I-Mode Performance Monitoring Use of ROOT in telecommunications at KPN
|
|
- Maximillian McCormick
- 6 years ago
- Views:
Transcription
1 I-Mode Performance Monitoring Use of ROOT in telecommunications at KPN Pieter Meulenhoff and Rob Meijer KPN Research, The Netherlands 1 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
2 Contents KPN/KPN Research Context I-Mode performance Monitoring ROOT Usage Future developments 2 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
3 What is KPN (Research)? Royal Dutch Telecommunications Company KPN Research R&D organisation of KPN 350 People (average age 29 years) To become part of TNO, the Netherlands organisation for applied scientific research. 3 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
4 Standard Telecommuincations Network switch switch switch 4 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
5 Internet Event/Rules: Pick up the phone Away from computer Slam the door No answer 5 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
6 Understanding Large Telco Infrastructures Systems grow complex Measure what is going on Systems are in a hostile environment Measure who is doing what from where Correlation between different layers HTTP HTTP TCP, UDP IP IP IP, IP, ICMP ICMP IP, IPICMP TCP, UDP IP Data network Data network Data Data network network Data Data network network Data network 6 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
7 Measuring: Key Performance Indicators (KPI) Hits / second Webserver Environment Windows Management Instrumentation Agent Extracts KPI s from server CPU, HTTP Requests, Disk, Memory Storage in tree object Offline analysis Web servers Mediation CPU time Analysis 7 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
8 I-mode What performance is i-mode monitoring? Wireless Internet via Mobile Phone Web Browsing Introduced in Japan by NTT DoCoMo in 1999 (now 30 million subscribers) Introduced in Germany, Netherlands, Belgium in Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
9 COMMERCIAL BRAKE 9 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
10 I-Mode Applications Ringtones Images Weather News Stocks Games Maps/Route/Travel Full Internet Access X-Rated Content 10 Pieter Meulenhoff KPN Research ROOT2002
11 I-Mode Platform Overview Service Platform GPRS Network i-mode Gateway Internet Content Website I-mode terminal What is the enduser experience? 11 Pieter Meulenhoff KPN Research ROOT2002
12 I-Mode Management Issues When do we have to upgrade the capacity of our i-mode gateway? Is a change in quality caused by i-mode service platform, Internet, GPRS network? What is the quality of our service compared to one day, week, month or year ago? 12 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
13 GPRS Network I-Mode is based on the GPRS Network Faster data transfer Packet Switched Network Mobile phone has IP-Number Always on You only pay for data transferred 13 Pieter Meulenhoff KPN Research ROOT2002
14 MLPA GPRS Network i-mode Gateway Service Platform Internet Content Website I-mode terminal Network Analyzer ROOT 14 Pieter Meulenhoff KPN Research ROOT2002
15 MLPA Multi Layer Packet Analysis Capturing and Storage of: timestamped TCP/IP Headers timestamped HTTP Headers Correlating TCP/IP and HTTP HTTP transactions Calculation of End-to-End response times Responsetime as experienced by user HTTP arrival rates tcp/ip quality Pieter Meulenhoff KPN Research ROOT2002
16 Correlating TCP/IP and HTTP Traffic User initiated URL request Network Analyzer i-mode Gateway SP or CP TCP set- up delay ~Set-up Time Request response time ~Server side RTT Received URL ~GPRS RTT 16 Pieter Meulenhoff KPN Research ROOT2002
17 Technical MLPA details: Software 1. Packet Analyzer Save time-stamped TCP/IP and HTTP Header information 2. Packet Correlator Calculate TCP/IP to HTTP Correlation TCP Connections HTTP Transactions 3. Analysis modules HTTP request arrival rates HTTP response throughput End-to-end HTTP response time (time-plots, distributions, statistics) TCP statistics Retransmissions, fragmentation, connection setup time 4. Presentation Module Convert analysis results to html format (presentation to other output formats/databases/ ) 17 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
18 Standard MLPA monitoring & analysis process Network Analyzer TCPPacket Correlator Analysis Module Analysis Module Analysis Module Analysis Script Presentation Script Website ROOT Scripts TCPPacket Object TCPConnection Standard stored in ROOT TTree and Histograms HTTPTransaction and Profiles object stored in TTree SLA monitoring 18 Pieter Meulenhoff KPN Research ROOT2002
19 Real-time MLPA analysis process Packet Analyzer Packet Correlator Analysis Module Alarm / Event! (Network Management System) Realtime Event Based Operation Network Management 19 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
20 Implementation Installation Attached to monitoring port of incoming/outgoing router (G i interface between GGSN and i-mode gateway). Software Database, Object I/O: ROOT ( Network Analyzer: Libpcap (ethereal, tcpdump) Graphics conversion: Imagemagick Administration: ssh Supported operating systems Unix based (Linux, Solaris) W2K Security options TCP/IP anonimisation HTTP header cleanup (XID,Cookies,Content,Form Variables) 20 Pieter Meulenhoff KPN Research p.j.meulenhoff@kpn.com ROOT2002
21 Demonstration 21 Pieter Meulenhoff KPN Research ROOT2002
22 ROOT Rapid Development through scripts Trees, Histograms, Profiles No modelling/simulation (outside root) 22 Pieter Meulenhoff KPN Research ROOT2002
23 Results & Future Work Performance Improvements Detection of bugs in TCP stack software Comparison between different terminals (speed) Network optimisation Future versions of platform/terminals Many more Introduction in operational environment Realtime alarm generation Connection to network management software SNMP, SOAP,... Stabillity 23 Pieter Meulenhoff KPN Research ROOT2002
24 24 Pieter Meulenhoff KPN Research ROOT2002
25 25 Pieter Meulenhoff KPN Research ROOT2002
26 26 Pieter Meulenhoff KPN Research ROOT2002
27 27 Pieter Meulenhoff KPN Research ROOT2002
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service
More informationLECTURE WK4 NETWORKING
LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,
More informationBEng. (Hons) Telecommunications. Examinations for / Semester 2
BEng. (Hons) Telecommunications Cohort: BTEL/16B/FT Examinations for 2016 2017 / Semester 2 Resit Examinations for BTEL/15B/FT MODULE: NETWORKS MODULE CODE: CAN 1102C Duration: 2 ½ hours Instructions to
More informationLab 1: Packet Sniffing and Wireshark
Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer
More informationComputer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic
Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationNET311 Computer Network Management Tools, Systems and Engineering
NET311 Computer Network Management Tools, Systems and Engineering Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
More informationUnit 28 Website Production ASSIGNMENT 1
Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationMiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationComputer Networks A Simple Network Analyzer Decoding Ethernet and IP headers
Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Objectives The main objective of this assignment is to gain an understanding of network activities and network packet formats
More informationWorld Skills Competition. Trade 39: IT PC and Network Support. Day 2 Competition
World Skills Competition Trade 39: IT PC and Network Support Day 2 Competition Small Business Competitor Name: Country Code: 1 of 10 CONTENTS This Test Project proposal consists of the following documentation/files:
More informationAvaya Port Matrix: Avaya Diagnostic Server 3.0
Avaya Matrix: Avaya Diagnostic Server 3.0 Issue 2.0 February 208 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER
More informationNetwork Traffic Analysis - Course Outline
Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have
More informationAvaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,
More informationMike Anderson. TCP/IP in Embedded Systems. CTO/Chief Scientist The PTR Group, Inc.
TCP/IP in Embedded Systems Mike Anderson CTO/Chief Scientist The PTR Group, Inc. RTC/GB-1 What We ll Talk About Networking 101 Stacks Protocols Routing Drivers Embedded Stacks Porting RTC/GB-2 Connected
More informationConfiguring Cisco IOS IP SLA Operations
CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels
More informationWireless Access Protocol(WAP) architecture
Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to
More informationComputer Networks A Simple Network Analyzer PART A undergraduates and graduates PART B graduate students only
Computer Networks A Simple Network Analyzer PART A undergraduates and graduates PART B graduate students only Objectives The main objective of this assignment is to gain an understanding of network activities
More informationMonitoring and Analysis
CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze
More informationEventSentry Quickstart Guide
Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationThe Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
More informationIntroduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁
II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:
More informationSE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer
SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?
More informationAll Events. One Platform.
All Events. One Platform. Industry s first IT ops platform that truly correlates the metric, flow and log events and turns them into actionable insights. Correlate Integrate Analyze www.motadata.com Motadata
More informationNetwork packet analyzer Wireshark
Network packet analyzer Wireshark Antonio Cianfrani NetLab - Dipartimento DIET Università Sapienza di Roma E-mail: antonio.cianfrani@uniroma1.it What is a packet analyzer? A network packet analyzer is
More informationCOPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status
1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationDenial of Service, Traceback and Anonymity
Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationCS244a: An Introduction to Computer Networks
Name: Grade: S MC: L MC: 15: 16: 17: Total: CS244a: An Introduction to Computer Networks Midterm Exam: Thursday You are allowed 1 hour to complete this exam. (i) This exam is closed book and closed notes.
More informationExercises: Basics of Networking II Experiential Learning Workshop
Exercises: Basics of Networking II Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationCh. 13: Measuring Performance
Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction
More informationGLOSSARY. See ACL. access control list.
GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs
More informationStager. A Web Based Application for Presenting Network Statistics. Arne Øslebø
Stager A Web Based Application for Presenting Network Statistics Arne Øslebø Keywords: Network monitoring, web application, NetFlow, network statistics Abstract Stager is a web based
More informationEnabling the Wireless Internet
Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2
More informationIntroduction. An introduction to the equipment and organization of the Internet Lab.
Introduction An introduction to the equipment and organization of the Internet Lab. Some material in this slide set is copyrighted, Pearson Education, 2004 Internet Lab Equipment 4 Linux PCs 4 Cisco Routers
More informationAvaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0
Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED
More informationTransport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324
Transport Layer TCP & UDP Week 7 Module : Computer Networks Lecturers : Lucy White lbwhite@wit.ie Office : 324 1 Purpose of the Transport Layer The Transport layer provides for the segmentation of data
More information1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology
Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10
EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No
More informationIT 341: Introduction to System
IT 341: Introduction to System Administration Private IP Addresses and the Internet Using IP Addresses to Communicate Over the Internet Network Address Translation Private IP Addresses and the Internet
More informationAvaya Port Matrix: Avaya Aura Performance Center 7.1
Avaya Port Matrix: Avaya Aura Performance Center 7.1 Issue 1.0 November 2014 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,
More informationImplementation of a WAP model to evaluate Capacity in 3G radio access networks
Implementation of a model to evaluate Capacity in 3G radio access networks Henrik Fållby Outline Scoop of this thesis switched vs. circuit switched networks Data in GSM radio networks Wireless Application
More informationUnit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6
5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing
More informationForeword xxiii Preface xxvii IPv6 Rationale and Features
Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP
More informationREAL USER EXPERIENCE monitoring and NTOP
Georg Kostner, Würth Phoenix S.r.l. REAL USER EXPERIENCE monitoring and NTOP Würth Phoenix more than software 1 The challenge: manage the new service complexity Company LAN Messages Collaboration Home
More informationSTATEFUL TCP/UDP traffic generation and analysis
XENATM STATEFUL TCP/UDP traffic generation and analysis Ideal for validating firewalls, switches, routers, NAT routers, proxies, load-balancers, bandwidth shapers and more. VULCAN LAYER 4-7 GIGABIT ETHERNET
More informationInternet Applications. Dr Steve Gordon ICT, SIIT
Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationGuaranteeing Video Quality
Guaranteeing Video Quality in IP Delivery Systems By Göran Appelquist, Ph.D., Chief Technology Officer, Edgeware AB This article explores some of the challenges and solutions for operators to guarantee
More informationLM1000STXR4 Gigabit Ethernet Load Module
Gigabit Ethernet Load Module Gigabit Ethernet Load Module Ixia's Gigabit Ethernet Load Modules offer complete Layer 2-3 network and routing/bridging protocol testing functionality in a single platform.
More informationCS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 Time: 1hour May 2nd, 2013
CS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 : 1hour May 2nd, 2013 Total Points: 25 Attempt all problems. Problem #1: (5 points, ½ point each) Choose only one answer. You will not receive
More informationch02 True/False Indicate whether the statement is true or false.
ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be
More informationPrime Performance Manager Overview
1 CHAPTER The following topics provide an overview to Cisco Prime Performance Manager user operations: Prime Performance Manager Features and Functions, page 1-1 Prime Performance Manager Reports, page
More informationQuestion No: 2 Which identifier is used to describe the application or process that submitted a log message?
Volume: 65 Questions Question No: 1 Which definition of a fork in Linux is true? A. daemon to execute scheduled commands B. parent directory name of a file pathname C. macros for manipulating CPU sets
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationBandwidth estimations
Bandwidth estimations for Test Traffic Measurements project Henk Uijterwaal Mark Santcroos RIPE NCC New Projects Group BEst2003, December 9 1 RIPE NCC Regional Internet Registry for Europe Based in Amsterdam,
More informationNETWORK PACKET ANALYSIS PROGRAM
NETWORK PACKET ANALYSIS PROGRAM Duration: 3 days (21 hours) Mode: 1. Instructor Led Class room Training and Labs 2. Online In this hands-on course, you will receive in-depth training on Protocol analysis
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationWireless Application Protocol (WAP) and. I-mode: An insight
A Term Paper on Wireless Application Protocol (WAP) and I-mode: An insight Guided by: Prof. Kevin Ryan Date: 04 / 07 / 2001 Submitted by: Amit Lakhani SID# 157-06-6960 Stevens Institute of Technology Hoboken,
More informationWireless Medium Access Control and CDMA-based Communication Lesson 15 i-mode
Wireless Medium Access Control and CDMA-based Communication Lesson 15 i-mode 1 i-mode i-mode Internet services WCDMA based NTT DoCoMo in Japan 2 i-mode Uses adaptive multi-rate encoding A cost-effective
More informationi-appli online and i-appli call Systems for Real-time Communication with Mobile Terminals
i-appli online and i-appli call Systems for Real-time Communication with Terminals Online Games Internet i-appli i-appli online and i-appli call Systems for Real-time Communication with Terminals We developed
More informationImplementation of a WAP model to evaluate Capacity in 3G radio access networks. Henrik Fållby
Implementation of a WAP model to evaluate Capacity in 3G radio access networks Henrik Fållby Outline Scoop of this thesis Packet switched vs. circuit switched networks Packet Data in GSM radio networks
More informationTCP/IP Networking Basics
TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationWhatsConnected v3.5 User Guide
WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationContent distribution networks
Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at
More informationCisco Interconnecting Cisco Networking Devices Part 1.
Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationSun Storage Common Array Manager
Sun Storage Common Array Manager Quick Start Guide This guide can help you with the basic steps of installing Oracle s Sun Storage Common Array Manager software. If you are upgrading from a previous version
More informationTransport Gateway Installation / Registration / Configuration
CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.
More informationSome Considerations on Protocol Analysis and Debugging
Some Considerations on Protocol Analysis and Debugging 1 Protocol Analysis and Debugging Figuring out why your protocol does not work Finding out why it does not interwork with someone else Understanding
More informationOn the State of ECN and TCP Options on the Internet
On the State of ECN and TCP Options on the Internet PAM 2013, March 19, Hong Kong Mirja Kühlewind Sebastian Neuner Brian
More informationIMC Network Traffic Analyzer 7.1 (E0301P04) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. All Rights Reserved.
Network Traffic Analyzer 7.1 (E0301P04) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. All Rights Reserved. Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release
More informationOutline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #1 Assigned today Due in one week Application layer: DNS, HTTP, protocols Recommend you start early
More informationPort Forwarding Setup (NB7)
Port Forwarding Setup (NB7) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly used
More informationBI-8 Wireshark Software Case Studies 4:45p 6:00p Mon June
BI-8 Wireshark Software Case Studies 4:45p 6:00p Mon June 25 2012 Megumi Takeshita Founder ikeriri network service co.,ltd. SHARKFEST 12 UC Berkeley June 24-27, 2012 About Megumi Takeshita 竹下恵 Founder,
More informationFaculty of Science and IT Course title. Pre-requisite/corequisite
Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.
More informationb. Suppose the two packets are to be forwarded to two different output ports. Is it
Problem-1:[15] Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other packets anywhere in the router. a. Suppose the two packets are
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationNew Features Summary. SAP Sybase Event Stream Processor 5.1 SP02
Summary SAP Sybase Event Stream Processor 5.1 SP02 DOCUMENT ID: DC01616-01-0512-01 LAST REVISED: April 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software
More informationLoadbalancer.org Virtual Appliance quick start guide v6.3
Loadbalancer.org Virtual Appliance quick start guide v6.3 What are your objectives?...2 What is the difference between a one-arm and a two-arm configuration?...2 What are the different load balancing methods
More informationJuniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud
Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud acezar@juniper.net MARKET DYNAMICS Branch/WAN Evolution: PMO FMO Bring Agility and Enhanced Customer Experience Utilizing Cloud
More informationComputer Networks and the internet. Daniel Graham Ph.D
Computer Networks and the internet Daniel Graham Ph.D 1.1 What Is the Internet? The Internet is a computer network that interconnects hundreds of millions of computing devices throughout the world. As
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More information