Premium Essay

Ftp Download Response Time

In:

Submitted By soran
Words 652
Pages 3
Ethernet Load (Server Load):
Ethernet Load can be called also server load. It is presented as a number which values start from 0.00. This procedure represent the number of processes that queuing for getting permission to access the processor(s), which are measured in certain period of time.If a large number of processes occur at the same time the response time is consequently much higher (Lemnaru, 2010).
Increasing of a network can have an impact on the server load and Ethernet delay, but this is not the case in some circumstances. The expansion of the network also affects the server load and Ethernet delay. In the Initial simulation (first-floor), carried for this report, consisted 30 workstations which were used over a time period of 30 minutes. Afterwards other 2 groups of workstations, each consisted of 15 workstations, was added. On Figure 5 the first floor scenario (red line), the expansion scenario (blue line) and second floor (green line) are presented.
The expansion scenario is higher than first floor scenario. This tendency was expected, as an result of an increase of workstations in the expansion which caused a delay in the Ethernet load. The first floor, second floor and expansion scenario start rising from the same point (0 bits/sec). However, expansion and second floor scenarios reach higher level than first floor scenario, because they have a longer load delay than the first floor. Nevertheless, after reaching the highest pick amplitudes of all 3 scenarios tend to level off towards the end, to denote a stable network.

Figure 5 Server or Ethernet Loads(bits/sec)
According to the result that appeared in Figure 5; in the first floor scenario the amount of the load that caused by thirty hosts is approximately 6,000bits/sec. The expansion scenario with fifteen hosts added server load is to nearly 8,850bits/sec. For the second floor reaches the

Similar Documents

Free Essay

The Modified Parallelized File Transfer Protocol for

...transfer standard. This FTP can let a computer system connect to the internet via a communication network, and it can also access the system resources from the internet. File server is being downloaded now by TCP/IP protocol, while before it was downloaded by signal server. Due to the limited flow control, the old method could not use download time efficiently. In order to solve the flow control problem, some researchers came up with a distributed file transfer method that can share the document with other users, thus allowing the shortest transfer time using neighboring servers. Although the distributed file transfer can reduce the file transfer time, it was not concerned with the quality of the transfer between two servers, and was inappropriate for file segmentation and transfer, so the file transfer could not attain the optimal transfer efficacy. Based on our research, we propose a new method called Distributed Parallelized File Transfer Protocol (DPFTP). This method is based on Parallelized File Transfer Protocol (P-FTP) and is beneficial to multi-users, as it utilizes server loading and reduces the download time. Keywords—FTP; P-FTP; DPFTP ; multi-users; (Autonomous System) P-FTP server in the center of the area and message passing to allow the client to download from multiple file servers by parallel transfer. The P-FTP file transfer protocol, divided into three parts performance, includes the client, PFTP server and mirror servers; the P-FTP flow chat as shown in fig...

Words: 4505 - Pages: 19

Free Essay

Network Opnet Manual

...system planners, and operation’s staff to more effectively diagnose difficult problems, validate changes before they are implemented, and plan for future scenarios such as traffic growth and network failures. You can do “what if” analyses (called scenarios in IT Guru) on network designs, just as you can on spreadsheets with financial business models. However, instead of looking at “bottom line” financial numbers, you will be looking at how response times, latency (delays) and other network performance measures will change under different network design approaches. To create a network simulation (called a project in IT Guru), you specify the nodes (computers, switches, routers, etc.) in your network, the links between nodes, and the applications that will be running on the nodes. In this exercise, the initial simulation (project) has been built for you. It models a family’s ITCE 416: OPNET IT Guru Lab, Page 1 home PC network, which has three PCs connected to the Internet for game playing; web browsing, E-mail, audio streaming, and FTP (file transfer protocol). Your objective will be to conduct a series of what-if simulations (scenarios) to see how performance differs if the family connects to the...

Words: 5307 - Pages: 22

Premium Essay

Computer

...Simulation tab (the running man) from the tool bar. The following screen will open. 2. Set the Duration to 4 (if it is not set) and change hour(s) to minute(s). 3. Click Apply and Cancel. 4. Go to File > Save, to save your configuration. 5. Before we duplicate the scenarios, now would be a good time to run the first simulation to ensure we have all the configurations made correctly. Once we copy them over to the PQ and WFQ scenarios, if something is configured incorrectly, that mistake will be transferred over. 6. Select the running man icon again to bring up the Configuration/Run Discrete Event Simulation panel again and click Run. The Simulation Execution window will open and the sim will start. 7. When the Sim completes and the Close window lights, click it to end. 8. We are now ready to look at the results. From the tool bar, select the icon to the right of the Run icon, View Results. The Results Browser will appear. 9. In the lower left pane, expand Global Results. Then Expand Select FTP Download Response Time (sec) Traffic Received (packets/sec) Traffic Sent (packets/sec) You should see something like this. 10. Note that FTP is performing as we configured with periodic bursts...

Words: 2594 - Pages: 11

Free Essay

Implementation and Analysis of a Wide Area Network

...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................

Words: 1948 - Pages: 8

Premium Essay

Bandidth Agregator

...Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet access bandwidth. Broadband technologies such as DSL and cable modem are being deployed rapidly in metropolitan areas but many Internet users will not have access to such technologies for years to come. These users are actively seeking ways to increase their bandwidth today. Even users that do have broadband access often need more bandwidth than is available with a single connection. One solution open to such users is bandwidth aggregation. By combining more than one single Internet connection, users can accumulate enough bandwidth to meet their exact needs. There are different ways to aggregate bandwidth, each with its advantages and disadvantages. This document was written to help you understand the differences and choose the technology best suited to your needs. We are presenting this information in a Q&A (Questions and Answers) format that we hope will be useful. Our knowledge of this subject relates to Internet connectivity in general, and stems from our own TCP/IP routing technology. We are providing the best information available to us as of the date of this writing and intend to update it at frequent intervals as things change and/or more information becomes available. However we intend this Q&A as a guide only and recommend that users obtain specific information to...

Words: 2534 - Pages: 11

Premium Essay

Information Tecnology

...worldwide network of news discussion groups. ADVANTAGE- It is also easier to find a newsgroup, and they sometimes have a moderator, who is someone who makes sure that things stay on track and do not disintegrate into something that is socially unpleasant. DISADVANTAGE- A newsgroup is not as quick as an email or even a mailing list. Very often there will be a delay of at least a day, often longer, before a response is given. C. IRC: Internet Relay Chat (IRC) is an application layer protocol that facilitates the transfer of messages in the form of text. The chat process works on a client/server networking model. IRC clients are computer programs that a user can install on their system. ADVANTAGE- IRC's channel paradigm is very flexible and robust: allows for real- time discussion with up to hundreds of people at once....

Words: 2374 - Pages: 10

Premium Essay

Networking

...Abstract AAS-Design AAS-Design is a North American fashion label specializing in luxury goods for men and women (ready-to-wear, leather accessories, shoes, luggage and hats), founded in 1990 by Abel, Angus and Satish in Virginia Beach, Virginia. Fulana inherited the company in 1995 by which time sales were up to U.S. $450,000. With John alongside her as business manager, Fulana was allowed time to implement her creativity onto design. Initial success was not instant, as they were hard to sell due to the lack of advertising and high-prices, but later become her first commercial hit. Description of technology and Communications Need: IT Department The IT Department is in the third floor of corporate building. From this place the IT department offer supports to the entire corporate building and the rest of the store in U.S. The implementation of news technology indicates the degree of business transformation varies significantly between firms. Improving processes usually involves implementing systems and process management across business function boundaries rather than within functions. IT infrastructure investments can be a constraint where systems are not compatible, or where inconsistent data models have been used in different parts of the business. (Broadbent, M., Weill, P., Clair, Don St, 1999) As companies grow, their IT Infrastructure evolves, requiring additional capacity and process efficiencies. The IT infrastructure required to support a company's operations...

Words: 4651 - Pages: 19

Premium Essay

Jon Jons

...World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions. Use this link to answer the following questions: Which versions support Tilt and 3D rotation? __________________________ Which Google Earth version supports the highest resolution? __________________________ To use Google Earth, version 4, minimum computer hardware requirements must be met: Operating System CPU System Memory (RAM)...

Words: 60675 - Pages: 243

Free Essay

Netw320 W3 Lab

...network that allows data and real-time voice traffic to traverse the same packet-switched network. The data traffic will consist of FTP (file transfer protocol) and email traffic and the voice traffic will be a VoIP (Voice over Internet Protocol) implementation. You will experiment with various router queuing policies to see how routers within a TCP/IP network can be utilized to support QoS (Quality of Service) within a converged network that is based on TCP/IP. Explanation and Background Traditional voice and data applications have been kept on separate networks. The voice traffic is confined to a circuit-switched network while data traffic is on a packet-switched network. Often, businesses keep these networks in separate rooms, or on different floors, within buildings that they own or lease (and many still do). This requires a lot of additional space and technical manpower to maintain these two distinct infrastructures. Today’s networks call for the convergence of these circuit-switching and packet-switching networks, such that voice and data traffic will traverse a common network based on packet switching. A common WAN technology used for this purpose is TCP/IP because it operates at Layer 3. It is capable of delivering voice and data services right to the desktop. However, voice and data traffic require different quality of service guarantees, because voice is interactive and takes place in real time, whereas data traffic is non-real-time and can tolerate delays to a much...

Words: 2956 - Pages: 12

Premium Essay

Internet Ages

...CHAPTER – 1 INTRODUCTION TO INTERNET WHAT IS A NETWORK? [pic] A network is a group of computers that are able to communicate with one another and share data, files, programs, and operations. The computers in a network are connected via hardware and software. The hardware is what physically connects the computers in the network together. For example: telephone lines, fibre-optic cables, routers and gateways, and the computers themselves. The software is what enables us to use the hardware for communication and exchanging information. Just as your brain tells your body parts how to function and work together, the software governs the way computers in the network communicate with each other and perform functions. Software that enables networking follows a set of rules that are generally referred to as protocol. Networks can be interoperable. This means that different types of computers, using different operating systems, can be connected, communicate with each other, and share information - as long as they follow the network protocols. [pic] In Summary: A network is a group of two or more computers, connected together through a physical infrastructure, that are able to communicate and exchange information because they agree to use software that observes the same set of rules, or protocol. WHAT IS THE INTERNET? • A network of networks • Based on TCP/IP (Transmission Control Protocol/Internet Protocol) • Global • A variety of services and...

Words: 48401 - Pages: 194

Free Essay

Secure Vpn

...flavors of LINUX. GRUB/LILO can receive many different kernel level commands and it poses a major security risk if an attacker is able to compromise the kernel. In response you can make sure that only authorized users are able to perform those commands by password protecting during the installation process. If using GRUB, the password is by default stored as clear text, and so you will want modify the /etc/grub.conf file to store the password in an MD5 checksum. $ /sbin/grub–md5–crypt Password: (at the prompt enter the GRUB password you created at installation and press enter) $ #%t%661GFGftffgctTFTDd (This is the MD5 hash) edit the grub.conf file and replace the clear text password with the MD5 Hash. You must use the –MD5 option or the password will be stored as the MD5 Hash and not the encrypted password. Password – md5 $1$m0tLR/ $#%t%661GFGftffgctTFTDd Partitioning Partitioning correctly will help to mitigate against one specific type of denial of service. For example and attack designed to fill up a /tmp or spool directory. If your files are on the same partition as the directory under attack, your system could be rendered unusable. One should use a partition strategy where those directories that are most likely to be filled by an attacker. Typically this is /var and /home . If you are using a server for ftp or e–mail, you may want to consider separate partitions for the application specific files. /boot contains all files for boot process /home contains individual user...

Words: 5898 - Pages: 24

Premium Essay

Ciw Foundations Guide

...CIW Foundations Study Guide | Internet Fundamentals The Internet, sometimes called simply "the Net," is a worldwide system of computer networks composed of other networks and individual computers in which users at any one computer can, if they have permission, get information from any other computer. The internet makes use of the TCP/IP protocol suite (to be covered later) in order to perform connections and communication. The technical coordinating body of the internet is ICANN. Network Solutions used to be responsible for assigning domain names and IP addresses. This function has now been taken over by Internet Corporation for Assigned Names and Numbers(ICANN) which is a division of the U.S. Department of Commerce. Network Solutions still maintains the master database of all domain names and IP addresses. Each distinct version of an Internet standards-related specification is published as part of the "Request for Comments" (RFC) document series. RFCs cover a range of topics in addition to Internet Standards, from discussions of new research concepts to memos about the status of the Internet. World Wide Web While the internet is a collection of interconnected networks and computers, the World Wide Web is the portion of the internet comprised of massive collections of files and resources that are accessible via a web browser. Client computers using a web browser send HTTP requests to a web server which returns the requested file to the client's web browser as...

Words: 8373 - Pages: 34

Free Essay

Save Documents and Software of Video Meeting

...start working on your computer at school or the office, and finish on your home computer. Never email yourself a file again!(1) 2.1.2. Drop Box (for business) The space is 1,000 GB when you start to use it. If you run out, tell them and they will increase it for free. It support WORD、EXCEL、POWER POINT、PDF etc. The files are stored using 256-bit AES(Advanced Encryption Standard)encryption, and SSL(Secure Sockets Layer) creates a secure tunnel for data transfers. You can remotely unlink the device to prevent anyone from accessing files if your phone is lost or stolen. It can avoid the important information lost. When you send the e-mail with the large files, you should zip. If you create a link to the files in Dropbox, you can view or download the...

Words: 2947 - Pages: 12

Premium Essay

Network

...Business Dilemma Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype surveillance system, the researchers could track someone wearing Nike+iPod sensors, plot their location on a GoogleMaps-based website and emai and text-messaging real-time surveillance data to anyone.PROJECT FOCUS:You are interested in deploying sensor technology in the cafe to help revamp operations. How would you address the following: * Many cafes are putting sensors on the...

Words: 2881 - Pages: 12

Free Essay

Sky X Technology

...SKY X TECHNOLOGY ======================= Satellites are attractive option for carrying internet and other IP traffic to many locations across the globe where terrestrial options are limited or [censored] prohibitive. But data networking on satellite is faced with overcoming the large latency and high bit error rate typical of satellite communications as well as the asymmetric bandwidth design of most satellite network. Satellites are ideal for providing internet and private network access over long distance and to remote locations. However the internet protocols are not optimized for satellite conditions. So the throughput over the satellite networks is restricted to only a fraction of available bandwidth. Mentat, the leading supplies of TCP/IP to the computer industry have overcome their limitations with the development of the Sky X product family. The Sky X system replaces TCP over satellite link with a protocol optimized for the long latency, high loss and asymmetric bandwidth conditions of the typical satellite communication. The Sky X family consists of Sky X Gateway, Sky X Client/Server and Sky X OEM products. Sky X products increase the performance of IP over satellite by transparency replacing. The Sky X Gateway works by intercepting the TCP connection from client and converting the data to Sky X protocol for transmission over the satellite. The Sky X Client /Server product operates in a similar manner except that...

Words: 5566 - Pages: 23