Avaya ExpertNet Lite Assessment Tool
|
|
- Julianna Johns
- 5 years ago
- Views:
Transcription
1 IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005
2 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation... 2 Delay Measurements... 3 Router Monitoring... 5 Installation Planning... 5 Reports... 6 ExpertNet Lite Assessment Tool and the ExpertNet VoIP Assessment Tool... 6 Glossary & Acronyms... 6
3 avaya.com 1 Overview This document is for customers who purchase implementation services for an IP Telephony solution requiring an IP Network Readiness Assessment Basic deliverable. The tool used to deliver the basic Readiness Assessment is the ExpertNet Lite Assessment Tool. This document explains what the purpose of the ExpertNet Lite Assessment Tool software is and an overview of its operation. This is a technical document; hence some specialized knowledge is assumed. Specifically, the reader should have a sound knowledge of basic TCP/IP networking theory and practice, IP packet routing, routing protocols and related technologies. The ExpertNet Lite Assessment Tool is a software application designed to perform an IP Network Readiness Assessment. To accomplish this, the tool gathers quality of service (QoS) information from an IP network. The data gathered is then analyzed by Avaya engineers to produce an ExpertNet Lite Assessment Tool report. It is designed to run for an extended period of time, typically five to seven days (note that five days is the recommended minimum), in order to see trends in network performance. These trends are often visible when the data is summarized graphically, and such graphs are typically included in an ExpertNet Lite Assessment Tool report. The IP Network Readiness Assessment Basic deliverable is intended to assess the suitability of a given network for Voice over IP (VoIP) applications. Hence the data gathered by the ExpertNet Lite Assessment Tool is tailored towards such applications. This is a key differentiator between the ExpertNet Lite Assessment Tool and other network performance measurement tools. The ExpertNet Lite Assessment Tool provides a network discovery operation and relies on a network topology discovery tool called the Avaya ExpertNet Discovery Tool. The operation of this tool is not discussed in this document, but further information can be obtained from Avaya. The network topology discovered by this tool is read by the ExpertNet Lite Assessment Tool, and used to determine the extent of the network to be monitored. Automatic network discovery is optional in the ExpertNet Lite Assessment Tool. It is performed only when the user selects the Discover Paths menu option. Users may also enter network paths manually. When entering paths manually, the user has the choice of entering proper paths or target-type paths. When entering a proper path, the agent, using an enhanced, patented trace-route with an ability to discover load-balanced links, discovers intermediate routers. When entering a target-type path, no intermediate routers are discovered. The ExpertNet Lite Assessment Tool is comprised of two parts: an Agent, which gathers measurements data, and the Server, which resides in a secure environment within Avaya infrastructure that interprets the measurements data. The Agent is available for download on external Avaya servers. When the Agent concludes measurements gathering, it compresses the data and then encrypts it utilizing 1024 bit encryption. If the Agent PC resides on a network directly connected to the Internet, the Agent can automatically upload the encrypted dataset onto Avaya servers. The uploaded dataset is not accessible to anyone external to Avaya. The dataset is then moved to a secure server and removed from the intermediate server. The Avaya technician involved in the Network Readiness Assessment is notified once the dataset has been stored. Use of the ExpertNet Lite Assessment Tool requires a valid license for up to 30 days from the date of generation. Please contact your Avaya representative for information about obtaining a license. Documentation, release notes and context-sensitive on-line help describe the procedure for running the ExpertNet Lite Assessment Tool.
4 COMMUNICATIONS AT THE HEART OF BUSINESS 2 Network Impact The ExpertNet Lite Assessment Tool is designed to have a low impact on the network under test. This means it injects a minimal amount of traffic into the network, and has built-in safeguards to ensure that the traffic does not exceed set limits. These traffic throttling limits can be increased or decreased as required, however the defaults should be sufficient for most customer network environments. Broadly speaking, there are two types of traffic that the ExpertNet Lite Assessment Tool uses to perform its measurements. These are delay (or ping ) packets and SNMP get queries, discussed further in the Delay Measurements and Router Monitoring sections below. The traffic throttling can be adjusted independently for each of these two types of measurements. The ExpertNet Lite Assessment Tool has been designed carefully and tested extensively, to ensure that it does not alter the configuration of, or otherwise affect adversely, any device in the network. For example, all of the SNMP traffic is get requests and responses. In addition, the ExpertNet Lite Assessment Tool produces extensive logging of all of its activities. Network Paths One of the key concepts in the ExpertNet Lite Assessment Tool is that of a network path. When a packet is sent from a host, it may pass through many different links and routers before arriving at its destination. This set of hosts, routers and links is known as the network path. The network path is significant because the overall performance of the path can be affected by the performance of the individual components of the path. For example, excessive packet loss on a network path can be due to congestion on one of the intermediate routers between source and destination. Hence the concept of network path allows data from different sources to be correlated and analyzed together. One of the key assumptions of the ExpertNet Lite Assessment Tool is that measurement of network performance to and from a single point can lead to meaningful inferences about the performance of the network as a whole. This means that all paths in the ExpertNet Lite Assessment Tool originate at a single point, the PC that runs the ExpertNet Lite Assessment Tool software. All paths terminate at network edges, and the process of generating paths is described in the section Path Generation below. The ExpertNet Lite Assessment Tool is designed such that no other additional special software is needed to run in the network. Instead, the tool measures network performance by relying on the default behavior of IP implementations for each device in the path. This is discussed further below. For the ExpertNet Lite Assessment Tool purposes the concept of path applies to the Internet Protocol (IP) layer. The tool does not monitor directly any network performance or topology for network link or physical layers (terminology as defined by the ISO network stack). For example, the ExpertNet Lite Assessment Tool does not attempt to discover Ethernet topology or monitor directly Ethernet performance. It is anticipated that performance problems for layer 2 links will be indirectly apparent at the IP layer. For example, if a problematic Ethernet segment is resulting in 1% of frames being lost, this will generally be apparent at the IP layer as 1% packet loss. Path Generation In order to make meaningful interpretation of packet delay measurements, the ExpertNet Lite Assessment Tool needs to ensure that the path taken by each packet is known. Determining this path is also necessary in order
5 avaya.com 3 to monitor the correct router interfaces. This path generation process is conducted when the user executes either Discover Paths or Add Path Manually. The set of paths is generated from the topology file produced by the ExpertNet Discovery Tool or manually entered by the user. Each path starts at the agent host and ends with a host in the edge subnet. Between the Assessment Tool and the edge host/router are intermediate routers. When generating paths, the ExpertNet Lite Assessment Tool uses a patented technique of enhanced traceroute. For each edge device, packets are sent with successively incrementing TTL values. The TTL-expired message returned is used to enumerate the path taken from the Agent host to each edge subnet. At the same time, sequences of pings are sent to determine load-balanced links. It is important to note that the process used to generate paths is similar to that used when making the delay measurements. This has the benefit that the paths are verified throughout the monitoring period. Concurrently with path generation, the ExpertNet Lite Assessment Tool also attempts to detect the presence of load-balanced links. Modern routing protocols such as OSPF allow for the presence of multiple equal-cost paths between two points in the network. Routers for load balancing purposes typically utilize these links. The ExpertNet Lite Assessment Tool attempts to determine which of the multiple routes in a load-balanced link is to be used for any given packet. Generally routers implement load balancing on either a per-packet or per-destination basis. Where per-packet load balancing is used, two successive packets to the same destination can take different paths through the network. This has the potential to negatively impact VoIP applications. Per-destination load balancing provides a stable route for successive packets, however the ExpertNet Lite Assessment Tool must still determine which of the possible routes is being used for the delay measurement packets. The Agent s GUI provides Ping Status information at the path and hop level which shows whether packets are Off Path at any given time. Delay Measurements One of the main functions of the ExpertNet Lite Assessment Tool is to take periodic measurements of packet roundtrip time (referred to here as pinging ). This is conceptually similar to the output of the ping utility supplied with most operating systems, in that a timer is started when sending a packet and the value of the timer recorded when a response packet is received. Packets may be lost in transit, and this fact is recorded. From the recorded values of delay, we can calculate the statistical variance in these values, sometimes known as jitter. Thus, the ExpertNet Lite Assessment Tool makes measurements in order to calculate the most important factors that affect the quality of VoIP applications: Mean Opinion Score (MOS), delay, loss rate, and jitter. Most implementations of the ping utility use the Internet Control Message Protocol (ICMP) echo request/ reply facility. However, ICMP echo packets are not always treated by the network in a similar fashion to voice packets. Routers may be configured to forward ICMP echo packets at a lower priority than others, or drop them altogether. Hence delay measurements made with ICMP echo are not necessarily indicative of VoIP performance. A similar limitation exists when Transmission Control Protocol (TCP) is chosen for performance measurement. In order to address this limitation of ICMP echo, the ExpertNet Lite Assessment Tool uses a combination of User Datagram Protocol (UDP) request, with an ICMP reply. To measure packet round-trip time to a host, the ExpertNet Lite Assessment Tool will send a UDP packet to a closed port on that host. The host will respond with an ICMP port unreachable message. The round trip time is calculated as the elapsed time between sending the UDP request and receiving the ICMP reply.
6 COMMUNICATIONS AT THE HEART OF BUSINESS 4 Some routers disable UDP ping packets to stop malicious software (viruses, worms) from spreading. In this situation the ExpertNet Lite Assessment Tool can be directed to use ICMP pings. As noted above ICMP pings will not be as accurate as UDP, and the resulting data may not be as accurate had UDP ping been used. The ExpertNet Lite Assessment Tool also attempts to measure round-trip time (RTT) to intermediate routers along the path. A slight variation on the above technique is used for these intermediate routers. For example, let R be an intermediate router between the ELAT Agent PC and host H. Now we cannot ping R directly, because of the potential presence of per-destination load-balancing which may result in packets addressed to R directly taking a different path from the Tool to R than they would if they were addressed to host H (see Figure 1). Hence when pinging R, the UDP packets are actually addressed to H, but the time-to-live (TTL) field in the IP header of these packets are set such that a response is elicited from R, rather than the destination host H. This TTL method is similar to that used by the trace-route utility. In summary, the ExpertNet Lite Assessment Tool measures delay for each component of a path through the network from the Agent PC to a host. For intermediate routers, the TTL is set in order to elicit a TTL-expired ICMP message. For the target host, a closed UDP port is chosen in order to elicit a port-unreachable ICMP message. In each case the ICMP reply is used to make the delay measurement. UDP Packet Source: Agent Dest: Host TTL: 1 ELAT Agent (A) ICMP Packet (TTL-expired) Source: Router R Dest: Agent A Router (R) UDP Packet Source: Agent Dest: Host H Port: (high numbered) Host (H) ELAT Agent (A) Router (R) ICMP Packet (port not reachable) Source: Host H Dest: Agent A Host (H) Figure 1. The ExpertNet Lite Assessment Tool is installed and runs on a Microsoft Windows -based PC, the exact specifications of which are given in the release notes. It is important to understand that, given the highly time-sensitive nature of the delay measurements, this PC should be configured to minimize the possibility of other software affecting the measurements. Software such as virus scanners, screen savers, and other background processors can prevent the ExpertNet Lite Assessment Tool from being notified immediately when a packet is received. This introduces delay as measured by the ExpertNet Lite Assessment Tool, and hence must be disabled.
7 avaya.com 5 Router Monitoring The second major type of measurement made by the ExpertNetLite Assessment Tool uses the Simple Network Management Protocol (SNMP) to obtain performance data from routers. As mentioned above, only SNMP get queries are used, and hence should have no discernable impact on the network. The ExpertNet Lite Assessment Tool queries for interface information using standard Management Information Bases (MIBs). 3Com, Avaya, Cisco, Extreme, and Xylogics devices are also queried for CPU usage information using the manufacturer private MIBs. Other MIB variables may be added in subsequent ExpertNet Lite Assessment Tool releases. At startup, the ExpertNet Lite Assessment Tool determines what SNMP variables are supported by each device to be monitored. This ensures that only supported variables are queried for the remainder of the ExpertNet Lite Assessment Tool run time. If SNMP is not supported by, or the community string not known for a given router, then it is removed from the set of devices to be monitored. The ExpertNet Lite Assessment Tool currently supports SNMP v1 and v2c only. Installation Planning An important prerequisite for running the ExpertNet Lite Assessment Tool is that the network topology must be known and understood. Some care needs to be taken when installing the ExpertNet Lite Assessment Tool to ensure that it produces results that are most meaningful. By design, the ExpertNet Lite Assessment Tool is deployed on a single PC, measuring network performance between this PC and the network edges. The performance of other paths through the network is not measured. Hence the location of the ExpertNet Lite Assessment Tool in the network is important. While not strictly required, some preliminary plans for the deployment of VoIP applications are highly beneficial. These plans should include information such as the location of media servers, media gateways, and endpoints (both IP and traditional). Similarly traffic paths should be considered, including the possibility of endpoint-to-endpoint, endpoint-to-gateway, gateway-to-gateway, and other more complex call topologies. Also the possible location for PSTN interfaces should be considered. These plans do not have to be complete (or even vendor-specific), but should be derived from the business requirements for VoIP telephony, and an understanding of existing traffic patterns. From these preliminary plans, it should be possible to determine where to deploy the ExpertNet Lite Assessment Tool. As a general rule it is suggested that the ExpertNet Lite Assessment Tool be deployed into a network subnet, which might be considered for use by a media server. In addition, it is recommended that SNMP v1/v2c be enabled on all routers. If IP-address-based access control is in use, the IP address of the Agent PC must be added to allow access to all routers. SNMP is also required for execution of the ExpertNet Discovery Tool. The community strings used by the ExpertNet Discovery Tool are reused by the ExpertNet Lite Assessment Tool as needed. As described above, the ExpertNet Lite Assessment Tool uses UDP packets to make delay measurements. Hence it is desired for correct use of the tool that devices support these packets; in the event that UDP ping cannot be supported, the user may configure the tool to use ICMP ping. Intermediate routers must support trace-route. The network must not filter the UDP ping packets or the ICMP replies; if filtering does occur, ICMP ping must be used.
8 COMMUNICATIONS AT THE HEART OF BUSINESS 6 Reports The ExpertNet Lite Assessment Tool has the ability to generate a detailed report from the measurements data of the network. The report, which is typically customized by an Avaya engineer for the specific customer, contains an overview of the entire network, in addition to details about each path or target-type path if path discovery was not chosen. The path, or target-type path, will have annotation detailing whether the path is within specifications or not and a summary graph containing MOS, delay, jitter, and loss. For layer 3 devices that SNMP manageable and a proper SNMP read community string was given, CPU usage and interface utilization will be included. ExpertNet Lite Assessment Tool and the ExpertNet VoIP Assessment Tool There are two suites of tools that support the Network Readiness Assessment, The ExpertNet Lite Assessment Tool, which has been discussed thus far, and the ExpertNet VoIP Assessment Tool. The ExpertNet VoIP Assessment Tool has additional capabilities to support a much larger enterprise network. An overview of the capabilities that the ExpertNet VoIP Assessment Tool has is described below. 1. The set of paths measured by the ExpertNet VoIP Assessment Tool does not originate/terminate at a single point in the network. Thus, edge-to-edge network performance can be measured directly, rather than inferred from the performance characteristics to and from a single point. 2. The ExpertNet VoIP Assessment Tool discovers Ethernet topology. 3. The ExpertNet VoIP Assessment Tool performs measurements using Real Time Protocol (RTP) streams emulating real VoIP calls. 4. The ExpertNet VoIP Assessment Tool reports estimated bandwidth. For more information about the ExpertNet VoIP Assessment Tool, please contact your Avaya Client Executive or visit us at Glossary & Acronyms ExpertNet Lite Assessment Tool ExpertNet Discovery Tool ExpertNet VoIP Assessment Tool ExpertNet SM Consulting Practice ICMP IP MIBs OSPF PSTN A tool designed to gather information from Internet Protocol (IP) networks Internet Protocol discovery, visualization, analysis and display tool Detailed Internet Protocol troubleshooting and sectionalization tool The Avaya Network Consulting Practice s Services for LAN/WAN, IP Telephony, Enterprise Security planning and communications infrastructures Internet Control Message Protocol Internet Protocol Management Information Bases Open Shortest Path First (routing protocol) Public Switched Telephone Network
9 avaya.com 7 Glossary & Acronyms QoS RTP RTT SNMP TCP TTL UDP VoIP Quality of Service Real-Time Transport Protocol Round-trip time Simple Network Management Protocol Transmission Control Protocol Time-to-live User Datagram Protocol Voice over Internet Protocol
10 About Avaya Avaya enables businesses to achieve superior results by designing, building and managing their communications infrastructure and solutions. For over one million businesses worldwide, including more than 90 percent of the FORTUNE 500, Avaya s embedded solutions help businesses enhance value, improve productivity and create competitive advantage by allowing people to be more productive and create more intelligent processes that satisfy customers. For businesses large and small, Avaya is a world leader in secure, reliable IP telephony systems, communications applications and full life-cycle services. Driving the convergence of embedded voice and data communications with business applications, Avaya is distinguished by its combination of comprehensive, world-class products and services. Avaya helps customers across the globe leverage existing and new networks to achieve superior business results. COMMUNICATIONS AT THE HEART OF BUSINESS avaya.com 2005 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. and may be registered in certain jurisdictions. All trademarks identified by the, SM or TM are registered trademarks, service marks or trademarks, respectively, of Avaya Inc., with the exception of FORTUNE 500 which is a registered trademark of Time Inc. All other trademarks are the property of their respective owners. Printed in the U.S.A. 04/05 EF-SVC
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationConfiguring Cisco IOS IP SLA Operations
CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationPfR Voice Traffic Optimization Using Active Probes
PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and
More informationset active-probe (PfR)
set active-probe (PfR) set active-probe (PfR) To configure a Performance Routing (PfR) active probe with a forced target assignment within a PfR map, use the set active-probe command in PfR map configuration
More informationAT&T Collaborate TM. Network Assessment Tool
AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T
More informationFirewall Stateful Inspection of ICMP
Firewall Stateful Inspection of ICMP Last Updated: March 26, 2012 The Firewall Stateful Inspection of ICMP feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages
More informationOverview of IPM. What Is IPM? CHAPTER
CHAPTER 1 Overview of IPM This chapter provides an overview of Cisco s Internetwork Performance Monitor (IPM) application. It contains the following sections: What Is IPM? Key Terms and Concepts How Does
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationVoice, Video and Data Convergence:
: A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationRouting with a distance vector protocol - EIGRP
Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License
More informationExpertNet Lite Assessment Tool
1 2 3 ExpertNet Lite Assessment Tool A Guide for Users 4 5 6 May 2013 Version 2.0 7 8 9 10 11 12 13 14 15 2013 Avaya Inc. All rights reserved. Notice While reasonable efforts were made to ensure that the
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationAT&T Collaborate TM. Network Assessment Tool
AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationA common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert
A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations
More informationNetwork Layer: ICMP and Network Management
Network Layer: ICMP and Network Management EECS3214 18-03-15 4-1 Chapter 5: outline 5.1 introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet: OSPF 5.4 routing
More informationFirewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
More informationTracking Packet Flow Using Path Analysis
CHAPTER 5 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network, including the physical
More informationIntroduction to Computer Networks. CS 166: Introduction to Computer Systems Security
Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationHP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine
HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationICMP (Internet Control Message Protocol)
ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationImplementing Cisco IP Routing
ROUTE Implementing Cisco IP Routing Volume 3 Version 1.0 Student Guide Text Part Number: 97-2816-02 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO MAKES AND YOU RECEIVE NO WARRANTIES
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationCSC 4900 Computer Networks: Routing Protocols
CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state
More informationCTS2134 Introduction to Networking. Module 09: Network Management
CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems
More informationWhitepaper IP SLA: Jitter. plixer. International
Whitepaper IP SLA: Jitter 1 plixer Table of Contents Table of Contents Introduction IP SLA VoIP Measurement Tools Jitter Latency Packet Loss MOS ICPIF Score IOS Version Warning Steps to Configure the IP
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationTable of Contents. Cisco Introduction to EIGRP
Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationTransforming the Cisco WAN with Network Intelligence
Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationUC Assessor A cloud-based UC network assessment solution. Getting Started Guide
UC Assessor A cloud-based UC network assessment solution Getting Started Guide December 2018 Copyright Copyright 2000-2018 Integrated Research Limited (ABN 76 003 588 449). All rights reserved. This guide
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationTable of Contents 1 System Maintaining and Debugging 1-1
Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4
More informationUsing ICMP to Troubleshoot TCP/IP Networks
Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationVoIP and Network Quality Manager
GETTING STARTED GUIDE VoIP and Network Quality Manager Version 4.4.1 Last Updated: Wednesday, August 9, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/voip_network_quality_manager_(vnqm)/vnqm_documentation
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationCisco Performance Routing
Cisco Performance Routing As enterprise organizations grow their businesses, the demand for real-time application performance and a better application experience for users increases. For example, voice
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationA NETWORK GUIDE FOR VIDEOCONFERENCING ROLLOUT
A NETWORK GUIDE FOR VIDEOCONFERENCING ROLLOUT THE BIGGEST VIDEOCONFERENCING CHALLENGE? REAL-TIME PERFORMANCE MANAGEMENT Did you know that according to Enterprise Management Associates EMA analysts, 95
More informationNetwork Layer: DHCP, ICMP, NAT, IPv6
Network Layer:, ICMP, NAT, IPv6 CS 352, Lecture 11 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors) 1 IP addresses:
More informationPSTN Fallback. Finding Feature Information
The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationExpert Reference Series of White Papers. Voice Architectures and Deployment Models COURSES.
Expert Reference Series of White Papers Voice Architectures and Deployment Models 1-800-COURSES www.globalknowledge.com Voice Architectures and Deployment Models Bernie Gardiner, Global Knowledge Certified
More informationRedeeming the P Word. Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER
Redeeming the P Word Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER With the growth of Unified Communications, there is an increasing need to effectively identify, diagnose,
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationForeword xxiii Preface xxvii IPv6 Rationale and Features
Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP
More informationPSTN Fallback. Finding Feature Information
The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationHands-On Troubleshooting IPTV with WireShark
Hands-On Course Description This Hands-On course will enable attendees to upgrade their knowledge about how Video and Television is carried over IP in state-of-the art systems. At the end of the course
More informationIxChariot. Predict Device and System Performance Under Realistic Load Conditions
0:00:02.0 0:00:00.3 0:00:00.6 0:00:01.8 Throughput 90.50 60.50 30.50 0.50 0:00:00 0:00:20 0:00:40 0:01:00 Predict Device and System Performance Under Realistic Load Conditions Test Triple Play Performance
More informationBandwidth, Latency, and QoS for Core Components
Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page
More informationApplication Notes. Introduction. Performance Management & Cable Telephony. Contents
Title Managing Cable Telephony Services Series VoIP Performance Management Date June 2004 Overview This application note describes the typical performance issues that cable operators encounter when deploying
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationConfiguring IP SLAs UDP Jitter Operations
This document describes how to configure an IP Service Level Agreements (SLAs) UDP jitter operation to analyze round-trip delay, one-way delay, one-way jitter, one-way packet loss, and connectivity in
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring the Expand Networks Accelerator 4820 with Avaya IP Telephony through Avaya SG203 and SG208 Security Gateways - Issue 1.0 Abstract
More informationComputer Networks Security: intro. CS Computer Systems Security
Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More information(ICMP), RFC
Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get
More informationCisco NAC Profiler Architecture Overview
CHAPTER 2 Topics in this chapter include: Overview, page 2-1 Cisco NAC Profiler System Deployment Model, page 2-3 Cisco NAC Profiler Usage: Port Provisioning and Endpoint Directory, page 2-4 Overview Cisco
More informationRSVP Support for RTP Header Compression, Phase 1
RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationEnhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER
40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn
More informationEXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.
HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationConfiguring Auto IP SLAs in IP SLAs Engine 3.0
This document describes the auto IP Service Level Agreements (SLAs) function in IP SLAs Engine 3.0, including the following: Auto-measure groups--each template, endpoint list, and scheduler can be configured
More informationConfiguring IP SLAs LSP Health Monitor Operations
Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationMaintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007
Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationHP 6125G & 6125G/XG Blade Switches
HP 6125G & 6125G/XG Blade Switches Network Management and Monitoring Configuration Guide Part number: 5998-3162b Software version: Release 2103 and later Document version: 6W103-20151020 Legal and notice
More informationInternet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1
Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationKillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦
KillTest Exam : 100-101 Title : CCNA Interconnecting Cisco Networking Devices 1 (ICND1) Version : Demo 1 / 15 1.Which three statements are true about the operation of a full-duplex Ethernet network? (Choose
More information