MANAGEMENT OF LAN DESIGN FOR BUSINESS APPLICATIONS USING HIERARCHICAL SWITCHING: SIMPLICITY VERSUS ADDED DELAY MANAGEMENT OF LAN DESIGN FOR BUSINESS APPLICATIONS USING HIERARCHICAL SWITCHING: SIMPLICITY VERSUS ADDED DELAY Dr. Paul Safonov, St. Cloud State University, MN, USA, safonov@stcloudstate.edu Dr. Dennis

More information

CES Test An Alternative Real-World Approach

CES Test An Alternative Real-World Approach WHITE PAPER Test An Alternative Real-World Approach By Tommy Cook, CEO Calnex Solutions Upgrading the wireless backhaul network to exclusively Ethernet transport is a compelling strategy for Service Providers

More information

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17, TO 8-06: Regional Real-Time Transit Architecture Design, Procurement and Technical Assistance Real-Time Transit Information System System Requirements VERSION 2.5 Prepared for: Metropolitan Transportation

More information

Multimedia Document Communications over Wireless Network

Multimedia Document Communications over Wireless Network Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing

More information

Basic Concepts. Network Management. Spring Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Basic Concepts. Network Management. Spring Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Basic Concepts Network Management Spring 2018 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology This presentation is based on the slides listed in references. Outline Introduction:

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Cisco XR Series Service Separation Architecture Tests

Cisco XR Series Service Separation Architecture Tests Cisco XR 12000 Series Service Separation Architecture Tests Introduction In April 2005, Cisco Systems released the XR 12000 Series routers bringing the functionality of IOS XR to the edge of next generation

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

Guide to Network Defense and Countermeasures Second Edition. Chapter 2 Security Policy Design: Risk Analysis

Guide to Network Defense and Countermeasures Second Edition. Chapter 2 Security Policy Design: Risk Analysis Guide to Network Defense and Countermeasures Second Edition Chapter 2 Security Policy Design: Risk Analysis Objectives Explain the fundamental concepts of risk analysis Describe different approaches to

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.

More information

Network Gateway Services John Enck

Network Gateway Services John Enck 51-20-39 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a

More information

Chapter 17: Distributed Systems (DS)

Chapter 17: Distributed Systems (DS) Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication

More information

1. Introduction. Traditionally, a high bandwidth file system comprises a supercomputer with disks connected

1. Introduction. Traditionally, a high bandwidth file system comprises a supercomputer with disks connected 1. Introduction Traditionally, a high bandwidth file system comprises a supercomputer with disks connected by a high speed backplane bus such as SCSI [3][4] or Fibre Channel [2][67][71]. These systems

More information

Efficient Handoff using Mobile IP and Simplified Cellular IP

Efficient Handoff using Mobile IP and Simplified Cellular IP Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial

More information

Extending Ethernet over 2-wire Copper Networks

Extending Ethernet over 2-wire Copper Networks Extending Ethernet over 2-wire Copper Networks Executive Summary To improve the efficiency of industrial automation systems, many operators are considering the possibility of IP upgrades to provide centralised

More information

ALCATEL Full-featured element management of SNMP devices SNMP ELEMENT MANAGER REL. 1.0

ALCATEL Full-featured element management of SNMP devices SNMP ELEMENT MANAGER REL. 1.0 ALCATEL 5520 SNMP ELEMENT MANAGER REL. 1.0 The Alcatel 5520 SNMP Element Manager (EM), formerly the 45020 Element Manager*, is the element-level management component of the Alcatel management family of

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Data warehouse architecture consists of the following interconnected layers:

Data warehouse architecture consists of the following interconnected layers: Architecture, in the Data warehousing world, is the concept and design of the data base and technologies that are used to load the data. A good architecture will enable scalability, high performance and

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

ArcGIS Enterprise Performance and Scalability Best Practices. Andrew Sakowicz

ArcGIS Enterprise Performance and Scalability Best Practices. Andrew Sakowicz ArcGIS Enterprise Performance and Scalability Best Practices Andrew Sakowicz Agenda Definitions Design workload separation Provide adequate infrastructure capacity Configure Tune Test Monitor Definitions

More information

Data Warehousing 11g Essentials

Data Warehousing 11g Essentials Oracle 1z0-515 Data Warehousing 11g Essentials Version: 6.0 QUESTION NO: 1 Indentify the true statement about REF partitions. A. REF partitions have no impact on partition-wise joins. B. Changes to partitioning

More information

IMR-Pathload: Robust Available Bandwidth Estimation under End-Host Interrupt Delay

IMR-Pathload: Robust Available Bandwidth Estimation under End-Host Interrupt Delay IMR-Pathload: Robust Available Bandwidth Estimation under End-Host Interrupt Delay Seong Kang Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University,

More information

UNDERSTANDING GIGABIT ETHERNET PERFORMANCE

UNDERSTANDING GIGABIT ETHERNET PERFORMANCE 51-20-98 DATA COMMUNICATIONS MANAGEMENT UNDERSTANDING GIGABIT ETHERNET PERFORMANCE Gilbert Held INSIDE Ethernet Frame Flow; The Gigabit Ethernet Frame OVERVIEW Gigabit Ethernet represents the latest Institute

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

E3-E4 CM TECHNICAL IT INFRASTRUCTURE

E3-E4 CM TECHNICAL IT INFRASTRUCTURE E3-E4 CM TECHNICAL IT INFRASTRUCTURE WELCOME This is a presentation for the E3-E4 CM Technical Module for the Topic: IT Infrastructure. Eligibility: Those who have got the Up-gradation from E3 to E4. This

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

IDEAL : An IntegrateD REsource MAnagement Language

IDEAL : An IntegrateD REsource MAnagement Language : An IntegrateD REsource MAnagement Language Simon ZNATY 1, Omar CHERKAOUI 2 1 ENST-Bretagne, RSM Dept Rue de la Chataigneraie, BP 78 35512 Cesson-Sévigné, FRANCE E-mail : Simon.Znaty@enst-bretagne.fr

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Database and Knowledge-Base Systems: Data Mining. Martin Ester

Database and Knowledge-Base Systems: Data Mining. Martin Ester Database and Knowledge-Base Systems: Data Mining Martin Ester Simon Fraser University School of Computing Science Graduate Course Spring 2006 CMPT 843, SFU, Martin Ester, 1-06 1 Introduction [Fayyad, Piatetsky-Shapiro

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Refresher: Lifecycle models. Lecture 22: Moving into Design. Analysis vs. Design. Refresher: different worlds. Analysis vs. Design.

Refresher: Lifecycle models. Lecture 22: Moving into Design. Analysis vs. Design. Refresher: different worlds. Analysis vs. Design. Analysis vs. Design Why the distinction? Design Processes Logical vs. Physical Design System vs. Detailed Design Architectures System Architecture Software Architecture Architectural Patterns (next lecture)

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

Single Pass Connected Components Analysis

Single Pass Connected Components Analysis D. G. Bailey, C. T. Johnston, Single Pass Connected Components Analysis, Proceedings of Image and Vision Computing New Zealand 007, pp. 8 87, Hamilton, New Zealand, December 007. Single Pass Connected

More information

Configuring AVC to Monitor MACE Metrics

Configuring AVC to Monitor MACE Metrics This feature is designed to analyze and measure network traffic for WAAS Express. Application Visibility and Control (AVC) provides visibility for various applications and the network to central network

More information

Introduction to WAN Technologies

Introduction to WAN Technologies Introduction to WAN Technologies From DocWiki This article introduces the various protocols and technologies used in wide-area network (WAN) environments. Topics summarized here include point-to-point

More information

ATAC. Advanced Trouble Analysis Center. Proactive Network Management. Sample: Réna C. Ayeras Page 1 of 9

ATAC. Advanced Trouble Analysis Center. Proactive Network Management. Sample: Réna C. Ayeras Page 1 of 9 ATAC Proactive Network Management Sample: Réna C. Ayeras Page 1 of 9 INTRODUCTION Growing from regional to global, networks have become more complex which causes centralized data centers to require extensive

More information

LAN Modeling. Overview

LAN Modeling. Overview LAN Modeling Overview This lesson focuses on the use of LAN models and background link utilization. You will learn to Configure the object palette with the models you need Set up application and profile

More information

AAPT. NetReporting. User Guide. Version All Rights Reserved

AAPT. NetReporting. User Guide. Version All Rights Reserved NetReporting Version 1.1 Glossary Abbreviation AD AR ATM CE DR FR GPDR IPVPN KPIs LT PE QoS RD TS WID Description Applicable Document Acquisition Rate (Polling rate of the data for SNMP, or period of the

More information

Applications of PTP in non-telecom networks. Anurag Gupta November 1 st -3 rd 2011, ITSF 2011

Applications of PTP in non-telecom networks. Anurag Gupta November 1 st -3 rd 2011, ITSF 2011 Applications of PTP in non-telecom networks Anurag Gupta angupta@juniper.net November 1 st -3 rd 2011, ITSF 2011 Introduction PTP/ 1588 has grown from its initial objective of Synchronization of real-time

More information

Experience with the Surveyor IP Performance Measurement Infrastructure. Matt Zekauskas IMIC Workshop 30 August 1999

Experience with the Surveyor IP Performance Measurement Infrastructure. Matt Zekauskas IMIC Workshop 30 August 1999 Experience with the Surveyor IP Performance Measurement Infrastructure Matt Zekauskas matt@advanced.org IMIC Workshop 30 August 1999 Outline Surveyor overview (+IPPM) System description Lessons and some

More information

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010 Traffic in Network 1.0.0.0/8 Geoff Huston George Michaelson APNIC R&D April 2010 Background The address plan for IPv4 has a reservation for Private Use address space. This reservation, comprising of 3

More information

A Technical Overview of the Lucent Managed Firewall

A Technical Overview of the Lucent Managed Firewall Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

S5 Communications. Rev. 1

S5 Communications. Rev. 1 S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed

More information