Cisco Bandwidth Quality Manager User Guide Software Release 3.2

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Bandwidth Quality Manager User Guide Software Release 3.2 Cisco Bandwidth Quality Manager User Guide Software Release 3.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number: OL-11097-03 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Copyright © 2007 Cisco Systems, Inc. All rights reserved. CCVP, the Cisco logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Packet, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0705R) PREFACE IX ABOUT THIS GUIDE IX OBJECTIVE IX AUDIENCE IX PREREQUISITE KNOWLEDGE IX RELATED DOCUMENTATION IX CONVENTIONS USED IN THIS GUIDE X OBTAINING DOCUMENTATION, OBTAINING SUPPORT, AND SECURITY GUIDELINES X 1 BANDWIDTH QUALITY MANAGER OVERVIEW 1-1 MONITORING AND CONFIGURATION INTERFACE FEATURES 1-2 SWITCHING BETWEEN MODES 1-5 SELECTING A REPORTING PERIOD 1-5 GENERATING REPORTS 1-6 2 CONFIGURING BQM QOS MONITORING 2-1 OVERVIEW 2-1 ENABLING QOS MONITORING FEATURES WITH MONITOR QUEUING AND END TO END MAPS 2-2 Default Monitor-Queuing-Map 2-2 Enabling Microburst Event Detection 2-3 Enabling and Disabling Congestion Analysis and Bandwidth Sizing Features 2-3 End-to-End Measurements 2-5 CLASSIFYING TRAFFIC WITH CLASS MAPS 2-6 MODELING ROUTER QOS CONFIGURATION WITH POLICY MAPS 2-6 COMPLETING THE NETWORK MODEL WITH SITES, ROUTERS, AND INTERFACES 2-7 CUSTOM APPLICATIONS 2-9 CONFIGURING QOS MONITORING FEATURES 2-9 CONFIGURING A MONITOR-QUEUING-MAP 2-9 Configuring Expected Queuing Delay and Loss 2-11 Configuring Corvil Bandwidth (CB) Measurement 2-12 Configuring Microburst Detection 2-13 CONFIGURING A MONITOR END-TO-END MAP 2-14 Cisco Bandwidth Quality Manager User Guide OL-11097-03 i CONFIGURING CLASS MAPS 2-16 CONFIGURING POLICY MAPS 2-21 CONFIGURING A SINGLE-CLASS POLICY MAP 2-22 CONFIGURING A MULTI-CLASS POLICY MAP 2-23 Configuring a Strict Priority Queuing Policy Map 2-23 Configuring a Weighted Fair Queuing (WFQ) Policy Map 2-26 Configuring a Low Latency Queuing (LLQ) Policy Map 2-29 CONFIGURING CUSTOM APPLICATIONS 2-32 CONFIGURING SITES, ROUTERS, AND INTERFACES 2-35 EDITING THE LOCAL SITE 2-36 Configuring a Local Site Router 2-37 Configuring a Local Site Router Interface 2-39 CONFIGURING A NEW REMOTE SITE 2-41 Configuring a Remote Site Router 2-44 Configuring a Remote Site Router Interface 2-45 Configuring Advanced Interface Settings 2-48 EDITING A REMOTE SITE 2-49 DELETING A REMOTE SITE 2-50 3 CONFIGURING NETWORK DEPLOYMENTS 3-1 OVERVIEW 3-1 BASIC ATM PVC, FRAME RELAY PVC, METRO ETHERNET, LEASED LINE DEPLOYMENT 3-1 BASIC MPLS VPN, INTERNET VPN, PRIVATE VPN DEPLOYMENT 3-8 VPN DEPLOYMENT WITH REDUNDANT LOCAL SITE CONNECTIVITY 3-15 VPN DEPLOYMENT WITH REDUNDANT REMOTE SITE CONNECTIVITY 3-15 DUAL-HOMED ATM PVC, FRAME RELAY PVC, METRO ETHERNET, LEASED LINE DEPLOYMENT 3-16 DUAL-HOMED MPLS DEPLOYMENT 3-22 HYBRID DEPLOYMENT 3-29 4 MONITORING NETWORK TRAFFIC 4-1 MONITORING DASHBOARD OVERVIEW 4-1 IDENTIFYING RECENT QUALITY ALARMS 4-2 IDENTIFYING THE TOP CONGESTED INTERFACES 4-3 IDENTIFYING WAN APPLICATION LEADERS 4-4 VIEWING SUMMARY INTERFACE AND CLASS RESULTS 4-5 Congestion Results 4-6 Top Applications Results 4-7 Microburst or Congestion Indicator, Corvil Bandwidth and Expected Delay and Loss Results 4-8 MONITORING CONGESTED INTERFACES 4-9 CONGESTION ANALYSIS OVERVIEW 4-9 SELECTING A REPORT PERIOD 4-13 Defining a Custom Report Period 4-14 SORTING THE CONGESTION ANALYSIS TABLE 4-14 FILTERING THE CONGESTION ANALYSIS TABLE 4-15 REPORTING CONGESTION ANALYSIS RESULTS 4-15 Cisco Bandwidth Quality Manager User Guide ii OL-11097-03 VIEWING INTERFACE AND CLASS CONGESTION 4-16 VIEWING ROUND TRIP DELAY AND LOSS 4-16 VIEWING INTERFACE MICROBURST AND CONGESTION INDICATOR MEASUREMENTS 4-18 VIEWING CLASS MEASUREMENTS 4-19 Expected Queuing Delay 4-20 Expected Queuing Loss 4-21 Microburst Detection 4-21 Congestion Indicator 4-23 Corvil Bandwidth – Delay 4-24 Corvil Bandwidth – Queue Length 4-25 VIEWING PRIORITY CLASS RESULTS 4-26 Corvil Bandwidth - Priority 4-26 Expected Priority Drops 4-27 MONITORING QUALITY ALARMS 4-28 SORTING THE QUALITY ALARMS TABLE 4-29 FILTERING THE QUALITY ALARMS TABLE 4-30 GENERATING A QUALITY ALARMS REPORT 4-30 MONITORING TRAFFIC INSIGHT RESULTS 4-31 TRAFFIC INSIGHT OVERVIEW 4-32 SELECTING A REPORT PERIOD 4-33 Defining a Custom Report Period 4-33 SORTING THE TRAFFIC INSIGHT TABLE 4-34 FILTERING THE TRAFFIC INSIGHT TABLE 4-34 REPORTING TRAFFIC STATISTIC RESULTS 4-35 VIEWING SUMMARY INTERFACE STATISTICS 4-35 VIEWING INTERFACE AND CLASS STATISTICS 4-36 CLASS STATISTICS OVERVIEW 4-36 IDENTIFYING MICROBURST MEASUREMENTS 4-38 IDENTIFYING INTERFACE AND CLASS TRAFFIC PATTERNS 4-40 Average Bit Rate Graph 4-40 Average Packet Rate Graph 4-41 Peak-to-Mean Ratio Graph 4-41 Packet Size Distribution Chart 4-42 IDENTIFYING TRAFFIC LEADERS 4-43 Viewing Top Applications 4-43 Viewing Top Talkers 4-44 Viewing Top Listeners 4-45 Viewing Top Conversations 4-46 5 ANALYZING NETWORK EVENTS 5-1 OVERVIEW 5-1 INVESTIGATING NETWORK EVENTS 5-2 ANALYZING AN EVENT 5-3 Defining and Applying Traffic Filters to Event Analysis Results 5-6 VIEWING EVENT CONGESTION ANALYSIS RESULTS 5-8 Corvil Bandwidth – Delay 5-8 Corvil Bandwidth – Queue Length 5-9 Expected Queuing Delay 5-9 Cisco Bandwidth Quality Manager User Guide OL-11097-03 iii Expected Queue Length 5-10 Expected Queuing Loss 5-11 VIEWING PRIORITY CLASS EVENT RESULTS 5-11 Corvil Bandwidth - Priority 5-11 Expected Priority Drops 5-12 IDENTIFYING EVENT TRAFFIC LEADERS 5-13 Viewing Top Applications 5-13 Viewing Packet Size Distributions 5-14 Viewing Top Talkers 5-15 Viewing Top Listeners 5-16 Viewing Top Conversations 5-17 IDENTIFYING THE SOURCE OF APPLICATION PERFORMANCE PROBLEMS 5-18 IDENTIFYING EVENT TRAFFIC PATTERNS 5-19 Average Bit Rate and Byte-counts Graphs 5-20 Average Packet Rate and Packet-counts Graphs 5-21 Active Flows Graph 5-22 IDENTIFYING EVENT MICROBURST MEASUREMENTS 5-22 IDENTIFYING NETWORK DELAY PROBLEMS 5-23 DISABLING EVENT DETECTION ON SELECTED INTERFACES 5-23 WORKING WITH MANUAL PACKET CAPTURES 5-23 SETTING DISK SPACE QUOTA FOR MANUAL AND EVENT ANALYSIS PACKET CAPTURES 5-29 SETTING A PACKET CAPTURE PASSWORD 5-29 USING MANUAL PACKET CAPTURE TO IDENTIFY EVENTS 5-30 6 BANDWIDTH SIZING 6-1 OVERVIEW 6-1 BANDWIDTH SIZING SUMMARY TABLE 6-2 SELECTING A REPORT PERIOD 6-5 Defining a Custom Report Period 6-5 SORTING THE BANDWIDTH SIZING TABLE 6-6 FILTERING THE BANDWIDTH SIZING TABLE 6-6 REPORTING BANDWIDTH SIZING RESULTS 6-6 VIEWING SIZING RESULTS 6-7 BANDWIDTH SIZING RECOMMENDATIONS 6-8 Single class Configuration Recommendations 6-8 Multi-class Configuration Recommendations 6-9 Priority Class in a Multi class Configuration Recommendations 6-9 Viewing the Sizing Graph 6-10 MONITORING SINGLE-CLASS SIZING REQUIREMENTS 6-11 MONITORING MULTI-CLASS SIZING REQUIREMENTS 6-12 IDENTIFYING NEW CLASS RESOURCE REQUIREMENTS 6-12 7 USING THE COMMAND LINE INTERFACE (CLI) 7-1 INTRODUCTION TO THE CLI
Recommended publications
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Interconnexion Et Routage Dans Les Systèmes Pair À Pair Salma Ktari
    Interconnexion et routage dans les systèmes pair à pair Salma Ktari To cite this version: Salma Ktari. Interconnexion et routage dans les systèmes pair à pair. domain_other. Télécom ParisTech, 2009. English. pastel-00005737 HAL Id: pastel-00005737 https://pastel.archives-ouvertes.fr/pastel-00005737 Submitted on 19 May 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Thèse présentée pour obtenir le grade de Docteur de l’École Nationale Supérieure des Télécommunications Spécialité : Informatique et Réseaux SALMA KTARI Interconnexion et routage dans les systèmes pair à pair Soutenue le 14 Décembre 2009 devant le jury composé de Isabelle Chrisment Rapporteurs Pascal Lorenz Maurice Gagnaire Examinateurs Sami Tabbane Yutaka Takahashi Invité Houda Labiod Directeur de thèse Artur Hecker Co-directeur de thèse ii À mon cher époux, À ma famille. iv Merci, Au terme de ce travail, je tiens à remercier mes directeurs de thèse, madame Houda Labiod et monsieur Artur Hecker qui m'ont accompagné dans ma recherche ces trois années. Un grand merci à Artur pour sa grande disponibilité et son suivi sérieux et parfois exigeant, qui m’ont été d’une aide précieuse.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • On the Design and Implementation of IP-Over-P2P Overlay Virtual Private
    DOI:10.1587/transcom.2019CPI0001 Publicized:2019/08/05 This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. 1 Invited Paper On the Design and Implementation of IP-over-P2P Overlay Virtual Private Networks Kensworth Subratie†, Saumitra Aditya†, Vahid Daneshmand†, Kohei Ichikawa††, and Renato Figueiredo† SUMMARY The success and scale of the Internet and its protocol IP has protocols (e.g. TLS [2], [3]). As a result, distributed spurred emergent distributed technologies such as fog/edge computing and applications that run across the Internet often must deal with new application models based on distributed containerized microservices. The Internet of Things and Connected Communities are poised to build on devices without public IPv4 addresses that are behind these technologies and models and to benefit from the ability to various NAT and firewall middleboxes and must create communicate in a peer-to-peer (P2P) fashion. Ubiquitous sensing, actuating secure transport sessions for communication. While these and computing implies a scale that breaks the centralized cloud computing issues are relatively easy to handle with client-server model. Challenges stemming from limited IPv4 public addresses, the need applications, they place a burden to applications where peer- for transport layer authentication, confidentiality and integrity become a burden on developing new middleware and applications designed for the to-peer communication is needed. network’s edge. One approach - not reliant on the slow adoption of IPv6 - Emerging distributed applications in edge/fog [4], [5] is the use of virtualized overlay networks, which abstract the complexities computing are poised to benefit from the ability for IoT and of the underlying heterogeneous networks that span the components of edge nodes to communicate in a peer-to-peer fashion.
    [Show full text]
  • Get Real: Print This
    Get Real: Print This http://www.corante.com/getreal/archives/032237print.html from Get Real by Marc Eisenstadt January 11, 2005 BitTorrent, eXeem, Meta-Torrent, Podcasting: "What? So What?" SUMMARY: The index that facilitates the sharing of files on a large scale is also the Achilles heel of peer-to-peer file-sharing, because it is vulnerable to litigation and closure. So what happens if the index is itself distributed? I try to get my head around the latest in peer-to-peer file sharing, and explain a bit about what I've learned, including the fact that BitTorrent's power rests in its 'swarm' distribution model, but not necessarily in your end-user download speed. What has this got to do with podcasting? (Answer: invisible P2P plumbing helps the podcasting wheel go round). [Warning: lengthy article follows]. First, some history (skip ahead to the next section if you're already bored with the Napster, Gnutella, KaZaa, and BitTorrent saga). Napster opened our eyes to the power of distributed file sharing on a massive scale. But it was closed down by lawsuits to stop it from listing copyrighted works for which the owners would naturally have preferred to collect royalties (there are thousands of commentaries on the pros and cons of such royalties, but that's not the focus of this posting). Successive generations of tools such as Gnutella, KaZaa, and now BitTorrent have created their own buzz, their own massive followings, their own headaches, and their own solutions to others' headaches. Here's my rundown of the 'big ideas' (and the people behind them): Napster (Shawn Fanning): This was the Mother of big-time peer-to-peer (P2P) file transfers, i.e.
    [Show full text]
  • Comparison of Virtual Networks Solutions for Community Clouds
    KTH Royal Institute of Technology Bachelor Thesis Comparison of Virtual Networks Solutions for Community Clouds Examiner: Vladimir Vlassov Author: Albert Avellana Supervisors: Paris Carbone, Hooman Peiro Information and Communication Technology School February 2014 KTH Royal Institute of Technology Abstract Information and Communication Technology School Bachelor Thesis Comparison of Virtual Networks Solutions for Community Clouds by Albert Avellana Cloud computing has a huge importance and big impact nowadays on the IT world. The idea of community clouds has emerged recently in order to satisfy several user expectations. Clommunity is a European project that aims to provide a design and implementation of a self-configured, fully distributed, decentralized, scalable and robust cloud for a community of users across a commmunity network. One of the aspects to analyze in this design is which kind of Virtual Private Network (VPN) is going to be used to interconnect the nodes of the community members interested in access cloud services. In this thesis we will study, compare and analyze the possibility of using Tinc, IPOP or SDN-based solutions such as OpenFlow to establish such a VPN. Acknowledgements I would like to express my gratitude to all those who gave me the possibility to do this thesis in KTH. Firstly, I would like to thank Vlad for the opportunity he gave me to do this thesis and for his support. Secondly, thanks to my thesis supervisors: Paris Carbone and Hooman Peiro, who guided me through the research, helped me and gave me recommendations during this period. Also, I would like to thank F´elixFreitag and Leandro Navarro from Universitat Polit`ecnica de Catalunya for supporting me from Barcelona and make this stay in Stockholm possi- ble.
    [Show full text]
  • Time-Limited Data Storing in Peer to Peer Networks Scherbakov Konstantin Spbsu Saint Petersburg, Russia [email protected]
    Time-limited data storing in peer to peer networks Scherbakov Konstantin SPbSU Saint Petersburg, Russia [email protected] coefficient of node’s usefulness for the whole network. ABSTRACT So nodes, that are more useful for the network, should have opportunity to use these mechanisms more often Different techniques of using peer to peer networks are and more completely. mentioned. The process of data distribution in peer to peer network by the single node’s initiative for purpose of further downloading by this node’s owner is UDD P2P network model described. A common model of special peer to peer Let’s assume that one person or group of persons have network (UDD network), developed for single node some u-data, that is very useful for this person or group initiated data distribution, with its main characteristics of persons, but not interesting for other participants of and used algorithms is introduced. Some ways of our future u-data distribution (UDD) p2p network. This improving existing peer to peer networks for the person wants to have access to this data from any place, purpose of compliance to UDD network specification where he can connect to internet (and to our UDD p2p are mentioned. Experimental results of single node’s network too). He also wants to have ability to extend his initiated data distribution in one of the existing peer to data storing time and he expects that there is some peer networks (with our improvements applied) are mechanism used in this network that prevents with high analyzed. probability his data from being deleted from all network nodes during its limited storing time.
    [Show full text]
  • HIP Based Mobility for Cloudlets
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Helsingin yliopiston digitaalinen arkisto Date of acceptance Grade Instructor: D.Sc. Miika Komu Supervisor: Prof. Sasu Tarkoma HIP based mobility for Cloudlets Juhani Toivonen Master’s thesis UNIVERSITY OF HELSINKI Department of Computer Science Helsinki, Wednesday 11th November, 2015 HELSINGIN YLIOPISTO — HELSINGFORS UNIVERSITET — UNIVERSITY OF HELSINKI Tiedekunta — Fakultet — Faculty Laitos — Institution — Department Faculty of Science Department of Computer Science Tekijä — Författare — Author Juhani Toivonen Työn nimi — Arbetets titel — Title HIP based mobility for Cloudlets Oppiaine — Läroämne — Subject Computer Science Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages Master’s thesis Wednesday 11th November, 2015 69 pages + 8 appendix pages Tiivistelmä — Referat — Abstract Computation offloading can be used to leverage the resources of nearby computers to ease the computational burden of mobile devices. Cloudlets are an approach, where the client’s tasks are executed inside a virtual machine (VM) on a nearby computing element, while the client orchestrates the deployment of the VM and the remote execution in it. Mobile devices tend to move, and while moving between networks, their address is prone to change. Should a user bring their device close to a better performing Cloudlet host, migration of the original Cloudlet VM might also be desired, but their address is then prone to change as well. Communication with Cloudlets relies on the TCP/IP networking stack, which resolves address changes by terminating connections, and this seriously impairs the usefulness of Cloudlets in presence of mobility events.
    [Show full text]
  • The Copyright Implications of Bittorrent Bob Rietjens *
    Volume 2, Issue 3, September 2005 Give and Ye Shall Receive! The Copyright Implications of BitTorrent * Bob Rietjens Abstract BitTorrent is a new type of P2P technology with which users download small pieces of a file, and then start uploading these small pieces to each other. This essay analyses whether using BitTorrent amounts to infringement of copyrights or related rights in different European jurisdictions. Although the essay will look specifically at BitTorrent, the arguments in this essay may apply to other P2P programs with similar technical properties. DOI: 10.2966/scrip.020305.327 This work is licensed with the Creative Commons Attribution-No Derivatives 2.5 Netherlands Licence, http://creativecommons.org/licenses/by-nd/2.5/nl/ This work is licenced under a Creative Commons Licence . * Ribbert Van der Kroft Advocaten, Amsterdam. Herengracht 514 1017 CC Amsterdam The Netherlands Tel 020 670 60 60 Fax 020 670 60 61 [email protected] (2005) 2:3 SCRIPT-ed 328 1. INTRODUCTION BitTorrent's peer-to-peer (P2P) "file-swarming" software currently uses more than a third of the Internet's bandwidth. 1 BitTorrent primarily owes its popularity to its fast download rates. It takes hours to download a ripped version of the latest episode of Desperate Housewives off Kazaa, but with BitTorrent it takes minutes. In some EU countries it is legal to download copyright protected content using P2P software under private copy exceptions. 2 As long as P2P users don’t upload, they are not liable for copyright infringement. But with BitTorrent, it is not possible to just download, as the idea behind BitTorrent is that users all download small pieces of the file, and then start uploading these small pieces to each other.
    [Show full text]
  • IT Policy N@Vi 「セキュリティ診断」のサポート製品情報 更新日:2015年8月15日
    IT Policy N@vi 「セキュリティ診断」のサポート製品情報 更新日:2015年8月15日 本紙では、IT Policy N@viの「セキュリティ診断」機能で診断可能なサポート製品情報について記載しています。(新規に追加された情報は「★」が付いています) セキュリティ診断 ウイルス対策ソフト診断(Windows) メーカー ソフトウエア名 バージョン Symantec AntiVirus Corporate Edition 8.x(※1) 9.x(※1) 10.x Symantec Client Security 3.x Symantec Endpoint Protection(※2) 11.0 Symantec 12.1 Norton Antivirus 2005 2006(※1) 2007(※1) 2008 2009 ウイルスバスター コーポレートエディション(※2) 7.3(※1) 8.0 10.0 10.5 10.6 トレンドマイクロ Trend Micro ビジネスセキュリティ 5.0 5.1 ウイルスバスター 2006(※1) 2007(※1) 2008(※1) 2009(※1) McAfee VirusScan Enterprise(※2) 8.5i(※1) 8.7i 8.8 マカフィーインターネットセキュリティ 2009 2010 2011 2012 マカフィートータルプロテクション 2009 McAfee 2010 2011 2012 マカフィーウイルススキャンプラス 2007(※1) 2008(※1) 2009(※1) マカフィーアンチウイルスプラス 2010 2011 2012 Microsoft Windows Defender Windows8搭載バージョン(※4) 2013/7/16追加 (※1) 各メーカーでサポートが終了している製品をインストールしている場合、IT Policy N@viのセキュリティ診断結果は「有効期限切れ」でNGと診断されます。 (※2) ウイルス対策ソフトのセキュリティ診断機能において、特定の診断が可能な製品は以下の通りです。 ■「ウイルス定義ファイルの更新日を診断する」 全ての製品で診断が可能です ■「定時スキャンの実行状況を診断する」 全ての製品で診断が可能です ■「スキャン対象ドライブ(すべてのドライブが対象になっているか)をチェックする」 Symantec Endpoint Protection / McAfee VirusScan Enterprise ■「ウイルス定義ファイルが古い場合に自動更新を促す」 Symantec Endpoint Protection / McAfee VirusScan Enterprise ■ウイルス検知時にIT Policy N@viのアラートを発行する Symantec Endpoint Protection / ウイルスバスター コーポレートエディション (※3) 上記に記載されていないウイルス対策ソフトについても、WindowsOSの機能である「セキュリティセンター(Windows XP /Vista)」および「アクションセンター(Windows 7)」 から情報取得できるウイルス対策ソフトについて、「ウイルス対策ソフトのインストール有無」「ウイルス定義ファイルの更新」「リアルタイム保護設定」が診断可能です。 ご利用のウイルス対策ソフトが「セキュリティセンター」「アクションセンター」に対応しているかどうかについては、ウイルス対策ソフトメーカー各社のHP等をご参照ください。 (※4) Microsoft Windows Defenderは「インストール有無
    [Show full text]
  • Ahistory of ONLINE GATEKEEPING
    Harvard Journal of Law & Technology Volume 19, Number 2 Spring 2006 A HISTORY OF ONLINE GATEKEEPING Jonathan Zittrain* TABLE OF CONTENTS I. INTRODUCTION..............................................................................253 II. TWO KINDS OF GATEKEEPERS .....................................................254 III. EARLY APPLICATIONS OF GATEKEEPING ONLINE: SUPPLEMENTS TO EXISTING PRIVATE MONITORING AND ENFORCEMENT REGIMES ..............................................................257 IV. LIMITED GATEKEEPING CONTINUES AS THE INTERNET MATURES: COPYRIGHT INFRINGEMENT, ISPS, AND OSPS............263 V. LIMITED GATEKEEPING IS TESTED AS THE INTERNET DEVELOPS FURTHER: COPYRIGHT INFRINGEMENT, PEER- TO-PEER SERVICES, AND RENEWED CONSIDERATION OF DUTIES TO PREEMPT OR POLICE ...................................................271 VI. GATEKEEPING ON THE GRID: GROKSTER AS FORBEARANCE..............................................................................286 VII. THE END OF REGULATORY FORBEARANCE?: FROM KRAAKMAN’S GATEKEEPERS TO LESSIG’S GATEKEEPERS ...........294 VIII. CONCLUSION............................................................................298 I. INTRODUCTION The brief but intense history of American judicial and legislative confrontation with problems caused by the online world has demon- strated a certain wisdom: a reluctance to intervene in ways that dra- matically alter online architectures; a solicitude for the collateral damage that interventions might wreak upon innocent activity; and, in the balance, a refusal
    [Show full text]