Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation

Size: px
Start display at page:

Download "Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation"

Transcription

1 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, (2002) Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation Department of Information Systems and Multimedia Design School of Engineering Tokyo Denki University Chiyoda-ku, Tokyo, , Japan Various applications provide convenient services in the Internet. As these applications are widely used, it is important that the quality of these services (QoS), such as the response time and throughput, be high. Several ways to measure network performance have been developed. However, QoS management is still difficult because of the lack of effective tools to evaluate network system usability. The goal of our study was to develop a new QoS measurement system for network system usability. In our approach, we measure system usability and performance through mechanisms installed in the clients. The purpose of our system is to make clear the behavior of the client applications, and this allows us to measure system performance and system usability. In this paper, we describe the fundamental concept behind client observation and its performance indices, and the design and implementation of a performance evaluation system implemented through observation. In addition, we confirm the effectiveness of our system through experiments. Keywords: quality of service, quality evaluation, performance measurement, performance management, network management, internet 1. INTRODUCTION Many kind of applications on the Internet are widely used. So it is important that quality of these services, such as response time and throughput, be high. To achieve high quality the service in network systems, system administrators should evaluate how their systems are working and should operate their systems so as to perform users requests and optimize performance. To manage network system performance, it is important for administrators to be aware of system usability factors, such as access delay, and processing time, and data transfer throughput. Several ways to evaluate the performance of network systems have been developed: Statistical analysis is applied to activity logging in servers. This is a popular way to evaluate server performance. However, this analysis cannot provide any hints about network links or clients. Benchmarking is another performance measurement method. It can provide various indices of server performance. However, the benchmark requires a special environment, and the results are valid only for that environment. Network monitoring allows us to evaluate network usage at the datalink level. However, It focuses net- Received August 30, 2001; accepted April 15, Communicated by Jang-Ping Sheu, Makoto Takizawa and Myongsoon Park. 891

2 892 work equipment management in the network layer. Its results do not indicate the quality of application services. This is because the application level performance includes not only the characteristics of the datalink, but also many other performance factors. Therefore, we need an evaluation method for end point application performance. The goal of our study was to develop a new quality evaluation system. In our approach, the performance through measurement mechanisms installed in clients are indices the systems quality. 2. QUALITY EVALUATION FOR INTERNET APPLICATIONS 2.1 Quality of Internet Applications To evaluate the quality of Internet applications from the point of view of usability, system administrators must know how their services are working and must improve them to satisfy user requests. The quality of Internet applications with regard to usability is determined by how the client provides performance to the user; that is, the system administrator should be aware of the performance factors in client system. These factors are as follows: Response time: 1. time that elapses while a transaction is performed in the clients; 2. time that elapses while the clients send a request message to the servers; 3. time elapses while the servers process the request message and prepare a response message; 4. time elapses while the servers send a response message to the clients. Throughput: 1. amount of data processing per seconds in a transaction; 2. amount of data transfer per seconds in request message transferring; 3. amount of data transfer per seconds in response message transferring. Therefore, an evaluation tool are needed to measure mentioned above indices. 2.2 Necessary Functions of Evaluation Tools We consider a common framework to evaluate the performance of an end point application. The evaluation tool should have the following functions: 1. The tool is able to measure the throughput and response speed at an end-point application, which impact the user. The performance evaluation tool aims to improve the performance of the end-point application. The total system performance is not always related to the performance of the network path. Therefore, the network system performance should be evaluated in the client applications. 2. The tool handle various kinds of datalinks. The Internet has been implemented on various datalinks, such as Ethernet, ATM, FDDI, Token Ring, X.25, xdsl, and so on. TCP/IP technology is a set of proto-

3 QOSMESUREMENT SYSTEM FOR INTERNET APPLICATIONS 893 cols of the upper layers of these datalinks. Therefore, the measurement method should be independent of datalinks. 3. The measurement tool be independent of applications. Various applications and application protocols are utilized on the Internet. The performance measurement approach should be a standard framework, and it should not be dependent on a single application or a single application protocol. 4. The measurement tool should be applicable to existing applications without any modification. It is costly to modify application software to operate a measurement tool. Also, a number of applications would be difficult to modify for use with a measurement tool. 5. The measurement tool should be applicable to running systems. Using computer simulation, it is difficult to calculate all the performance factors, and the benchmark is only valid under specified conditions. It is more effective to evaluate running systems by measuring performance in a real situation. 2.3 Conventional Performance Measurement Several tools to evaluate network performance have been developed: 1. Statistical analysis of server logs. Statistical analysis of server access logs allows us to determine the operation status of the servers, such as the number of accesses, the number of data transfers, and the processing time. However, the results of analysis of server logs only indicates the performance of the servers themselves. The performance of the clients and the network links is not included in the results. 2. Measurement of network usage and Round Trip Time (RTT). The Simple Network Management Protocol (SNMP) is widely used to measure network usage [1, 2]. System administrators can use simple tools, such as ping and traceroute, todiagnose networks. However, TCP performance degrades as network usage increases, and it is also affected by the characteristics of the network links [3, 4]. The performance of an end-point application is affected by not only the network usage, but also by the characteristics, end-to-end throughput, and capacity of the servers and clients. 3. Benchmark. Some benchmark tools are available, such as SPECweb [5], WebStone [6], ttcp, DBS [7] and so on. These tools provide many indices of exact application performance. However, it is difficult to set up suitable benchmark conditions in order to reproduce those of servers under actual operating conditions. 4. Packet dumping. Analysis of packet dumping provides many indices of the datalink level, such as tcpdump [8] and snoop. Some tools, such as RMONv2 and ENMA [6], can calculate the indices in the TCP layer. However, packet dumping can only be applied to specific datalinks and traffic shared networks, and it requires much CPU power. Even in the Ethernet environment, packets can not be observed in a switched network.

4 894 Accordingly, we need a new performance evaluation tool for network systems that can be applied to actual systems operation under various configurations. 3. EVALUATION METHOD BY CLIENT OBSERVATION 3.1 Fundamental of Client Observation The goal of our performance evaluation method is to provide a suitable, common framework to measure network system performance usability. We do this by measuring the actual network system performance from the user s point of view. The proposed method involves observing the behavior of the client applications, as shown in Fig. 1. To access the network facility and enable communication from a client application to a server, applications always use the system calls in the Operating System (OS). A layer attached to observe the applications, called the Observation layer, reveals all the system call level behavior in the client applications. Fig. 1. Fundamental of client observation. The observation layer can effectively evaluate the network system quality because the client application stands on the end-user side directly. Moreover, the observation layer interfaces are the same as the standard Application Programming Interfaces (APIs), such as the BSD Socket, Transport Layer Interface (TLI), and Winsock. In other words, applications can access the network via the observation layer through standard system calls without modification.

5 QOS MESUREMENT SYSTEM FOR INTERNET APPLICATIONS Communication Model in the Observation Layer In this section, we describe the target communication model for measurement through the observation layer. In popular Internet application protocols, such as the Hypertext Transfer Protocol (HTTP) [10], Simple Mail Transfer Protocol (SMTP) [11], Post Office Protocol 3 (POP3) [12] and so on, the clients the perform following procedures, that are called the Request-Response Communication Model : 1. Connection Establishment connect() system call. 2. Sending of request write() system call. 3. Receiving of result read() system call. 4. Repeat 2 and Connection Close close() system call. For example, Fig. 2 shows the communication flow diagram in HTTP. The client sets up the connection, sends the server a request as GET, PUT and POST, then receives and the results that the server processed. Fig. 2. Communication flow in HTTP. 3.3 Performance Index The observation layer can measure various performance indices by observing system calls. Fig. 3 shows the performance indices based on the Request-Response Communication Model. The contents of the measurement are the time period of T1 T7 and the amount of data transferred.

6 896 Fig. 3. Performance indices. Our system is able to measure the following performance indices: Transaction time (Tt) (T1 T7) The transaction time (Tt) is the time that elapses during a TCP connection. Specifically, it is defined as the period from the time when the open() system call is invoked (T1 in Fig. 3) to the time when the close() system call is returned (T7 in Fig. 3). This index is the processing time of a transaction. Connection establishment time (Te) (T1 T2) The connection establishment time (Te) is the time that elapses during connection setup. It is defined as being the time from when the connect() system call is invoked (T1 in Fig. 3) to when it is returned (T2 in Fig. 3). This index is the RTT (Round Trip Time) of the network and the TCP/IP performance of the clients and servers. Request data transfer time (Ts) (T3 T4) The request data transfer time (Ts) is the time that elapses for the data transfer to send the servers to the request data in the Request-Response Communication Model in above mentioned. It is defined as the time from when the write() system call is invoked (T3 in Fig. 3) to when it is returned (T4 in Fig. 3). Response data transfer time (Tr) (T5 T6) The response data transfer time (Tr) is the time elapsed for the data transfer to receive the processed data in the servers, defined as the time from when the read() system call is invoked (T5 in Fig. 3) to when it is returned (T6 in Fig. 3). It includes not only the

7 QOSMESUREMENT SYSTEM FOR INTERNET APPLICATIONS 897 time that elapses during for the data transfer, but also the time needed to process a request in the servers. Therefore, this value indicates the performance of the server systems and the network. Request data size (D s ) The request data size (D s ) is the amount of data transferred to the servers as the request. It is defined as the number of bytes transmitted by write() system call. Response data size (D r ) The response data size (D r ) is the amount of data transferred from the servers as the response. It is defined as the number of bytes received by read() system call. Request data transfer rate (R s ) The request data transfer rate (R s ) is the transfer rate of the requested data sent to the servers. It is defined as Ds (Request data size) R s =. (1) T (Request data transfer time) s Response data transfer rate (R r ) The response data transfer rate (R r ) is the transfer rate of the data returned by the servers. It is defined as Dr (Response data size) R r =. (2) T (Response data transfer time) r Transaction transfer rate (R a ) The transaction transfer rate (R a ) is the rate of all data transferred during the time that elapses during the entire process. It is a performance index based on the data size of the transaction. It is defined as R a Ds (Request data size) + Dr (Response data size) =. (3) T (Transaction time) t 4. DESIGN OF PERFORMANCE EVALUATION SYSTEM 4.1 System Model Fig. 4 shows the system model of the performance evaluation system implemented through client observation. The system consists of four components: an observation layer, a data slicer, a database, and a manager.

8 898 Fig. 4. System structure Observation layer The observation layer monitors the system calls between the applications and the OS. The observation layer has proxy system call functions. The proxy system call functions stands for the application instead of the actual system call functions in the OS. When the application calls system calls, the proxy system call procedures in the observation layer are invoked. Then the observation layer records the time of each state (T 1 T 7 ), counts the amount of data transferred in each TCP connection, and simultaneously, invokes the actual system call in the OS Data slicer The data slicer processes the measured raw data in the observation layer with the conditions such as the IP address and the port number, and performs basic analysis Database The data slicer stores the processed data in the database. The database is used for further analysis by the manager. The database consists of a matrix into which are put the server address, port number, time elapsing in each state, data size, and transfer rate in time stamp order. The structure of the database is quite simple because a data entry for each TCP connection forms a

9 QOSMESUREMENT SYSTEM FOR INTERNET APPLICATIONS 899 single row of data. Therefore, it reduces the amount of overhead for measurement in the clients Manager The manager collects measurement data from the target of the remote clients. It analyzes the data and provides a graphical interpretation of the results. Currently, the manager is implemented as the interface to Gnuplot to view the analysis results. 4.2 Implementation We are currently implementing the performance evaluation system on World Wide Web (WWW) systems. The observation layer, data slicer, and database are implemented in ANSI C on Sun Solaris. The manager is implemented in shell programs and C programs. The observation layer has a proxy BSD Socket interface for invoking from the target application. The proxy interface is implemented as a shared library that uses dynamic linking. It enables replacement of the actual Socket interface in the OS with the proxy Socket interface in the observation layer when the application is executed dynamically. Therefore, no modification of the application program is needed for measurement. Even if the target system does not have dynamic linking facilities, we do not have to modify the application; we recompile/link to the observation layer module as a static library. The proxy Socket interface is invoked when the application calls a Socket system call to access the network. The observation layer monitors connection open, close, write, and read, records the time that elapses, and counts the data transfers. It continuously calls actual Socket system calls in the OS. 5. EXPERIMENTS CONDUCTED TO EVALUATE THE EFFECTIVENESS OF OUR APPROACH 5.1 Comparison of Our System With Server Log Analysis In order to evaluate our implementation, we applied our system to actual running systems. To confirm the measurement accuracy of our system, we compared the measure of our system with the analysis results of the server access log. Statistical analysis of the server access log was used to evaluate the performance. The configuration of the target system is shown in Table 1. The target system was configured on an Apache HTTP server, a Sun Ultra 60 workstation and an ApacheBench client program on Sun Ultra 10 workstations. These devices were connected on 100Base-T Ethernet. In the server, we prepared 20,000 objects which had the same distribution based on data size in a WWW server in the Department of Computer Science, Meiji University. Fig. 5 shows the frequency distribution of object sizes in the server. The client randomly accessed the server objects 10,000 times. We measured T t (Transaction time) in our system and the process time of the server log. Fig. 6 shows the frequency distribution of time that elapsed (milliseconds).

10 900 Table 1. Configuration of experiment. Server Client Server program Client program Sun Ultra 60 (Two UltraSPARC-II 360MHz) (Solaris 2.6) Sun Ultra 10 (UltraSPARC-Iii 333MHz) (Solaris 2.6) Apache 1.3 ApacheBench 1.3 Size (bytes) Fig. 5. Frequency of file size in server. Fig. 6. Comparison T t in observation layer with process time in server log.

11 QOSMESUREMENT SYSTEM FOR INTERNET APPLICATIONS 901 The results were distributed around 200ms for T t of our system and concentrated around 10ms in the server log. The average of our system was 815ms, and one of the server logs was 418ms. The difference reached 51 percent. T t in our system is the entire time that elapses during the transaction, including the time needed for connection setup, data transfer, and connection close procedures in the Socket layer. In contrast, the server log records only the server side application activity. Therefore, the server log cannot measure performance with respect to connection setup/closing. Moreover, the relation between data size and elapsed time is shown in Fig. 7 (for T t in our system) and Fig. 8 (in the server log). In our system, the elapsed time increased depending on the data size. In contrast, in the server log, the elapsed time was distributed around 10ms when the data size was from 0bytes to 8,500bytes, distributed around 200ms when the data size was from 8,500bytes to 17,000bytes, and distributed around 330ms when the data size was from 17,000bytes to 26,000bytes. Time elaps (ms) Fig. 7. Distribution of data size and process time in observation layer. Time elaps (ms) Fig. 8. Distribution of data size and process time in server log.

12 902 The server logs records the performance in the application level on the server side. Once the data are put into the buffer in the OS, before an actual transmission occurs, it appears that data transfers are completed early in the server programs. Since the size of the socket buffer is configured at about 8kbytes in the Solaris environment, the transmission process is carried out in blocks of 8kbytes. Generally, because almost all WWW contents on the Internet consist of 8kbyte or smaller objects [13], server logs are inaccurate records. Therefore, our system is more accurate than the conventional method based on the experimental results. 5.2 Comparison of Server Performance We conducted other experiments to measure the performance of the server. We compared a measurement of the Fast server with one of the Slow server. The configuration of the target system is shown in Table 2. Server A was connected on 100Base-T Ethernet, and Server B was connected on 10Base-T Ethernet. We prepared 20,000 objects in the servers as mentioned in section 5.1. The client randomly accessed the server objects 10,000 times. We measured T t (Transaction time) in each server. Server A Server B Client Table 2. Configuration of experiment. Server program Client program Sun Ultra 60 (Two UltraSPARC-II 360MHz) (Solaris 2.6) Sun SPARCstation 5 (HyperSPARC 170MHz) (Solaris 2.6) Sun Ultra 10 (UltraSPARC-Iii 333MHz) (Solaris 2.6) Apache 1.3 ApacheBench 1.3 Fig. 9 shows the frequency distribution of T t (milliseconds). The results distributed around 200ms in Server A, and distributed around 1,600ms in Server B. Therefore, our system can measure differences in server performance. 6. SUMMARY In this paper, we have explained why a new method to evaluate the QoS of Internet applications is needed, and we have proposed a QoS measurement method based on client observation. Our method involves observing the behavior of the client application and exactly measuring its performance. Our system can effectively evaluate the network system quality because the client application stands on the end-user side directly. In addition, we have used our system on an actual WWW system and confirmed its effectiveness through experiments.

13 QOSMESUREMENT SYSTEM FOR INTERNET APPLICATIONS 903 Fig. 9. Comparison T t in server A with T t in server B. REFERENCES 1. A. Leinwand, Accomplishing performance management with SNMP, in Simple Times, Vol. 1, 1992, pp A. Leinwand and K. F. Conroy, Network Management: A Practical Perspective, 2nd ed., Addison-Wesley, M. Allman, C. Hayes, H. Kruse, and S. Osterman, TCP performance over satellites links, in Proceedings of the 5th International Conference on Telecommunications Systems, 1997, pp B. Vandalore, S. Kalyanaraman, R. Jain, R. Goyal, and S. Fahmy, Simulation study of world wide web traffic over the ATM ABR service, in Proceedings of SPIE Symposium on Voice, Video and Data Communications, Vol. 3530, 1998, pp SPECweb99 Benchmark, Standard Performance Evaluation Corporation, spec.org/osg/ web99/. 6. WebStone, The Benchmark for Web Servers, webstone/. 7. Y. Murayama and S. Yamaguchi, DBS: powerful tool for TCP performance evaluation, in Proceedings of SPIE, International Society for Optical Engineering, Vol. 3231, 1997, pp tcpdump, LBNL s Network Research Group, 9. Y. Nakamura, K. Chinen, H. Sunahara, S. Yamaguchi, and Y. Oie, ENMA: The WWW server performance measurement system via packet monitoring, in Proceedings of INET 99, Internet Society, R. Fielding, J. Getty, J. Mogul, H. Frystyk, and T. Berners-Lee, Hyper Text Transfer Protocol HTTP/1.1, RFC2068, J. Postel, Simple Mail Transfer Protocol, RFC821, J. Myers and M. Rose, Post Office Protocol Version 3, RFC1939, M. Nabe, K. Baba, M. Murata, and H. Miyahara, Analysis and modeling of www

14 904 traffic for designing internet traffic, IEICE Transaction, Vol. J80-B1, 1997, pp H. Saito and T. Chusho, Design and implementation of network performance evaluation system through client observation, in Proceedings of INET2000, Internet Society, H. Saito and T. Chusho, Quality evaluation of network services by client observation, in Proceedings of the 15th International Conference on Information Networking 01 (ICOIN15 01), pp Hiroki Saito was born in Tokyo. He received B.S., M.E. and Ph. D degrees in Computer Science from Meiji University, Japan, in 1996, 1998 and 2001, respectively. He is since 2002 an instructor in the Department of Information Systems and Multimedia Design, School of Engineering, Tokyo Denki University, Japan. He is a member of Internet Society, Information Processing Society Japan and Japan Society for Software Science and Technology. His research interest includes performance measurement in the Internet, network management and Internet architecture.

A WWW Server Benchmark System in IPv6 Environment. Takao Nakayama. Graduate School of Information Science Nara Institute of Science and Technology

A WWW Server Benchmark System in IPv6 Environment. Takao Nakayama. Graduate School of Information Science Nara Institute of Science and Technology A WWW Server Benchmark System in IPv6 Environment Takao Nakayama Graduate School of Information Science Nara Institute of Science and Technology Background(/2) With the spread of IPv6 technology, we can

More information

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Performance Modeling and Evaluation of Web Systems with Proxy Caching Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering

More information

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination Hans Kruse McClure School of Communication Systems Management Ohio University 9 S. College Street Athens,

More information

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS Cristina Hava & Liam Murphy 1 Abstract The World Wide Web (WWW, or Web) is one of the most important Internet services, and has been largely responsible

More information

TCP performance for request/reply traffic over a low-bandwidth link

TCP performance for request/reply traffic over a low-bandwidth link TCP performance for request/reply traffic over a low-bandwidth link Congchun He, Vijay Karamcheti Parallel and Distributed Systems Group Computer Sciences Department New York University {congchun, vijayk}@cs.nyu.edu

More information

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination Hans Kruse McClure School of Communication Systems Management Ohio University 9 S. College Street Athens,

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

High Speed TCP/IP Experiment over International ATM Test Bed

High Speed TCP/IP Experiment over International ATM Test Bed 24 High Speed TCP/IP Experiment over International ATM Test Bed Toru Hasegawa*, Mitsuru Yamada*, Kanji Hokamura*, Kohei Yoshiizumi*, Teruyuki Hasegawa*, Toshihiko Kato*, Linda Galasso**, and Hiroyuki Fujii***

More information

Computer Networking. Introduction. Quintin jean-noël Grenoble university

Computer Networking. Introduction. Quintin jean-noël Grenoble university Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No. Additional Material Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science 2010 Information Network I/No.4 1 ! Protocol Suites for the Internet! Widely used from LANs

More information

Development of a WWW Server Management Support System

Development of a WWW Server Management Support System Development of a WWW Server Management Support System Yutaka Nakamura yutaka-n@rd.center.osaka-u.ac.jp Shinji Shimojo shimojo@cmc.center.osaka-u.ac.jp Cyber Media Center of Osaka University Suguru Yamaguchi

More information

ATM in TCP/IP environment: Adaptations and Effectiveness

ATM in TCP/IP environment: Adaptations and Effectiveness Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

HyperIP : SRDF Application Note

HyperIP : SRDF Application Note HyperIP : SRDF Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably enhances large data movement over big bandwidth and long-haul IP networks. HyperIP

More information

Performance Analysis of iscsi Middleware Optimized for Encryption Processing in a Long-Latency Environment

Performance Analysis of iscsi Middleware Optimized for Encryption Processing in a Long-Latency Environment Performance Analysis of iscsi Middleware Optimized for Encryption Processing in a Long-Latency Environment Kikuko Kamisaka Graduate School of Humanities and Sciences Ochanomizu University -1-1, Otsuka,

More information

A transport-layer approach for achieving predictable throughput for Internet applications

A transport-layer approach for achieving predictable throughput for Internet applications Seventh International Conference on Networking A transport-layer approach for achieving predictable throughput for Internet applications Go Hasegawa, Kana Yamanegi and Masayuki Murata Graduate School of

More information

************************************************************************ Distribution: ATM Forum Technical Working Group Members (AF-TM) *************

************************************************************************ Distribution: ATM Forum Technical Working Group Members (AF-TM) ************* ************************************************************************ ATM Forum Document Number: ATM_Forum/97-0617 ************************************************************************ Title: Worst

More information

Design Issues in Traffic Management for the ATM UBR+ Service for TCP over Satellite Networks: Final Report

Design Issues in Traffic Management for the ATM UBR+ Service for TCP over Satellite Networks: Final Report Design Issues in Traffic Management for the ATM UBR+ Service for TCP over Satellite Networks: Final Report Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 1 Overview Statement

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science NETWORK PROGRAMMING CSC- 341 Instructor: Junaid Tariq, Lecturer, Department of Computer Science 6 Lecture CHAPTER 2: THE TRANSPORT LAYER : TCP AND UDP Contents Introduction UDP: User Datagram Protocol

More information

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Report from COAST. 155 Mbit/s tests with TCP/IP over ATM wide area links SUNET. Gothenburg & Uppsala March 1996

Report from COAST. 155 Mbit/s tests with TCP/IP over ATM wide area links SUNET. Gothenburg & Uppsala March 1996 Report from COAST Mbit/s tests with TCP/IP over ATM wide area links SUNET & March 1996 Gunnar Lindberg SUNET/Chalmers Robert Olsson SUNET/SLU page

More information

An Analysis of the Number of ICP Packets on the Distributed WWW Caching System

An Analysis of the Number of ICP Packets on the Distributed WWW Caching System An Analysis of the Number of ICP Packets on the Distributed WWW Caching System Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi and Hideki Sunahara Nara Institute of Science and Technology 8916-5 Takayama,

More information

Fore ATM Switch ASX1000 D/E Box (0 to 20000km) ACTS (36000km)

Fore ATM Switch ASX1000 D/E Box (0 to 20000km) ACTS (36000km) Performance of TCP extensions on noisy high BDP networks Charalambous P. Charalambos, Victor S. Frost, Joseph B. Evans August 26, 1998 Abstract Practical experiments in a high bandwidth delay product (BDP)

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Delay Time Analysis of Reconfigurable. Firewall Unit

Delay Time Analysis of Reconfigurable. Firewall Unit Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology

More information

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

Countermeasure for Round Trip Delay Which Occurs in Between Satellite and Ground with Software Network Accelerator

Countermeasure for Round Trip Delay Which Occurs in Between Satellite and Ground with Software Network Accelerator Countermeasure for Round Trip Delay Which Occurs in Between Satellite and Ground with Software Network Accelerator Kohei Arai Graduate School of Science and Engineering Saga University Saga City, Japan

More information

Internetworking With Tcp Ip 6th Edition File Type

Internetworking With Tcp Ip 6th Edition File Type We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with internetworking with

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation

Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation Osamu Honda, Hiroyuki Ohsaki, Makoto Imase Graduate School of Information Science and

More information

Lecture 13: Transportation layer

Lecture 13: Transportation layer Lecture 13: Transportation layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End-to-end communication Distinguish different

More information

Measurement-based Analysis of TCP/IP Processing Requirements

Measurement-based Analysis of TCP/IP Processing Requirements Measurement-based Analysis of TCP/IP Processing Requirements Srihari Makineni Ravi Iyer Communications Technology Lab Intel Corporation {srihari.makineni, ravishankar.iyer}@intel.com Abstract With the

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

Cisco IOS for S/390 Architecture

Cisco IOS for S/390 Architecture CHAPTER 1 Cisco IOS for S/390 Architecture This chapter describes the architecture of Cisco IOS for S/390. It includes the following sections: Overview An overview of the architecture of Cisco IOS for

More information

COMPUTER AND DATA NETWORKS

COMPUTER AND DATA NETWORKS COMPUTER AND DATA NETWORKS (EE2.CDN, Spring 2003) Dr. Z. SUN University of Surrey Guildford Surrey GU2 5XH Tel: 01483 68 9493 Fax: 01483 68 6011 Email: Z.Sun@eim.surrey.ac.uk 1 Dr.Z.Sun SCHEDULE Week 1

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

SATP A TRANSPORT PROTOCOL FOR ATM-INTRANETS

SATP A TRANSPORT PROTOCOL FOR ATM-INTRANETS A TRANSPORT PROTOCOL FOR ATM-INTRANETS Axel Böger, Martina Zitterbart Institute of Operating Systems and Computer Networks Technical University of Braunschweig, Germany fboeger j zitg@ibr.cs.tu-bs.de Joachim

More information

Which Service for TCP/IP Traffic on ATM: ABR or UBR?

Which Service for TCP/IP Traffic on ATM: ABR or UBR? Which Service for TCP/IP Traffic on ATM: ABR or UBR? Standby Guaranteed Joy Riders Confirmed Columbus, OH 43210-1277 Contact: Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 2 1 Overview Service

More information

Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces

Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible s Igor Bisio, Mario Marchese, and Maurizio Mongelli Abstract. There are many types of Performance

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

******************************************************************* *******************************************************************

******************************************************************* ******************************************************************* ATM Forum Document Number: ATM_Forum/96-0518 Title: Performance of TCP over UBR and buffer requirements Abstract: We study TCP throughput and fairness over UBR for several buffer and maximum window sizes.

More information

Internet Mail: The SMTP Model

Internet Mail: The SMTP Model Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,

More information

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter

More information

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Haowei Bai Honeywell Aerospace Mohammed Atiquzzaman School of Computer Science University of Oklahoma 1 Outline Introduction

More information

Why Your Application only Uses 10Mbps Even the Link is 1Gbps?

Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Contents Introduction Background Information Overview of the Issue Bandwidth-Delay Product Verify Solution How to Tell Round Trip Time (RTT)

More information

estadium Project Lab 2: Iperf Command

estadium Project Lab 2: Iperf Command estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Exercises TCP/IP Networking With Solutions

Exercises TCP/IP Networking With Solutions Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Development of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies

Development of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies Development of Transport Systems for Dedicated Service Provision Using Transport Technologies Hidetoshi Onda, Masaki Shinkai, Takaaki Hisashima, Sachio Suda, Takeru Sakairi, Hidenori Iwashita, Masaya Ogawa,

More information

Secure Web Server Performance Dramatically Improved by Caching SSL Session Keys

Secure Web Server Performance Dramatically Improved by Caching SSL Session Keys Secure Web Server Performance Dramatically Improved by Caching SSL Session Keys Arthur Goldberg, Robert Buff, Andrew Schmitt [artg, buff, schm7136]@cs.nyu.edu Computer Science Department Courant Institute

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

RRDTool: A Round Robin Database for Network Monitoring

RRDTool: A Round Robin Database for Network Monitoring Journal of Computer Science Original Research Paper RRDTool: A Round Robin Database for Network Monitoring Sweta Dargad and Manmohan Singh Department of Computer Science Engineering, ITM Universe, Vadodara

More information

Data Communications and Networks Spring Syllabus and Reading Assignments

Data Communications and Networks Spring Syllabus and Reading Assignments Data Communications and Networks Spring 2018 Syllabus and Assignments Revision Date: January 24, 2018 Course : This course teaches the design and implementation techniques essential for engineering robust

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Networking and TCP/IP. John Kalbach November 8, 2004

Networking and TCP/IP. John Kalbach November 8, 2004 Networking and TCP/IP John Kalbach kalbach@psu.edu November 8, 2004 Topology Bus Ethernet, Wireless Star ATM, Switched Ethernet, Gigabit Ethernet Ring Token Ring, FDDI DS Digital Signals Speeds DS 0 64Kbs

More information

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label

More information

Design and Implementation of Client Server Network Management System for Ethernet LAN

Design and Implementation of Client Server Network Management System for Ethernet LAN Design and Implementation of Client Server Network Management System for Ethernet LAN Ms. MAY PAING PAING ZAW and Ms. SU MYAT MARLAR SOE Abstract Network Management Systems have played a great important

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Improved Model for a Non-Standard TCP Behavior

Improved Model for a Non-Standard TCP Behavior IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 45 Improved Model for a Non-Standard TCP Behavior Mohammed Abdullah Alnuem, King Saud University, Riyadh,

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Memory Management Strategies for Data Serving with RDMA

Memory Management Strategies for Data Serving with RDMA Memory Management Strategies for Data Serving with RDMA Dennis Dalessandro and Pete Wyckoff (presenting) Ohio Supercomputer Center {dennis,pw}@osc.edu HotI'07 23 August 2007 Motivation Increasing demands

More information

RTI Performance on Shared Memory and Message Passing Architectures

RTI Performance on Shared Memory and Message Passing Architectures RTI Performance on Shared Memory and Message Passing Architectures Steve L. Ferenci Richard Fujimoto, PhD College Of Computing Georgia Institute of Technology Atlanta, GA 3332-28 {ferenci,fujimoto}@cc.gatech.edu

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2 COMMUNICATION AND INTERNET TECHNOLOGIES 3.2.1 PROTOCOLS PROTOCOL Protocol a set of rules governing the way that devices communicate with each other. With networks and the Internet, we need to allow

More information

HTTP Page Transfer Rates over Geo-Stationary Satellite Links

HTTP Page Transfer Rates over Geo-Stationary Satellite Links HTTP Page Transfer Rates over Geo-Stationary Satellite Links Introduction Hans Kruse J. Warren McClure School, Ohio University; hkruse1@ohiou.edu Mark Allman NASA Lewis Research Center/Sterling Software;

More information

Backup and Recovery Scheme for Distributed e-learning System

Backup and Recovery Scheme for Distributed e-learning System Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

******************************************************************* *******************************************************************

******************************************************************* ******************************************************************* ATM Forum Document Number: ATM_Forum/96-0517 Title: Buffer Requirements for TCP over ABR Abstract: In our previous study [2], it was shown that cell loss due to limited buffering may degrade throughput

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Application. Transport. Network. Link. Physical

Application. Transport. Network. Link. Physical Transport Layer ELEC1200 Principles behind transport layer services Multiplexing and demultiplexing UDP TCP Reliable Data Transfer TCP Congestion Control TCP Fairness *The slides are adapted from ppt slides

More information

Chapter 2 Layer Architecture of Network Protocols. School of Info. Sci. & Eng. Shandong Univ.

Chapter 2 Layer Architecture of Network Protocols. School of Info. Sci. & Eng. Shandong Univ. Chapter 2 Architecture of Network Protocols School of Info. Sci. & Eng. Shandong Univ. Outline 2.1 Examples of ing 2.2 OSI Reference Model (Continued from last time) 2.3. TCP/IP Architecture 2.4 Berkeley

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

Protocol Overview. TCP/IP Performance. Connection Types in TCP/IP. Resource Management. Router Queues. Control Mechanisms ITL

Protocol Overview. TCP/IP Performance. Connection Types in TCP/IP. Resource Management. Router Queues. Control Mechanisms ITL Protocol Overview TCP/IP Performance E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP ITL IP ICMP ARP RARP (Auxiliary Services) ATM Ethernet, X.25, HDLC etc. 2/13/06 Hans Kruse & Shawn Ostermann, Ohio

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

A Design and Implementation of Network Traffic Monitoring System for PC-room Management

A Design and Implementation of Network Traffic Monitoring System for PC-room Management A Design and Implementation of Network Traffic Monitoring System for PC-room Management Yonghak Ahn, Oksam Chae Dept. of Computer Engineering, Kyunghee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do

More information

NWEN 243. Networked Applications. Transport layer and application layer

NWEN 243. Networked Applications. Transport layer and application layer NWEN 243 Networked Applications Transport layer and application layer 1 Topic TCP flow control TCP congestion control The Application Layer 2 Fast Retransmit Time-out period often relatively long: long

More information