Rab Nawaz Jadoon. Characterizing Network Traffic DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan
|
|
- Russell Shepherd
- 5 years ago
- Views:
Transcription
1 Characterizing Network Traffic DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND)
2 Characterizing Types of Traffic Flow for New Network Applications 2
3 Characterizing Traffic Flow A good technique for characterizing network traffic flow is to classify applications as supporting one of a few well-known flow types. Terminal/Host Traffic Flow Asymmetric For example Telnet (terminal sends few character, while host sends back many character i.e user name and password authentication. Client/Server Traffic Flow Bidirectional flow Asymmetric For example, FTP, HTTP protocols etc. Request from the clients are small frames while responses ranges from 64 bytes to 15 bytes. 3
4 Thin Client traffic Flow/Server based computing A special case of client/server architecture Bulk of data processing on server side. Peer to Peer Traffic Flow Bidirectional and symmetric Traffic Flow Each device is considered as important as each other device, and no device stores substantially more data than any other device. Recently, peer-to-peer applications for downloading music, videos, and software have gained popularity. Each user publishes music or other material and allows other users on the Internet to download the data. This is because of every user acts as both a distributor and consumer of data. Traffic flow is bidirectional and symmetric. E.g. video conferencing 4
5 Traffic Flow Server/Server Traffic Flow Servers talk to other servers to, implement directory services, cache heavily used data, mirror data for load balancing and redundancy, back up data, broadcast service availability. With server/server network traffic, the flow is generally bidirectional. The symmetry of the flow depends on the application. With most server/server applications, the flow is symmetrical, but in some cases there is a hierarchy of servers, with some servers sending and storing more data than others. 5
6 Traffic Flow Distributed Computing Traffic Flow With distributed computing, data travels between a task manager and computing nodes and between computing nodes. Characterizing traffic flow for distributed computing applications might require you to, Study the traffic with a protocol analyzer or model potential traffic with a network simulator. 6
7 Traffic Flow in VOIP Networks Traffic flow in VoIP networks is that there are two flows. The flow associated with transmitting the audio voice. The flow associated with call setup and teardown. The flow for transmitting the digital voice is peer-to-peer, between two phones or between two PCs running software such as Skype or Cisco IP Communicator (CIPC). Call setup and teardown, on the other hand, can be characterized as a client/server flow because a phone needs to talk to a more complicated machine like server or switching machine. 7
8 Traffic Flow The audio voice flow between two IP endpoints RTP, RTP Connectionless, run on top of UDP. The main call setup, teardown, and control protocols in an IP network are, H.323, the Cisco Skinny Client Control Protocol (SCCP), Simple Gateway Control Protocol (SGCP), Media Gateway Control Protocol (MGCP), and Session Initiation Protocol (SIP). 8
9 Documenting Traffic Flow for New and Existing Network Applications 9
10 Documenting Traffic Flow To document traffic flow for new (and existing) network applications, characterize the flow type for each application and list the user communities and data stores that are associated with applications. 10
11 11
12 Traffic Load Characterizing traffic load can help you design networks with sufficient capacity for local usage and internetwork flows. traffic load estimates are unlikely to be precise. The goal is simply to avoid a design that has any critical bottlenecks. 12
13 Traffic load Traffic load(sometimes called offered load) is the sum of all the data all network nodes have ready to send at a particular time. A general goal for most network designs is that the network capacity should be more than enough to handle the traffic load. The challenge is to determine if the capacity proposed for a new network design is sufficient to handle the potential load. 13
14 Calculating Theoretical Traffic Load For example, for a network with a proposed capacity 1 Mbps, If 1000 stations send 1000-bit frames every second, the offered load equals the capacity. This is according to the theory of the William Stalling 14
15 Calculating Theoretical Traffic Load In general, to calculate whether capacity is sufficient, only a few parameters are necessary: The number of stations. The average time that a station is idle between sending frames. The time required to transmit a message once medium access is gained. 15
16 Calculating Theoretical Traffic Load For a client/server application, idle time for the server depends on, The number of clients using the server, and the architecture and performance characteristics of the server (disk access speed, RAM access speed, caching mechanisms, and so on). Idle time on the client side depends partly on user action, which means it is impossible to precisely predict idle time. 16
17 Calculating Theoretical Traffic Load After you have identified the approximate traffic load for an application flow, you can estimate total load for an application by multiplying the load for the flow by the number of devices that use the application. 17
18 Traffic Load In general, to accurately characterize traffic load, you need to understand Application usage patterns and QoS requirements in addition to idle times and frame sizes. 18
19 Documenting Application-Usage patterns The first step in documenting application-usage patterns is to identify user communities, the number of users in the communities, and the applications the users employ. (this is already covered before) 19
20 Documenting Application-Usage patterns In addition to identifying the total number of users for each application, you should also document the following information: The frequency of application sessions (number of sessions per day, week, month, or whatever time period is appropriate) The length of an average application session The number of simultaneous users of an application 20
21 Documenting Application-Usage patterns you can more accurately predict the aggregate bandwidth requirement for all users of an application. If it is not practical to research these details, you can make some assumptions: The number of users of an application equals the number of simultaneous (real time) users. All applications are used all the time, so that your bandwidth calculation is a worstcase (peak) estimate. Each user opens just one session, and that session lasts all day until the user shuts down the application at the end of the day. 21
22 Estimates of Traffic Load Caused by Applications To completely characterize application behavior, you should investigate which protocols an application uses. When you know the protocols, you can calculate traffic load more precisely by adding the size of protocol headers to the size of data objects. Table (next slide) shows some typical protocol header sizes. 22
23 Traffic Overhead for Various Protocols 23
24 Estimates of Traffic Load Caused by Applications In addition to applications that are set to start upon bootup, the following system-level protocols send packets as a workstation initializes: Address Resolution Protocol (ARP) Dynamic Host Configuration Protocol (DHCP) Internet Control Message Protocol (ICMP), rsion 4 and 6 Internet Group Management Protocol (IGMP), version 4 and 6 Domain Name System (DNS) 24
25 Multicast DNS (mdns) NetBIOS name queries Network Time Protocol (NTP) Simple Service Discovery Protocol (SSDP) Service Location Protocol (SLP) Simple Network Management Protocol (SNMP) Cont 25
26 Estimating Traffic Load Caused by Routing Protocols Estimating traffic load caused by legacy routing protocols is important in a topology that includes many networks on one side of a slow WAN link. A router sending a large distance-vector routing table every 30sec can use a significant percentage of WAN bandwidth. 26
27 Estimating Traffic Load Caused by Routing Protocols Because routing protocols limit the number of routes per packet, on large networks, a router sends multiple packets to send the entire table. Routing Information Protocol (RIP), for example, sends a routing packet every 30 seconds. Each route in the packet uses 20 bytes, and there are 25 routes per packet. When headers are added, this means that a router running RIP sends one or more 532-byte packets every 30 seconds, depending on the size of the routing table. 27
28 Estimating Traffic Load Caused by Routing Protocols Newer routing protocols, such as Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP), use little bandwidth. EIGRP also sends Hello packets but more frequently than OSPF (every 5 seconds). On the other hand, EIGRP doesn t send any periodic route updates or database-synchronization packets. It sends route updates only when there are changes. 28
29 29
Logical Network Design (Part II)
Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationNetwork-Based Application Recognition
Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important
More informationPRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS
PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS Objectives At the end of this workshop participants will: Be able to configure, maintain and manage routers have a clear practical understanding
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationGoCertify Advanced Cisco CCIE Lab Scenario # 1
GoCertify Advanced Cisco CCIE Lab Scenario # 1 (http://www.gocertify.com) IPexpert, Inc. is a leading provider in on-line Cisco CCNA, CCNP and CCIE training material. For more information please visit
More informationCCNA Exploration Network Fundamentals
CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationAP500 4-Port FXS VoIP Gateway
AP500 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification APOS Technology
More informationSYED AMMAL ENGINEERING COLLEGE
QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing
More informationTCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02
TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)
More informationCHAPTER 4: ROUTING DYNAMIC. Routing & Switching
CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationGetting Started with the VG248
CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable
More informationAP-SAV100 Analog Voice Intercom
AP-SAV100 Analog Voice Intercom IP Gateway High Performance IP Extension Solution for Legacy Analog Door Phone www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification
More informationSection 6. Implementing EIGRP ICND2
ICND2 Section 6 Implementing EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) was introduced in Cisco IOS Release 9.21 as an enhancement to the limitations of IGRP. IGRP was developed by Cisco
More informationDomain 1.0 Network Technologies
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 1.0 Network Technologies Chapter 1 1.1 Explain the function of common networking protocols TCP TCP is a connection oriented protocol that provides
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK UNIT 1
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Year & Semester : II / IV Section : CSE Subject Code : CS6551 Subject Name
More informationComputer Networks (Unit wise Questions)
Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies
More informationTransparent or Routed Firewall Mode
This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple
More informationChapter 7 Routing Protocols
Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationUnderstanding SNMP. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Abbottabad Pakistan. Department of Computer Science
Understanding SNMP Rab Nawaz Jadoon DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Abbottabad Pakistan Motivation In small networks with only a few devices confined
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationTransparent or Routed Firewall Mode
This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple
More informationAP Port Analog VoIP Gateway High Performance VoIP Gateway Solution
AP2390 72-Port Analog VoIP Gateway High Performance VoIP Gateway Solution Optional DC Power Supply (Model : AP2390D) www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware
More informationChapter 4: Routing Concepts. Routing & Switching
Chapter 4: Routing Concepts Routing & Switching Routers are Computers Routers are specialized computers containing the following required components to operate: Central processing unit (CPU) Operating
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationInternetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork
UNIT - II Internetworking An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. different kinds of network technologies
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationEECS 228a Lecture 1 Overview: Networks. Jean Walrand
EECS 228a Lecture 1 Overview: Networks Jean Walrand www.eecs.berkeley.edu/~wlr Fall 2002 Course Information Instructor: Jean Walrand n Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 in 285 Cory
More informationExamsheets Questions and Answers
640-802 Examsheets Questions and Answers Number: 640-802 Passing Score: 800 Time Limit: 120 min File Version: 17.6 http://www.gratisexam.com/ 640-802 Questions and Answers Exam Name: Cisco Cisco Certified
More informationVoIP / RoIP for Technicians
Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going
More informationCCNP Voice (CCVP) Syllabus/Module Details CVOICE Cisco Voice over IP and QoS v8.0 (CVOICE v8.0)
CCNP Voice (CCVP) Syllabus/Module Details 642-437 CVOICE Cisco Voice over IP and QoS v8.0 (CVOICE v8.0) 642-447 CIPT1 Implementing Cisco Unified Communications Manager, Part 1 v8.0 (CIPT1 v8.0) 642-457
More informationIntroduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony
Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet
More informationConfiguring Bridge Domain Interfaces
The Cisco ASR 1000 Series Aggregation Services Routers support the bridge domain interface (BDI) feature for packaging Layer 2 Ethernet segments into Layer 3 IP. Restrictions for Bridge Domain Interfaces,
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationCisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.
Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the
More informationScope and Sequence: CCNA Exploration v4.0
Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are
More informationCCNA. Course Catalog
CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationUnicast Routing. Information About Layer 3 Unicast Routing CHAPTER
CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationAdvanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices
Advanced Network Administration 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices 2. Duration 5 Days 3. Purpose This five day course for L-2 Network
More informationThe trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap
Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationUnderstanding Networking Fundamentals
Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationAP-2GR Port 2G GSM Router High Performance 2G GSM Router Solution
AP-2GR1001 1-Port 2G GSM Router High Performance 2G GSM Router Solution www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification 2G GSM Module Specification
More informationAP2650PMG PTT Media Gateway High Performance PTT Media Gateway Solution
AP2650PMG PTT Media Gateway High Performance PTT Media Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview APOS Technology Hardware Specification
More informationData Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I
Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide
More informationAP800 TM PSTN Backup 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution
AP800 TM PSTN Backup 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology 2007, Sales and Marketing Contents Product Overview Hardware Specification
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationBTEC Level 3 Extended Diploma
BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward
More information521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service
More informationSecurity and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in
More informationMultimedia in the Internet
Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet
More informationAP-GS808S 8-Port GSM VoIP Gateway High Performance GSM VoIP Gateway Solution
AP-GS808S 8-Port VoIP Gateway High Performance VoIP Gateway Solution www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification Module Specification APOS Technology
More informationSIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN
SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SUBJECT: IT 4.1.2 NETWORK PROTOCOLS CLASS: 4/4 B.Tech., I - SEMESTER, A.Y.2017-18 INSTRUCTOR: Sri N. Prasad
More informationChapter 2. Communicating Over The Network
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More informationSection 3 - Configuration. Enable Auto Channel Scan:
Enable Auto Channel Scan: Wireless Channel: The Auto Channel Scan setting can be selected to allow the DGL-4500 to choose the channel with the least amount of interference. Indicates the channel setting
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationFundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security
Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services
More informationLMR(Land-to-Mobile Radio) Gateway High Performance LMR Gateway Solution
AP-LMR2000 LMR(Land-to-Mobile Radio) Gateway High Performance LMR Gateway Solution Interworking with Motorola XiR M8620 Radio Station www.addpac.com AddPac Technology 2015, Sales and Marketing Contents
More informationRab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication
Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationInterconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview
Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationWireless and Mobile. Rab Nawaz Jadoon. Applications DCS. Assistant Professor. Department of Computer Science
Wireless and Mobile Applications Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication Mobile Communication A communication
More informationSession 16 Windows 7 Professional DNS & Active Directory
Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationBLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS
BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationSS7 VoIP Gateway Solution
SS7 VoIP Gateway Solution AddPac Technology 2013, Sales and Marketing www.addpac.com Contents SS7 VoIP Gateway Service Diagram SS7 VoIP Gateway Comparison Table Digital VoIP Gateways(1~1616 E1/T1) VoIP
More informationWhich of the following describe the process identifier that is used to run OSPF on a router? (Choose two)
ICND1 OSPF Questions Question 1 Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two) A. It is locally significant. B. It is globally significant. C.
More informationRouter 6000 R17 Training Programs. Catalog of Course Descriptions
Router 6000 R7 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 IP NETWORKING... 4 IP OVERVIEW & FUNDAMENTALS... 8 IP ROUTING OVERVIEW & FUNDAMENTALS...0
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationChapter 7: Routing Dynamically. Routing & Switching
Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationReti di Calcolatori I
Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria
More informationAP-LMS1500 Multi-Port LMS VoIP Gateway High Performance LMS(Land to Mobile Station) VoIP Gateway
AP-LMS1500 Multi-Port LMS VoIP Gateway High Performance LMS(Land to Mobile Station) VoIP Gateway Solution Bluetooth VoIP, 3G VoIP Service www.addpac.com AddPac Technology Sales and Marketing Contents Product
More informationThe network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are:
NETWORK CONFIGURATION GUIDE Listen EVERYWHERE (LE) was designed to be used on pre-existing wireless networks as a plug-and-play system, however it might be necessary to have an IT/Network Administrator
More informationCourse Outline: Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1)
Course Outline: Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1) Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs : CIPTV1 v1.0 gives the learner all the tools they
More informationCompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]
s@lm@n CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 3: Troubleshooting 140
More informationAbout the H3C S5130-EI configuration guides
About the H3C S5130-EI configuration guides The H3C S5130-EI configuration guides describe the software features for the H3C S5130-EI Switch Series, and guide you through the software configuration procedures.
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationSEMESTER 2 Chapter 1 Planning and Cabling a Network V 4.0
SEMESTER 2 Chapter 1 Planning and Cabling a Network V 4.0 135 points 1.1.1 What are the common components between a router and other computers? CPU RAM ROM Operating System 1.1.1.2 What does a router connect?
More informationBusiness Data Communications and Networking
Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP
More informationEIGRP. About EIGRP. CLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide, 9.7 1
This chapter describes how to configure the Cisco ASA to route data, perform authentication, and redistribute routing information using the Enhanced Interior Gateway Routing Protocol (). About, page 1
More information200AE1 Network Services Gateway
200AE1 Network Services Gateway Quick Start Guide Version 1.0 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Refer to online help for assistance
More information