Network and Service Performance

Top PDF Network and Service Performance:

Unveiling Network and Service Performance Degradation in the Wild with mPlane

Unveiling Network and Service Performance Degradation in the Wild with mPlane

∗ FTW Vienna, † Politecnico di Torino, ‡ Fondazione Ugo Bordoni, § University of Li`ege Corresponding Author: casas@ftw.at/pecasas@gmail.com Abstract—Unveiling network and service performance issues in complex and highly decentralized systems such as the In- ternet is a major challenge. Indeed, the Internet is based on decentralization and diversity. However, its distributed nature leads to operational brittleness and difficulty in identifying the root causes of performance degradation. In such a context, network measurements are a fundamental pillar to shed light and to unveil design and implementation defects. To tackle this fragmentation and visibility problem, we have recently conceived mPlane, a distributed measurement platform which runs, collects and analyses traffic measurements to study the operation and functioning of the Internet. In this paper, we show the potentiality of the mPlane approach to unveil network and service degradation issues in live, operational networks, involving both fixed-line and cellular networks. In particular, we combine active and passive measurements to troubleshoot problems in end-customer Internet access connections, or to automatically detect and diagnose anomalies in Internet-scale services (e.g., YouTube) which impact a large number of end-users.
Show more

15 Read more

Proactively Manage IT Service Performance Across Your Enterprise with CA ehealth Network Performance Manager

Proactively Manage IT Service Performance Across Your Enterprise with CA ehealth Network Performance Manager

• Report experts can use Report Studio to translate queries into customized reports. • General users can tap a Report Center Web Interface to access reports created for them by power users and report experts and to store those reports in personalized folders. CA eHEALTH TRAFFIC ACCOUNTANT This add-on module provides a business-level view of network utilization and delivers automated reports on network resource consumption by users, business units, regions or applications. The software imports and analyzes Netflow and RMON2 data, combining it with sophisticated grouping and sorting capabilities to create concise, understandable reports revealing trends and usage patterns that can impact the performance of your network.
Show more

16 Read more

Opportunistic Resource Management to Improve Network Service Performance in User-created Networks

Opportunistic Resource Management to Improve Network Service Performance in User-created Networks

Most existing authentication solutions rely on central servers to handle authentication. Captive portals and the 802.11i suite of protocols tunnel authentication requests to a central server that stores all rele- vant credentials and verifies the clients. Other protocols exist to reduce the load on the central server by only checking the revocation status of a certificate [104]. Due to the unreliable connections in the UCN, communication with central servers faces high failure rate, especially since most protocols are not reliable. In addition, due to the large size of the UCN a central server might be located far from where authenti- cation is happening or overloaded with potentially millions of requests, which leads to high communica- tion and processing delays. For mobile users whose connectivity periods might only last a few seconds, the extra delay for authenticating is intolerable. One approach to reduce delay is to deploy servers closer to the edge of the network to act as authentication proxies [50]. Although such an approach can reduce com- munication delay, in order to service the entire UCN deployment, the installation and maintenance costs are large. Especially considering the lack of strong business model, it would seem that there would be no incentive for a third party to invest large sums of money up-front before the UCN has been proven suc- cessful. What is needed is a new deployment approach for authentication between the UCN and backhaul networks that runs on end-user devices themselves, has low delay and overhead and yet is still centrally managed.
Show more

116 Read more

Application of Social Network Analysis to Service Networks Performance Analytics: A Literature Review

Application of Social Network Analysis to Service Networks Performance Analytics: A Literature Review

As figure 5 above illustrates, introducing KPIs requires a carefully planned strategy; a strategic vision, continuously improving business and service orientation, adopting a new business model, identifying critical success factors, reporting performance, and evaluating how whether performance meets the predetermined KPIs. Many services are exceedingly complex phenomena which can be conceptualised in several different ways [12]. Taking a qualitative perspective and trying to really understand primarily what relational structures mean in service network, how they evolve, and then try and address and look at how they change with the impact of IT and service performance from a quantitative perspective. The relationships which exist between these services can determine the service innovation and operations efficiencies across networks. This will also allow us to identify the critical success factors (CSFs) which enable (KPI) or inhibit business processes. Papazoglou [20], draws our attention to the focus of the current practice of business transactions, and the lack of insight into the behaviour or the relationships of transactions between trading partners which can enhance their business value when transaction functions are combined. Sifting through departmental and cross-organisational conflicting objectives clutters manager‘s ability to extract key performance information [63]. Freeing up resources to develop value-added information is critical to managerial activities (e.g. rapid decision making and execution). To address these issues we must uniquely define the business KPIs. KPIs allow us to measure the success of goal achievement and to generate insight to discover how service performance and value may be enhanced. Characteristically, service network KPIs should be simple for decision making, relevant to unique (service-dominant) business models, present timely results, useful, and instant for actionable insights. Here, one is reminded of services seeking the right balance or requisite variety between ‗use, usage, and usability‘ [75] of their resources and processes through service-oriented approaches. In addition, Parmenter, [73] identifies seven key characteristics of KPIs:
Show more

40 Read more

Service-Oriented Network Performance Management

Service-Oriented Network Performance Management

The combination of network and application leads to a scenario that once a problem occurs, administrators have to face a series of infrastructures such as firewall, load balancer, WAN accelerator, application accelerator, encrypt device and other devices that require specialized knowledge and techniques to deal with. When figuring out whether the problem is on network layer or application layer, administrators have to understand the logic of business and to organize the access relations between network services; otherwise they cannot make logical judgment to the problem. Moreover, it’s necessary for administrators to know the solution to the problem found on port. As a result, if network administrators lack knowledge of TCP/IP and insight of application logic, they are unable to analyze and solve problems even with powerful infrastructure management platform or network data analysis and decoding tools.
Show more

12 Read more

Performance of Network and Service Monitoring Frameworks

Performance of Network and Service Monitoring Frameworks

Figure 2. Architecture of the JMX-based instance of our benchmarking platform. framework. In this case, we varied the monitoring rate as an impact factor. In a second stage, we have extended this initial work to study the impact of instrumentation models as described in [10] on both the performance of the management and an instrumented web server [18]. We did show that the users perceived performance in terms of the number of HTTP transactions/s and their respective delays are highly affected by the management activity in the boot driver and component models while a daemon integration model limits the man- agement activities impact on the functional plane. However, we showed that under low monitoring rates in the order of 200 requests/second, the three integration models have a small impact on the web server performance. Figure 3 depicts the throughput and the delays of the web server, monitored by a driver agent model. In this experiment, we varied the operational load in terms of number of web clients and the monitoring load in terms of getAttributes per second.
Show more

7 Read more

UAS Service Supplier Network Performance

UAS Service Supplier Network Performance

Acknowledgments To present the results in this document, the efforts of many individuals and organizations were necessary. The NASA UTM Project is made up of researchers, engineers, and other professionals that have kept the work of UTM going for several years. Specifically, the TCL4 Flight Test Team, software engineers developing critical components, the Airspace Operations Lab allowing for visualization and live analysis of data, and the Data Management Plan team were all vital to the results included herein. The UTM concept was originally proposed by Parimal Kopardekar and supported by NASA Ames Research Center. Externally, the Nevada Institute for Autonomous Systems and the Lone Star UAS Center of Excellence & Innovation were excellent partners in the execution of TCL4. NASA’s partnership with the Federal Aviation Administration has been vital in outlining the UTM concept and future requirements, driving a great deal of our research. While there were dozens of industry and government partners making TCL4 a success, the results in this document were possible primarily due to the efforts of our industry partners implementing the NASA UAS Service Supplier specification for TCL4. These include AirMap, AiRXOS, ANRA Technologies, Avision, Collins Aerospace, OneSky, and Uber Elevate.
Show more

31 Read more

“Performance Analysis of Active Network Service Composition”

“Performance Analysis of Active Network Service Composition”

Abstract: - Active Networks is novel approach to networking, which provides an architectural support for dynamically deploying new protocols in an existing network topology. The nodes in an active network are able to download and execute customized user codes on themselves and thus rendering the node recognize and run totally new protocols without making any changes to the architecture of the network. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active network. Active network environment will be implemented on a small scale test scenario, in order to study the performance and characteristics of active networks.
Show more

9 Read more

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation*

Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw, xuke}@csnet1.cs.tsinghua.edu.cn Abstract. In order to provide QoS guarantees for data transmission, we devel- oped the QoS router, which can seek feasible paths subject to QoS require- ments for the IP packets. However, the QoS router cannot be deployed exten- sively in the Internet because the current routers need to be modified. Based on the overlay network, we propose QoS Routing Network (QOSRN), which consists of fewer QoS routers and virtual links. We go further by researching into the impact of the arrangement of QoS routers upon the performance of QOSRN. Extensive simulations show that by adopting reasonable arrange- ment scheme, e.g. deploying border routers first, QOSRN achieves high per- formance without increasing the load of the network excessively. The re- search result can give some guidance to the construction of the overlay net- work that provides QoS guarantees.
Show more

8 Read more

Analyzing the effect of Denial of Service attack on Network Performance

Analyzing the effect of Denial of Service attack on Network Performance

Keywords: Denial of Service Attacks, Mac Spoof, Access point, IEEE 802.11, WLAN ________________________________________________________________________________________________________ I. I NTRODUCTION When you Wireless networking presents many advantages Productivity improves because of increased accessibility to information resources. Network configuration and reconfiguration is easier, faster, and less expensive. However, wireless technology also creates new threats and alters the existing information security risk profile. For example, because communications takes place "through the air" using radio frequencies, the risk of interception is greater than with wired networks. If the message is not encrypted, or encrypted with a weak algorithm, the attacker can read it, thereby compromising confidentiality. Although wireless networking alters the risks associated with various threats to security, the overall security objectives remain the same as with wired networks: preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems.
Show more

5 Read more

Quality Of Service In UMTS Network And Improvement VOIP Performance

Quality Of Service In UMTS Network And Improvement VOIP Performance

in fig 2 the simulation gives best result Figures [3,4,5,6,7,8and 9 ] evaluating the capability of wireless networks for VoIP transmissions, since they provide measures for the impact of the network on the perceived speech quality, the QoS factors will be controlled and managed to ensure good quality VoIP call , the design of layered coding and multiple description coding is employed to address the bandwidth fluctuations and packet loss problems in the wireless network and to further enhance the error resilience, Figure 10 and Figure 12 show GMS and G.729A CODEC get less end to end delay when they are using 20ms frame sizes than 30 ms frame sizes. The actual end to end delay time is very close. Both CODECs are getting about 150ms end to end delay for a 20 ms frame size and 158ms end-to-end delay for a 30 ms frame size. The re- sults shown in Figure 10 and Figure 12 are acceptable for VoIP calls. Figures 11 shows the results for GSM CODEC with Six simulations have using the hybrid network with a 20 ms frame size has been configured and used with a varied num- ber of voice call frames in each VoIP packet. As shown in Fig- ures 11 increasing the number of voice call frames per VoIP packet will increase the end to end delay. The 20 ms frame size still performs better than other length frame sizes with about 150 ms end to end delay and with a varied number of voice call frames in each VoIP packet about 365 as maximum value and 150 as minimum value. In Figure 13 show similar results were found for the G.729A CODEC. The simulations carried out were to identify if changes in the number of voice packets and CODECs affected the performance overall. Re- search have confirm that packet delay of 150ms doesn't do any problem, but if the delay grow up to 150ms the voice sig- nal is damage . The service providers have to guarantee that the delay happen is equal or less than 150ms.Fig 14 shows utilization.
Show more

6 Read more

Quality of Service and Network Performance (UMTS version 3.1.0)

Quality of Service and Network Performance (UMTS version 3.1.0)

This Technical Report (TR) has been produced by ETSI Special Mobile Group (SMG). Introduction The Quality of Service of the Universal Mobile Telecommunications System UMTS is an important factor when introducing the system to the customers. When UMTS is ready to be launched to the mass market, several other mobile telecommunication services exist as an alternative for the general public. A high quality experienced by the user of UMTS is essential in order to promote the idea of UMTS as a global all-purpose communication tool for millions of people with mass produced low price terminal equipment.
Show more

16 Read more

Performance Analysis of MPLS network with Traditional IP Network in Service Provider Environment

Performance Analysis of MPLS network with Traditional IP Network in Service Provider Environment

Multiprotocol Label Switching is a tool applied in distinguished performance telecommunications networks that carries materials from on complex over to the next. Originally MPLS created by a crew of engineers that were consumed with improving the quickness of routers nevertheless from the time it has emerged as a classic in today's telecommunications. There have been a multitude number of attempts at developing many technologies with the identical goals, to date none have reached the position of success that we now see with MPLS. To this extent what benefits arise out of using MPLS you may wonder? Well firstly, they allow internet service providers the savvy to maintain rapidly growing internet. In addition allows for fundamental adjustability. Appreciating MPLS means looking to some of the parts that exist concerning to the MPLS such as the label which is a locally significant identifier that is allotted to a packet. Every label contains four fields, a label value, traffic class field which determines the quality of service, bottom of stack label which is not always set but when it is it signifies that the label is currently the last in the stack and finally there is the "time to live" (also referred to as TTL) field which is the limit of time that data can experience before it will be discarded. To realize the magnitude of MPLS one just has too measure it against some earlier technologies that are similar like the frame relay which focused on making previously existing physical resources more adequate. In recent days the use of frame relay has been given a poor name in several markets because of overdone bandwidth used by some companies hence making the use of MPLS much more alluring. One more similarity would be that between ATM (also referred to as Asynchronous Transfer Mode) MPLS when comparing the two have many differences both offer connection oriented service to allow for transporting data across networks.
Show more

6 Read more

INTERNET SERVICE POLICIES AND DISCLOSURES I. NETWORK MANAGEMENT AND PERFORMANCE

INTERNET SERVICE POLICIES AND DISCLOSURES I. NETWORK MANAGEMENT AND PERFORMANCE

Approved Equipment Customer may connect any lawful device to the Services, subject to the following. Wintek is not responsible for the compatibility, suitability or functionality of any equipment that is provided by Customer or any third party. If Wintek reasonably believes any such equipment harms our network, degrades or interrupts the service of other users, or otherwise causes damage, harm, or service issues (collectively, “Equipment-Related Harm”), Wintek may require Customer to disconnect the device. Wintek further reserves the right to suspend, limit, or terminate Services to Customers that in our sole discretion are causing or contributing to Equipment-Related Harm, as well as the right to pursue any remedy at law available to address such harm.
Show more

5 Read more

Performance Evaluation of a Distributed Storage Service in Community Network Clouds

Performance Evaluation of a Distributed Storage Service in Community Network Clouds

RTT between VMs 1-2 ms Average throughput from the community network client 7-8 Mbits/sec 5. RESULTS All tests were conducted using the IOzone cloud storage benchmark [ 37 ]. IOzone is a filesystem benchmark tool, which generates the cloud storage workload and measures various file operations. The benchmark tests file input/output (I/O) performance of many important storage-benchmarking operations, such as read, write, re-read, re-write, random read/write, etc. We run all 13 IOzone tests and vary the file size from 64 KB to 128 MB and we maintain a record length of 128 KB. An -a flag allows us to run all 13 tests. We add the -b flag to write the test output in binary format to a spreadsheet. We use a FUSE (Filesystem in Userspace) kernel module in combination with SSHFS (SSH Filesystem), an SFTP client that allows filesystem access via FUSE, to mount a Tahoe-LAFS directory to the local disk of the client. Tahoe’s SFTP front end includes several workarounds and extensions to make it function correctly with SSHFS. When mounting with SSHFS, we disable the cache and use direct I/O and synchronous writes and reads, using the parameters -o cache=no, big writes, direct io, and sshfs sync . We observe that the -o big writes option to SSHFS improves write performance without affecting the read operations [ 26 ]. The distributed storage experiment is comprised of 15 runs of writing and reading files, where each run consists of 10 repetitions. Performance results presented in this paper are averaged over all the successful runs and are measured in MB/s referred to as operation speed. Tests with concurrent reading and writing were not conducted.
Show more

15 Read more

Performance evaluation of a distributed storage service in community network clouds

Performance evaluation of a distributed storage service in community network clouds

3 Tahoe-LAFS distributed filesystem Tahoe-LAFS [ 29 ] is a decentralised storage system with provider-independent security. This features means that the user is the only one who can view or modify disclosed data. The data and metadata in the cluster is distributed among servers using erasure coding and cryptography. The erasure coding parameters determine how many servers are used to store each file which is denoted with N, and how many of them are necessary for the files to be available denoted as K . The default parameters used in Tahoe-LAFS are K=3 and N=10 (3-of-10). The Tahoe-LAFS cluster consists of a set of storage nodes, client nodes and a single coordinator node called the Introducer. The storage nodes connect to the Introducer and announce their presence and the client nodes connects to the Introducer to get the list of all connected storage nodes. The Introducer does not transfer data between clients and storage nodes, but the transfer is done directly between them. The Introducer is a single-point-of-failure for new clients or new storage peers, since they need it for joining the storage network. When the client uploads a file to the storage cluster, a unique public/private key pair is generated for that file, and the file is encrypted, erasure coded and distributed across storage nodes (with enough storage space) [ 20 ]. The location of erasure coded shares is decided by a server selection algorithm that hashes the private key of the file in order to generate a distinct server permutation. Then, servers without enough storage space are removed from the permutation and the rest of the servers are contacted in sequence and asked to hold one share of the file. To download a file the client asks all known storage nodes to list the number of shares of that file they hold and in the subsequent rounds (second round-trip), the client chooses which share to request based on various heuristics like latency, node load etc. Figure 4 shows how an immutable file (created once and can be read repeatedly) is created. To create an immutable file, a client chooses a symmetric encryption key then uses that key to encrypt the file and chooses erasure coding parameters K and N that erasure codes the ciphertext into N shares, and writes each share to a different server.
Show more

13 Read more

Network as a service:

Network as a service:

Q. How much time and resources are required to manage our network? Consideration: Many IT teams spend more than half their time managing and maintaining the network. 4 NaaS can help apply these resources to tasks that deliver more business value. NaaS can automate multiple processes such as onboarding new users, provisioning and configuring new network devices, lifecycle management, and extending policies throughout the network for maximum performance and compliance. Most NaaS solutions also employ powerful, AI-driven, actionable insights to ensure fast identification and resolution of faults and to help IT improve services utilization, optimize workload traffic, and better protect the business from cyber threats, along with partner- delivered services for added speed, agility, and solution optimization.
Show more

10 Read more

Mathematical model of service quality performance s computing of multiservice network

Mathematical model of service quality performance s computing of multiservice network

1. Introduction Today, the popularity of the Internet is so vast that the technical capabilities of the World Network do not have time to provide full growing with each passing day the flow of information. Therefore, the task of the qualitative approach to networking is reduced to the task of selecting the topological structure of the network, determining the optimal number of nodes and links of the network to the calculation of its capacity, finding the shortest-path load transfer calculation probability-time characteristics of the network, etc. In the process of analysis and synthesis of networks, the problem of calculating its probability-time characteristics for designers is of greatest interest as a solution to this problem, you can: significantly improve network performance, prevent network failures during overload traffic information, to determine the optimal direction of
Show more

7 Read more

cWRR: A Scheduling Algorithm for Maximizing  the Performance of Quality of Service Network Router

cWRR: A Scheduling Algorithm for Maximizing the Performance of Quality of Service Network Router

These key functions of a network router scheduling algorithm have led researchers to propose different algorithms for supporting many queues and satisfying various requirements of each traffic group in DiffServ. Most of the algorithms are criticized in terms of flow isolation, delays experienced by traffic packets at the router, fairness to traffic sources, simplicity of implementation, utilization and scalability among others. Isolation in the sense that queues that violates their sending rates should not carry their burdens to other cooperative traffic queues. Scheduling algorithms can be grouped into three: frame-based, time-stamped and the hybrid of the two. Frame-based shares the available resources among queues as quantum and cyclical services the queue as much as the quantum could allow [3, 4, 5, 6, 7]. The time-stamped counterpart attends to the traffic according to the time required by each packet for execution. While some frame- based scheduling algorithms such as in [ ] were noted for higher packet delays, some sorted algorithms like [8, 9, 10]
Show more

5 Read more

New cellular networks in Malawi: Correlates of service rollout and network performance

New cellular networks in Malawi: Correlates of service rollout and network performance

JEL No. O20,O25,R39 ABSTRACT Cellular technologies have become increasingly important in the developing world; infrastructure for mobile networks has expanded dramatically over the past two decades giving access to remote areas without previous phone service. Despite this expansion, relatively little is known about the correlates of the rollout of cellular phone networks or the performance of these networks. Since the rollout of cellular networks has been largely spearheaded by an active private sector in telecommunications, how demand-side and cost-side factors affect the timing of rollout and quality of network service is of particular interest. In this paper we use new data to estimate the correlates of cellular phone access and network performance across rural areas of Malawi. We compile a dataset which combines administrative data of the entire cellular network of Malawi with geographic and Census data to describe the rollout and the performance of the cellular network measured by the dropped call rate. We find that both demand-side and cost-side factors are important in determining the timing of network access, while demand-side factors appear most relevant for the dropped call rate, one metric of network quality.
Show more

33 Read more

Show all 10000 documents...