Performance Analysis of IPsec Gateway

Size: px
Start display at page:

Download "Performance Analysis of IPsec Gateway"

Transcription

1 VOL. 3, NO., APRIL Performance Analysis of IPsec Gateway Adam Tisovský, Ivan Baroňák Fakulta elektrotechniky a informatiky STU v Bratislave {tisovsky,baronak}@ut.fei.stuba.sk Abstract The paper outlines specific features of IPsec gateway performance related to the rate of offered traffic. It points out the role of hardware crypto accelerator in the security gateway and advises of pitfall when no hardware acceleration is implemented. It is essential to consider these effects when testing IPsec performance in order to obtain precise and reliable results. We propose recommendations and methodology for testing the performance of IPsec gateway. The evaluation is based on the values of IPsec forwarding rate and gateway s CPU utilization. Introduction Knowing information about the IPsec performance on a network device is important for both vendors and customers. It is often complicated to analytically calculate or to predict an actual performance of IPsec gateway for certain nature of network traffic. One of reliable methods how to obtain this information is to measure it on the devices either in-situ or in laboratory. We need results obtained in a confident, simple and mostly as-fast-as-possible way. To perform effective measurement with avoiding mistakes we need to know all specific phenomena related to the IPsec performance on a security gateway as well as to be equipped by a wise measuring tool. From our previous research [] we know that the capacity of IPsec processing expressed either in bits per second or in packets per second is not constant and not linear over the range of packet sizes. This introduces many difficulties into modelling the network parameters, e.g. traffic dimensioning, QoS policy, etc. Therefore there is higher demand for measuring the IPsec performance and also for researching the possibilities of performance modelling []. Another significant fact is that there are considerable differences in performance when IPsec is processed exclusively by the main CPU (i.e. cryptographic algorithm is executed on a software basis by the same processor responsible for switching packets, routing, resource management, etc.) and when the hardware crypto accelerator is employed to offload the main CPU. We can summarize these differences in two main statements: Performance with hardware crypto accelerator is much higher than without crypto accelerator. This apparent fact, however, covers other consequences there is an omissible difference in performance between all cryptographic algorithms, it is rather dependant on a security protocol (AH or ESP). The performance over the range of packet sizes is closer to a constant value of packets per second, yet still is not constant. Without hardware crypto accelerator IPsec forwarding rate decreases when the offered load exceeds the IPsec processing capacity (device is overloaded). In this paper we deal mainly with implications related to the second statement. We focus on how are the forwarding rate and CPU utilization of IPsec process dependant on the amount of offered load, with or without hardware crypto accelerator. Terminology In this paper we use terminology for device performance testing introduced mainly in RFC [], RFC 85 [3] and IETF draft Terminology for Benchmarking IPsec Devices []. These terms are: (offered traffic rate) the rate at which device under test receives the frames at a specified interface. [3] Forwarding rate the rate at which a device can be observed to successfully transmit to the correct destination interface in response to a specified offered load. It makes no explicit reference to frame loss. [3] Forward pressure situation in which overloaded device violates normal procedures in order to increase forwarding rate. [3] Throughput the maximum rate at which none of the offered frames are dropped by the device. [, ] Maximum forwarding rate (MFR) the highest forwarding rate of a device taken from an iterative set of forwarding rate measurements [3]. MFR is often recorded when the device is overloaded. Besides the terms throughput and maximum forwarding rate we propose to employ another term: Maximum forwarding rate same as offered load (MFRSOL) the highest forwarding rate of a device that is the same as offered load. According to our observations MFRSOL is more suitable to universally describe the performance of a device than throughput. The reason is that the throughput as described in RFC may be dependent on duration of the test. It varies between values of MFRSOL and MFR. As presented in this paper, a buffer preceding IPsec process may cause that no 39

2 VOL. 3, NO., APRIL packet is lost in a test of finite duration, despite an offered load is higher than forwarding rate. Due to buffer, forwarding pressure and interrupt coalescing in the device [5] throughput may be temporarily higher than MFRSOL. The device is, however, overloaded and the state of no packet loss is not infinitely sustainable. Conclusion is that the value of throughput is affected by many factors, as duration of the test, buffer length, interrupt-coalescing block size, ability of device to handle forward pressure, and therefore is not as universal as MFRSOL. However, all of aforementioned terms and their related methodologies of measuring may be interesting for specified demands and conditions in testing. 3 Experiment Environment We evaluated IPsec performance on Cisco 8 Integrated Services Router with integrated hardware crypto accelerator. Experiment environment was set as depicted in Fig.. Two Cisco 8 routers acted as security gateways. All device connections were made using Mbps Fastethernet links to ensure that capacity bottleneck is IPsec processing on the router, not the link interface. As a traffic generator and measurement tool was used Iperf.7. with Jperf.. GUI which was installed on two endpoints with operating system Linux Ubuntu version. one acting as a client (traffic transmitter), the second acting as a server (traffic receiver). UDP was used as a transport protocol because TCP employs flow and error control unneeded for our experiment. Input and output values in Iperf are related to the payload of Layer of OSI model (excluding L header), thus all the rates and sizes in this paper are related to UDP datagram payloads, too. Default settings in our scenario were these: 5 bytes UDP payload datagram (58 bytes IP packet) constant packet inter-departure time IPsec in tunnel mode ESP protocol for encryption 3DES encryption algorithm 3 seconds duration of the tests Fig.. Scheme of experiment environment Forwarding Rate. Hardware crypto accelerator enabled First we can take a look at a forwarding rate of IPsec process related to an offered load when the hardware crypto accelerator is enabled. In Table I are noted values for security combination ESP-3des and flow of 5 byte UDP payload datagrams. These values are plotted in Fig.. In this case forwarding rate is the same as offered load until it reaches MFRSOL at 7 Mbps. Until this point no packet is lost. Further increasing of offered load causes forward pressure on the router and in the effort to relieve the saturated queue router temporarily inhibit certain processes to increase the forwarding rate [3]. A number of packets are now being discarded as well. At offered load 9 Mbps we reach the MFR, which is 7.95 Mbps. When the rate of offered load overruns MFR the forwarding rate decreases very slightly (minus.6%). With a further increase of offered load it persists at the same level, however. This means that with omissible error we can measure MFR easily by setting offered load to any higher value than is the actual (expected) MFR. IPsec Forwarding Rate TABLE I ESP-3DES PERFORMANCE FOR 5 BYTES UDP DATAGRAM; HARDWARE ENCRYPTION Forwarding rate Packet loss Maximum forwarding rate same as offered load (MFRSOL) and also throughput Maximum forwarding rate (MFR) IPsec Forwarding Rate Offered Load Packet Loss Fig.. ESP-3des performance for 5 bytes UDP datagram; hardware encryption. Hardware crypto accelerator disabled If we disable hardware crypto accelerator, behaviour of forwarding rate will be different. The dependency of forwarding rate and a packet loss on the offered load is shown in Table II and plotted in Fig Packet Loss

3 VOL. 3, NO., APRIL First difference is that at a certain interval of offered load (3. Mbps to 3.58 Mbps in this example) forwarding rate is lower than the offered load, but no packet is lost. From the results we suppose that the reason is in buffer preceding the encryption process. Default duration of our measurements was set to 3 seconds, but when we increased this period, we experienced the packet loss. The less was difference between offered load and forwarding rate (i.e. the offered load exceeds current forwarding rate only slightly), the more time it took to record packet loss. And vice versa, if the offered load exceeds forwarding rate greatly, the packet loss occurs in a short time. The buffer, according to our observations, could be in this example quite large tens of kilobytes. In fact, analyzing the time when packet loss begins can be one of the methods how to estimate the buffer length when this information is not publicly available as was the case of our device as well. IPsec Forwarding Rate 3,5 3,5,5,5 TABLE II ESP-3DES PERFORMANCE FOR 5 BYTES UDP DATAGRAM; SOFTWARE ENCRYPTION Forwarding rate Packet loss Maximum forwarding rate that same as offered load (MFRSOL) Maximum forwarding rate (MFR) and also throughput IPsec Forwarding Rate 5 5 Offered Load Packet Loss Fig. 3. ESP-3des performance for 5 bytes UDP datagram; software encryption The second difference is that after reaching maximal forwarding rate (3.76 Mbps in this example), with further increase of offered load the forwarding rate decreases. This Packet Loss behaviour may be very risky the performance of security gateway might be decreased significantly if the amount of IPsec traffic is not designed correctly. Besides, we can obtain wrong numbers of device performance when we employ incorrect methodology of measurement. The reason of described behaviour is discussed below. 5 CPU utilization To reveal the reason of mentioned IPsec forwarding rate behaviour we take a look at CPU utilization. Cisco IOS provides this information using command show processes cpu which covers utilization of last 5 seconds, minute and 5 minutes. The utilization is split between operations on an interrupt level and on a process level. First we analyze CPU utilization of the gateway with hardware accelerator enabled. 5. Hardware crypto accelerator enabled Looking at CPU utilization we find out that with enabled hardware crypto accelerator the IPsec performance is determined only by amount of interrupts of the CPU. On a process level there is no CPU utilization by the cryptographic operations. As a result, whole CPU utilization, let be maximum 98%, consists of 96% CPU utilization on interrupt level and % on process level. This minor utilization on process level is the sum of common CPU not-intensive processes like Pool Manager, CDP Protocol, Per-Minute Jobs, DHCPD receive, Check Heaps, Load Meter, etc. The reason of high CPU utilization by interrupts during IPsec processing is that some device architectures do not allow processing of IPsec packet exclusively by the hardware crypto accelerator, but requires CPU cooperation to handle the packet. The role of CPU is mainly to control a packet passing through the device and to maintain software operations related to IPsec protocol (protocol stack, protocol driver, API, etc.) []. In Table III are listed values of CPU utilization for different offered loads for security combination ESP-3des and 5 byte UDP payload packet. For comparison, CPU utilization for plaintext (non-ipsec) traffic is % at Mbps. When plotting data from Table III into graph (Fig. ) we find out that the trend of CPU utilization is not linear over the range of offered load. The linearity appears only for offered load lower than about.3 Mbps, what is 58% of maximal measured forwarding rate at this point the CPU utilization is 88%. With further increasing of offered load the utilization rises very slowly and finally reaches 98% at maximal measured forwarding rate 7.75 Mbps. The interesting thing is that this CPU utilization behaviour does not affect forwarding rate at all it is strictly linear over the whole range of offered load (until it reaches maximal forwarding rate). This behaviour is not abnormal, however, as Cisco reports non-linear CPU utilization also for the plaintext packet switching for some of their devices []. For further understanding it is important to remind that maximal forwarding rate is achieved at almost full utilization of CPU by interrupts. As a result, forwarding rate does not decrease when the offered load exceeds maximal measured forwarding rate (as shown in Fig. ). This is in contrast with

4 VOL. 3, NO., APRIL CPU Utilization the case of crypto accelerator disabled (as was shown in Fig. 3 and also will be explained below). As was mentioned in the introduction, the capacity of IPsec processing is dependent on the packet length. For this reason we measured utilization for various packet lengths and verified that mentioned behaviour of CPU utilization is the same for all packet lengths. The trend keeps linearity up to circa 88% of CPU utilization. This corresponds to a forwarding rate of about 58% of MFR in all cases. Moreover, when we look at the forwarding rate that induces 5% CPU utilization we see that it equals around 3% of MFR for all packet lengths. Precise values are listed in Table IV. This assumption might help us to estimate performance for different packet lengths: either MFR from known CPU utilization at known offered load or vice versa CPU utilization for certain offered load from known MFR TABLE III CPU UTILIZATION FOR 5 BYTES UDP DATAGRAM, ESP-3DES; HARDWARE ENCRYPTION Total CPU utilization Interrupt utilization Total CPU Utilization Interrupt utilization Forwarding rate Offfered Load Fig.. CPU utilization at 5 bytes UDP datagram; hardware encryption Forwarding Rate UDP payload length [bytes] TABLE IV FORWARDING RATE AT 5% CPU UTILIZATION Maximum Forwarding Rate (MFR) Forwarding rate (FR) at 5% CPU utilization Ratio of FR / MFR % % % 5. Hardware crypto accelerator disabled Total CPU utilization of IPsec processing without hardware crypto accelerator consists of two main components CPU interrupts and encryption process. In Table V are listed values for ESP-3des encryption at 5 bytes UDP payload datagram. These values are plotted in Fig. 5 as well. Until maximum forwarding rate is reached, both main components of total CPU utilization (light orange) CPU interrupts (orange) and encryption process (dark orange) are directly proportional to the flow offered load. Interesting to note is that interrupt utilization keeps linear trend over the whole inspected range unlike the case with hardware crypto accelerator enabled. Maximum forwarding rate of IPsec processing is achieved at total CPU utilization of 99%, where 8.5% is consumed by the encryption process, 8% by the interrupts and the rest by minor processes. If we continue increasing offered load beyond this point, more CPU resources will be consumed by interrupts and less will be available for the encryption process itself. This leads into decrease of forwarding rate, as it was shown in Fig. 3, and makes measuring the capacity more difficult than when hardware crypto accelerator is enabled. There are two possible methods of measuring the capacity. First, estimate MFR by extrapolating the linear relation between CPU utilization and forwarding rate. Because the relation is linear and the line begins in zero, one measuring is needed, as depicted in Fig. 6. This method appears to be easy and convenient, but since extrapolation amplifies an error, we must be able to measure both CPU utilization and forwarding rate with enough precision. Our testing device provides values of CPU utilization rounded to integer only what could produce an error of several percent in a result. Inaccuracy may be lowered when measured point falls within high utilization. It is also possible to make several measurements with different offered loads to obtain more known points in extrapolation chart. Second method, a search algorithm with iterations of the offered load (its increase, decrease and a step change) in response to measured forwarding rate (or a packet loss) of the gateway. Using this method is possible to precisely measure MFRSOL, throughput and MFR. Disadvantage of the method might be its time consumption as we need several iterations until the result is approached. Therefore it is necessary to design effective iterative algorithm and wisely adjust its parameters (start point, step, tolerances limit).

5 VOL. 3, NO., APRIL CPU Utilization TABLE V CPU UTILIZATION FOR 5 BYTES UDP DATAGRAM, ESP-3DES; SOFTWARE ENCRYPTION Fig. 5. CPU utilization at 5 bytes UDP datagram; software encryption Total CPU Utilization 8 6 Total CPU utilization Measured point Interrupt utilization Extrapolated point 7%CPUat,3 Mbps Encryption utilization Encryption utilization Interrupt utilization Offered Load Total CPU utilization Forwarding Rate 99%CPUat 3,3Mbps 3 Offered Load Fig. 6. Throughput estimation by extrapolating the CPU utilization; estimation has % inaccuracy from the actual throughput value 3, Mbps,5 3,5 3,5,5,5 Forwarding rate It is necessary to say that for different packet lengths the relation between CPU utilization and forwarding rate utilization is not the same, as it was in case of hardware crypto accelerator enabled. However, presented linear trend of both components of CPU utilization CPU interrupts and encryption process is valid for every packet length. 6 Conclusion and future work In this paper we presented dependency of IPsec gateway performance on offered load and suggested considerations for effective and precise performance testing. According to our observations MFRSOL ( Maximal Forwarding Rate Same as Offered Load ) is more suitable term to universally describe the performance of a device than the throughput described in RFC, as this may be dependent on duration of the test. The paper has also outlined several interesting and potential fields of further research. We will aim to inspect IPsec capacity and CPU utilization for different nature of traffic more parallel flows or not-constant packet inter-departure time distribution, and mixed traffic, i.e. more packet lengths present in the concurrent flows. We will also examine the possibilities of estimation the IPsec buffer length. Acknowledgement This work is a part of research activities conducted at Slovak University of Technology Bratislava, Faculty of Electrical Engineering and Information Technology, Institute of Telecommunications, within the scope of the projects VEGA No. /86/ Modelling of Multimedia Traffic Parameters in IMS Networks and Support of Centre of Excellence for SMART Technologies, Systems and Services II., ITMS 69, co-funded by the ERDF. References [] Tisovský, A., Klúčik, S., "Method for Calculation the Packet- Size Dependent Throughput of a Computationally Intensive IPsec Process" In: Elektrorevue, ISSN 3-539, November, Art. no 98W. [] S. Bradner, RFC - Benchmarking Terminology for Network Interconnection Devices, IETF RFC, 99 [3] R. Mandeville, RFC - Benchmarking Terminology for LAN Switching Devices, IETF RFC, 998 [] M. Kaeo, T. Van Herck, M. Bustos, Terminology for Benchmarking IPsec Devices: draft-ietf-bmwg-ipsec-term-, IETF Draft, 9 [5] M. Zec, M. Mikuc, M. Žagar, Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput, Proceedings of the th SoftCOM conference, [6] Khaled Salah, Integrated performance evaluating criterion for selecting between interrupt coalescing and normal interruption, International Journal of High Performance Computing and Networking, Volume 3 Issue 5/6, December 5 [7] M. Castelino, F. Hady, Network Processing Forum, Tutorial on NPF's IPsec Forwarding Benchmark. [Online].. Available: Benchmark 3

6 VOL. 3, NO., APRIL [8] M. Kaeo, Methodology for Benchmarking IPsec Devices, IETF Draft, 9 [9] S. Bradner, RFC 5 - Benchmarking Methodology for Network Interconnect Devices, IETF RFC, 999 [] B. Hickman et al., RFC 35 - Benchmarking Methodology for Firewall Performance, IETF RFC, 3 [] G. Waters, K. Stammberger, Understanding Crypto Performance in Embedded Systems. [Online]. 9. Available: WP_Rev.pdf [] Cisco Systems, Troubleshooting High CPU Utilization on Cisco Routers. Configuration Guide. [Online]. Available: oducts_tech_note986a8a7f.shtml?referring_site=body nav [3] T. Balogh, M. Medvecký, Comparison of Priority Queuing Based Scheduling Algorithms. In: Elektrorevue. - ISSN Roč. 5, 6.. (), art. no 93 [] M. Voznak, F. Rezac, M Halas, Speech Quality Evaluation in IPsec Environment, th International Conference on Networking, VLSI and Signal Processing (ICNVS '), FEB -, Univ Cambridge, Cambridge, ENGLAND, Source: RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING Book Series: Mathematics and Computers in Science and Engineering Pages: 9-53, Published:

LANCOM Techpaper Routing Performance

LANCOM Techpaper Routing Performance LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided

More information

Research Article Average Bandwidth Allocation Model of WFQ

Research Article Average Bandwidth Allocation Model of WFQ Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute

More information

Modeling of Contact Center Traffic

Modeling of Contact Center Traffic Modeling of Contact Center Traffic E. Chromy, S. Petran and M. Kavacky * Abstract Paper deals with operation of the contact center and its modeling. Erlang B and Erlang C formulas are used for our calculations.

More information

Parallelizing IPsec: switching SMP to On is not even half the way

Parallelizing IPsec: switching SMP to On is not even half the way Parallelizing IPsec: switching SMP to On is not even half the way Steffen Klassert secunet Security Networks AG Dresden June 11 2010 Table of contents Some basics about IPsec About the IPsec performance

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Request for Comments: 2889 Category: Informational Spirent Communications August Benchmarking Methodology for LAN Switching Devices

Request for Comments: 2889 Category: Informational Spirent Communications August Benchmarking Methodology for LAN Switching Devices Network Working Group Request for Comments: 2889 Category: Informational R. Mandeville CQOS Inc. J. Perser Spirent Communications August 2000 Status of this Memo Benchmarking Methodology for LAN Switching

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Performance of Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Chin Hooi Tang, and Tat Chee Wan, Member, IEEE ComSoc. Abstract Quality of Service (QoS) schemes such

More information

Scalability Considerations

Scalability Considerations 3 CHAPTER This chapter presents the following steps to selecting Cisco products for a VPN solution: Sizing the headend Choosing Cisco products that can be deployed for headend devices Product sizing and

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS VOLUME: 9 NUMBER: 5 SPECIAL ISSUE THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS Martin MEDVECKY Department of Telecommunications, Faculty of Electrical Engineering and Information Technology,

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

Southern Polytechnic State University Spring Semester 2009

Southern Polytechnic State University Spring Semester 2009 Southern Polytechnic State University Spring Semester 2009 ECET 4840 Laboratory Exercises 9: Router Queuing Configuration and Testing Objective: Students will investigate the effect of varying link capacity

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Performance Testing of Open Source IP Multimedia Subsystem

Performance Testing of Open Source IP Multimedia Subsystem Performance Testing of Open Source IP Multimedia Subsystem MATEJ KAVACKÝ Institute of Multimedia Information and Communication Technologies Faculty of Electrical Engineering and Information Technology,

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Analyze of SIP Messages and Proposal of SIP Routing

Analyze of SIP Messages and Proposal of SIP Routing Analyze of SIP Messages and Proposal of SIP Routing F. Csoka, I. Baronak, E. Chromy and L. Kockovic Abstract This paper deals with the functionality of SIP and design of an efficient and optimized process

More information

Hillstone IPSec VPN Solution

Hillstone IPSec VPN Solution 1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

The IPsec protocols. Overview

The IPsec protocols. Overview The IPsec protocols -- components and services -- modes of operation -- Security Associations -- Authenticated Header (AH) -- Encapsulated Security Payload () (c) Levente Buttyán (buttyan@crysys.hu) Overview

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

VOIP Network Pre-Requisites

VOIP Network Pre-Requisites VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.

More information

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Performance Modeling and Evaluation of Web Systems with Proxy Caching Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering

More information

Chapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO)

Chapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) CHAPTER - 5 A BANDWIDTH-SENSITIVE ROUTING FOR NETWORK MOBILITY He profits most who serves best. -Arthur F. Sheldon 5.1 Background It is very

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract 1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined

More information

GUIDELINES FOR VOIP NETWORK PREREQUISITES

GUIDELINES FOR VOIP NETWORK PREREQUISITES GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration EqualLogic Storage and Non-Stacking Switches Sizing and Configuration THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Table of Contents 1 GRE Configuration Point to Multi-Point GRE Tunnel Configuration 2-1

Table of Contents 1 GRE Configuration Point to Multi-Point GRE Tunnel Configuration 2-1 Table of Contents 1 GRE Configuration 1-1 GRE Overview 1-1 Introduction to GRE 1-1 GRE Security Options 1-3 GRE Applications 1-3 Protocols and Standards 1-4 Configuring a GRE over IPv4 Tunnel 1-4 Configuration

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

TamoSoft Throughput Test

TamoSoft Throughput Test TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2016 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...

More information

estadium Project Lab 2: Iperf Command

estadium Project Lab 2: Iperf Command estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

QOS Section 6. Weighted Random Early Detection (WRED)

QOS Section 6. Weighted Random Early Detection (WRED) QOS Section 6 Weighted Random Early Detection (WRED) The previous section addressed queuing, which is a congestionmanagement QoS mechanism. However, this section focuses on congestion avoidance. Specifically,

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

Network Design Considerations for Grid Computing

Network Design Considerations for Grid Computing Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom

More information

A Fuzzy Based Approach for Priority Allocation in Wireless Sensor Networks Imen Bouazzi #1, Jamila Bhar #2, Semia Barouni *3, Mohamed Atri #4

A Fuzzy Based Approach for Priority Allocation in Wireless Sensor Networks Imen Bouazzi #1, Jamila Bhar #2, Semia Barouni *3, Mohamed Atri #4 A Fuzzy Based Approach for Priority Allocation in Wireless Sensor Networks Imen Bouazzi #1, Jamila Bhar #2, Semia Barouni *3, Mohamed Atri #4 # EμE Laboratory, Faculty of Science of Monastir Monastir,

More information

A New Congestion Control Scheme: Slow Start and Search (Tri-S)

A New Congestion Control Scheme: Slow Start and Search (Tri-S) A New Congestion Control Scheme: Slow Start and Search (ri-s) Zheng Wang Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6B, United Kingdom zwang@cs.ucl.ac.uk,

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

The ERICA ALGORITHM for ABR TRAFFIC in ATM NETWORKS

The ERICA ALGORITHM for ABR TRAFFIC in ATM NETWORKS The ERICA ALGORITHM for ABR TRAFFIC in ATM NETWORKS Ibrahim Koçyigit Department of Electronics, Faculty of Engineering, Uludag University, Görükle, Bursa TURKEY E-mail: kocyigit@uludag.edu.tr Emrah Yürüklü

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

IPsec NAT Transparency

IPsec NAT Transparency The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science

More information

IP data delivery in HBB-Next Network Architecture

IP data delivery in HBB-Next Network Architecture IP data delivery in HBB-Next Network Architecture Roman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Truchly, and Andrej Binder Institute of Computer Systems and Networks, Faculty of Informatics and Information

More information

SamKnows test methodology

SamKnows test methodology SamKnows test methodology Download and Upload (TCP) Measures the download and upload speed of the broadband connection in bits per second. The transfer is conducted over one or more concurrent HTTP connections

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Radyne s SkyWire Gateway Quality of Service

Radyne s SkyWire Gateway Quality of Service Radyne s SkyWire Gateway Quality of Service White Paper WP026 Rev 1.0 April 2008 Radyne Corporation 3138 E. Elwood St. Phoenix, AZ 85034 (602) 437-9620 Fax: (602) 437-4811 Radyne s SkyWire Gateway Quality

More information

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme TFRC and RTT s Interdependence in a Selective Retransmission Scheme Árpád Huszák, Sándor Imre Budapest University of Technology and Economics, Department of Telecommunications Budapest, Hungary Email:

More information

Introducing Frame Relay

Introducing Frame Relay Frame Relay CCNA 4 Note Much of the information in this presentation comes from the CCNP 2 version 3.0 module on Frame Relay. I find a lot of the information in CCNA 4 module 5 Frame Relay not very well

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Secure Networking with NAT Traversal for Enhanced Mobility

Secure Networking with NAT Traversal for Enhanced Mobility Secure Networking with NAT Traversal for Enhanced Mobility Lubomir Cvrk 1, Vit Vrba 1 1 Brno University of Technology, Dept. of Telecommunications, Purkynova 118, 61200 Brno, Czech Republic {cvrk, vrba}@westcom.cz

More information

An evaluation tool for Wireless Digital Audio applications

An evaluation tool for Wireless Digital Audio applications An evaluation tool for Wireless Digital Audio applications Nicolas-Alexander Tatlas 1, Andreas Floros 2, and John Mourjopoulos 3 1 Audiogroup, Electrical Engineering and Computer Technology Department,

More information

Configuring Cisco Performance Monitor

Configuring Cisco Performance Monitor This document contains information about and instructions for configuring Cisco Performance Monitor. Finding Feature Information, page 1 Information About Cisco Performance Monitor, page 1 Restrictions

More information

Performance Evaluation of NEMO Basic Support Implementations

Performance Evaluation of NEMO Basic Support Implementations Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support

More information

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps Configuration Guide 5991-2121 May 2006 Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps This Configuration Guide explains the concepts behind configuring your Secure Router Operating

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

Ashortage of IPv4 address space has

Ashortage of IPv4 address space has INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 411 419 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.582 A measurement study of network

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Performance Enhancement for IPsec Processing on Multi-Core Systems

Performance Enhancement for IPsec Processing on Multi-Core Systems Performance Enhancement for IPsec Processing on Multi-Core Systems Sandeep Malik Freescale Semiconductor India Pvt. Ltd IDC Noida, India Ravi Malhotra Freescale Semiconductor India Pvt. Ltd IDC Noida,

More information

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo. QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data

More information

Internet security and privacy

Internet security and privacy Internet security and privacy IPsec 1 Layer 3 App. TCP/UDP IP L2 L1 2 Operating system layers App. TCP/UDP IP L2 L1 User process Kernel process Interface specific Socket API Device driver 3 IPsec Create

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review What is AIMD? When do we use it? What is the steady state profile

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

TOLLY. Nortel Networks. Contivity Extranet Switch Test Summary. Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput

TOLLY. Nortel Networks. Contivity Extranet Switch Test Summary. Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput T H E TOLLY G R O U P No. 199104 January 1999 Nortel Networks Contivity Extranet Switch 4000 Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput Test Summary Premise: As savvy network

More information

Transition Strategies from IPv4 to IPv6: The case of GRNET

Transition Strategies from IPv4 to IPv6: The case of GRNET Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering

More information

Mobile IP and IPSec in Enterprise use

Mobile IP and IPSec in Enterprise use Mobile IP and IPSec in Enterprise use Markku Rantala Helsinki University of Technology Department of Electrical and Communications Engineering Markku.Rantala@spiritco.com Abstract A modern enterprise IT

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Network Interconnection

Network Interconnection Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture

More information

Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks

Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks Communication Networks Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks Michael Menth and Nikolas Zeitler http://kn.inf.uni-tuebingen.de Outline The problem Definition

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

A ULE Security Approach for Satellite Networks on PLATINE Test Bed

A ULE Security Approach for Satellite Networks on PLATINE Test Bed A ULE Security Approach for Satellite Networks on PLATINE Test Bed L. Liang, L. Fan, H. Cruickshank, and Z. Sun Centre of Communication System Research, University of Surrey, Guildford, Surrey, UK C. Baudoin

More information

On the Effectiveness of CoDel for Active Queue Management

On the Effectiveness of CoDel for Active Queue Management 1 13 Third International Conference on Advanced Computing & Communication Technologies On the Effectiveness of CoDel for Active Queue Management Dipesh M. Raghuvanshi, Annappa B., Mohit P. Tahiliani Department

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #1 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Intersession 2009 Question Paper NOTE: Students may take this

More information

Virtual Private Networks (VPN)

Virtual Private Networks (VPN) CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1

More information

High Availability Options

High Availability Options , on page 1 Load Balancing, on page 2 Distributed VPN Clustering, Load balancing and Failover are high-availability features that function differently and have different requirements. In some circumstances

More information