Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis

Size: px
Start display at page:

Download "Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis"

Transcription

1 Analysis of Redundant Flow in Network 1 Yan Liu, 2 Yulong Yang 1, 2 Southwest University of Science and Technology ABSTRACT It is information society nowadays, with the rapidly growing popularity of the Internet, more and more people surf the Internet every day. Audio, video and hot web site become more and more popular, resulting in the sharply increase of redundant flow, a great waste of bandwidth, and consumedly reduce the quality of network service. Therefore, people are trying their best to seek a method to solve the problem of insufficient bandwidth. Also, it is very important to prove the existence of redundant flow in the network and study the next-generation Internet architecture. This article firstly uses network sniffer to capture massive data in the network, then statistically analyses the data and finally confirms the presence of a large amount of redundant traffic in the network. Keywords: Network; redundant; flow analysis 1. BACKGROUND According to the experimental results, there are a lot of redundant traffic between two node in the Interne, redundant traffic is refers to the network between the two nodes of the same content repeated more than once. These redundant transmission increases the burden of network traffic, reduces the quality of network service. Especially now the network resources have become more and more rich, and the audio and voide information gradually become the mainstream of the network which challenge the Internet a lot. if we do nothing about it, after a few years the Internet may breakdown due to the bandwidth bottleneck and congestion. Not only the audio and video information, but also popular site visits is ten thousands of times of a common site visits. Popular audio and video, and web page file produced by the redundant traffic are sharply increasing, greatly influenced the quality of the network. So people are trying to seek better ways to meet the needs of sharing network resources, reduce the network load. Researching network redundancy flow characteristics can help analyze the behavior of network user behavior a lot and provide personalized service. In the process of the reformation of the Internet, information storage structure is haven been used to solve the crisis of Internet bandwidth. So-called seeding save structure (Broad - Storage), is a fusion of CDN (Content Delivery Network and Content Delivery Network) and a wide range of Storage resources of the Network structure which P2P traffic often has. It will transport via satellite broadcast and content directly to the national urban and rural areas, and the place distribution of storage is closest to the user. Use the forms of "broadcast and storage" to build storage of the network structure [1]. With the expanding of network size, network traffic characteristics research has become one of the major direction of network performance analysis. Studying of network traffic characteristics can help us to predict network performance, QoS, SLA service applications, network measurement and the basis for application with necessary support. Because now most of the interconnect network are using the TCP/IP protocol, the research of IP packet has been one of the major ways in the study of network traffic. As the set of IP packets, IP flows can not only show the characteristics of a message, but also show the user preference from the perspective of higher levels, so there are quite a lot of literatures analyzing the protocol behavior and user behavior by IP flow analysis to get how it can impact the network load and performance. 2. WEB LOG ANALYSIS We have observed the HTTP accesses which the users searched in the southwest university of science and technology campus network in May Southwest university of science and technology has more than twenty thousand student. The observation was carried out from May 9 to 15 which had 1.15 million visits and involved more than twenty thousand sites, and the heats of the visits are very different. Most popular sites are requested more than hundreds of thousands of times, the coldest only accept a visit. Sort by heat: top 10 sites (need) attract times (43%), 100 sites attract times (72%) befo re the visit, the first 1000 sites attract 1.04 million times (90%). China has millions of websites and 1000 web sites accounted for only about one over one thousand. Visible, most Internet users interest has focused on a few sites. This model is based on the network log server, and can reflect the user community's interest, the user interest distribution. But this method does not analyze the network data traffic, especially the data of these main interest distribution of the flow which is the mainstream of the network communication, and especially the main interest of data is the mainstream of network data communication. The mainstream of the huge amounts of data is duplicate data in the network transmission which takes up a large number of backbone network bandwidth. So we need study the characteristics of the data, then adopt a new mode of transmission, in order to improve the performance of network. If a content is only a single site, and many users in the same local area network (LAN) all need to enjoy the content, then the web server to the LAN routers between the trunk network redundancy inevitably brought traffic. Network redundancy flow research work include: network data fetching platform, data 606

2 processing system. 3. NETWORK DATA CAPTURE PLATFORM 3.1 Principles of Network Data Packet Capture In shared media Ethernet, information is transmitted in plaintext. Ethernet uses a multi-channel access protocol (CSMA / CD), so that Ethernet is a broadcast LAN, i.e. when an adapter to transmit one, all adapters on the LAN can receive the frame. NIC has four operating modes: broadcast mode, multicast transmission mode, direct mode, promiscuous mode. Because the card in the default mode of operation is broadcast mode or direct mode, in this mode the card can only receive frames sent to their own, in order to capture the same collision domain transmit all packets will need to be set to promiscuous NIC mode. Capture technology uses WinPcap-based packet capture technology. The library of this technology works in the bottom of network analysis system modules, it can obtain the most complete and real data from the lowest layer of the network. Winpcap packet capture technology can monitor the communications of the network in realtime, obtaining a copy of the required packages, and does not affect the normal transceiver communication, to ensure the normal use and production. Through data collection module developed on WinPcap can achieve network monitoring and data collection in the case of not affecting the current network load and network node machine system configuration. The data frame captured by WinPcap is Ethernet data frames generated from the encapsulation of the transport layer, network layer and the data link layer in fact, so making it possible to further resolve the data frame [2]. 3.2 Intermediate Node Network Packet Capture System Description It can capture the entire packet by the approach to traffic data collection using probes, the amount of information is the most complete, including Layer 2 to Layer 7 information [3].Parallel probe adds beam splitter to the link monitoring to receive the optical signal separated by the beam splitter, to catch packets. Parallel probe will not increase the network latency, jitter and packet loss, does not affect the throughput of the network, and will not be an additional point of failure to the network, even if the probe fails, normal communications are not interrupted. You can also copy the targeted traffic to the acquisition device by port mirroring function on the router. Network data collection test bed network topology system is shown in Figure 2.We build network data collection test platform in a Network Information Center node of a university, and analyze the reliability and efficiency of capture system. Fig 2: Hierarchical semantic web data extraction test bed network topology diagram 3.3 Intermediate Node Network Packet Capture System Efficiency Analysis Packet access platforms are used in schools on the central node of the network packet capture. The reliability and efficiency of the system are particularly prominent when the data captured is a mass Reliability Put the date obtained from the hierarchical semantic web data extraction test platform as the source for analyzing, with IRIS, Sniffer, Wire shark and other specialized packet capture and analysis tools widely used at home and abroad for analysis. Finally we can get basically the same situation to capture, the accuracy of credibility judgment and quality judgment of information on the hierarchical semantic network data extraction test platform rate up to 95%. Fig 1: Intermediate node network packet capture process Efficiency Test environment is designed as follows to verify the system's efficiency. We use a switch with management function, and connect it to the capture system, then open the port and the switch starts counting at the same time. After some time, we stop capturing packages and close the port at the same time. Switch port stops counting network packet. Next to do is reading the value of the 607

3 switch port and access to the packet size of the file. Packets capture system efficiency verification platform comparison of experimental data is shown in Table 1. Seen, the average efficiency of the experiment is 99.77%.Analysis of experimental error is mainly produced in the switch using a web form to capture. That is in the page refreshes time, the switch still counting state, resulting in errors. Table 1: Packet capture system efficiency comparison table of verification platform experimental data S.No Switch data(bytes) Packet access platform(bytes) Efficie ncy 1 326,719, ,763, % 2 504,933, ,542, % 3 685,327, ,570, % 4 832,011, ,213, % 5 1,266,361, ,579,115,20 6 1,261,920,2 31 1,576,971, % 99.86% 3.4 Kernel File Operations All measuring instruments need to capture packet from network firstly, then analyze. It must improve the capability of measuring instruments and reduce even avoid packet loss in order to get an accurate and reliable analysis result. The cost of software measuring instrument is lower than hardware and it is very convenient to use and maintain. The usually process of this kind of instrument is capture, filtration, then transmitting the needed packet to user layer to store or deal later. This process involves coping packets from operating system kernel to user layer and saving them to files or databases, so it is very important to improve the measuring instrument s capability. This article introduces one method --use the system kernel to deal the data directly since the operating system kernel has a high priority and fast speed. This method not only reduces the system s calling times but also avoids the course sending the data to user layer to deal. Fig 3: Example System Services As picture 3 shows, the Write File functions (at Kernel32.dll) execute system service, and passé service number of Nt Write File, then sinks into kernel, after completing necessary preparatory work by calling Nt Write File function. The system service processor calls the real Nt Write File function to deal I/O request, and completes the real work of writing file, finally returns the result from kernel model to user model application program. Therefore, from the angle of operating system, it should be able to reduce the cost coming from data copy and system call by the method that directly completes file operations at kernel mode, in order to improve the program s capability [4]. 4. PACKET ANALYSIS 4.1 The Method of Identification TCP and UDP Packet from Source File Firstly, determine that the packet contains frame part certainly. Then, check that the hexadecimal of the frame type field of the Ethernet s frame header section is 0080 (Internet Protocol IP) or not. After the data frame, the IP message header is followed. The content which has 9 bytes interval between the IP message header and the Ethernet s type filed referred just now is protocol field in IP message header. If the decimal form of this value is equal to 11 then it is UDP protocol, and if it is equal to 06 then it is TCP protocol. 4.2 The Framework of Hypertext Transfer Protocol (HTTP) Nowadays, WWW mainly uses HTTP/1.0 and HTTP/1.1. HTTP works on client/server model. A browser is a client and an application program that receives connection and returns information to request is web server. The Internet s web server monitors the client s request on the 80th port of TCP [5]. When a browser downloads a web page file from the server, it is needed to shake hands by three times with the 80th port of the server in order to build connection, then send request message to the server by the connection, and finally the server responds to it. 608

4 HTTP Request packet GET /index.shtml HTTP/1.1\r\n Host: Connection: Keep-Alive\r\n User-Agent: Mozilla/5.0\r\n Accept-Language: zh-cn\r\n \r\n The first line of this HTTP request message is called request line, and the request line is made up of three fields: method field, URI field, HTTP edition field. Method field can be GET, POST, HEAD, PUT and DELETE. The browser will use GET method when requests an object [6]. A few lines after the first line are called header line. Header line consists of header field and its value, separated by one space. When the header field is Host, its value is the target host. HTTP Response packets HTTP/ OK\r\n Date: Sun, 21 Apr :11:31 GMT\r\n Content-Type: image/gif\r\n Content-Length: 43\r\n Last-Modified: Wed,19 Sep :33:50 GMT\r\n Connection: close\r\n Accept-Ranges: bytes\r\n \r\n (data) The response message can be divided into three parts: status line, header line and entity body. The entity body is the main part of the message. 4.3 Capture Data Analysis Process It is needed to analyze the resource s location firstly, in other words, to analyze the packet s URL, then further analyze the resource s visit time and data size according to the URL in order to realize the statistical analysis of the redundant flow in network. The captured packet stores in heap file, so it is needed to pick up them one by one from the heap file, and analyze the IP address, port number, URL, serial number and other information of the packet, and then store it back to database. Sort the captured information by IP address, port number and serial number. Then, find out this single resource s data size according to IP address, port number and confirmation number of the packet that has URL. Finally, we can obtain the visit time of all resources, redundant data and the proportion in total resources according to the database packet cluster analysis. field. If the two fields exist at least one, then load it into string container, and connect the URI field at the back of the container, thus we can get the URL. Then regard the URL associated client IP (source IP), the server IP (destination IP), the source port number and the serial number (the confirmation number in TCP header) as the information of this packet, and store it into the MYSQL picketing table. b. If the packet s source port number is 80, then store the information of server IP (source IP), client IP (destination IP), destination port number, serial number and length into picketing table. c. Sort all the data in picketing table by client IP, server IP, port number and serial number. The serial number that is an URL column and is not an empty row in picketing table is the serial number of the packet that responds to client as resource from server. Analyze the data size that responds to the URL from server according to the serial number, and store the related URL into packet URL table. d. Do grouping cluster analysis for the packet URL according to URL, then we can analyze the repeated visit time of the resource and the data size of the network redundant transmission. 5. THE ANALYSIS OF THE EXPERIMENTAL RESULT We can get entire data from any node of network of the school by suing the network data collection test platform that uses the RSPAN of the CISC06509 router in the computer center which is shown below. We capture data from the Port 80 from one building of the school for research, and we totally get 48.2G data from 9:00 to 17:00 from the port. By analyzing the data using the method above, we find out the result as follow: The specific process of packet analysis is as following: a. We read the packet from heap file firstly. If the destination port number of this packet is 80 and the request line is GET method, We obtain the URL from this packet. URL is made up of Host and URI (resource location), and URI begins with the "GET\0x20" and ends with one '\0x20', and Host begins witch the "Host:\0x20" and ends with '\r'. It will find "Refer:\0x20" instead if the request line does not have "Host:\0x20" Fig 4: The analyzing result of the network package There are only million different Independent resource requests among the million we have found out. The repeat rate of the resource request is as high as 46.74% all most a half. The same resource access repetition rates up to a maximum of 186,100 times, 609

5 the relative are also followed by 185,700 times. Another group of independent resources are from 184,000 different pages. The highest Web is 496 times, the next is 391 times. This means that there are a very high percentage of repeat request events in the process of resource access for this similar campus network of the particular network topology. Nearly half of network transmission bandwidth belongs to repeated occupation which will inevitably result in a tremendous waste of resources. 6. CONCLUSION The experiment is carried out on the network data collection test platform, and the high efficiency and the high reliability of the platfrom ensure the completion of the data we captured which reduces the experiment error. According to the statistics of the data information confirmed, there are a number of redundant traffic in the network especially in hot web. If we can reduce the presence of these redundant traffic, Internet performance will be greatly ascend. The system only analyses redundancy situation of the flow of the website, when it faces to the flow of the audio and the video will be worse. For a more comprehensive analysis of network traffic redundancy situation, a comprehensive analysis of various resources is needed. REFERENCES [1] Broadcast memory structures to save Internet bandwidth crisis, fw/web html,may [2] Xiaowen Chen, Wenfei Hu, Yingmin He, WinPcap bypass IP blocking Research and implementation [Finance and Management] January [3] Bing Ni, Yunqing Chen, P2P traffic monitoring technology research and existing network test "Journal of Jilin University (Information Science Edition)" May [4] Fang Liu, A method of improving the efficiency of network measurement-kernel file operation and performance analysis, February [5] TaiMing Ren, TCP/IP Protocol and Network Programming, March [6] James F.Kurose, Keith W.Ross, Computer Networking: A Top-Down Approach,

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

Open Access Design and Development of Network Application Layer Sniffer Analysis Software. Yujiao Wang and Haiyun Lin *

Open Access Design and Development of Network Application Layer Sniffer Analysis Software. Yujiao Wang and Haiyun Lin * Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 167-172 167 Open Access Design and Development of Network Application Layer Sniffer Analysis

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

The Capture and Reduction Technology of Image Data based on HTTP Protocol 1

The Capture and Reduction Technology of Image Data based on HTTP Protocol 1 1, 2, 3 The Capture and Reduction Technology of Image Data based on HTTP Protocol 1 Wu yan lun, 2 Zhang xiao hong, 3 Peng cui School of Information Engineering, Southwest University of Science and Technology,

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Research and Implementation of Server Load Balancing Strategy in Service System

Research and Implementation of Server Load Balancing Strategy in Service System Journal of Electronics and Information Science (2018) 3: 16-21 Clausius Scientific Press, Canada Research and Implementation of Server Load Balancing Strategy in Service System Yunpeng Zhang a, Liwei Liu

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1 IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Analysis of Virtual Local Area Networking Technology. Zheng Zhang

Analysis of Virtual Local Area Networking Technology. Zheng Zhang 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Analysis of Virtual Local Area Networking Technology Zheng Zhang Jiangxi Vocational and Technical

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1, d

A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1, d International Forum on Mechanical, Control and Automation IFMCA 2016 A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1,

More information

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D. ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation

More information

Lecture #9 Introduction to communication networks

Lecture #9 Introduction to communication networks KTH ROYAL INSTITUTE OF TECHNOLOGY Lecture #9 Introduction to communication networks Nicholas Honeth In this series Lecture #9 Communication protocol basics Relationship between OSI and

More information

Application of Redundant Backup Technology in Network Security

Application of Redundant Backup Technology in Network Security 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

Lecture 2. Computer Networks Models. Network Models 1-1

Lecture 2. Computer Networks Models. Network Models 1-1 Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

Switched Ethernet Virtual LANs

Switched Ethernet Virtual LANs Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware

More information

Introduction to Computer Science (I1100) Networks. Chapter 6

Introduction to Computer Science (I1100) Networks. Chapter 6 Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and

More information

Research and Design of Communication based on Train Real-time Ethernet message data

Research and Design of Communication based on Train Real-time Ethernet message data Research and Design of Communication based on Train Real-time Ethernet message data Jiachen Liu, Yi Qiao, Shunde Wang, Yang Li Institute of Electrical and Information Engineering, Dalian Jiaotong University,Dalian

More information

Lab: 2. Wireshark Getting Started

Lab: 2. Wireshark Getting Started Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

Ashortage of IPv4 address space has

Ashortage of IPv4 address space has INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 411 419 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.582 A measurement study of network

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Research on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3

Research on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Research on Multi-service Unified Bearing Electric Power Communication Access Bao Feng1,a, Yang

More information

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Abstract The Office of Navel Research Network Team actively

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Muhammad Farooq-i-Azam CHASE-2006 Lahore

Muhammad Farooq-i-Azam CHASE-2006 Lahore Muhammad Farooq-i-Azam CHASE-2006 Lahore Overview Theory Existing Sniffers in action Switched Environment ARP Protocol and Exploitation Develop it yourself 2 Network Traffic Computers and network devices

More information

Basics of datacommunication

Basics of datacommunication Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Data Link Layer Network Fundamentals Chapter 7 Version 4.0 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission

More information

First Exam for ECE671 Spring /22/18

First Exam for ECE671 Spring /22/18 ECE67: First Exam First Exam for ECE67 Spring 208 02/22/8 Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 75 minutes to complete the exam. Be a

More information

9. Wireshark I: Protocol Stack and Ethernet

9. Wireshark I: Protocol Stack and Ethernet Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the

More information

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017 5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?

More information

Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP

Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP Suxia

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

CS 43: Computer Networks. Layering & HTTP September 7, 2018

CS 43: Computer Networks. Layering & HTTP September 7, 2018 CS 43: Computer Networks Layering & HTTP September 7, 2018 Last Class: Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network:

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

Computer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1

Computer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1 Computer Networks Chapter 12 Topics: Communication links LAN / WAN Internet / WWW CMPUT101 Introduction to Computing (c) Yngvi Bjornsson 1 Computer Networks A computer network is a set of independent computer

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

RoCE vs. iwarp Competitive Analysis

RoCE vs. iwarp Competitive Analysis WHITE PAPER February 217 RoCE vs. iwarp Competitive Analysis Executive Summary...1 RoCE s Advantages over iwarp...1 Performance and Benchmark Examples...3 Best Performance for Virtualization...5 Summary...6

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve

More information

University of Maryland Baltimore County Department of Information Systems Spring 2015

University of Maryland Baltimore County Department of Information Systems Spring 2015 University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Wireshark Lab: Getting Started v7.0

Wireshark Lab: Getting Started v7.0 Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic

More information

Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware

Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware What You Will Learn The goal of zero latency in financial services has caused the creation of

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Open Systems Interconnection Model

Open Systems Interconnection Model OPEN SYSTEMS INTERCONNECTION AND TCP/IP PROTOCOL SUITE TCP/IP P Open Systems Interconnection Model An ISO standard that covers all aspects of network communications A layered framework consisting of seven

More information

Stager. A Web Based Application for Presenting Network Statistics. Arne Øslebø

Stager. A Web Based Application for Presenting Network Statistics. Arne Øslebø Stager A Web Based Application for Presenting Network Statistics Arne Øslebø Keywords: Network monitoring, web application, NetFlow, network statistics Abstract Stager is a web based

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks... Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer

More information

Ethereal Lab: Getting Started

Ethereal Lab: Getting Started Ethereal Lab: Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Computer Networks and reference models. 1. List of Problems (so far)

Computer Networks and reference models. 1. List of Problems (so far) Computer s and reference models Chapter 2 1. List of Problems (so far) How to ensure connectivity between users? How to share a wire? How to pass a message through the network? How to build Scalable s?

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Evaluation of Performance of TCP on Mobile IP SHAKE

Evaluation of Performance of TCP on Mobile IP SHAKE Vol. 45 No. 10 IPSJ Journal Oct. 2004 Regular Paper Evaluation of Performance of TCP on Mobile IP SHAKE Kenji Koyama, Yosuke Ito, Hiroshi Mineno and Susumu Ishihara We extensively evaluated a method of

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Network Infrastructure

Network Infrastructure Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

1. Data Link Layer (Layer 2)

1. Data Link Layer (Layer 2) 1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media

More information