Validation of Router Models in OPNET

Size: px
Start display at page:

Download "Validation of Router Models in OPNET"

Transcription

1 Validation of Router Models in OPNET B. Van den Broeck, P. Leys, J. Potemans 1, J. Theunis, E. Van Lil, A. Van de Capelle Katholieke Universiteit Leuven (K.U.Leuven) Department of Electrical Engineering ESAT-TELEMIC division 2 Kasteelpark Arenberg 10 B-3001 Heverlee (Leuven), Belgium bart.vandenbroeck@esat.kuleuven.ac.be Abstract OPNET contains a vast amount of node models that represent specific types of networking gear available in the marketplace. These models closely resemble their real-life counterparts in supported functionality, but in order for OPNET to generate representative simulation results they also have to accurately simulate the performance of the real devices. In this paper, the actual behavior of a router will be compared to the behavior of the corresponding OPNET node model depending on parameters like inter-arrival time, size etc. of the packets on the network, with the use of a traffic generator. A method is presented to obtain the values necessary to match the simulation to the measurements. Finally some remarks will be made about the particular configuration we measured and simulated, and suggestions will be given for more accurate models. 1. Introduction A very big advantage of the OPNET simulation tool is the vast amount of network elements the user can choose out of to build a simulation topology. The model library included with OPNET Modeler 8.1A, which was used for this paper, is very large and contains node models for a broad range of networking gear. There is even a collection of so-called Vendor Models which model a lot of specific, real-life devices from several vendors available in the marketplace. However as is clearly stated in the online documentation these models are based solely on information gathered from product catalogs and the manufacturer s website. No other devicespecific information is represented in these models. This means these models closely resemble the real devices in the interfaces they have and the protocols they support. Their performance parameters however have not been tuned in order to approximate the performance characteristics of the real devices. In fact, when examining the settings of some router models, it is clear that very often the IP Processing Information attribute which contains the parameters determining the routing performance is set to default. Some simulation results, like processing delay in the router, will therefore not match the actual delay induced by a router. In this paper a method is presented to obtain the values necessary to configure the performance parameters of the router node model. First of all a traffic generator was used to measure the actual behavior of the router. The results of these measurements were processed statistically. From these statistics the necessary parameters were calculated. The obtained parameters were set in the router model and several simulations were performed to verify the match with the measurements. This paper is organized as follows. In section 2 the measurement setup is described. Section 3 describes the traffic which the router was loaded with during the measurements. In section 4 the measurement results are processed. Section 5 describes the calculation of the performance parameters. The simulation scenario we used is given in section 6. In section 7 the simulation results are compared with the measurements. Some remarks are made and some suggestions given in section 8. Finally, section 9 sums up the conclusions of this paper. 2. Measurement setup For the purpose of validating the router models in OPNET, we chose a Cisco 2621 router we have available in our networking lab. This router has among others two autosensing 10/100 Mbps Ethernet ports, which we used to perform our tests. Other details of this router can be found in table 1. Cisco IOS version IOS IS 12.1(6) Amount of flash memory 16 MB Amount of RAM 48 MB Amount of NVRAM 32 KB Table 1: Router characteristics The router contains one central processor that is responsible for performing all packet processing functions of the router. For the measurements we disabled the router cache. In order to measure the performance of the router we wanted to load it with some well-defined traffic patterns and check how the router handled this traffic. Since we wanted to control the characteristics of the imposed traffic completely, we needed a utility to generate this artificial traffic. A lot of free traffic generators are available today. After browsing the documentation of several of them as well as some reports of 1 Research Assistant of the Fund of Scientific Research Flanders (FWO-Vlaanderen) 2 ESAT-Telemic participates in the OPNET University Program for research [7, 8, 9] and educational projects [10, 11, 12]. 1

2 research in which these utilities are used, we decided to use the "RUDE & CRUDE" 0.61 utilities [1], which were created during the project Faster 2000 at the Tampere University of Technology. In a technical report titled "Low-Cost Precise QoS Measurement Tool" [2] these utilities were used to measure the Quality of Service characteristics of a network like packet loss, throughput, one-way delay, delay variation as well as distribution of delay and delay variation. The RUDE part (which stands for Real-Time UDP Data Emitter) of this tool can dispatch UDP packets according to a predefined pattern with a precision of 1 microsecond. This accuracy is high enough for our application. To make it possible to process the sent out UDP packets when they are received, they contain some information like the destination address, a stream ID, a sequence number and a time stamp with a resolution of 1 microsecond indicating when they were sent. Therefore the UDP packets have a payload of at least 20 bytes. At the other end, we needed a utility to receive the packets, to enable us to check how the traffic pattern was modified by the router. The CRUDE part (which stands for Collector for RUDE) has exactly that purpose. It didn't however give very accurate packet receival time stamps (there was an error of up to 200 microseconds). This is probably due to the fact that the packets have to be processed by several protocol layers before being available to the CRUDE utility, and due to the fact that the CRUDE utility has to wait to get scheduled some processor time before it can actually time stamp the packet. So we chose a different approach and received the packets with the tcpdump [3] packet sniffer. This led to very accurate receive time stamps (in the order of microseconds), however we had to write our own utility to process the output of tcpdump. Because we wanted to measure one-way delay, the clocks of the sending and the receiving PC had to be synchronized. There are a few ways to synchronize the clocks of PCs. One way is to use the Network Time Protocol (NTP) [4]. The accuracy that can be achieved is however of the order of tens of milliseconds in the Internet and about 1 millisecond in a LAN. This is not enough to reliably measure the delay introduced by a router, which can be of the order of milliseconds or even smaller. A better way would be to synchronize the clock of the PCs to the signal of a GPS receiver. However since such a device was not at our disposal, we used a different technique to compensate for the mismatch between the two clocks. By sending a reference stream directly from sender to receiver (so without the router in between) before and after each measurement, it was possible to measure the mismatch between the two clocks (and some other constant delay that might be present). Out of these reference measurements we could conclude that the mismatch between the two clocks was actually not entirely constant. It decreased with a constant amount of 0.9 milliseconds every 10 seconds (the length of the reference measurement). With the values obtained by doing a linear regression of the receive time as a function of the send time of a reference measurement, we were able to calculate the receive times of the next reference measurement with an accuracy of the order of microseconds. So we compensated for the clock mismatch by subtracting the calculated clock mismatch from the receive times of the packets. 2 Summing up the above, we end up with two measurement configurations which allowed us to measure one-way delay with an accuracy at least of the order of a few tens of microseconds: one for the reference measurement and one for the actual measurement of the router as can be seen in figure 1. PC 1 PC 2 PC 1 router PC 2 Figure 1: Reference and router measurement setup PC 1 is a portable PC with a Pentium III 750 MHz processor, running Red Hat Linux with a Linux kernel. PC 2 is a desktop PC with a Pentium III 1 GHz processor, running Mandrake Linux mdk with a Linux mdk kernel. Both PCs have an autosensing 10/100 Mbps Ethernet NIC, which we used to make the network connection. The NICs were in 100 Mpbs full-duplex mode during the measurements. On the receive side we executed the command: tcpdump -i eth0 -s 80 -w filename This tells tcpdump to put the 80 first bytes of the packets arriving on interface eth0 (the 10/100 Mbps Ethernet NIC) and their receive time stamps into the dumpfile filename. On the send side we then executed the command: rude -P 90 -s filename This tells the RUDE utility to send traffic according to the configuration in the file filename. The "-P 90" option tells RUDE to execute with scheduling priority 90 (one has to start the program as the root user to be able to do this). The processor will therefore schedule the execution of the RUDE process before the ones of lower priority (almost all) processes, so the RUDE process won't have to wait while other processes are executing before it can send its UDP packets. The two Ethernet interfaces of the router were configured for the router measurement setup. During the measurement session the topology was switched from the reference measurement setup to the router measurement setup and back again. After every switch a small script reconfigured the PCs for the new setup and sent ping packets from the send PC to the receive PC until a ping reply arrived to make sure the setup was operational, the ARP caches were filled etc. 3. The applied traffic With the RUDE utility two types of traffic can be generated. The CONSTANT stream consists of UDP packets with a constant size sent out at a constant rate. The TRACE stream consists of UDP packets of which size and time until the next packet are specified individually for each packet in a trace file. Several streams can be generated simultaneously. To avoid transitory effects, we decided to load the router with traffic of the CONSTANT stream type. A stream of packets was sent each time, so we could be sure to be in a steady state long enough to make statistically relevant averages. In order to examine the dependence of the performance characteristics of the router on the packet size and the packet rate, we consecutively loaded the router with packets of 20 (the smallest possible packet), 200, 600, 1000 and 1472 (the largest

3 possible packet on Ethernet) bytes UDP payload, which were sent every 200, 300, 400, 500, 600, 800, 1000, 1200, 1400 or 1600 microseconds. 4. The received traffic After the measurements, we converted the dumpfiles created by tcpdump into lists with columns containing the sender, the send time, the receive time corrected for clock mismatch, the packet size and the sequence number. With the use of some processing scripts developed by a couple of Master students during their Master s thesis [5] in our research group, the lists were processed further. The lost packets were detected, the one-way delay was calculated and the results were processed statistically. This resulted in the following statistics: throughput (bits per second), throughput (packets per second), average delay (seconds) and average packet loss (%). The averages were taken over groups of 100 sent packets. An example of those statistics is shown in figure 2. As expected the various statistics are nearly constant after transitory effects at the beginning. Figure 2: Statistics of a few streams of 2500 packets/s By examining the number of received packets as a function of the size of the UDP payload and of the interpacket time under heavy load in figure 3, one can see that the performance characteristics of the particular configuration we tested, are indeed dependent of the packet size. This is in contradiction with the general idea that the rate at which a router routes packets, is independent of the packet size and should therefore be expressed as a number of packets per second. 5. Calculating the necessary parameters The fact that we could overload the router with our measurement traffic allowed for easy determination of the parameters of the router. Since our goal was to model the router in OPNET, we looked at the IP Processing Information table of a router node in OPNET. The attributes in this table indicated which parameters we had to determine. Since the measured router uses central processing, the second attribute ( Backplane Transfer Rate ) was irrelevant. Since we didn t use MPLS, the third attribute ( Datagram Switching Rate ) was too. That left us with the datagram forwarding rate, the forwarding rate units and the memory size. As mentioned before, these parameters can easily be determined for an overloaded router. Since the router receives traffic with a constant packet size at a constant rate and can t handle it, we can assume that the buffer of the router is practically constantly full. So there will always be a packet available for the router to forward. Therefore the datagram forwarding rate, the rate at which the router processes packets, will be equal to the throughput in packets per second (or bits per second depending on how you set the Forwarding Rate Units attribute) during the steady state of the measurement. This only holds for an overloaded router. A router far from overload has a throughput equal to the arrival rate of traffic at the router. Note that to recalculate the datagram forwarding rate in packets per second to bits per second for usage in OPNET one has to multiply by 8 times the UDP payload size plus 29 bytes as will be explained in section 6. Because we can assume the buffer of the router to be practically constantly full, an arriving packet that s not dropped will always be inserted into the buffer at the end. So the delay that packet incurs at the router is about the time it takes for the router to process an entire buffer of packets. The relation between the delay, the datagram forwarding rate and the buffer size is represented in the following equation: D = B/ with D = delay (s) B = buffer size (packets or bits) = datagram forwarding rate (packets per second or bits per second) Figure 3: Number of received packets as a function of packet size and interpacket time The buffer size that follows from this equation should be filled in as the value of the Memory Size attribute. Since the unit of this attribute is bytes however, one should multiply the buffer size in packets by the UDP payload size plus 29 bytes as will be explained in section 6. 3

4 6. The OPNET simulation scenario Next, we created an OPNET scenario that represents the router measurement setup in order to compare the simulation results with our tests. The scenario topology is depicted in figure 4. It contains an advanced Ethernet workstation (the sending PC), an advanced Ethernet server (the receiving PC) and a node representing the Cisco 2621 router. The two computers are connected to the router with Ethernet 100BaseT links. A model of the Cisco 2621 router is not included with the vendor models, but since the router vendor models are all based upon the same model with the right interfaces and protocols attached, we constructed a model for the Cisco 2621 router with the Device Creator. Figure 5: Comparison of measurement and simulation Figure 4: The scenario topology The traffic is defined as a custom application. In the task definition the number of packets per request was set to 1 and we filled in the size of the UDP payload of the packets for Request Packet Size. The actual size of the resulting IP packets will be 29 bytes larger in OPNET to take into account the size of the IP and UDP headers. All distributions were of course set to constant. The repetition in the traffic pattern could be set in the task definition or in the profile definition. Setting it in the task definition resulted in an interpacket time that was actually 10 microseconds larger than the one specified, but simulation times were very small (about 14 seconds for a stream of packets). Specifying the repetition in the application repeatability attribute of the profile definition resulted in an exact interpacket time, but simulation times increased by a factor 2 to 6 depending on how fast the application had to be repeated. An advantage of putting the repeatability into the profile definition is that one can measure the one-way end-to-end delay by choosing the task response time statistic. 7. Comparison of measurement and simulation We calculated the values of the Datagram Forwarding Rate and Memory Size attributes as explained in section 5 for all measurements during which the router was overloaded. With these values every measurement was simulated. The match between the measured and the calculated throughput and delay was very good as can be seen in figure 5. The error on both statistics was always smaller than 5%. This validates the fact that the behavior of the router model included in OPNET closely resembles the performance characteristics of an actual router when the right values are filled in for the various IP Processing Information attributes. 8. Remarks and suggestions Calculation of the buffer size for the various measurements revealed that the buffer size is approximately constant (between 75 and 76 packets with an error of less than 3%) over all measurements when expressed as a number of packets. By querying the router we could confirm that the input queue of the interface connected to the sender has indeed a size of 75 packets. So, in order to get a value that s realistic for all packet sizes for this particular router in this configuration, we would suggest multiplying the buffer size in packets with the average packet size of the traffic flowing through the router. An adaptation to the OPNET software package to accommodate this router, would be to allow entering the memory size in packets. Therefore we suggest adding a Memory Size Units attribute to the IP Processing Information table. This attribute should have bytes and packets as allowed values. Figure 6: The dependence of the datagram forwarding rate on the arrival rate 4

5 [4] D.L. Mills, Simple network time protocol (SNTP) version 4 for IPv4, IPv6 and OSI, Request for Comments 2030, Internet Engineering Task Force, October [5] T. Brans and T. Dekeyser, The ultimate network crash test (in Dutch), thesis to obtain the degree of Master in Electronics Engineering, K.U.Leuven, Belgium, June [6] P. Leys, J. Potemans, B. Van den Broeck, J. Theunis, E. Van Lil and A. Van de Capelle, Use of the Raw Packet Generator in OPNET, OPNETWORK 2002, Washington D.C., USA, August [7] J. Potemans, J. Theunis, B. Rodiers, B. Van den Broeck, P. Leys, E. Van Lil and A. Van de Capelle, Simulation of a Campus Backbone Network, a case-study, OPNETWORK 2002, Washington D.C., USA, August Figure 7: The dependence of the datagram forwarding rate on the packet size Examination of the datagram forwarding rate across all measurements revealed a dependence on both the arrival rate in packets and the size of the packets for this particular router in this configuration. Preliminary results indicate both dependencies are approximately linear as is indicated by figures 6 and 7, but further research is needed to determine the relation of those parameters. Out of this we can conclude that at least for some routers the datagram forwarding rate is a parameter that varies significantly with the load applied to the router. For these routers it might be very hard to find a suitable value for the datagram forwarding rate. So it might not be possible to accurately model the delay introduced by these routers. This makes it impossible to determine if and when this kind of routers is overloaded and starts dropping packets by simulation with the present routing model of OPNET. A better understanding of the dependence of the datagram forwarding rate on the arrival rate and the packet size, and the subsequent implementation of it in OPNET might alleviate this problem in the future. [8] M. Teughels, E. Van Lil, and A. Van de Capelle, "Backbone Network Simulation: a Self-Similar Perpetuum Mobile", OPNETWORK 1999, Washington D.C., USA, August [9] J. Theunis, B. Van den Broeck, P. Leys, J. Potemans, E. Van Lil and A. Van de Capelle, OPNET in Advanced Networking Education, OPNETWORK 2002, Washington D.C., USA, August [10] J. Theunis, J. Potemans, M. Teughels, A. Van de Capelle and E. Van Lil, Project Driven Graduate Network Education, Proc. to the International Conference on Networking ICN 01, Colmar, France, pp , [11] J. Potemans, J. Theunis, M. Teughels, E. Van Lil and A. Van de Capelle, Student Network Design Projects using OPNET, OPNETWORK 2001, Washington D.C., USA, August Conclusion In this paper a measurement setup and a measurement method were described with which it is possible to calculate the parameters needed to model the performance characteristics of a router in OPNET. Simulation results were presented that show the close match between measurement and simulation. Finally some remarks were given on the particular router we used, as well as some suggestions for more accurate models. References [1] J. Laine, S. Saaristo and R. Prior, RUDE and CRUDE: Real-time UDP Data Emitter and Collector, May [2] S. Ubik, V. Smotlacha and S. Saaristo, Low-Cost Precise QoS Measurement Tool, June [3] Tcpdump: traffic dump utility. 5

Simulation of a Campus Backbone Network, a case-study

Simulation of a Campus Backbone Network, a case-study Simulation of a Campus Backbone Network, a case-study J. Potemans 1, J. Theunis, B. Rodiers, B. Van den Broeck, P. Leys, E. Van Lil, A. Van de Capelle Katholieke Universiteit Leuven (K.U.Leuven) Department

More information

In this paper, we will focus on the use of the OPNET Modeler for simulations in the projects. In [1] we comment on the other parts of the assignment.

In this paper, we will focus on the use of the OPNET Modeler for simulations in the projects. In [1] we comment on the other parts of the assignment. Student Network Design Projects using OPNET J. Potemans, J. Theunis, M. Teughels, E. Van Lil and A. Van de Capelle Katholieke Universiteit Leuven, ESAT-TELEMIC Kasteelpark Arenberg 10, B-3001 Leuven, Belgium

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Low-cost Precise QoS Measurement Tool

Low-cost Precise QoS Measurement Tool Low-cost Precise QoS Measurement Tool Sven Ubik and Vladimir Smotlacha, CESNET, Prague, Czech Republic ubik, vs @cesnet.cz Sampo Saaristo, Tampere University of Technology, Tampere, Finland sambo@cs.tut.fi

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

A Ns2 model for the Xbox System Link game Halo

A Ns2 model for the Xbox System Link game Halo A Ns2 model for the Xbox System Link game Halo Tanja Lang, Grenville Armitage Centre for Advanced Internet Architectures. Technical Report 030613A Swinburne University of Technology Melbourne, Australia

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 9 The Data Link Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Physical Addresses Physical (or LAN or MAC) address: 48 bit string Hexadecimal representation

More information

Oscillation of RED with 2way TCP bulk data traffic

Oscillation of RED with 2way TCP bulk data traffic First Author: Oscillation of RED with way TCP bulk data traffic Thomas Ziegler, Salzburg Polytechnic University; Thomas.Ziegler@fh-sbg.ac.at Second Author: Bernhard Hechenleitner, Salzburg Polytechnic

More information

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract 1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined

More information

IP SLAs QFP Time Stamping

IP SLAs QFP Time Stamping This module describes how to configure the IP SLA QFP Time Stamping feature for IP Service Level Agreements (SLAs) UDP jitter operations. This new probe and responder structure enables more accurate network

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Gigabit Networks, VLANs & Wireless LANs

Gigabit Networks, VLANs & Wireless LANs Hands-On Gigabit Networks, VLANs & Wireless LANs ( Advanced Local Area Networks ) Course Description This Hands-On course will discuss traditional Ethernet as it is evolving today and its future. Ethernet

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Juniper M10 QoS Capabilities

Juniper M10 QoS Capabilities TEN 155 CZ technical report number X/2002 Juniper M10 QoS Capabilities Sven Ubik (ubik@cesnet.cz) 28.12.2001 1 Introduction This is a summary of our assesment of QoS capabilities of the Juniper M10 router.

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Portable 2-Port Gigabit Wirespeed Streams Generator & Network TAP

Portable 2-Port Gigabit Wirespeed Streams Generator & Network TAP Portable 2-Port Gigabit Wirespeed Streams Generator & Network TAP NuDOG-301C OVERVIEW NuDOG-301C is a handheld device with two Gigabit ports for Ethernet testing. The main functions of NuDOG-301C include

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Open Source Traffic Analyzer

Open Source Traffic Analyzer Open Source Traffic Analyzer Daniel Turull June 2010 Outline 1 Introduction 2 Background study 3 Design 4 Implementation 5 Evaluation 6 Conclusions 7 Demo Outline 1 Introduction 2 Background study 3 Design

More information

Why You Should Consider a Hardware Based Protocol Analyzer?

Why You Should Consider a Hardware Based Protocol Analyzer? Why You Should Consider a Hardware Based Protocol Analyzer? Software-only protocol analyzers are limited to accessing network traffic through the utilization of mirroring. While this is the most convenient

More information

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam. Cisco 640-822 Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam TYPE: DEMO http://www.examskey.com/640-822.html Examskey Cisco 640-822 exam demo product is here for you to test quality of the

More information

Southern Polytechnic State University Spring Semester 2009

Southern Polytechnic State University Spring Semester 2009 Southern Polytechnic State University Spring Semester 2009 ECET 4840 Laboratory Exercises 9: Router Queuing Configuration and Testing Objective: Students will investigate the effect of varying link capacity

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication

The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication John Markus Bjørndalen, Otto J. Anshus, Brian Vinter, Tore Larsen Department of Computer Science University

More information

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing 521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service

More information

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Esra Musbah Mohammed Musbah 1 Khalid Hamed Bilal 2 Amin Babiker A./Nabi Mustafa 3 Abstract VoIP stands for voice over internet protocol. It is one

More information

Transport protocols Introduction

Transport protocols Introduction Transport protocols 12.1 Introduction All protocol suites have one or more transport protocols to mask the corresponding application protocols from the service provided by the different types of network

More information

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Chapter 6. The Protocol TCP/IP. Introduction to Protocols Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following

More information

The Link Layer and LANs: Ethernet and Swiches

The Link Layer and LANs: Ethernet and Swiches The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP

More information

Presentation_ID. 2002, Cisco Systems, Inc. All rights reserved.

Presentation_ID. 2002, Cisco Systems, Inc. All rights reserved. 1 Gigabit to the Desktop Session Number 2 Gigabit to the Desktop What we are seeing: Today s driver for Gigabit Ethernet to the Desktop is not a single application but the simultaneous use of multiple

More information

Lab Exercise UDP & TCP

Lab Exercise UDP & TCP Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

SWITCHED ETHERNET TESTING FOR AVIONICS APPLICATIONS. Ken Bisson Troy Troshynski

SWITCHED ETHERNET TESTING FOR AVIONICS APPLICATIONS. Ken Bisson Troy Troshynski SWITCHED ETHERNET TESTING FOR AVIONICS APPLICATIONS Ken Bisson Troy Troshynski 2007 Switched Ethernet is being implemented as an avionics communication architecture. A commercial standard (ARINC-664) and

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Chapter 17: Distributed Systems (DS)

Chapter 17: Distributed Systems (DS) Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication

More information

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP.

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Lab Exercise ARP Objective To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Requirements Wireshark: This lab uses the Wireshark

More information

One-way Delay Measurement Using NTP

One-way Delay Measurement Using NTP One-way Delay Measurement Using NTP Vladimír Smotlacha, CESNET, Prague, Czech Republic vs@cesnet.cz I. INTRODUCTION This paper presents an experimental comparison of different NTP synchronization strategies

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦 KillTest Exam : 100-101 Title : CCNA Interconnecting Cisco Networking Devices 1 (ICND1) Version : Demo 1 / 15 1.Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames

More information

Gigabit Ethernet XMVR LAN Services Modules

Gigabit Ethernet XMVR LAN Services Modules Gigabit Ethernet XMVR LAN Services Modules Ixia's Gigabit Ethernet XMVR LAN Services Modules (LSMs) offer Layer 2-3 network testing functionality in a single test system. Each test port supports wire-speed

More information

The DETER Testbed: Overview 25 August 2004

The DETER Testbed: Overview 25 August 2004 The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Order of Packet Transmission and Dropping

Order of Packet Transmission and Dropping Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

Session Exam 1. EG/ES 3567 Worked Solutions. (revised)

Session Exam 1. EG/ES 3567 Worked Solutions. (revised) Session 003-00 Exam 1 EG/ES 3567 Worked Solutions. (revised) Please note that both exams have identical solutions, however the level of detail expected in ES is less, and the questions are phrased to provide

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

[Actual4Exams] Actual & valid exam test dumps for your successful pass

[Actual4Exams]   Actual & valid exam test dumps for your successful pass [Actual4Exams] http://www.actual4exams.com Actual & valid exam test dumps for your successful pass Exam : 300-135 Title : Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Vendor : Cisco Version

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Version 2.6. Product Overview

Version 2.6. Product Overview Version 2.6 IP Traffic Generator & QoS Measurement Tool for IP Networks (IPv4 & IPv6) -------------------------------------------------- FTTx, LAN, MAN, WAN, WLAN, WWAN, Mobile, Satellite, PLC Distributed

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

CISCO SYSTEM ADMINISTRATION (41)

CISCO SYSTEM ADMINISTRATION (41) CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

CCNA-A Scope and Sequence (March 2007-Draft)

CCNA-A Scope and Sequence (March 2007-Draft) CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

Computer Science 461 Midterm Exam March 14, :00-10:50am

Computer Science 461 Midterm Exam March 14, :00-10:50am NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Chapter 6: Network Layer. Introduction to Networks v5.1

Chapter 6: Network Layer. Introduction to Networks v5.1 Chapter 6: Network Layer Introduction to Networks v5.1 6.0 Introduction 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configure a Cisco Router 6.5 Summary 2013 Cisco and/or its affiliates. All

More information

An Optimized Salahaddin University New Campus IP-Network Design using OPNET

An Optimized Salahaddin University New Campus IP-Network Design using OPNET An Optimized Salahaddin University New Campus IP-Network Design using OPNET Ammar. O.Hasan Dept. of Information Technology Salahaddin University-Hawler Erbil, Iraq Raghad Z.Yousif,PhD Dept. Applied Physics-Communication

More information

Multicast can be implemented here

Multicast can be implemented here MPI Collective Operations over IP Multicast? Hsiang Ann Chen, Yvette O. Carrasco, and Amy W. Apon Computer Science and Computer Engineering University of Arkansas Fayetteville, Arkansas, U.S.A fhachen,yochoa,aapong@comp.uark.edu

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

CS 638 Lab 6: Transport Control Protocol (TCP)

CS 638 Lab 6: Transport Control Protocol (TCP) CS 638 Lab 6: Transport Control Protocol (TCP) Joe Chabarek and Paul Barford University of Wisconsin Madison jpchaba,pb@cs.wisc.edu The transport layer of the network protocol stack (layer 4) sits between

More information

4. Environment. This chapter describes the environment where the RAMA file system was developed. The

4. Environment. This chapter describes the environment where the RAMA file system was developed. The 4. Environment This chapter describes the environment where the RAMA file system was developed. The hardware consists of user computers (clients) that request reads and writes of file data from computers

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer Introduction to Networks v5.1 6.0 Introduction 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configure a Cisco Router 6.5 Summary 2 Upon completion of this section, you

More information

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering Department of Computer Science and Engineering EECS 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 9, 2016 Instructions: Examination time: 180 min.

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services

More information

46PaQ. Dimitris Miras, Saleem Bhatti, Peter Kirstein Networks Research Group Computer Science UCL. 46PaQ AHM 2005 UKLIGHT Workshop, 19 Sep

46PaQ. Dimitris Miras, Saleem Bhatti, Peter Kirstein Networks Research Group Computer Science UCL. 46PaQ AHM 2005 UKLIGHT Workshop, 19 Sep 46PaQ Dimitris Miras, Saleem Bhatti, Peter Kirstein Networks Research Group Computer Science UCL 46PaQ AHM 2005 UKLIGHT Workshop, 19 Sep 2005 1 Today s talk Overview Current Status and Results Future Work

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,

More information

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 NETWORK INTRUSION Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Recognize different

More information

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4 CSCD 330 Network Superhighway Network Programming Winter 2015 Lecture 13 Network Layer Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007

More information