Appendix PERFORMANCE COUNTERS SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC.
|
|
- Eustace Davis
- 5 years ago
- Views:
Transcription
1 Appendix E PERFORMANCE COUNTERS SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC
2 1 Default s for Commonly Used Objects Object Default Cache Data Map Hits % How often requested data is found in the cache This is an indicator of application I/O A poor cache hit rate may indicate a memory shortage Logical Disk Average Disk Queue Length Measure of the activity of each logical partition of the disk An Average Disk Queue Length of 10 indicates that the logical disk was busy for the entire sample time Busy time includes all processing time for a disk I/O request, including driver time and time in the queue, so values for a single logical disk may exceed 10 Sustained high values over time indicated a possible disk bottleneck Memory Pages Number of pages between main memory and the disk drives in each second If this counter is consistently high, memory is in short supply Sustained paging degrades performance Objects Processes Instantaneous count of the number of processes running When charted with Processor: % Processor Time, it shows the effect on the processor of adding and removing processes Physical Disk Average Disk Queue Length Measure of the activity of the disk subsystem It is the sum of Average Disk Queue Length for all logical partitions of the disk This is a good measure of disk activity when measuring multiple physical disks in a disk set Process % Processor Time Measure of each process s use of the processor Processor % Processor Time Indicator of the demand for and efficiency of a processor System % Total Processor Time Monitors multiprocessor systems It combines the average processor usage of all processors into a single counter Thread % Processor Time Threads are the components of a process that execute its code on the processor This counter indicates which threads are getting processor time SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page i
3 2 s 21 Browser Object: s Announcements Domain Announcements Server Announcements Total Duplicate Master Announcement Election Packets Enumerations Domain Enumerations Others / second Enumerations Server / second Enumerations Total / second Illegal Datagrams / second Mailslot Allocations Failed Mailslot Opens Failed / second Mailslot Receives Failed Mailslot Writes Failed Mailslot Writes Missed Mailslot Datagrams Rate that a Domain has announced itself to the network Rate that the servers in this domain have announced themselves to this server Sum of Announcements Server and Announcements Domain Indicates the number of times that the master browser has detected another master browser on the same domain Rate of browser election packets that have been received by this workstation Rate of Domain browse requests that have been processed by this workstation Rate of browse requests processed by this workstation that were not domain or server browse requests Rate of Server browse requests that have been processed by this workstation Rate of browse requests that have been processed by this workstation This is the sum of Enumerations Server, Enumerations Domain, and Enumerations Other Rate of incorrectly formatted datagrams that have been received by the workstation Number of times the datagram receiver has failed to allocate a buffer to hold a user mailslot write Rate of mailslot messages received by this workstation that were to be delivered to mailslots that are not present on this workstation Number of mailslot messages that couldn't be received due to transport failures Total number of mailslot messages that have been successfully received, but that were unable to be written to the mailslot Rate of mailslot messages that have been successfully received Number of Mailslot Datagrams that have been discarded due to configuration or allocation limits SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page ii
4 Missed Server Announcements Missed Server List Requests Server Announcement Allocations Failed Server List Requests Number of server announcements that have been missed due to configuration or allocation limits Number of requests to retrieve a list of browser servers that were received by this workstation, but could not be processed Rate of server (or domain) announcements that have failed due to lack of memory Rate of requests to retrieve a list of browser servers that have been processed by this workstation SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page iii
5 22 Cache Object: s Cache Async Pin Reads Copy Read Hits Copy Reads Data Flush Pages Data Flushes Data Map Hits Data Map Pins Data Maps Fast Read Not Possibles Fast Read Resource Misses Fast Reads Lazy Write Flushes Lazy Write Pages MDL Read Hits MDL Reads Frequency of reading data into the Cache preparatory to writing the data back to disk Pages read in this fashion are pinned in memory at the completion of the read The file system will regain control immediately even if the disk must be accessed to retrieve the page While pinned, a page's physical address will not be altered Percentage of Cache Copy Read requests that hit the Cache, ie, did not require a disk read in order to provide access to the page in the Cache A Copy Read is a file read operation that is satisfied by a memory copy from a Cache page to the application's buffer The LAN Redirector uses this method for retrieving Cache information, as does the LAN Server for small transfers This is a method used by the disk file systems as well Frequency of reads from Cache pages that involve a memory copy of the data from the Cache to the application's buffer The LAN Redirector uses this method for retrieving Cache information, as does the LAN Server for small transfers This is a method used by the disk file systems as well Number of pages the Cache has flushed to disk as a result of a request to flush or to satisfy a write-through file write request More than one page can be transferred on each flush operation Frequency the Cache has flushed its contents to disk as the result of a request to flush or to satisfy a write-through file write request More than one page can be transferred on each flush operation Percentage of Data Maps in the Cache that could be resolved without having to retrieve a page from the disk, ie the page was already in physical memory Frequency of Data Maps in the Cache that resulted in pinning a page in main memory, an action usually preparatory to writing to the file on disk While pinned, a page's physical address in main memory and virtual address in the Cache will not be altered Frequency that a file system such as NTFS or HPFS maps a page of a file into the Cache to read the page Frequency of attempts by an Application Program Interface (API) function call to bypass the file system to get at Cache data, that could not be honored without invoking the file system after all Frequency of Cache misses necessitated by the lack of available resources to satisfy the request Frequency of reads from Cache pages that bypass the installed file system and retrieve the data directly from the Cache Normally, file I/O requests invoke the appropriate file system to retrieve data from a file, but this path permits direct retrieval of Cache data without file system involvement if the data is in the Cache Even if the data is not in the Cache, one invocation of the file system is avoided Frequency the Cache's Lazy Write thread has written to disk Lazy Writing is the process of updating the disk after the page has been changed in memory, so the application making the change to the file does not have to wait for the disk write to complete before proceeding More than one page can be transferred on each write operation Frequency the Cache's Lazy Write thread has written to disk Lazy Writing is the process of updating the disk after the page has been changed in memory, so the application making the change to the file does not have to wait for the disk write to complete before proceeding More than one page can be transferred on a single disk write operation Percentage of Cache Memory Descriptor List (MDL) Read requests that hit the Cache, ie, did not require disk accesses in order to provide memory access to the page(s) in the Cache Frequency of reads from Cache pages that use a Memory Descriptor List (MDL) to access the data The MDL contains the physical address of each page involved in the transfer, and thus can employ a hardware Direct Memory Access (DMA) device to effect the copy The LAN Server uses this method for large transfers out of the server SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page iv
6 Pin Read Hits Pin Reads Read Aheads Sync Copy Reads Percentage of Cache Pin Read requests that hit the Cache, ie, did not require a disk read in order to provide access to the page in the Cache While pinned, a page's physical address in the Cache will not be altered The LAN Redirector uses this method for retrieving Cache information, as does the LAN Server for small transfers This is usually the method used by the disk file systems as well Frequency of reading data into the Cache preparatory to writing the data back to disk Pages read in this fashion are pinned in memory at the completion of the read While pinned, a page's physical address in the Cache will not be altered Frequency of Cache reads where the Cache detects sequential access to a file The read aheads permit the data to be transferred in larger blocks than those being requested by the application, reducing the overhead per access Frequency of reads from Cache pages that involve a memory copy of the data from the Cache to the application's buffer The file system will not regain control until the copy operation is complete, even if the disk must be accessed to retrieve the page SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page v
7 23 ICMP Object: s Messages Outbound Errors Messages Received Errors Messages Received Messages Sent Messages Received Address Mask Received Address Mask Reply Received Destination Unreachable Received Echo Reply Received Echo Received Parameter Problem Received Redirect Received Source Quench Received Time Exceeded Received Timestamp Reply Received Timestamp Sent Address Mask is Sent Address Mask Reply Sent Destination Unreachable Sent Echo Reply Sent Echo ICMP messages that this entity did not send due to problems discovered within ICMP such as lack of buffers This value should not include errors discovered outside the ICMP layer such as the inability of IP to route the resultant datagram In some implementations there may be no types of error that contribute to this counter's value Number of ICMP messages that the entity received but determined as having errors (bad ICMP checksums, bad length, etc) Rate that ICMP messages are received by the entity The rate includes those messages received in error Rate that ICMP messages are attempted to be sent by the entity The rate includes those messages sent in error Total rate that ICMP messages are received and sent by the entity The rate includes those messages received or sent in error Number of ICMP Address Mask Request messages received Number of ICMP Address Mask Reply messages received Number of ICMP Destination Unreachable messages received Rate of ICMP Echo Reply messages received Rate of ICMP Echo messages received Number of ICMP Parameter Problem messages received Rate of ICMP Redirect messages received Number of ICMP Source Quench messages received Number of ICMP Time Exceeded messages received Rate of ICMP Timestamp Reply messages received Rate of ICMP Timestamp (request) messages received Number of ICMP Address Mask Request messages sent Number of ICMP Address Mask Reply messages sent Number of ICMP Destination Unreachable messages sent Rate of ICMP Echo Reply messages sent Rate of ICMP Echo messages sent SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page vi
8 Sent Parameter Problem Sent Redirect Sent Source Quench Sent Time Exceeded Sent Timestamp Reply Sent Timestamp Number of ICMP Parameter Problem messages sent Rate of ICMP Redirect messages sent Number of ICMP Source Quench messages sent Number of ICMP Time Exceeded messages sent Rate of ICMP Timestamp Reply messages sent Rate of ICMP Timestamp (request) messages sent Additional counters will be examined and demonstrated specific to the client s operational objectives SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC (W2000 Server - 36) APP E: Page vii
Appendix PERFORMANCE COUNTERS SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC.
Appendix E PERFORMANCE COUNTERS SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC. Performance s 1 Default s for Commonly Used Objects Object Default Cache Data Map Hits % How often requested data is found in
More informationEach ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields.
IP address ICMP Each ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields. The TYPE field identifies the ICMP message, the CODE field
More informationInternet Control Message Protocol (ICMP)
Chapter 9 Internet Control Message Protocol (ICMP) مترجم : دکتر محمد حسین یغمایی 1 TCP/IP Protocol Suite CONTENTS TYPES OF MESSAGES MESSAGE FORMAT ERROR REPORTING QUERY CHECKSUM ICMP PACKAGE مترجم : دکتر
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationIBM Tivoli Monitoring Version Windows OS Agent User Interface Reference
IBM Tioli Monitoring Version 6.3.0 Windows OS Agent User Interface Reference April 2013 IBM Tioli Monitoring Version 6.3.0 Windows OS Agent User Interface Reference April 2013 Note Before using this information
More informationOutline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols
SC/CSE 3213 Winter 2013 L9: Control Protocols Sebastian Magierowski York University 1 Outline ICMP ARP DHCP NAT (not a control protocol) 2 1 Control Protocols IP is used to transfer data Network layer
More informationMESSAGES error-reporting messages and query messages. problems processes IP packet specific information
ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES
More informationSubnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction
The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions
More informationICMP (Internet Control Message Protocol)
ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationTable of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 3 FEATURES... 3 CONNECTING TO OVIDA... 4 INSTALLATION WIZARD... 5
Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 3 FEATURES... 3 CONNECTING TO OVIDA... 4 INSTALLATION WIZARD... 5 ADSL WIZARD... 6 ISDN WIZARD... 7 PC SETTINGS... 8 USING THE INTERNET... 8 LOCAL
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas
More informationLecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)
Last Lecture Internet Protocol (1) This Lecture Internet Protocol (2) Lecture 18 Overview Source: chapters 19.1, 19.2, 22,1 22.2, 26.6 Next Lecture Transport Control Protocol (1) Source: chapters 24.1,
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More informationUnit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationTSIN02 - Internetworking
Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationTo make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at
To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationConfiguring attack detection and prevention 1
Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationITM 6.2/6.1 Attribute Difference Report
ITM 6.2/6.1 Attribute Difference Report Application Product Agent KNT NT Windows OS [=] TABLE: NT_System 2 [=] TABLE: NT_Memory 2 [=] TABLE: NT_Logical_Disk 2 [=] TABLE: NT_Physical_Disk 2 [=] TABLE: NT_Process
More informationPerformance Objects and Counters for the System
APPENDIXA Performance Objects and for the System May 19, 2009 This appendix provides information on system-related objects and counters. Cisco Tomcat Connector, page 2 Cisco Tomcat JVM, page 4 Cisco Tomcat
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationIP performance optimization
Contents IP performance optimization 1 display icmp statistics 1 display ip socket 2 display ip statistics 6 display tcp statistics 8 display udp statistics 10 ip forward-broadcast 11 ip icmp flow-control
More informationT01IPnnn - Internet Layer Messages
CHAPTER 20 T01IPnnn - Internet Layer Messages This chapter describes the messages issued by the Internet layer (IP, ICMP) routine. These include messages T01IP001 through T01IP999. T01IPnnn T01IP001D Protocol
More information(ICMP), RFC
Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to
More informationConfiguring attack detection and prevention 1
Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack
More informationNetwork Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:
Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless
More informationNetwork Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control
The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)
More informationAuxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets
Internet Layer Auxiliary Protocols aw division into three tasks: Data transfer over a global network oute decision at the sub-nodes Control of the network or transmission status outing Protocols outing
More informationTable of Contents 1 IP Address Configuration Commands IP Performance Configuration Commands 2-1
Table of Contents 1 IP Address Configuration Commands 1-1 IP Address Configuration Commands 1-1 display ip interface 1-1 display ip interface brief 1-2 ip address 1-3 2 IP Performance Configuration Commands
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationCommand Manual (For Soliton) IP Address-IP Performance. Table of Contents
Table of Contents Table of Contents Chapter 1 IP Address Configuration... 1-1 1.1 IP Address Configuration... 1-1 1.1.1 display ip interface... 1-1 1.1.2 display ip interface brief... 1-3 1.1.3 ip address...
More informationNetworking TCP/IP troubleshooting
System i Networking TCP/IP troubleshooting Version 6 Release 1 System i Networking TCP/IP troubleshooting Version 6 Release 1 Note Before using this information and the product it supports, read the information
More informationConfiguring IP Services
This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationDepartment of Computer Science and Engineering. COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005
Department of Computer Science and Engineering COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005 Midterm Examination Instructions: Examination time: 75 min. Print
More informationChapter 6. The Protocol TCP/IP. Introduction to Protocols
Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following
More informationFirewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
More information4. Basic IP Support Protocols
4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols
More informationConfiguring IP Services
CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in
More informationTable of Contents 1 IP Address Configuration Commands IP Performance Configuration Commands 2-1
Table of Contents 1 IP Address Configuration Commands 1-1 IP Address Configuration Commands 1-1 display ip interface 1-1 display ip interface brief 1-2 ip address 1-4 2 IP Performance Configuration Commands
More informationThe Internet. The Internet is an interconnected collection of netw orks.
The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached
More informationInternet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC
Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary
More informationConfiguring IP Services
Configuring IP Services Last Updated: December 16, 2011 This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationCS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly
More informationIPv4. Christian Grothoff.
IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving
More informationSupport for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only.
Support for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only. Transparently Routing Web Traffic to the Barracuda Web Security Gateway This article demonstrates
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationContents. IP addressing configuration commands 1 display ip interface 1 display ip interface brief 3 ip address 5
Contents IP addressing configuration commands 1 display ip interface 1 display ip interface brief 3 ip address 5 i IP addressing configuration commands display ip interface Syntax View Default level Parameters
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24
EE 586 Communication and Switching Networks (Fall 2010) Lecture 24 October 25, 2010 1-1 Announcements Midterm 1: Mean = 92.2 Stdev = 8 Still grading your programs (sorry about the delay) Network Layer
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationUsing ICMP to Troubleshoot TCP/IP Networks
Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which
More informationCS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationSystem Performance Objects and Counters
APPENDIXA System Performance Objects and This appendix contains the following sections: Cisco Tomcat Connector, page A-2 Cisco Tomcat JVM, page A-3 Cisco Tomcat Web Application, page A-4 Database Change
More informationREC (Remote Equivalent Copy) ETERNUS DX Advanced Copy Functions
ETERNUS DX Advanced Copy Functions (Remote Equivalent Copy) 0 Content Overview Modes Synchronous Split and Recovery Sub-modes Asynchronous Transmission Sub-modes in Detail Differences Between Modes Skip
More informationCisco ISR G2 and Cloud Web Security Troubleshooting Guide
Design Guide Cisco ISR G2 and Cloud Web Security Troubleshooting Guide Design Guide September, 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 18 Contents
More informationOS and Hardware Tuning
OS and Hardware Tuning Tuning Considerations OS Threads Thread Switching Priorities Virtual Memory DB buffer size File System Disk layout and access Hardware Storage subsystem Configuring the disk array
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationOS and HW Tuning Considerations!
Administração e Optimização de Bases de Dados 2012/2013 Hardware and OS Tuning Bruno Martins DEI@Técnico e DMIR@INESC-ID OS and HW Tuning Considerations OS " Threads Thread Switching Priorities " Virtual
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationTSIN02 - Internetworking
Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationImplementing Access Lists and Prefix Lists
An access control list (ACL) consists of one or more access control entries (ACE) that collectively define the network traffic profile. This profile can then be referenced by Cisco IOS XR softwarefeatures
More informationLarge Systems: Design + Implementation: Communication Coordination Replication. Image (c) Facebook
Large Systems: Design + Implementation: Image (c) Facebook Communication Coordination Replication Credits Slides largely based on Distributed Systems, 3rd Edition Maarten van Steen Andrew S. Tanenbaum
More informationUNIFIE II/FC79 FEE7/ L AD-iZ INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL i/ I MARINA DEL REY INFORMATION SCIENCES INST SEP Si
L AD-iZ23 207 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL i/ SPECIFICATION(U) UNIVERSITY OF SOUTHERN CALIFORNIA I MARINA DEL REY INFORMATION SCIENCES INST SEP Si UNIFIE II/FC79 FEE7/ 212 jjj~j.0
More informationshow ip sockets through show sockets
show ip sockets, page 2 show ip tcp header-compression, page 5 show ip traffic, page 9 show ip wccp, page 13 show ip wccp global counters, page 29 show ip wccp web-caches, page 31 show platform hardware
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationConfiguring Routes on the ACE
CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up
More informationInternet Technology 3/23/2016
Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router
More informationTCP/IP Protocol Suite
TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol
More informationUpdates: 1213 November 1996 Category: Standards Track
Network Working Group K. McCloghrie, Editor Request for Comments: 2011 Cisco Systems Updates: 1213 November 1996 Category: Standards Track Status of this Memo SNMPv2 Management Information Base for the
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationAn 8051 Based Web Server
An 8051 Based Web Server Project by Mason Kidd Submitted to Dr. Donald Schertz EE 452 Senior Laboratory II May 14 th, 2002 Table of Contents Page 1. Abstract 1 2. Functional Description 2 3. Block Diagram
More informationIP Services Volume Organization
IP Services Volume Organization Manual Version 6W100-20090626 Product Version Release 1102 Organization The IP Services Volume is organized as follows: Features IP Address IP Performance Optimization ARP
More information