Karisma Network Requirements
|
|
- Norah Ramsey
- 5 years ago
- Views:
Transcription
1 Karisma Network Requirements
2 Introduction There are a number of factors influencing the speed of the Karisma response rates of retrieving data from the Karisma server. These factors include the hardware resources of the workstation running Karisma, the Karisma application server and, in particular, the Microsoft SQL Server. This document will focus on the networking requirement of Karisma and will assume that the all other variables are optimal; however a bottle neck in any of these other factors will result in high response times regardless of the network over which Karisma is operating. Disclaimer: This document outlines the Karisma network traffic and indicative network utilisation and saturation points assume no other traffic over the network. For most organisations this will not be the case and the non-karisma network utilisation, such as internet access, and PACS needs to be considered and the network requirements scaled up accordingly. Reviewed by: Gavin Morris, Application Architect Approved by: Adrian Russell, Systems Operation Manager Date: 1 st June, 2007 Page 2 of 11
3 Networking Requirements The fundamental equation for specifying network requirements is: Response time = Amount of data to be transferred / Maximum available data transfer rate Response time The response time is the amount of time, usually measured in seconds or fractions of a second for the data to be transmitted over the network and to the client s workstation. Karisma displays the results to the user after all the data is received. Amount of data to be transferred The amount of data to be transferred from the Karisma client application to and from the Karisma server depends on the functionality performed. Karisma is built on a 3 tier architecture which provides an excellent platform for low data transfer requirements. The table below summarises representative data size transfer for common functionality in Karisma. Data amounts are expressed in bytes (B), and multiples thereof, such as kilobytes (KB equals 1024 bytes), megabytes (MB equals 1024 kilobytes), gigabytes (GB equals 1024 megabytes) and so on. Maximum available data transfer rate The time it takes to push the amount of data from the server to the client (and vice versa) depends on how thick the pipe is connecting the two. The available bandwidth to Karisma is the amount of bandwidth supplied by your network administrator or, if over the internet, by your internet service provider (ISP) less the amount of bandwidth used by other applications. The following are some of the biggest known causes of bandwidth utilisation by other applications (other than Karisma): PACS PACS systems move very large images around the network and can easily saturate low bandwidth availability leaving virtually none for Karisma. You should discuss this with your PACS vendor to determine other options, such as prefetching during quiet/night times and compression methods. Copying files over the network Moving large files through Windows Explorer, MS- DOS, FTP or other means will have similar impact as a PACS system. Internet usage Sites that need to communicate over the internet to access the Karisma server are dependant on other users internet usage using the same bandwidth, as well as the general internet traffic to and from the Karisma server. You should assess and restrict internet usage when Karisma is sharing the same route/isp line. Other applications other applications using the local area network (LAN) or wide area network (WAN), usually over the internet, may impact the Karisma response times if the Karisma data has to wait for the other applications traffic. In environments where a WAN link is shared by multiple applications, it might be necessary to implement a bandwidth management solution to ensure all applications perform at an acceptable level. Maximum data transfer rate is usually measured in bits per second (bps), and multiples thereof, such as kilobits per second (kbps, equals 1000 bits per second 1 ), megabits per second 1 There is much discussion and literature as to the correct definition of kilobits per second (kbps). Some ISP providers use the SI unit where 1000 bits per second equals a kbps while others use similar to converting bytes to kilobytes where Page 3 of 11
4 (mbps, equals 1000 kilobits per second), gigabits per second (gbps, equals 1000 megabits per second) and so on. 1 byte is equal to 8 bits. Throughput versus goodput Your network administrator, ISP and Windows workstation will all indicate the throughput of a connection. Throughput is the amount of bits per second the connection provides, such as 100 mbps (typical LAN). Not all of this is available to transmit data however as the data has to be broken down every 1500 bytes into network packets. Each network packet requires 20 bytes of IP header and 20 bytes of TCP header information (containing the IP address of sender and recipient and other error checking information about the data to ensure it is transmitted correctly). Packets transferred over the Ethernet also impose a 38 byte overhead per packet. This is known as protocol overhead. Therefore the available throughput, or goodput, for transmitting data over a 100 mpbs LAN is approximately: 1460/1538 * 100 mbps = mbps or MB per second (as 1 byte = 8 bits). Approximate goodput of common bandwidth throughput 2 ISP quoted bandwidth (throughput) Approximate bandwidth available to transfer data (goodput) 1000 mbps = 1 gbps MB per second 100 mbps MB per second 10 mbps MB per second 4 mbps KB per second 2 mbps KB per second 1 mbps KB per second 512 kbps 60.7 KB per second 256 kbps 30.4 KB per second 128 kbps 15.2 KB per second Other factors that may affect goodput are: Retransmission of lost or corrupt packets Collision detection 1024 bits per second equals a kbps. The calculations in this document have used SI conversion (1000 bits per second equals a kbps). You should speak to your ISP provider and/or network provider to determine the exact number of bits per second. 2 There are a number of ways to calculate goodput from throughput. The formula used here is the accepted calculation as published on Wikipedia. Page 4 of 11
5 Latency Latency is the amount of time taken between sending a packet and receiving the respective packet acknowledgment back from the receiving workstation. Latency is usually measured in milliseconds. The perceived speed or responsiveness of an application is directly related to the latency of the network, more so than throughput when the network is not saturated. The recommended latency of a network for Karisma is < 100 ms. Firewalls Firewalls are designed to block access to internal networks. Any Karisma access required outside a firewall will require a rule on the firewall allowing the traffic through. It is required that a firewall access rule is provided to all traffic going to and from the Karisma service (CMSService.exe) on the application server through port 40100, where there is a requirement to access Karisma outside the firewall. Page 5 of 11
6 Sample Karisma network utilisation The table below indicates data transfer rates assuming all bandwidth is available to Karisma. Kestral benchmarks all responses to occur within 2 seconds with the exception of variable length data such as reports, scanned request forms and digital dictations. The data for these concepts are controlled by the user and will vary based on length of report, resolution and quality of scanned request forms and length of dictations. The data below does not include time to display the records by the workstation as that is variable for each client and is <1 second on minimum workstation specifications supplied by Kestral. The table below indicates that sites on: 1 Mbps bandwidth could support up to 5 users 2 Mbps bandwidth could support up to 10 users 4 Mbps bandwidth could support up to 20 users 100 Mbps bandwidth could support up to 500 users providing scanned request forms, dictations and reports were < 300 KB and assuming no more than one fifth of the users were downloading or uploading these at a time. Bandwidth < 1 Mbps could be supported however users may experience delays of > 2 secs when scanning, dictating or uploading/printing/downloading large reports. Similarly, document designs with large graphic images may impact distribution preview and printing times. Similarly, retrieving large record sets, for example retrieving hundreds of patients starting with Smith instead of limiting search with filtered criteria, will also increase the amount of data required to transfer between the server and client and therefore increase transfer times. Times that are within the 2 second benchmark are coloured green, while those times that exceed a transfer rate of greater than 2 seconds are coloured red. NOTE: Dictation uploads are performed in the background allowing the user to continue reporting and dictating next report. The user does not have to wait for the upload to finish.
7 Karisma network utilisation table Test Logging On Data to/from CMSConsole and CMSService 3 Sent (KB) Received (KB) Sent Network bandwidth times to transfer data 100 Mbps 4 Mbps 2 Mbps 1 Mbps Received Sent Received Sent Received Load log on dialog <1 <1 <1 <1 <1 <1 <1 <1 Log on to Home page <1 <1 <1 <1 <1 <1 < Patients page Search for patient display patients grid Edit existing patient details Save new or existing patient details details notes reports film bags summary host Requests page requests grid Sent Received /patient 4 <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 <1 0 0 <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < /report 5 <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < /request 7 <1 <1 <1 <1 <1 <1 <1 <1 Edit existing request <1 <1 <1 <1 <1 <1 <1 <1 3 Via server port Patient details all fields populated, general, accounting, medical alert and registration notes each had 84 words over 2 paragraphs. 5 Report details 439 words, 2 bold/underline headings, 6 paragraphs 6 Film bag 2 film bags allocated to patient 7 Request details all fields populated, 2 exams, clinical and scheduling notes each had 84 words over 2 paragraphs
8 Save existing or new <1 <1 <1 <1 <1 <1 <1 <1 request Display request detail <1 <1 <1 <1 <1 <1 <1 <1 Display request notes <1 <1 <1 <1 <1 <1 <1 <1 Display request <1 <1 <1 <1 <1 <1 <1 <1 summary Display request <1 <1 <1 <1 <1 <1 <1 <1 reports /report Display request film <1 <1 <1 <1 <1 <1 <1 <1 bags View request price <1 <1 <1 <1 <1 <1 <1 <1 Requests Scanned images Display request forms <1 <1 <1 <1 <1 <1 <1 <1 1 st image (72 KB 75 dpi) Display request forms <1 <1 <1 <1 <1 <1 <1 <1, next image button 2 nd image (228 KB 150 dpi) Display request forms <1 <1 < < <1 4.13, next image button 2 nd image (489 KB 240 dpi) Insert request form <1 <1 <1 <1 <1 <1 <1 <1 (72 KB 75 dpi) - no preview Insert request form <1 <1 <1 <1 <1 < <1 (228 KB 150 dpi) - no preview Insert request form (489 KB 240 dpi) - no preview <1 < < < <1
9 Preview request form <1 <1 <1 <1 <1 <1 <1 <1 (72 KB 75 dpi) Preview request form <1 <1 <1 <1 <1 <1 < (228 KB 150 dpi) Preview request form <1 <1 < < < (489 KB 240 dpi) Patient exams page Display exams for <1 <1 <1 <1 <1 <1 <1 <1 request grid /exam Display Commence <1 <1 <1 <1 <1 <1 <1 <1 exam steps dialog Save exam steps <1 <1 <1 <1 <1 <1 <1 <1 dialog Display exams details 0 0 <1 <1 <1 <1 <1 <1 <1 <1 Display exams reports <1 <1 <1 <1 <1 <1 <1 <1 Display exams <1 <1 <1 <1 <1 <1 <1 <1 summary Display Cancel <1 <1 <1 <1 <1 <1 <1 <1 examination steps dialog Save Cancel <1 <1 <1 <1 <1 <1 <1 <1 examination steps dialog Reports page Display existing <1 <1 <1 <1 <1 <1 <1 <1 patient reports grid /report Display report notes <1 <1 <1 <1 <1 <1 <1 <1 Edit existing report <1 <1 <1 <1 <1 <1 <1 <1 contents panel Edit empty report <1 <1 <1 <1 <1 <1 <1 <1 contents panel Report details dialog Display forms dialog <1 <1 <1 <1 <1 <1 <1 <1
10 no forms exist Display forms dialog <1 <1 <1 <1 <1 <1 <1 <1 (72 KB 75 dpi) Display forms dialog <1 <1 <1 <1 <1 <1 < next image (228 KB 150 dpi) Display forms dialog <1 <1 < <1 <1 < next image (489 KB 240 dpi) Display dictation 0 0 <1 <1 <1 <1 <1 <1 <1 <1 panel Save report no <1 <1 <1 <1 <1 <1 <1 <1 dictations Display report history <1 <1 <1 <1 <1 <1 <1 <1 panel 1 report history Dictations/transcriptions Display empty Dictate <1 <1 <1 <1 <1 <1 <1 <1 selected report dialog Save empty report <1 <1 <1 <1 <1 < <1 with 30.0 sec dictation Save empty report <1 <1 <1 < < <1 with 60.0 sec dictation Save empty report <1 < < < <1 with sec dictation Transcribe selected <1 <1 <1 <1 <1 <1 < report 30.0 sec dictation Select next dictation <1 <1 <1 <1 < < sec dictation Select next dictation <1 <1 < < < sec dictation Worklists Patient <1 <1 <1 <1 <1 <1 <1 <1 worklist no preview /patient 0 0 <1 <1 <1 <1 <1 <1 <1 <1
11 worklist details tab preview worklist patient tab preview worklist patient notes tab preview worklist report contents (empty report) tab preview Display Arrive patient dialog Save Arrive patient dialog Display Depart patient dialog Save Depart patient dialog <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 < <1 <1 <1 <1 <1 <1 <1 <1
Workfront DAM Performance Evaluation
Workfront DAM Performance Evaluation workfront.com +1.866.441.0001 +44 (0)845 5083771 1 Table of Contents INTRODUCTION) 3! DATA)RATE)VALUE)DESCRIPTIONS) 3! CONNECTION)SPEEDS)&)DATA)TRANSFER)RATES) 3! FILE)SIZE)&)DOWNLOAD)SPEEDS)
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question
More informationNETWORK PROBLEM SET Solution
NETWORK PROBLEM SET Solution Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: 1. For a packet-switched network of N nodes, the number of hops is one less than
More informationImpact of TCP Window Size on a File Transfer
Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience
More informationNETWORK PROBLEM SET Due Date 6/28/2014
NETWORK PROBLEM SET Due Date 6/28/2014 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached to the
More informationTamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2016 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationA closer look at network structure:
T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationObjective To examine the throughput of a TCP connection as the flow control window size is varied.
Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions
More informationComputer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So
Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer
More informationCommunication Networks
Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on
More informationBasics of datacommunication
Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #1 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Intersession 2009 Question Paper NOTE: Students may take this
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationEqualLogic Storage and Non-Stacking Switches. Sizing and Configuration
EqualLogic Storage and Non-Stacking Switches Sizing and Configuration THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationNetwork core and metrics
Network core and metrics latency propaga-on transmit queue Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More information: Chapter 2 Networking Fundamentals.
241-206: Chapter 2 Networking Fundamentals touch@coe.psu.ac.th Wednesday, June 10, 2009 Chapter Outline Chapter Outline Network Terminology Wednesday, June 10, 2009 Chapter Outline Network Terminology
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More information2/29/2012. Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels
Jim Williams HONP-112 Week 7 Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels A Network consists of at least two computers, and other peripherals (like a printer)
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationNetworks. Computer Technology
Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication
More informationAnnouncements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:
Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationTop-Down Network Design
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Technical Goals Scalability Availability Performance Security Manageability
More informationAT&T Collaborate TM. Network Assessment Tool
AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationServer Specifications
Requirements Server s It is highly recommended that MS Exchange does not run on the same server as Practice Evolve. Server Minimum Minimum spec. is influenced by choice of operating system and by number
More informationChapter 3 Packet Switching
Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More informationFundamentals of Networking Network Terminologies
Fundamentals of Networking Network Terminologies Kuldeep Sonar 1 Performance Measurements Kuldeep Sonar 2 Latency Refers to the amount of time (usually measured in milliseconds) it takes for data to travel
More informationFocus Study Communication 2 (FSCo2) Digital Download & File Storage. G. Georgiou
Focus Study Communication 2 (FSCo2) Digital Download & File Storage Name 1 General Mathematics (Preliminary Course) Digital Downloads & File Storage G. Georgiou Use Prefixes to Describe the Size of Units
More informationModule 3. Wide Area Networking (WAN)
Module 3 Wide Area Networking (WAN) When many nodes or LAN s are connected together in a large scale, we have a WAN. This may be world wide. Because of the separation of the nodes, the Public Data Network
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Computer Networks and The Inter Sec 1.3 Prof. Lina Battestilli Fall 2017 Outline Computer Networks and the Inter (Ch 1) 1.1 What is the Inter? 1.2 work
More information1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
CCNA 1 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? application transport data link physical
More informationTop-Down Network Design
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Original slides by Cisco Press & Priscilla Oppenheimer Scalability Availability Performance Accuracy Security Manageability Usability
More informationCSE 1 23: Computer Networks
CSE 1 23: Computer Networks Total Points: 47.5 Homework 2 Out: 10/18, Due: 10/25 1. The Sliding Window Protocol Assume that the sender s window size is 3. If we have to send 10 frames in total, and the
More informationIs BranchCache right for remote, serverless software distribution?
Is BranchCache right for remote, serverless software distribution? 1E Technical Whitepaper Microsoft BranchCache and System Center Configuration Manager 2007 Abstract BranchCache is a new feature available
More informationWAN-accelerators, How they work
WAN-accelerators, How they work By: Fred Geerlings Version: 1.0 Date: April 1 st 2015 table of contents 1 Introduction... 3 2 IPknowledge... 3 3 Management Summary... 3 4 TCP protocol... 4 5 Latency reduction...
More informationPerformance of VMware vcenter. 5.0 in Remote Offices and Branch Offices. Performance Study TECHNICAL WHITE PAPER
Performance of VMware vcenter 5. in Remote Offices and Branch Offices Performance Study TECHNICAL WHITE PAPER Performance of VMware vcenter 5. in Table of Contents Introduction... 3 Executive Summary...
More informationAT&T Collaborate TM. Network Assessment Tool
AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationNetworking Fundamentals Tom Brett
Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct
More informationEng 3553 Lab #5 TCP Throughput
Eng 3553 Lab #5 TCP Throughput Overview TCP (Transmission Control Protocol) is a means for building a reliable communications stream, enabling two hosts to establish a connection and exchange streams of
More informationEXAM TCP/IP NETWORKING Duration: 3 hours
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationThis tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found
FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationFUJIFILM MEDICAL SYSTEMS
FUJIFILM MEDICAL SYSTEMS Product Data Synapse Release Version 4.2 Foundation Technologies Application Synapse server is a collection of software modules built on Microsoft Windows Server, which together
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationb A bit is the basic unit for storing electronic data, for example an MP3 file. The term bit is a
Digital download and file storage Syllabus: FSCo2 Focus Study: Mathematics and Communication Digital Storage b A bit is the basic unit for storing electronic data, for example an MP3 file. The term bit
More informationSage ERP MAS 200 SQL Version 4.50 Supported Platform Matrix Revised as of July 24, 2014
The information in this document applies to Sage ERP MAS 200 SQL Version 4.50.Detailed product update information and support policies can be found on the Customer Portal at: http://na.sage.com/log-on/
More informationSELECTION OF METRICS (CONT) Gaia Maselli
SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual
More informationInternet Architecture & Performance. What s the Internet: nuts and bolts view
Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,
More informationTutorial 8 : Congestion Control
Lund University ETSN01 Advanced Telecommunication Tutorial 8 : Congestion Control Author: Antonio Franco Emma Fitzgerald Tutor: Farnaz Moradi December 18, 2015 Contents I Before you start 3 II Exercises
More informationPerformance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation
Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University
More informationInternetwork. recursive definition point-to-point and multi-access: internetwork. composition of one or more internetworks
Internetwork A B E C D recursive definition point-to-point and multi-access: internetwork composition of one or more internetworks Additional complications to deal with: addressing necessary LAN addresses
More informationObjective To examine the change in throughput in a local area network when upgrading from a hub to a switch.
Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationemix Implementation Steps
emix Implementation Steps Copyright 2009-2013 DR Systems, Inc. 1 Contents About emix 3 Benefits... 3 How emix works... 3 1 Installing the emix Gateway 4 Station requirements... 4 Additional station requirements...
More informationContents Overview of the Compression Server White Paper... 5 Business Problem... 7
P6 Professional Compression Server White Paper for On-Premises Version 17 July 2017 Contents Overview of the Compression Server White Paper... 5 Business Problem... 7 P6 Compression Server vs. Citrix...
More informationEXAM TCP/IP NETWORKING Duration: 3 hours With Solutions
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you
More informationNETWORK ASSISTED RATE ADAPTATION FOR CONVERSATIONAL VIDEO OVER LTE CSWS 14
NETWORK ASSISTED RATE ADAPTATION FOR CONVERSATIONAL VIDEO OVER LTE CSWS 14 {Ylva.Timner, Jonas.Pettersson, Hans.Hannu, Min.W.Wang, Ingemar.S.Johansson}@ericsson.com Endpoint based rate adaptation Examples
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationTopics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput
Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve
More informationQuickStart Guide. Concur Premier: Travel Request
QuickStart Guide Concur Premier: Travel Request Proprietary Statement This document contains proprietary information and data that is the exclusive property of Concur Technologies, Inc., Redmond, Washington.
More informationAVANTUS TRAINING PTE LTD
[ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and
More informationCOMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)
COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be
More informationCell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets
Cell Switching (ATM) Connection-oriented packet-switched network Used in both WAN and LAN settings Signaling (connection setup) Protocol: Q2931 Specified by ATM forum Packets are called cells 5-byte header
More informationAMS R1 & 2, 2015, and 2016 Online Configuration Guide May 2016
AMS360 2014 R1 & 2, 2015, and 2016 Online Configuration Guide May 2016 5/20/16 2016 Vertafore, Inc. and its subsidiaries. All rights reserved. Vertafore, the Vertafore logo, and other trademarks are trademarks
More informationPrepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT
Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define
More informationBest Practices with StarWind Replication
Best Practices with StarWind Replication 2012 NetEx Software 6420 Sycamore Lane N. Suite 300 Maple Grove, MN 55369 http://www.netex.com HyperIP with StarWind Replication Page 1 of 11 HyperIP in a Network
More informationCSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012
CSE 473 Introduction to Computer Networks Jon Turner Exam 2 Your name here: 11/7/2012 1. (10 points). The diagram at right shows a DHT with 16 nodes. Each node is labeled with the first value in its range
More informationEdexcel GCSE in Computer Science Microsoft IT Academy Mapping
Edexcel GCSE in Computer Science Microsoft IT Academy Mapping Topic 1: Problem solving Subject Content: 1.1 Algorithms MOAC course and lesson(s) MVA course and module(s) : 1.1.1 Understand what an algorithm
More informationSage MAS 200 ERP Supported Platform Matrix
The information in this document applies to Level 3.71 through version 4.30. Sage generally only supports the current Sage MAS 200 level and one prior major level. As of the version 4.10 release, Sage
More informationIT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS
Prjoect Overview IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS Phase II of the project will pick up where the IT Infrastructure Project Phase I left off. In this project, you will see how a network administrator
More informationSage 200 Online. System Requirements and Prerequisites
Sage 200 Online System Requirements and Prerequisites v2013 Copyright statement Sage (UK) Limited, 2013. All rights reserved. If this documentation includes advice or information relating to any matter
More informationLab 1: Improving performance by LAN Hardware Upgrade
Lab 1: Improving performance by LAN Hardware Upgrade Objective In this lab, OPNET s IT Guru Academic Edition advanced modeling software will be used to study performance improvements in LAN obtained by
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationPerformance Evaluation of WiFiRe using OPNET
Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support
More informationEL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002
Instructions: EL 604 - Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Be sure to write your name on your submission. This is an open book test. Use your class notes,
More informationCollege of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435
College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed
More informationP6 Compression Server White Paper Release 8.2 December 2011 Copyright Oracle Primavera P6 Compression Server White Paper Copyright 2005, 2011, Oracle and/or its affiliates. All rights reserved. Oracle
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationPerformance Modeling
Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia
More informationChapter 1: Introduction
Chapter 1: Introduction Our goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?
More informationMonitoring and Analysis
CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationOverview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.
Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationServer Specifications
Requirements Server s It is highly recommended that MS Exchange does not run on the same server as Practice Evolve. Server Minimum Minimum spec. is influenced by choice of operating system and by number
More informationEXAM TCP/IP NETWORKING Duration: 3 hours With Solutions
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2016 INSTRUCTIONS 1. Write your solution into this document and return it to us (you
More informationTCP/IP Performance ITL
TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,
More information