Agenda  Yi: "Subjective Test Setup and Samples"  Niko: "Packeteer"

Slides:



Advertisements
Similar presentations
Using Edge-To-Edge Feedback Control to Make Assured Service More Assured in DiffServ Networks K.R.R.Kumar, A.L.Ananda, Lillykutty Jacob Centre for Internet.
Advertisements

Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
Tiziana Ferrari Differentiated Services Test: Report1 Differentiated Service Test REPORT TF-TANT Tiziana Ferrari Frankfurt, 1 Oct.
Introduction Token Bucket Regulator (TBR) used at network ingress to smoothen subscriber traffic TBR is a regulator or a linearly bounded arrival process:
Ahmed El-Hassany CISC856: CISC 856 TCP/IP and Upper Layer Protocols Slides adopted from: Injong Rhee, Lisong Xu.
On Impact of Non-Conformant Flows on a Network of Drop-Tail Gateways Kartikeya Chandrayana Shivkumar Kalyanaraman ECSE Dept., R.P.I. (
Computer Networks Computer Networks Term B10 Network Delay Network Delay Performance Problems.
Congestion Control for High Bandwidth-Delay Product Networks Dina Katabi, Mark Handley and Charlie Rohrs SIGCOMM2002 Pittsburgh Presenter – Bob Kinicki.
Netergy - Stanford - VoIP A Show-and-Tell After the First 12 Month Niko Färber, Yi Liang, Mack Hashemi Bernd Girod, Balaji Prabhakar.
Reduced TCP Window Size for Legacy LAN QoS II Niko Färber Sept. 20, 2000.
Yi Liang and Niko Färber Feb 7, 2001 Adaptive Playout Scheduling Using Side Information in Legacy LAN.
CS158B Project By Shing Chau Jerry Ko Ying Li
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
Influence of File Size Distribution on Legacy LAN QoS Parameters Nikolaus Färber Nov. 15, 2000.
Reduced TCP Window Size and Adaptive Playout for Legacy LAN VoIP Niko Färber, Yi Liang November 29, 2000.
Setting TCP Window Size for Legacy LAN VoIP Niko Färber January 10, 2001.
Project P3-A MAC Scheduling and Reservations with UDP Design and Prototyping project Test harness for adding limited application level MAC features to.
Reduced TCP Window Size for VoIP in Legacy LAN Environments Nikolaus Färber, Bernd Girod, Balaji Prabhakar.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 2 Time: 60 min (strictly enforced) Points: 50 { 5 questions,
Chapter 1 Data Communications and Network Management Overview
Reduced TCP Window Size for Legacy LAN QoS Niko Färber July 26, 2000.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Advanced Computer Networks 1 Sample Network Performance Problems.
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Department of Computer Science Southern Illinois University Edwardsville Dr. Hiroshi Fujinoki and Kiran Gollamudi {hfujino,
Ch 7. Multimedia Networking Myungchul Kim
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 Integrated and Differentiated Services Multimedia Systems(Module 5 Lesson 4) Summary: r Intserv Architecture RSVP signaling protocol r Diffserv Architecture.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Architecting for Innovation ACM SIGCOMM Computer Communication Review 2011 July Presenter :許耀中
Why Should I Listen? Session Title: QoS & Network Management for Successful Enterprise VoIP Deployment In other words: How do I roll out VoIP with assurances.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
Link Scheduling & Queuing COS 461: Computer Networks
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 A TCP Friendly Traffic Marker for IP Differentiated Services Feroz Azeem, Shiv Kalyanaraman,
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
Benefits of Networking & Network administration. Outline the benefits the network there are actually only 2, namely "Sharing resources and as communication.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Chapter Objectives After completing this chapter you will be able to: –Understand the basic concepts of ATM –List some reasons for implementing an ATM.
Network layer Accepts messages from the application layer Prepares messages for the data link layer Packetising Addressing Routing.
Un-Cooperative Congestion Control Kartikeya Chandrayana Prof. Shivkumar Kalyanaraman ECSE Dept., R.P.I. (
Data Network Designing and Evaluation
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
1 Capacity Dimensioning Based on Traffic Measurement in the Internet Kazumine Osaka University Shingo Ata (Osaka City Univ.)
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
Hierarchical Topology Design. 2 Topology Design Topology is a map of an___________ that indicates network segments, interconnection points, and user communities.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) [Hint: spend time roughly.
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets A. Kuzmanovic, A. Mondal, S. Floyd, and K.K. Ramakrishnan draft-ietf-tcpm-ecnsyn-02.txt.
 Introduction to Wide Area Networks 2 nd semester
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
1 Ram Dantu University of North Texas, Practical Networking.
Networking in the Enterprise
Networking in the Enterprise
Data Communications and Network Management Overview
Virtual Private Network
April 10, 2006, Northwestern University
Project-2 (20%) – DiffServ and TCP Congestion Control
Queueing Problem The performance of network systems rely on different delays. Propagation/processing/transmission/queueing delays Which delay is affected.
Presentation transcript:

Agenda  Yi: "Subjective Test Setup and Samples"  Niko: "Packeteer"

Packeteer  Company  Core technology  Products  Patent Nikolaus Farber..

Company  Founded 1996  Headquarter: Cupertino  Employees: 127 worldwide  Mission: Provide WAN-QoS infrastructure for business and ASP  Initial public offering (NASDAQ PKTR): July 1999, $69 M  Mkt. Cap.: $1.3 B  6-Month revenue/loss ( ): $16.3 M/$2 M

Core Technology  S. Karandikar, S. Kalyanaraman, P. Bagal, B. Packer, "TCP Rate Control", ACM SIGCOMM, Computer Communication Review, Vol. 30, No. 1, Jan 2000  Control rate (kbit/s) of individual TCP flows by  Advertised window size  ACK pacing  Compares favorable with RED and ECN  Can control misbehaving TCP flows  TCP-friendly  Limited scalability, up to 20,000 flows at 45 Mbps

Products -PacketShaper  Scenario:  PacketShaper 1500/2500/4500  Traffic classification (application, protocol, subnet, URL,...)  Monitoring/analysis  Policy-based bandwidth allocation and enforcement  Presentation, reporting Router WAN Packet Shaper LAN

Products - AppVantage  Scenario:  Application Subscriber Management (ASM)-30/50/70  Service demarcation  Performance analysis, service level compliance  Billing  End-to-end QoS ASM Main Office LAN ASP ASM Branch LAN ASM Branch LAN...

Products - PacketWise  Software offered to technology partners  Software components for  Traffic classification  Monitoring/analysis  Policy-based bandwidth allocation and enforcement  Presentation, reporting

Patent  US Patent , March 2000, R. L. Packer "Method for explicit data rate control in a packet communication environment without data rate supervision"  ACK processing covered in detail for specific embodiment (flow charts)  19 Claims: "A method/apparatus for controlling data rate of data packets..."  Claim 1-5,17: Modification of play-out time  Claim 6-11,18: Modification of sequence numbers  Claim 12-16,19: Modification of advertised window