Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis
|
|
- Myles Hines
- 5 years ago
- Views:
Transcription
1 Analysis of Redundant Flow in Network 1 Yan Liu, 2 Yulong Yang 1, 2 Southwest University of Science and Technology ABSTRACT It is information society nowadays, with the rapidly growing popularity of the Internet, more and more people surf the Internet every day. Audio, video and hot web site become more and more popular, resulting in the sharply increase of redundant flow, a great waste of bandwidth, and consumedly reduce the quality of network service. Therefore, people are trying their best to seek a method to solve the problem of insufficient bandwidth. Also, it is very important to prove the existence of redundant flow in the network and study the next-generation Internet architecture. This article firstly uses network sniffer to capture massive data in the network, then statistically analyses the data and finally confirms the presence of a large amount of redundant traffic in the network. Keywords: Network; redundant; flow analysis 1. BACKGROUND According to the experimental results, there are a lot of redundant traffic between two node in the Interne, redundant traffic is refers to the network between the two nodes of the same content repeated more than once. These redundant transmission increases the burden of network traffic, reduces the quality of network service. Especially now the network resources have become more and more rich, and the audio and voide information gradually become the mainstream of the network which challenge the Internet a lot. if we do nothing about it, after a few years the Internet may breakdown due to the bandwidth bottleneck and congestion. Not only the audio and video information, but also popular site visits is ten thousands of times of a common site visits. Popular audio and video, and web page file produced by the redundant traffic are sharply increasing, greatly influenced the quality of the network. So people are trying to seek better ways to meet the needs of sharing network resources, reduce the network load. Researching network redundancy flow characteristics can help analyze the behavior of network user behavior a lot and provide personalized service. In the process of the reformation of the Internet, information storage structure is haven been used to solve the crisis of Internet bandwidth. So-called seeding save structure (Broad - Storage), is a fusion of CDN (Content Delivery Network and Content Delivery Network) and a wide range of Storage resources of the Network structure which P2P traffic often has. It will transport via satellite broadcast and content directly to the national urban and rural areas, and the place distribution of storage is closest to the user. Use the forms of "broadcast and storage" to build storage of the network structure [1]. With the expanding of network size, network traffic characteristics research has become one of the major direction of network performance analysis. Studying of network traffic characteristics can help us to predict network performance, QoS, SLA service applications, network measurement and the basis for application with necessary support. Because now most of the interconnect network are using the TCP/IP protocol, the research of IP packet has been one of the major ways in the study of network traffic. As the set of IP packets, IP flows can not only show the characteristics of a message, but also show the user preference from the perspective of higher levels, so there are quite a lot of literatures analyzing the protocol behavior and user behavior by IP flow analysis to get how it can impact the network load and performance. 2. WEB LOG ANALYSIS We have observed the HTTP accesses which the users searched in the southwest university of science and technology campus network in May Southwest university of science and technology has more than twenty thousand student. The observation was carried out from May 9 to 15 which had 1.15 million visits and involved more than twenty thousand sites, and the heats of the visits are very different. Most popular sites are requested more than hundreds of thousands of times, the coldest only accept a visit. Sort by heat: top 10 sites (need) attract times (43%), 100 sites attract times (72%) befo re the visit, the first 1000 sites attract 1.04 million times (90%). China has millions of websites and 1000 web sites accounted for only about one over one thousand. Visible, most Internet users interest has focused on a few sites. This model is based on the network log server, and can reflect the user community's interest, the user interest distribution. But this method does not analyze the network data traffic, especially the data of these main interest distribution of the flow which is the mainstream of the network communication, and especially the main interest of data is the mainstream of network data communication. The mainstream of the huge amounts of data is duplicate data in the network transmission which takes up a large number of backbone network bandwidth. So we need study the characteristics of the data, then adopt a new mode of transmission, in order to improve the performance of network. If a content is only a single site, and many users in the same local area network (LAN) all need to enjoy the content, then the web server to the LAN routers between the trunk network redundancy inevitably brought traffic. Network redundancy flow research work include: network data fetching platform, data 606
2 processing system. 3. NETWORK DATA CAPTURE PLATFORM 3.1 Principles of Network Data Packet Capture In shared media Ethernet, information is transmitted in plaintext. Ethernet uses a multi-channel access protocol (CSMA / CD), so that Ethernet is a broadcast LAN, i.e. when an adapter to transmit one, all adapters on the LAN can receive the frame. NIC has four operating modes: broadcast mode, multicast transmission mode, direct mode, promiscuous mode. Because the card in the default mode of operation is broadcast mode or direct mode, in this mode the card can only receive frames sent to their own, in order to capture the same collision domain transmit all packets will need to be set to promiscuous NIC mode. Capture technology uses WinPcap-based packet capture technology. The library of this technology works in the bottom of network analysis system modules, it can obtain the most complete and real data from the lowest layer of the network. Winpcap packet capture technology can monitor the communications of the network in realtime, obtaining a copy of the required packages, and does not affect the normal transceiver communication, to ensure the normal use and production. Through data collection module developed on WinPcap can achieve network monitoring and data collection in the case of not affecting the current network load and network node machine system configuration. The data frame captured by WinPcap is Ethernet data frames generated from the encapsulation of the transport layer, network layer and the data link layer in fact, so making it possible to further resolve the data frame [2]. 3.2 Intermediate Node Network Packet Capture System Description It can capture the entire packet by the approach to traffic data collection using probes, the amount of information is the most complete, including Layer 2 to Layer 7 information [3].Parallel probe adds beam splitter to the link monitoring to receive the optical signal separated by the beam splitter, to catch packets. Parallel probe will not increase the network latency, jitter and packet loss, does not affect the throughput of the network, and will not be an additional point of failure to the network, even if the probe fails, normal communications are not interrupted. You can also copy the targeted traffic to the acquisition device by port mirroring function on the router. Network data collection test bed network topology system is shown in Figure 2.We build network data collection test platform in a Network Information Center node of a university, and analyze the reliability and efficiency of capture system. Fig 2: Hierarchical semantic web data extraction test bed network topology diagram 3.3 Intermediate Node Network Packet Capture System Efficiency Analysis Packet access platforms are used in schools on the central node of the network packet capture. The reliability and efficiency of the system are particularly prominent when the data captured is a mass Reliability Put the date obtained from the hierarchical semantic web data extraction test platform as the source for analyzing, with IRIS, Sniffer, Wire shark and other specialized packet capture and analysis tools widely used at home and abroad for analysis. Finally we can get basically the same situation to capture, the accuracy of credibility judgment and quality judgment of information on the hierarchical semantic network data extraction test platform rate up to 95%. Fig 1: Intermediate node network packet capture process Efficiency Test environment is designed as follows to verify the system's efficiency. We use a switch with management function, and connect it to the capture system, then open the port and the switch starts counting at the same time. After some time, we stop capturing packages and close the port at the same time. Switch port stops counting network packet. Next to do is reading the value of the 607
3 switch port and access to the packet size of the file. Packets capture system efficiency verification platform comparison of experimental data is shown in Table 1. Seen, the average efficiency of the experiment is 99.77%.Analysis of experimental error is mainly produced in the switch using a web form to capture. That is in the page refreshes time, the switch still counting state, resulting in errors. Table 1: Packet capture system efficiency comparison table of verification platform experimental data S.No Switch data(bytes) Packet access platform(bytes) Efficie ncy 1 326,719, ,763, % 2 504,933, ,542, % 3 685,327, ,570, % 4 832,011, ,213, % 5 1,266,361, ,579,115,20 6 1,261,920,2 31 1,576,971, % 99.86% 3.4 Kernel File Operations All measuring instruments need to capture packet from network firstly, then analyze. It must improve the capability of measuring instruments and reduce even avoid packet loss in order to get an accurate and reliable analysis result. The cost of software measuring instrument is lower than hardware and it is very convenient to use and maintain. The usually process of this kind of instrument is capture, filtration, then transmitting the needed packet to user layer to store or deal later. This process involves coping packets from operating system kernel to user layer and saving them to files or databases, so it is very important to improve the measuring instrument s capability. This article introduces one method --use the system kernel to deal the data directly since the operating system kernel has a high priority and fast speed. This method not only reduces the system s calling times but also avoids the course sending the data to user layer to deal. Fig 3: Example System Services As picture 3 shows, the Write File functions (at Kernel32.dll) execute system service, and passé service number of Nt Write File, then sinks into kernel, after completing necessary preparatory work by calling Nt Write File function. The system service processor calls the real Nt Write File function to deal I/O request, and completes the real work of writing file, finally returns the result from kernel model to user model application program. Therefore, from the angle of operating system, it should be able to reduce the cost coming from data copy and system call by the method that directly completes file operations at kernel mode, in order to improve the program s capability [4]. 4. PACKET ANALYSIS 4.1 The Method of Identification TCP and UDP Packet from Source File Firstly, determine that the packet contains frame part certainly. Then, check that the hexadecimal of the frame type field of the Ethernet s frame header section is 0080 (Internet Protocol IP) or not. After the data frame, the IP message header is followed. The content which has 9 bytes interval between the IP message header and the Ethernet s type filed referred just now is protocol field in IP message header. If the decimal form of this value is equal to 11 then it is UDP protocol, and if it is equal to 06 then it is TCP protocol. 4.2 The Framework of Hypertext Transfer Protocol (HTTP) Nowadays, WWW mainly uses HTTP/1.0 and HTTP/1.1. HTTP works on client/server model. A browser is a client and an application program that receives connection and returns information to request is web server. The Internet s web server monitors the client s request on the 80th port of TCP [5]. When a browser downloads a web page file from the server, it is needed to shake hands by three times with the 80th port of the server in order to build connection, then send request message to the server by the connection, and finally the server responds to it. 608
4 HTTP Request packet GET /index.shtml HTTP/1.1\r\n Host: Connection: Keep-Alive\r\n User-Agent: Mozilla/5.0\r\n Accept-Language: zh-cn\r\n \r\n The first line of this HTTP request message is called request line, and the request line is made up of three fields: method field, URI field, HTTP edition field. Method field can be GET, POST, HEAD, PUT and DELETE. The browser will use GET method when requests an object [6]. A few lines after the first line are called header line. Header line consists of header field and its value, separated by one space. When the header field is Host, its value is the target host. HTTP Response packets HTTP/ OK\r\n Date: Sun, 21 Apr :11:31 GMT\r\n Content-Type: image/gif\r\n Content-Length: 43\r\n Last-Modified: Wed,19 Sep :33:50 GMT\r\n Connection: close\r\n Accept-Ranges: bytes\r\n \r\n (data) The response message can be divided into three parts: status line, header line and entity body. The entity body is the main part of the message. 4.3 Capture Data Analysis Process It is needed to analyze the resource s location firstly, in other words, to analyze the packet s URL, then further analyze the resource s visit time and data size according to the URL in order to realize the statistical analysis of the redundant flow in network. The captured packet stores in heap file, so it is needed to pick up them one by one from the heap file, and analyze the IP address, port number, URL, serial number and other information of the packet, and then store it back to database. Sort the captured information by IP address, port number and serial number. Then, find out this single resource s data size according to IP address, port number and confirmation number of the packet that has URL. Finally, we can obtain the visit time of all resources, redundant data and the proportion in total resources according to the database packet cluster analysis. field. If the two fields exist at least one, then load it into string container, and connect the URI field at the back of the container, thus we can get the URL. Then regard the URL associated client IP (source IP), the server IP (destination IP), the source port number and the serial number (the confirmation number in TCP header) as the information of this packet, and store it into the MYSQL picketing table. b. If the packet s source port number is 80, then store the information of server IP (source IP), client IP (destination IP), destination port number, serial number and length into picketing table. c. Sort all the data in picketing table by client IP, server IP, port number and serial number. The serial number that is an URL column and is not an empty row in picketing table is the serial number of the packet that responds to client as resource from server. Analyze the data size that responds to the URL from server according to the serial number, and store the related URL into packet URL table. d. Do grouping cluster analysis for the packet URL according to URL, then we can analyze the repeated visit time of the resource and the data size of the network redundant transmission. 5. THE ANALYSIS OF THE EXPERIMENTAL RESULT We can get entire data from any node of network of the school by suing the network data collection test platform that uses the RSPAN of the CISC06509 router in the computer center which is shown below. We capture data from the Port 80 from one building of the school for research, and we totally get 48.2G data from 9:00 to 17:00 from the port. By analyzing the data using the method above, we find out the result as follow: The specific process of packet analysis is as following: a. We read the packet from heap file firstly. If the destination port number of this packet is 80 and the request line is GET method, We obtain the URL from this packet. URL is made up of Host and URI (resource location), and URI begins with the "GET\0x20" and ends with one '\0x20', and Host begins witch the "Host:\0x20" and ends with '\r'. It will find "Refer:\0x20" instead if the request line does not have "Host:\0x20" Fig 4: The analyzing result of the network package There are only million different Independent resource requests among the million we have found out. The repeat rate of the resource request is as high as 46.74% all most a half. The same resource access repetition rates up to a maximum of 186,100 times, 609
5 the relative are also followed by 185,700 times. Another group of independent resources are from 184,000 different pages. The highest Web is 496 times, the next is 391 times. This means that there are a very high percentage of repeat request events in the process of resource access for this similar campus network of the particular network topology. Nearly half of network transmission bandwidth belongs to repeated occupation which will inevitably result in a tremendous waste of resources. 6. CONCLUSION The experiment is carried out on the network data collection test platform, and the high efficiency and the high reliability of the platfrom ensure the completion of the data we captured which reduces the experiment error. According to the statistics of the data information confirmed, there are a number of redundant traffic in the network especially in hot web. If we can reduce the presence of these redundant traffic, Internet performance will be greatly ascend. The system only analyses redundancy situation of the flow of the website, when it faces to the flow of the audio and the video will be worse. For a more comprehensive analysis of network traffic redundancy situation, a comprehensive analysis of various resources is needed. REFERENCES [1] Broadcast memory structures to save Internet bandwidth crisis, fw/web html,may [2] Xiaowen Chen, Wenfei Hu, Yingmin He, WinPcap bypass IP blocking Research and implementation [Finance and Management] January [3] Bing Ni, Yunqing Chen, P2P traffic monitoring technology research and existing network test "Journal of Jilin University (Information Science Edition)" May [4] Fang Liu, A method of improving the efficiency of network measurement-kernel file operation and performance analysis, February [5] TaiMing Ren, TCP/IP Protocol and Network Programming, March [6] James F.Kurose, Keith W.Ross, Computer Networking: A Top-Down Approach,
Computer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationOpen Access Design and Development of Network Application Layer Sniffer Analysis Software. Yujiao Wang and Haiyun Lin *
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 167-172 167 Open Access Design and Development of Network Application Layer Sniffer Analysis
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationThe Capture and Reduction Technology of Image Data based on HTTP Protocol 1
1, 2, 3 The Capture and Reduction Technology of Image Data based on HTTP Protocol 1 Wu yan lun, 2 Zhang xiao hong, 3 Peng cui School of Information Engineering, Southwest University of Science and Technology,
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationResearch and Implementation of Server Load Balancing Strategy in Service System
Journal of Electronics and Information Science (2018) 3: 16-21 Clausius Scientific Press, Canada Research and Implementation of Server Load Balancing Strategy in Service System Yunpeng Zhang a, Liwei Liu
More informationCommunication Networks
Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationA New Method Of VPN Based On LSP Technology
2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing
More informationIT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1
IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationAnalysis of Virtual Local Area Networking Technology. Zheng Zhang
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Analysis of Virtual Local Area Networking Technology Zheng Zhang Jiangxi Vocational and Technical
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationA Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1, d
International Forum on Mechanical, Control and Automation IFMCA 2016 A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1,
More informationMODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY
MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.
ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation
More informationLecture #9 Introduction to communication networks
KTH ROYAL INSTITUTE OF TECHNOLOGY Lecture #9 Introduction to communication networks Nicholas Honeth In this series Lecture #9 Communication protocol basics Relationship between OSI and
More informationApplication of Redundant Backup Technology in Network Security
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationReference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models
Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationLecture 2. Computer Networks Models. Network Models 1-1
Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -
More informationRECOMMENDATION ITU-R BT.1720 *
Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question
More informationSwitched Ethernet Virtual LANs
Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware
More informationIntroduction to Computer Science (I1100) Networks. Chapter 6
Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and
More informationResearch and Design of Communication based on Train Real-time Ethernet message data
Research and Design of Communication based on Train Real-time Ethernet message data Jiachen Liu, Yi Qiao, Shunde Wang, Yang Li Institute of Electrical and Information Engineering, Dalian Jiaotong University,Dalian
More informationLab: 2. Wireshark Getting Started
Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationApplications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationAshortage of IPv4 address space has
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 411 419 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.582 A measurement study of network
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationResearch on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Research on Multi-service Unified Bearing Electric Power Communication Access Bao Feng1,a, Yang
More informationUsing Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton
Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Abstract The Office of Navel Research Network Team actively
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationMuhammad Farooq-i-Azam CHASE-2006 Lahore
Muhammad Farooq-i-Azam CHASE-2006 Lahore Overview Theory Existing Sniffers in action Switched Environment ARP Protocol and Exploitation Develop it yourself 2 Network Traffic Computers and network devices
More informationBasics of datacommunication
Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationOSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Data Link Layer Network Fundamentals Chapter 7 Version 4.0 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission
More informationFirst Exam for ECE671 Spring /22/18
ECE67: First Exam First Exam for ECE67 Spring 208 02/22/8 Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 75 minutes to complete the exam. Be a
More information9. Wireshark I: Protocol Stack and Ethernet
Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the
More informationBABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017
5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?
More informationPerformance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP
5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP Suxia
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationCS 43: Computer Networks. Layering & HTTP September 7, 2018
CS 43: Computer Networks Layering & HTTP September 7, 2018 Last Class: Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network:
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationContinuous Real Time Data Transfer with UDP/IP
Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor
More informationComputer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1
Computer Networks Chapter 12 Topics: Communication links LAN / WAN Internet / WWW CMPUT101 Introduction to Computing (c) Yngvi Bjornsson 1 Computer Networks A computer network is a set of independent computer
More informationApplications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationRoCE vs. iwarp Competitive Analysis
WHITE PAPER February 217 RoCE vs. iwarp Competitive Analysis Executive Summary...1 RoCE s Advantages over iwarp...1 Performance and Benchmark Examples...3 Best Performance for Virtualization...5 Summary...6
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve
More informationUniversity of Maryland Baltimore County Department of Information Systems Spring 2015
University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationScaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX
Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic
More informationSolace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware
Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware What You Will Learn The goal of zero latency in financial services has caused the creation of
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationOpen Systems Interconnection Model
OPEN SYSTEMS INTERCONNECTION AND TCP/IP PROTOCOL SUITE TCP/IP P Open Systems Interconnection Model An ISO standard that covers all aspects of network communications A layered framework consisting of seven
More informationStager. A Web Based Application for Presenting Network Statistics. Arne Øslebø
Stager A Web Based Application for Presenting Network Statistics Arne Øslebø Keywords: Network monitoring, web application, NetFlow, network statistics Abstract Stager is a web based
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationIntroduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...
Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer
More informationEthereal Lab: Getting Started
Ethereal Lab: Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationWireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark
More informationBusiness Data Communications and Networking
Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationComputer Networks and reference models. 1. List of Problems (so far)
Computer s and reference models Chapter 2 1. List of Problems (so far) How to ensure connectivity between users? How to share a wire? How to pass a message through the network? How to build Scalable s?
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationEvaluation of Performance of TCP on Mobile IP SHAKE
Vol. 45 No. 10 IPSJ Journal Oct. 2004 Regular Paper Evaluation of Performance of TCP on Mobile IP SHAKE Kenji Koyama, Yosuke Ito, Hiroshi Mineno and Susumu Ishihara We extensively evaluated a method of
More informationPrepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT
Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationGeospatial Information Service Based on Ad Hoc Network
I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationNetwork Infrastructure
Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
More information1. Data Link Layer (Layer 2)
1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media
More information