Lecture 8: Flow Analysis

Size: px
Start display at page:

Download "Lecture 8: Flow Analysis"

Transcription

1 Lecture 8: Flow Analysis Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG Network Analysis Requirement Analysis Gather Requirements Develop Service Metrics to Measure Performance capacity, delay, RMA Characterizing Behavior Develop Performance Thresholds Distinguishing Between Service Requirements Flow Analysis Establish Flow Boundaries Identify Backbone/Composite Flow Develop Flowspec Capacity Plan Service Plan Prof. Shervin Shirmohammadi CEG

2 Flow Analysis Flow analysis is the process of characterizing traffic flow through the network. The intent is not to show every flow in the network only show those that have the greatest impact on the network architecture and design. Generally these are often a small fraction of the total set of flows for a network. We will look at: Individual, composite, and critical flows. Source and sink models Flow models Flow specifications. Lecture 9 Prof. Shervin Shirmohammadi CEG Background We have established the user, application, host and the network requirements, established requirements specifications Further analyse these requirements based on their end-to-end characteristics We will discuss the concepts of flow and flow specification Use with best effort service for capacity planning Use with specified services for service planning Introduce flow concepts Data sources and sinks Flow models Flow distributions To identify, size, and choose flows Develop cumulative performance specifications for each flow Prof. Shervin Shirmohammadi CEG

3 Definition A Flow is A set of application and protocol information that has some common attributes, such as Source address, Destination address, Information type, Options, Routing, etc. and is transmitted during a single session of an application. Source/Destination Addresses, Port Numbers, Information Type Network User, Server or Other Device Routing through Network QoS Parameters, Directionality Prof. Shervin Shirmohammadi CEG Concepts Flows are: End-to-end, source-to destination (between applications/hosts) They can be directly linked to an application, device, or network Can also be examined on a link-by-link or Network-by-network basis Flow analysis is where performance requirements, services, and service metrics are combined with location information to show where service is needed in the network. Flow Analysis can provide: An end-to-end perspective on requirements Some insight to the degree of hierarchy and redundancy needed Useful information for choosing an interconnection strategy Switching Routing, or Hybrid mechanisms Prof. Shervin Shirmohammadi CEG

4 Representing Flows Flow 1 (Bidirectional) 100 Kb/s Upstream 500 Kb/s Downstream Flow 2 (Unidirectional) 100 Kb/s, 40 ms Upstream Flow Kb/s Flow 3 & 4 (A set of 2 unidirectional flows) Flow 4 1 Mb/s Prof. Shervin Shirmohammadi CEG Types of Flows Individual flow Flow for a single session of an application. When an individual flow has guaranteed requirements it is generally kept with that individual flow. Composite flow Combination of requirements from multiple applications or individual flows. Most flows in a network are composite. Backbone flow Really a composite flow that is defined by its location in the network (i.e. backbone layer). At this stage of our design we should not be considering network structure, so backbone flow should not really exist as such (it should simply be composite flow). Prof. Shervin Shirmohammadi CEG

5 Example Prof. Shervin Shirmohammadi CEG Flow Identification and Development Process Identify Flows, Flow Requirements, and Locations from Requirements Specification Determine where sources and sinks are located Apply flow models where needed Combine performance requirements for flows into flow specification Prof. Shervin Shirmohammadi CEG

6 Critical Flows Critical flows are flows that are more important than others. They are higher in performance or have strict requirements. mission critical, rate-critical, real-time, interactive, high performance. Also, individual flows with guaranteed requirements. More about this in the next lecture. How to identify flows? From an application perspective: Focus on a particular application, application group, device, or function (e.g. video conference, storage). Develop a profile of common or selected applications that can be applied over a user population. Choose the top N (e.g. 3, 5, 10) applications to be applied across the entire network. Prof. Shervin Shirmohammadi CEG Focusing on A Particular App App1: staging data from devices, 100 Kbps, 100 reliability App1: migrating data between servers, 500 Kbps, 100% reliability App2: migrating to remote storage, 10Mbps, 100% reliability Prof. Shervin Shirmohammadi CEG

7 Flow Estimation Determined from requirements For App1: Prof. Shervin Shirmohammadi CEG Flow Requirements Between buildings Between devices Prof. Shervin Shirmohammadi CEG

8 Flow within Building C Prof. Shervin Shirmohammadi CEG Flow Aggregation Prof. Shervin Shirmohammadi CEG

9 Developing a Profile Can use profiles to group flows of common applications. Instead of replicating information, one can use the profile tag. P1: 100 Kbps, 100% reliability. Prof. Shervin Shirmohammadi CEG Data Sources and Sinks A data source is a device or group of devices that primarily produces data that the network will carry A data sink primarily accepts data from the network, acting as a data repository. Most devices on a network will both produce and accept data Data sources: Computing servers, Mainframes, Parallel systems, Computing clusters Data sinks: Groups of disks/tape devices, Video editing or display devices Gives an indication of where flows are consolidated or generated Network Source Sink Prof. Shervin Shirmohammadi CEG

10 Exercise Which of the following devices are data sinks, and which one are data sources? (a) A storage device receiving streaming video from a camera Data Sink (b) A video editing unit, using video from the storage device in (a) Data sink and source (assuming video is written back into (a) (c) A web server Data source, mainly. (d) A storage disk farm Data source and data sink Prof. Shervin Shirmohammadi CEG Data Source and Sink Map (1/3) Prof. Shervin Shirmohammadi CEG

11 Data Source and Sink Map (2/3) Prof. Shervin Shirmohammadi CEG Data Source and Sink Map (3/3) Prof. Shervin Shirmohammadi CEG

12 Choosing the Top N Applications Decision can be based on a number of factors ranging from degrees of usage, number of users, number of devices / servers, or performance requirements. Example: top 5 applications: Web browsing File transfer Word processing Database transactions These top N applications must be the performance drivers fro the network. Always ask: if requirements for Top N are met, are the requirements for the eliminated (from the Top N list) applications met too? Prof. Shervin Shirmohammadi CEG

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network Architecture Architecture: high-level, end-to-end structure

More information

Lecture 16: Architectural Considerations

Lecture 16: Architectural Considerations Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network : high-level, end-to-end structure for the network. Relationships

More information

Lecture 4: Introduction to Computer Network Design

Lecture 4: Introduction to Computer Network Design Lecture 4: Introduction to Computer Network Design Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi Hussein Al Osman CEG4190 4-1 Computer Networks Hussein Al Osman CEG4190 4-2

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG Lecture 6: Network Analysis: Process Part 1 Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 6-1 Overview The principles, guidelines, and procedures for requirements

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Lecture 20: Automated Fault Management

Lecture 20: Automated Fault Management Lecture 20: Automated Fault Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 20-1 Fault Management Fault Management consists of 5 steps: 1. Fault detection

More information

Automated Fault Management. Lecture 20: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG

Automated Fault Management. Lecture 20: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG Lecture 20: Automated Fault Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 20-1 Fault Management Fault Management consists of 5 steps: 1. Fault detection

More information

Lecture 6: Network Analysis: Process Part 1

Lecture 6: Network Analysis: Process Part 1 Lecture 6: Network Analysis: Process Part 1 Instructor: Hussein Al Osman Based on Slides by: Profs Makrakis and Shirmohammadi Hussein Al Osman CEG4190 6-1 Overview The principles, guidelines, and procedures

More information

Lecture 4: The Transport Layer and UDP

Lecture 4: The Transport Layer and UDP Lecture 4: The Transport Layer and UDP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 4-1 The Transport Layer Provides efficient and robust end-to-end service

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Lecture 14: Multimedia Communications

Lecture 14: Multimedia Communications Lecture 14: Multimedia Communications Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 14-1 Multimedia Characteristics Bandwidth Media has natural bitrate, not very flexible. Packet

More information

Lecture 4: Basic Internet Operations

Lecture 4: Basic Internet Operations Lecture 4: Basic Internet Operations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 4-1 LAN View A LAN 2 B Hub 2 Gateway to Internet Hub 1 Z (Gateway) LAN 1

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. OSI Management. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. OSI Management. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: OSI Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 17-1 OSI Characteristics OSI: International Standards Organizations (ISO OSI) Deals

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

Data Warehousing. Data Warehousing and Mining. Lecture 8. by Hossen Asiful Mustafa

Data Warehousing. Data Warehousing and Mining. Lecture 8. by Hossen Asiful Mustafa Data Warehousing Data Warehousing and Mining Lecture 8 by Hossen Asiful Mustafa Databases Databases are developed on the IDEA that DATA is one of the critical materials of the Information Age Information,

More information

Lecture 10: Protocol Design

Lecture 10: Protocol Design Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications

More information

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

Replicate It! Scalable Content Delivery: Why? Scalable Content Delivery: How? Scalable Content Delivery: How? Scalable Content Delivery: What?

Replicate It! Scalable Content Delivery: Why? Scalable Content Delivery: How? Scalable Content Delivery: How? Scalable Content Delivery: What? Accelerating Internet Streaming Media Delivery using Azer Bestavros and Shudong Jin Boston University http://www.cs.bu.edu/groups/wing Scalable Content Delivery: Why? Need to manage resource usage as demand

More information

Cisco Virtualized Workload Mobility Introduction

Cisco Virtualized Workload Mobility Introduction CHAPTER 1 The ability to move workloads between physical locations within the virtualized Data Center (one or more physical Data Centers used to share IT assets and resources) has been a goal of progressive

More information

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC CS2060 - High Speed Networks Dr.G.A.Sathish Kumar Professor EC UNIT V PROTOCOLS FOR QOS SUPPORT UNIT V PROTOCOLS FOR QOS SUPPORT RSVP Goals & Characteristics RSVP operations, Protocol Mechanisms Multi

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study Case Study 1588v2 Performance Validation for Mobile Backhaul May 2011 Executive Summary Many mobile operators are actively transforming their backhaul networks to a cost-effective IP-over- Ethernet paradigm.

More information

Managing Access to Web Applications

Managing Access to Web Applications This chapter contains the following sections: Overview of, on page 1 Enabling the AVC Engine, on page 2 Policy Application Control Settings, on page 3 Controlling Bandwidth, on page 5 Controlling Instant

More information

CCNA Exploration: Routing Protocols and Concepts Chapter 5 Case Study

CCNA Exploration: Routing Protocols and Concepts Chapter 5 Case Study Objectives: Enforce RIPv1 poor metric calculation (hop count). Enforce importance of smooth routing protocol migration. Introduce the concept of Load Balance. Consolidate the interface bandwidth command

More information

Cache Memory and Performance

Cache Memory and Performance Cache Memory and Performance Cache Performance 1 Many of the following slides are taken with permission from Complete Powerpoint Lecture Notes for Computer Systems: A Programmer's Perspective (CS:APP)

More information

ASA 8.X and later: Add or Modify an Access List through the ASDM GUI Configuration Example

ASA 8.X and later: Add or Modify an Access List through the ASDM GUI Configuration Example ASA 8.X and later: Add or Modify an Access List through the ASDM GUI Configuration Example Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

A New Approach To Manage a Best Effort IP WAN Services

A New Approach To Manage a Best Effort IP WAN Services A New Approach To Manage a Best Effort IP WAN Services Network Management Components Network Engineering Corporate Policy Traffic Engineering Network Planning Network Monitoring Network Forecasting 1 Network

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:

More information

Congestion Notification in Pre-defined Network Domains

Congestion Notification in Pre-defined Network Domains Congestion Notification in Pre-defined Network Domains Mehmet Toy, Ph.D February, 2014 Problem Statement Ethernet is the dominant technology for access networks and becoming an alternative technology for

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Metodologia de Projecto 4 - Project Methodology 4 1 Hierarchical

More information

Design Process of IT Infrastructures Network Architecture and Design

Design Process of IT Infrastructures Network Architecture and Design Mestrado em Engenharia InformáEca e de Computadores Master Degree (MSc) in InformaEon Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and

More information

Lecture 19: Web Based Management

Lecture 19: Web Based Management Lecture 19: Web Based Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 19-1 Using the Web for Management Web browser UI connects with the management

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 35 Software-Defined lot Networking - Part- 1 Having

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet

More information

Guide to Google Analytics: Admin Settings. Campaigns - Written by Sarah Stemen Account Manager. 5 things you need to know hanapinmarketing.

Guide to Google Analytics: Admin Settings. Campaigns - Written by Sarah Stemen Account Manager. 5 things you need to know hanapinmarketing. Guide to Google Analytics: Google s Enhanced Admin Settings Written by Sarah Stemen Account Manager Campaigns - 5 things you need to know INTRODUCTION Google Analytics is vital to gaining business insights

More information

Adobe Analytics Product description

Adobe Analytics Product description Adobe Analytics Product description Effective as of: March 6, 2017 What is Adobe Analytics? Adobe Analytics provides reporting, visualizations, and analysis of Customer Data that allows Customers to discover

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved NOTICE This document contains DragonWave proprietary information. Use, disclosure, copying or distribution of any part of the information contained herein, beyond that for which it was originally furnished,

More information

Implementing QoS in IP networks

Implementing QoS in IP networks Adam Przybyłek http://przybylek.wzr.pl University of Gdańsk, Department of Business Informatics Piaskowa 9, 81-824 Sopot, Poland Abstract With the increasing number of real-time Internet applications,

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID, IPS,

More information

Multicast Communications. Tarik Čičić, 4. March. 2016

Multicast Communications. Tarik Čičić, 4. March. 2016 Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

Traffic Monitoring. Traffic Monitoring

Traffic Monitoring. Traffic Monitoring , page 1 Creating a Session, page 6 Editing an Existing Session, page 7 Activating or Deactivating a Session, page 7 Deleting a Session, page 8 Traffic monitoring copies traffic, from one or more source

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3060 PA-3050 PA-3020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

Configuring Modular QoS on Link Bundles

Configuring Modular QoS on Link Bundles A link bundle is a group of one or more ports that are aggregated together and treated as a single link. This module describes QoS on link bundles. Line Card, SIP, and SPA Support Feature ASR 9000 Ethernet

More information

White Paper Network Management Considerations For VSAT Technology March 2010

White Paper Network Management Considerations For VSAT Technology March 2010 White Paper Network Management Considerations For VSAT Technology March 2010-1 - Introduction Network management is a serious aspect of any business, if not one of the most important. It is essential that

More information

Aquaforest CheckPoint Reference Guide

Aquaforest CheckPoint Reference Guide Aquaforest CheckPoint Reference Guide Version 1.01 April 2015 Copyright 2005-2015 Aquaforest Limited http://www.aquaforest.com/ Contents 1 Product Overview... 3 2 Installation and Licensing... 4 2.1 Installation...

More information

Broadband Quality of Service

Broadband Quality of Service Broadband Quality of Service Prof. Timothy Gonsalves Dept of Computer Science & Engg TeNeT Group, IIT-Madras tag@tenet.res.in 18 Mar 08 1 Overview The users The technologies The QoS metrics The evaluation

More information

Isolate-User-VLAN Technology White Paper

Isolate-User-VLAN Technology White Paper Isolate-User-VLAN Technology White Paper Keywords: Isolate-user-VLANs, secondary VLANs Abstract: Isolate-user-VLAN adopts a two-tier VLAN structure: an upper level isolate-user-vlan and multiple lower-level

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN Finding Feature Information, page 1 Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 2 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

VMware vsphere: Fast Track [V6.7] (VWVSFT)

VMware vsphere: Fast Track [V6.7] (VWVSFT) VMware vsphere: Fast Track [V6.7] (VWVSFT) Formato do curso: Presencial Preço: 3950 Nível: Avançado Duração: 50 horas This five-day, intensive course takes you from introductory to advanced VMware vsphere

More information

Interim Master Thesis Talk. Extension of a DiffServ enabled IP core network for delivering QoS to the xdsl access. Sandeep Misra

Interim Master Thesis Talk. Extension of a DiffServ enabled IP core network for delivering QoS to the xdsl access. Sandeep Misra Interim Master Thesis Talk Extension of a DiffServ enabled IP core network for delivering QoS to the xdsl access By : Guide : Prof. Hußmann 02.07.2002 1 AQUILA (IST-1999-10077) Adaptive Resource Control

More information

Wireless Backhaul Synchronization

Wireless Backhaul Synchronization Wireless Backhaul Synchronization Abstract This paper focuses on Next Generation Backhaul Networks Synchronization and the way it is implemented by Ceragon s high capacity, LTE Ready point to point microwave

More information

Measuring BGP. Geoff Huston. CAIA SEMINAR 31 May

Measuring BGP. Geoff Huston. CAIA SEMINAR 31 May Measuring BGP Geoff Huston BGP is An instance of the Bellman-Ford Distance Vector family of routing protocols And a relatively vanilla one at that The routing protocol used to support inter-domain routing

More information

VMware vsphere: Fast Track. System administrators System engineers. Cursusduur: 5 Dagen Cursuscode: VSFT Version: 6.7. Beschrijving: Doelgroep:

VMware vsphere: Fast Track. System administrators System engineers. Cursusduur: 5 Dagen Cursuscode: VSFT Version: 6.7. Beschrijving: Doelgroep: VMware vsphere: Fast Track Cursusduur: 5 Dagen Cursuscode: VSFT Version: 6.7 Beschrijving: This five-day, intensive course takes you from introductory to advanced VMware vsphere management skills. Building

More information

CS 126 Lecture S5: Networking

CS 126 Lecture S5: Networking CS 126 Lecture S5: Networking Outline Introductions Connectivity Naming and addressing Abstractions and layering Example: socket programming Conclusions CS126 24-1 Randy Wang Review: Technology Advances

More information

CS 126 Lecture S5: Networking

CS 126 Lecture S5: Networking CS 126 Lecture S5: Networking Outline Introductions Connectivity Naming and addressing Abstractions and layering Example: socket programming Conclusions CS126 24-1 Randy Wang Review: Technology Advances

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-500 PA-220 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Computer Networks and The Inter Sec 1.3 Prof. Lina Battestilli Fall 2017 Outline Computer Networks and the Inter (Ch 1) 1.1 What is the Inter? 1.2 work

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

Intelligent Routing Platform

Intelligent Routing Platform WHITE PAPER Bring Intelligence to your Network Copyright 2018 Noction Inc. Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4

More information

Access Control Using Intelligent Application Bypass

Access Control Using Intelligent Application Bypass Access Control Using Intelligent Application Bypass The following topics describe how to configure access control policies to use Intelligent Application Bypass: Introducing Intelligent Application Bypass,

More information

*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM

*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM PA-820 PA-500 Feature Performance *Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM models please refer to hypervisor, cloud specific data sheet

More information

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch.

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch. CHAPTER 23 This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Request for Comments: 2889 Category: Informational Spirent Communications August Benchmarking Methodology for LAN Switching Devices

Request for Comments: 2889 Category: Informational Spirent Communications August Benchmarking Methodology for LAN Switching Devices Network Working Group Request for Comments: 2889 Category: Informational R. Mandeville CQOS Inc. J. Perser Spirent Communications August 2000 Status of this Memo Benchmarking Methodology for LAN Switching

More information

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Instructions: EL 604 - Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Be sure to write your name on your submission. This is an open book test. Use your class notes,

More information

Database Services at CERN with Oracle 10g RAC and ASM on Commodity HW

Database Services at CERN with Oracle 10g RAC and ASM on Commodity HW Database Services at CERN with Oracle 10g RAC and ASM on Commodity HW UKOUG RAC SIG Meeting London, October 24 th, 2006 Luca Canali, CERN IT CH-1211 LCGenève 23 Outline Oracle at CERN Architecture of CERN

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

AfriConnect Satellite Technology Overview

AfriConnect Satellite Technology Overview AfriConnect Satellite Technology Overview Topics Why VSAT? Defining The Network Requirements Coverage Traffic & Connectivity Features Public & Private Networks Understanding The Technology VSAT Terminal

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

Technology Insight Series

Technology Insight Series IBM ProtecTIER Deduplication for z/os John Webster March 04, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved. Announcement Summary The many data

More information

Outline. Parallel Database Systems. Information explosion. Parallelism in DBMSs. Relational DBMS parallelism. Relational DBMSs.

Outline. Parallel Database Systems. Information explosion. Parallelism in DBMSs. Relational DBMS parallelism. Relational DBMSs. Parallel Database Systems STAVROS HARIZOPOULOS stavros@cs.cmu.edu Outline Background Hardware architectures and performance metrics Parallel database techniques Gamma Bonus: NCR / Teradata Conclusions

More information

TKN. Technische Universität Berlin. Circuit Switching Module for ns-2. Filip Idzikowski. Berlin, March 2009

TKN. Technische Universität Berlin. Circuit Switching Module for ns-2. Filip Idzikowski. Berlin, March 2009 TKN Telecommunication Networks Group Technische Universität Berlin Telecommunication Networks Group Circuit Switching Module for ns-2 Filip Idzikowski idzikowski@tkn.tu-berlin.de Berlin, March 2009 TKN

More information

Exadata Database Machine: 12c Administration Workshop Ed 2

Exadata Database Machine: 12c Administration Workshop Ed 2 Oracle University Contact Us: 800-260-690 Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop training

More information

VM Aware Fibre Channel

VM Aware Fibre Channel White Paper White Paper VM-ID VM Aware Fibre Channel Virtual Machine Traffic Visibility for SANs StorFusion VM-ID feature on QLogic Gen6 (32G) and Enhanced Gen5 (16G) Fibre Channel KEY BENEFITS Increases

More information

Dell Storage vsphere Web Client Plugin. Version 4.0 Administrator s Guide

Dell Storage vsphere Web Client Plugin. Version 4.0 Administrator s Guide Dell Storage vsphere Web Client Plugin Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION:

More information

Exadata Database Machine: 12c Administration Workshop Ed 2

Exadata Database Machine: 12c Administration Workshop Ed 2 Oracle University Contact Us: 00 9714 390 9050 Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop

More information

Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days

Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days This Exadata Database Machine: 12c Administration Workshop introduces you to Oracle Exadata Database Machine. Explore the various

More information

Cisco IOS LISP Application Note Series: Access Control Lists

Cisco IOS LISP Application Note Series: Access Control Lists Cisco IOS LISP Application Note Series: Access Control Lists Version 1.1 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration and configuration

More information

Networks Hardware Components

Networks Hardware Components Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices

More information

SQL Diagnostic Manager Management Pack for Microsoft System Center

SQL Diagnostic Manager Management Pack for Microsoft System Center SQL Diagnostic Manager Management Pack for Microsoft System Center INTEGRATE SQL SERVER MONITORS AND ALERTS WITH SYSTEM CENTER SQL Diagnostic Manager (SQL DM) Management Pack for Microsoft System Center

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

Multi-Protocol Label Switching

Multi-Protocol Label Switching Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol Multi-Protocol Label Switching Seminar: Datenkommunikation und Verteilte Systeme SS 2003

More information

4 Chip Multiprocessors (I) Chip Multiprocessors (ACS MPhil) Robert Mullins

4 Chip Multiprocessors (I) Chip Multiprocessors (ACS MPhil) Robert Mullins 4 Chip Multiprocessors (I) Robert Mullins Overview Coherent memory systems Introduction to cache coherency protocols Advanced cache coherency protocols, memory systems and synchronization covered in the

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-850 PA-820 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information