SlideShare a Scribd company logo
Network Application
Performance
Deke Kassabian and Shumon Huque
ISC Networking & Telecommunications
February 2002 - Super Users Group
Introduction
What this talk is all about
 Network performance on the local area
network and around campus
 Network performance in the wide area and
for advanced applications
Goal: acceptable performance, positive
user experience
Who needs to be involved?
End Users
Researchers
Local Support Providers
Application Developers
System Programmers/Administrators
Network Engineers
What is performance?
“Performance” might mean …
 Elapsed time for file transfers
 Packet loss over a period of time
 Percentage of data needing retransmission
 Drop outs in video or audio
 Subjective “feeling” that feedback is “on
time”
Throughput
Throughput is the amount of data that
arrives per unit time.
“Goodput” is the amount of data that
arrives per unit time, minus the amount
of that data that was retransmitted.
Delay
Delay is a time measurement for data
transfer
 One way network delay for a bit in transit
 Delay for a total transfer
 Time from mouse click to screen message
that the “operation is complete”
NIC to NIC
Stack to Stack
Eyeball to eyeball
Jitter
Variation in delay over time
 Non-issue for non-realtime applications
 May be problematic for some applications with real-time
interactive requirements, such as video conferencing
 E2E delay of 70 ms +/- 5 ms -> low jitter
 E2E delay of 35 ms +/- 20 ms -> higher jitter
Some Contributors to Delay
Slow networks
Slow computers
Poor TCP/IP stacks on end-stations
Poorly written applications
Analysis of Delay
A B
(1)Insertion time
(2) Propagation Delay
(3) Processing Delay
Analysis of Delay
A B
(1)Insertion time
(2) Propagation Delay
(3) Processing Delay
Send 1,000 bits from A to B,
With an acknowledgement,
Over 100 meters of fiber
0.0001 sec
0.0000004 sec
0.01 sec
From: Deke
To: Ira
Date: Mon Feb 12, 2002, 11:00AM EST
Subject: Lunch
Hey Ira,
Meet you at the food trucks at noon!
^Deke
Analysis of Delay
A B
Send 1,000 bits from A to B,
With an acknowledgement,
Over 100 meters of fiber
•Data Insertion • 0.0001 sec
•Propagation • 0.0000004 sec
•Processing (B) • 0.01 sec
•Ack Insertion • 0.001 sec
•Propagation • 0.0000004 sec
•Processing (A) • 0.01 sec
Total Elapsed Time: 0.0211008 secondsTotal Elapsed Time: 0.0211008 seconds
Analysis of Delay
A BAdd 2 switches and a
router to the path
New Total Elapsed Time: 0.0231408 secondsNew Total Elapsed Time: 0.0231408 seconds
S S
R
Add 0.00002 secAdd 0.00002 sec Add 0.00002 secAdd 0.00002 sec
Add 0.002 secAdd 0.002 sec
Summary of Delay Analysis
Propagation delay is of little consequence in LANs,
more of an issue for high bandwidth WANs.
Queueing delays are rarely major contributors.
Processing delay is almost always an issue.
Retransmission delays can be major contributors to
poor network performance.
Speaker Change
What I’m going to talk about
More on delay contributors, their causes and
how to minimize them
Protocol Stack behavior & tuning
Quality of Service (QoS)
Performance measurement tools
Operating System tuning examples
General comments about things you can do
Recap: Delay Contributors
Processing Delay
Retransmission Delay
Queueing Delay
Propagation Delay
Processing Delay
Time it takes to process a packet at an end-
station or network node. Depends on:
 Network protocol complexity, application code,
computational power at node, NIC efficiency etc
Endstation Tuning
Application Tuning
Endstation Tuning
Good network hardware/NICs
Correct speed/duplex settings
 Auto-negotiation problems
Sufficient CPU
Sufficient Memory
Network Protocol Stack tuning
 Path MTU discovery, Jumbo Frames, TCP
Window Scaling, SACK etc
Ethernet Bandwidth/Duplex mode
Ethernet bandwidth: 10, 100, 1000
 10 Gigabit Ethernet soon
Duplex modes: half-duplex, full-duplex
Auto-Negotiation
Mismatch Detection:
 CRC/Alignment errors
 Late Collisions
Application Tuning
Optimize access to host resources
Pay attention to Disk I/O issues
Pay attention to Bus and Memory issues
Know what concurrent activity may be
interfering with performance of app
Tuning application send/receive buffers
Efficient application protocol design
Positive end user feedback
 Subjective perception of performance
Retransmission Delay
Causes
 Packet loss
 Bad hardware: NICs, switches, routers, transmission
lines
 Congestion and Queue drops
 Out of order packet delivery
 May be considered packet loss from application’s
perspective if it can’t re-order packets
 Untimely delivery (delay)
 Some apps may consider a packet to be lost if they don’t
receive it in a timely fashion
Retransmission Delay (cont)
Mitigating retransmission delay
 Ensure working equipment
 Although some packet loss is unavoidable; eg. most
transmission lines have a BER (Bit Error Rate)
 Reduce time to recover from packet loss
 Eg. Highly tuned network stack with more aggressive
retransmission and recovery behavior
 Forward Error Correction (FEC)
 Very useful for time/delay sensitive applications
 Also, for cases when it’s expensive to retransmit data
Bit Errors on WAN paths
Bit Error Rate (BER) specs for networking
interfaces/circuits may not be low enough:
 1 bit-error in 10 billion bits
 Assuming 1500 byte packets
 Packet error rate: 1 in 1 million
 10 hops => 1 in 100,000 packet drop rate
Queueing Delay
Long queueing delays could be caused
by lame hardware (switches/routers)
 Head of line blocking
 Insufficient switching fabric
 Insufficient horse power
Unfavorable QoS treatment
Queueing Delay (cont)
How to reduce
 Use good network hardware
 Improved network architecture
 Reduce number of switching/routing elements on the
network path
 Richer network topology, more interconnections
 End user may not have influence over architecture
 Employ preferential queue scheduling algorithms
 Will discuss later in QoS section of talk
Propagation Delay
Restricted by speed of light through
transmission medium
 Can’t be changed, but rarely a concern in
the campus/LAN environment
 A concern in long distance paths (WAN),
but
 Some steps can be taken to increase
performance (throughput) on such paths
Other delays and bottlenecks
Intermediary systems
 DNS
 Routing issues
 Route availability, asymmetric routing, routing
protocol stability and convergence time
 Firewalls
 Tunnels (IPSec VPNs, IP in IP tunnels etc)
 Router hardware poor at encap/decap
Throughput
Influenced by a number of variables:
 All the delay factors we discussed
 Window size (for TCP)
 Bottleneck link capacity
 End station processing and buffering
capacity
What I’m going to talk about next
• Brief description of TCP/IP protocol
• How to improve TCP/IP performance
Transport: TCP vs UDP
Network apps use 2 main transport protocols:
TCP (Transmission Control Protocol)
 Connection oriented (telephone like service)
 Reliable: guarantees delivery of data
 Flow control
 Examples: Web (HTTP), Email (SMTP, IMAP)
UDP (User Datagram Protocol)
 Connectionless (postal system like)
 Unreliable: no guarantees of delivery
 Examples: DNS, various types of streaming media
When to use TCP or UDP?
Many common apps use TCP because it’s
convenient
 TCP handles reliable delivery, retransmissions of lost
packets, re-ordering, flow control etc
You may want to use UDP if:
 Delays introduced by ACKs are unacceptable
 TCP congestion avoidance and flow control measures
are unsuitable for your application
 You want more control of how your data is transported
over the network
 Highly delay/jitter sensitive apps often use UDP
 Audio-video conferencing etc
Network Stack Tuning
Jumbo Frames
Path MTU Discovery
TCP Extensions:
 Window Scaling - RFC 1323
 Fast Retransmit Fast Recovery
 Selective Acknowledgements
Jumbo Frames
Increase MTU used at link layer, allowing
larger maximum sized frames
Increases Network Throughput
Fewer larger frames means:
 Fewer CPU interrupts and less processing overhead for
a given data transfer size
Some studies have shown Gigabit Ethernet
using 9000 byte jumbo frames provided 50%
more throughput and used 50% less CPU!
 (default Ethernet MTU is 1500 bytes)
Jumbo Frames (cont)
Pitfalls:
 Not widely deployed yet
 Many network devices may not be capable of jumbo
frames (they’ll look like bad frames)
 May cause excessive IP fragmentation
 BER may have more impact on jumbo frames
 Eg. A single bit-error can cause a large amount of data to
be lost and retransmitted
 May have negative impact on host processing
requirements:
 More memory for buffering, newer NICs
Path MTU Discovery
MTU (Max Transmission Unit)
 Max sized frame allowed on the link
Path MTU
 Min MTU on any network in the path between 2 hosts
IP Fragmentation & Reassembly
Path MTU Discovery
MSS (Max Segment Size)
What happens without PMTU discovery?
 Might select wrong MTU and cause fragmentation
 Suboptimal selection of TCP MSS (536 default?)
Path MTU Discovery (cont)
A
B
R1
R3
R2
MTU=4474
MTU=9000
MTU=1500
MTU=9000
Path MTU is 1500
IP fragmentation may occur
TCP Sliding Window
TCP uses a flow control method called
“Sliding Window”
 Allows sender to send multiple segments before it
has to wait for an ACK
 Results in faster transfer rate coz sender doesn’t
have to wait for an ACK each time a packet is sent
 Receiver advertises a window size that tells the
sender how much data it can send without waiting
for ACK
TCP Sliding Window (cont)
Slow Start
In actuality, TCP starts with small window and
slowly ramps it up (upto rwin)
Congestion Window (cwnd)
 controls startup and limits throughput in the face of
congestion
 cwnd initialized to 1 segment
 cwnd gets larger after every new ACK
 cwnd gets smaller when packet loss is detected
Slow Start is actually exponential
Congestion Avoidance
Assumption: packet loss is caused by
congestion
When congestion occurs, slow down
transmission rate
 Reset cwnd to 1 if timeout
 Use slowstart until we reach the half way point
where congestion occurred.
 Then use linear increase
 Increase cwnd by ~ 1 segment/RTT
TCP Behavior
Recovery after a loss can be very slow
on today’s high delay/bandwidth links
 (graph from Peter O’Neill, NCAR)
CWND
slow start:
exponential
increase
congestion
avoidance:
linear
increase
packet loss, D-ACK
time
retransmit:
slow start
again
timeout
TCP Throughput Acceleration
rtt (msec) 0-100Mbps (sec)
5 0.216
10 0.864
20 3.45
50 21.6
100 86.4
200 345
(From Phil Dykstra)
TCP Window Size Tuning
TCP performance depends on:
 Transfer rate (bandwidth)
 Round trip time
BW*Delay product
TCP Window should be sized to be at
least as large as the BW*Delay product
BW*Delay Product
BW*Delay product measures:
 Amount of data that would fill the network
pipe
 Buffer space required at sender and
receiver to achieve the max possible TCP
throughput
 Amount of unacknowledged data that TCP
must handle in order to keep pipe full
BW*Delay example
A path from Penn to Stanford has:
 Round trip time: 60 ms
 Bandwidth: 120 Mbps
BW * Delay =
 60/1000 sec * 120 * 1000000 bits/sec
 = 7200000 bits = 7200 Kbits
 = 900 Kbytes
So TCP window should be at least 900KB
TCP Window Scaling
RFC 1323: TCP Extensions for High
Performance
Allows scaling of TCP window size beyond
64KB (16 bit window field)
 Introduces new TCP option
Note: In previous example, TCP needs to
support Window Scaling to use 900KB
window
Window Scaling Pitfalls
Why not use large windows always?
 Might consume large memory resources
 May not be useful for all applications
 Isn’t useful in the campus/LAN
environment
Fast Retransmit Fast Recovery
TCP required to send immediate D-ACK when out-of-
order packet received
After 3 D-ACKs, sending TCP retransmits only one
segment
Also perform congestion avoidance but not slow start
1 2 73 4 5 6
Packet loss, causing D-ACK
TCP Selective Acks (SACK)
RFC 2018
Allows TCP to efficiently recover from
multiple segment losses within a
window
Without retransmitting entire window
Enough about TCP
Performance depends on App
So, understand application’s requirements
(high throughput, low latency, low jitter), eg:
 File Transfer using TCP
 Needs high throughput
 Intolerant of packet loss
 May be more tolerant of delay
 Interactive Video Conferencing application
 Tolerant of some loss
 More intolerant of delay and jitter
Quality of Service (QoS)
A method to selectively allocate scarce
network resources
A mechanism to offer varying degrees of
service to varying classes of traffic
Service: delay, jitter, proportion of link
bandwidth etc
Quality of Service (QoS) cont
Requires deployed QoS infrastructure
 Might require
 Traffic marking capabilities in hosts and network
hardware
 Traffic classification and identification capabilities
 Multiple traffic queues with different service
characteristics
 Different queue servicing algorithms
 Mechanisms to specify and enforce QoS policy
 Signalling mechanisms
IEEE 802.1p, IP precedence, IntServ/RSVP,
DiffServ, MPLS
Performance Measurement Tools
To measure “real” performance of an
app, you need to instrument the app
with measurement code!
However, independent measurement of
some common network perf metrics can
be done
Two kinds:
 Active and Passive measurement
Active Measurement
Ping
Traceroute
Netperf http://www.netperf.org/
Iperf http://dast.nlanr.net/Projects/Iperf/
Pathchar ftp://ftp.ee.lbl.gov/pathchar/
Pathrate http://www.pathrate.org/
Mping
Passive Measurement
OCxMON/PCMon
Router/switch stats collected via
 SNMP
 Netflow, etc
tcpdump, snoop, etherfind
Some tuning examples
Microsoft Windows
 Newer versions: Win98, Win2K, WinXP
support many of the features (window
scaling, PMTU discovery, SACK etc)
 May require registry tweaks to turn some of
them on
 TCPTune: A TCP Stack Tuner for Windows
 http://moat.nlanr.net/Software/TCPtune/
More tuning examples
MacOS X
 [need to find out more, who knows?]
 Supports window scaling:
 $ sysctl net.inet.tcp.rfc1323
 net.inet.tcp.rfc1323: 1
 Socket buffer raising:
 Kernel tunable kern.ipc.maxsockbuf
 TCP send/receive buffer tuning:
 Tunables supported:
 net.inet.tcp.sendspace
 net.inet.tcp.recvspace
More tuning examples
Linux
 In /proc/sys/net/core/ set:
 rmem_default
 rmem_max
 wmem_default
 wmem_max
 In /proc/sys/net/ipv4 set:
 tcp_windowscaling
 tcp_sack
More tuning examples
Solaris 2.x - 8
 ndd -set /dev/tcp tcp_max_buf xxx
 ndd -set /dev/tcp tcp_xmit_hiwat xxx
 ndd -set /dev/tcp tcp_recv_hiwat xxx
 ndd -set /dev/ip ip_path_mtu_discovery 1
 ndd -set /dev/tcp tcp_sack_permitted 2
Web100 Project
http://www.web100.org/
Enhance TCP capabilities with:
 Better (finer grain) kernel instrumentation
 Automatic controls
Availability:
 Today: Linux (patches for 2.4.16 kernel)
 Being ported to other operating systems.
Things you can do (WAN)
Make sure app offers adequately sized
receive windows and send buffers
But don’t run your system out of memory
Find out your path RTT with ping
Check your path with traceroute
Determine bottleneck capacity and available
bandwidth on path
Make sure your OS uses Path MTU discovery
Make sure your OS uses TCP Large
Windows, Fast Retransmit, SACK
Things you can do (Campus)
Check your host
 (80% of the problems)
Check your host
 Bandwidth/Duplex problems
 Network stack tuning
 Application tuning
Talk to campus networking folks
Conclusion
Understand performance requirements
of your application
What are the issues?
 Campus/LAN environment
 WAN environment
What can you do to ask for help?
Any Questions?
Deke Kassabian
 deke@isc.upenn.edu
Shumon Huque
 shuque@isc.upenn.edu

More Related Content

What's hot

Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
muhammad amir
 
Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
Data Communication And Networking - DATA & SIGNALS
Data Communication And Networking - DATA & SIGNALSData Communication And Networking - DATA & SIGNALS
Data Communication And Networking - DATA & SIGNALS
Avijeet Negel
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
Computer Network
Computer NetworkComputer Network
Computer Network
Coky Fauzi Alfi
 
Ip address
Ip addressIp address
Ip address
MdAnikKhan
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
GetachewDires1
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
aniston0108
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
Humayoun Kabir
 
Transmission media
Transmission mediaTransmission media
Transmission media
kinish kumar
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 
Chapter 4-The Medium Access Control Sublayer.ppt
Chapter 4-The Medium Access Control Sublayer.pptChapter 4-The Medium Access Control Sublayer.ppt
Chapter 4-The Medium Access Control Sublayer.ppt
vanlinhle3
 
network Addressing
network Addressingnetwork Addressing
network Addressing
Tauseef khan
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
SNMP
SNMPSNMP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
Pankaj Debbarma
 

What's hot (20)

Ethernet
EthernetEthernet
Ethernet
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Ethernet
EthernetEthernet
Ethernet
 
Data Communication And Networking - DATA & SIGNALS
Data Communication And Networking - DATA & SIGNALSData Communication And Networking - DATA & SIGNALS
Data Communication And Networking - DATA & SIGNALS
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Ip address
Ip addressIp address
Ip address
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Chapter 4-The Medium Access Control Sublayer.ppt
Chapter 4-The Medium Access Control Sublayer.pptChapter 4-The Medium Access Control Sublayer.ppt
Chapter 4-The Medium Access Control Sublayer.ppt
 
Tcp
TcpTcp
Tcp
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
SNMP
SNMPSNMP
SNMP
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 

Viewers also liked

NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
Kak Yong
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Networking Technologies
Networking TechnologiesNetworking Technologies
Networking Technologies
H.R.Supun Harshana
 
Sa 005 performance
Sa 005 performanceSa 005 performance
Sa 005 performanceFrank Gielen
 
Types of network communication technology
Types of network communication technologyTypes of network communication technology
Types of network communication technology
Maizun Azian
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
Vuz Dở Hơi
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010chanwitcs
 
Advance Network Technologies
Advance Network TechnologiesAdvance Network Technologies
Advance Network Technologies
Dr Shashikant Athawale
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
IOSR Journals
 
It application social network twitter
It application social network twitterIt application social network twitter
It application social network twitter
zeref17
 
Social network analysis: an overview
Social network analysis: an overviewSocial network analysis: an overview
Social network analysis: an overview
sociamigo
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...
Nidhi Baranwal
 
Transmission impairments
Transmission impairmentsTransmission impairments
Transmission impairments
Online
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Mangesh Vasu
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in Business
Nethan P
 
Digital modulation
Digital modulationDigital modulation
Digital modulationIbrahim Omar
 
Application and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaApplication and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & Tosca
Nati Shalom
 

Viewers also liked (20)

Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Transport Layer Description By Varun Tiwari
 
Networking Technologies
Networking TechnologiesNetworking Technologies
Networking Technologies
 
141015 iNSAF intro
141015 iNSAF intro141015 iNSAF intro
141015 iNSAF intro
 
Sa 005 performance
Sa 005 performanceSa 005 performance
Sa 005 performance
 
Types of network communication technology
Types of network communication technologyTypes of network communication technology
Types of network communication technology
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
 
Advance Network Technologies
Advance Network TechnologiesAdvance Network Technologies
Advance Network Technologies
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
It application social network twitter
It application social network twitterIt application social network twitter
It application social network twitter
 
Social network analysis: an overview
Social network analysis: an overviewSocial network analysis: an overview
Social network analysis: an overview
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...
 
Transmission impairments
Transmission impairmentsTransmission impairments
Transmission impairments
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in Business
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
 
Application and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaApplication and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & Tosca
 

Similar to Network Application Performance

Impact of Satellite Networks on Transport Layer Protocols
Impact of Satellite Networks on Transport Layer ProtocolsImpact of Satellite Networks on Transport Layer Protocols
Impact of Satellite Networks on Transport Layer ProtocolsReza Gh
 
Tcp ip
Tcp ipTcp ip
Tcp ip
mailalamin
 
6761 8-realtime
6761 8-realtime6761 8-realtime
6761 8-realtime
abhishek saini
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Sugan Nalla
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3John Mathias
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
Gerardo Pardo-Castellote
 
UDT
UDTUDT
UDT
lilyco
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
yohansurya2
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
Thomas Mangin
 
AETA_2004_VOIP.ppt
AETA_2004_VOIP.pptAETA_2004_VOIP.ppt
AETA_2004_VOIP.pptVideoguy
 
Performance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPerformance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdf
Phcng785014
 
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
CA Technologies
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
Availability Computer Communication Network .pdf
Availability Computer Communication Network .pdfAvailability Computer Communication Network .pdf
Availability Computer Communication Network .pdf
YashShirude1
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
Seung-Bum Lee
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
syedhaiderraza
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 

Similar to Network Application Performance (20)

Impact of Satellite Networks on Transport Layer Protocols
Impact of Satellite Networks on Transport Layer ProtocolsImpact of Satellite Networks on Transport Layer Protocols
Impact of Satellite Networks on Transport Layer Protocols
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
6761 8-realtime
6761 8-realtime6761 8-realtime
6761 8-realtime
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
 
UDT
UDTUDT
UDT
 
UDT
UDTUDT
UDT
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
AETA_2004_VOIP.ppt
AETA_2004_VOIP.pptAETA_2004_VOIP.ppt
AETA_2004_VOIP.ppt
 
Performance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPerformance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdf
 
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Availability Computer Communication Network .pdf
Availability Computer Communication Network .pdfAvailability Computer Communication Network .pdf
Availability Computer Communication Network .pdf
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Report
ReportReport
Report
 

More from Shumon Huque

DANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSDANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLS
Shumon Huque
 
Client Certificates in DANE TLSA Records
Client Certificates in DANE TLSA RecordsClient Certificates in DANE TLSA Records
Client Certificates in DANE TLSA Records
Shumon Huque
 
Query-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server BehaviorQuery-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server Behavior
Shumon Huque
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
Shumon Huque
 
Hands-on getdns Tutorial
Hands-on getdns TutorialHands-on getdns Tutorial
Hands-on getdns Tutorial
Shumon Huque
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
Shumon Huque
 
IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013
Shumon Huque
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
Shumon Huque
 
IPv6 Transition in Research & Education
IPv6 Transition in Research & EducationIPv6 Transition in Research & Education
IPv6 Transition in Research & Education
Shumon Huque
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at Penn
Shumon Huque
 
IPv6 Deployment Panel
IPv6 Deployment PanelIPv6 Deployment Panel
IPv6 Deployment Panel
Shumon Huque
 
A survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E CommunityA survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E Community
Shumon Huque
 
World IPv6 Launch at Penn
World IPv6 Launch at PennWorld IPv6 Launch at Penn
World IPv6 Launch at Penn
Shumon Huque
 
IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)
Shumon Huque
 
Open Source VoIP at Penn
Open Source VoIP at PennOpen Source VoIP at Penn
Open Source VoIP at Penn
Shumon Huque
 
Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)
Shumon Huque
 
.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned
Shumon Huque
 
IPv6 Campus Deployment Panel
IPv6 Campus Deployment PanelIPv6 Campus Deployment Panel
IPv6 Campus Deployment Panel
Shumon Huque
 
.EDU DNSSEC Testbed
.EDU DNSSEC Testbed.EDU DNSSEC Testbed
.EDU DNSSEC Testbed
Shumon Huque
 
DNSSEC at Penn
DNSSEC at PennDNSSEC at Penn
DNSSEC at Penn
Shumon Huque
 

More from Shumon Huque (20)

DANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLSDANE and DNSSEC Authentication Chain Extension for TLS
DANE and DNSSEC Authentication Chain Extension for TLS
 
Client Certificates in DANE TLSA Records
Client Certificates in DANE TLSA RecordsClient Certificates in DANE TLSA Records
Client Certificates in DANE TLSA Records
 
Query-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server BehaviorQuery-name Minimization and Authoritative Server Behavior
Query-name Minimization and Authoritative Server Behavior
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Hands-on getdns Tutorial
Hands-on getdns TutorialHands-on getdns Tutorial
Hands-on getdns Tutorial
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
 
IPv6 Transition in Research & Education
IPv6 Transition in Research & EducationIPv6 Transition in Research & Education
IPv6 Transition in Research & Education
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at Penn
 
IPv6 Deployment Panel
IPv6 Deployment PanelIPv6 Deployment Panel
IPv6 Deployment Panel
 
A survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E CommunityA survey of DNSSEC Deployment in the US R&E Community
A survey of DNSSEC Deployment in the US R&E Community
 
World IPv6 Launch at Penn
World IPv6 Launch at PennWorld IPv6 Launch at Penn
World IPv6 Launch at Penn
 
IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)IPv6 Security Panel (U of Penn)
IPv6 Security Panel (U of Penn)
 
Open Source VoIP at Penn
Open Source VoIP at PennOpen Source VoIP at Penn
Open Source VoIP at Penn
 
Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)Kerberos at Penn (MIT Kerberos Consortium)
Kerberos at Penn (MIT Kerberos Consortium)
 
.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned.EDU DNSSEC Testbed - Lessons Learned
.EDU DNSSEC Testbed - Lessons Learned
 
IPv6 Campus Deployment Panel
IPv6 Campus Deployment PanelIPv6 Campus Deployment Panel
IPv6 Campus Deployment Panel
 
.EDU DNSSEC Testbed
.EDU DNSSEC Testbed.EDU DNSSEC Testbed
.EDU DNSSEC Testbed
 
DNSSEC at Penn
DNSSEC at PennDNSSEC at Penn
DNSSEC at Penn
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Network Application Performance

  • 1. Network Application Performance Deke Kassabian and Shumon Huque ISC Networking & Telecommunications February 2002 - Super Users Group
  • 2. Introduction What this talk is all about  Network performance on the local area network and around campus  Network performance in the wide area and for advanced applications Goal: acceptable performance, positive user experience
  • 3. Who needs to be involved? End Users Researchers Local Support Providers Application Developers System Programmers/Administrators Network Engineers
  • 4. What is performance? “Performance” might mean …  Elapsed time for file transfers  Packet loss over a period of time  Percentage of data needing retransmission  Drop outs in video or audio  Subjective “feeling” that feedback is “on time”
  • 5. Throughput Throughput is the amount of data that arrives per unit time. “Goodput” is the amount of data that arrives per unit time, minus the amount of that data that was retransmitted.
  • 6. Delay Delay is a time measurement for data transfer  One way network delay for a bit in transit  Delay for a total transfer  Time from mouse click to screen message that the “operation is complete” NIC to NIC Stack to Stack Eyeball to eyeball
  • 7. Jitter Variation in delay over time  Non-issue for non-realtime applications  May be problematic for some applications with real-time interactive requirements, such as video conferencing  E2E delay of 70 ms +/- 5 ms -> low jitter  E2E delay of 35 ms +/- 20 ms -> higher jitter
  • 8. Some Contributors to Delay Slow networks Slow computers Poor TCP/IP stacks on end-stations Poorly written applications
  • 9. Analysis of Delay A B (1)Insertion time (2) Propagation Delay (3) Processing Delay
  • 10. Analysis of Delay A B (1)Insertion time (2) Propagation Delay (3) Processing Delay Send 1,000 bits from A to B, With an acknowledgement, Over 100 meters of fiber 0.0001 sec 0.0000004 sec 0.01 sec From: Deke To: Ira Date: Mon Feb 12, 2002, 11:00AM EST Subject: Lunch Hey Ira, Meet you at the food trucks at noon! ^Deke
  • 11. Analysis of Delay A B Send 1,000 bits from A to B, With an acknowledgement, Over 100 meters of fiber •Data Insertion • 0.0001 sec •Propagation • 0.0000004 sec •Processing (B) • 0.01 sec •Ack Insertion • 0.001 sec •Propagation • 0.0000004 sec •Processing (A) • 0.01 sec Total Elapsed Time: 0.0211008 secondsTotal Elapsed Time: 0.0211008 seconds
  • 12. Analysis of Delay A BAdd 2 switches and a router to the path New Total Elapsed Time: 0.0231408 secondsNew Total Elapsed Time: 0.0231408 seconds S S R Add 0.00002 secAdd 0.00002 sec Add 0.00002 secAdd 0.00002 sec Add 0.002 secAdd 0.002 sec
  • 13. Summary of Delay Analysis Propagation delay is of little consequence in LANs, more of an issue for high bandwidth WANs. Queueing delays are rarely major contributors. Processing delay is almost always an issue. Retransmission delays can be major contributors to poor network performance.
  • 15. What I’m going to talk about More on delay contributors, their causes and how to minimize them Protocol Stack behavior & tuning Quality of Service (QoS) Performance measurement tools Operating System tuning examples General comments about things you can do
  • 16. Recap: Delay Contributors Processing Delay Retransmission Delay Queueing Delay Propagation Delay
  • 17. Processing Delay Time it takes to process a packet at an end- station or network node. Depends on:  Network protocol complexity, application code, computational power at node, NIC efficiency etc Endstation Tuning Application Tuning
  • 18. Endstation Tuning Good network hardware/NICs Correct speed/duplex settings  Auto-negotiation problems Sufficient CPU Sufficient Memory Network Protocol Stack tuning  Path MTU discovery, Jumbo Frames, TCP Window Scaling, SACK etc
  • 19. Ethernet Bandwidth/Duplex mode Ethernet bandwidth: 10, 100, 1000  10 Gigabit Ethernet soon Duplex modes: half-duplex, full-duplex Auto-Negotiation Mismatch Detection:  CRC/Alignment errors  Late Collisions
  • 20. Application Tuning Optimize access to host resources Pay attention to Disk I/O issues Pay attention to Bus and Memory issues Know what concurrent activity may be interfering with performance of app Tuning application send/receive buffers Efficient application protocol design Positive end user feedback  Subjective perception of performance
  • 21. Retransmission Delay Causes  Packet loss  Bad hardware: NICs, switches, routers, transmission lines  Congestion and Queue drops  Out of order packet delivery  May be considered packet loss from application’s perspective if it can’t re-order packets  Untimely delivery (delay)  Some apps may consider a packet to be lost if they don’t receive it in a timely fashion
  • 22. Retransmission Delay (cont) Mitigating retransmission delay  Ensure working equipment  Although some packet loss is unavoidable; eg. most transmission lines have a BER (Bit Error Rate)  Reduce time to recover from packet loss  Eg. Highly tuned network stack with more aggressive retransmission and recovery behavior  Forward Error Correction (FEC)  Very useful for time/delay sensitive applications  Also, for cases when it’s expensive to retransmit data
  • 23. Bit Errors on WAN paths Bit Error Rate (BER) specs for networking interfaces/circuits may not be low enough:  1 bit-error in 10 billion bits  Assuming 1500 byte packets  Packet error rate: 1 in 1 million  10 hops => 1 in 100,000 packet drop rate
  • 24. Queueing Delay Long queueing delays could be caused by lame hardware (switches/routers)  Head of line blocking  Insufficient switching fabric  Insufficient horse power Unfavorable QoS treatment
  • 25. Queueing Delay (cont) How to reduce  Use good network hardware  Improved network architecture  Reduce number of switching/routing elements on the network path  Richer network topology, more interconnections  End user may not have influence over architecture  Employ preferential queue scheduling algorithms  Will discuss later in QoS section of talk
  • 26. Propagation Delay Restricted by speed of light through transmission medium  Can’t be changed, but rarely a concern in the campus/LAN environment  A concern in long distance paths (WAN), but  Some steps can be taken to increase performance (throughput) on such paths
  • 27. Other delays and bottlenecks Intermediary systems  DNS  Routing issues  Route availability, asymmetric routing, routing protocol stability and convergence time  Firewalls  Tunnels (IPSec VPNs, IP in IP tunnels etc)  Router hardware poor at encap/decap
  • 28. Throughput Influenced by a number of variables:  All the delay factors we discussed  Window size (for TCP)  Bottleneck link capacity  End station processing and buffering capacity
  • 29. What I’m going to talk about next • Brief description of TCP/IP protocol • How to improve TCP/IP performance
  • 30. Transport: TCP vs UDP Network apps use 2 main transport protocols: TCP (Transmission Control Protocol)  Connection oriented (telephone like service)  Reliable: guarantees delivery of data  Flow control  Examples: Web (HTTP), Email (SMTP, IMAP) UDP (User Datagram Protocol)  Connectionless (postal system like)  Unreliable: no guarantees of delivery  Examples: DNS, various types of streaming media
  • 31. When to use TCP or UDP? Many common apps use TCP because it’s convenient  TCP handles reliable delivery, retransmissions of lost packets, re-ordering, flow control etc You may want to use UDP if:  Delays introduced by ACKs are unacceptable  TCP congestion avoidance and flow control measures are unsuitable for your application  You want more control of how your data is transported over the network  Highly delay/jitter sensitive apps often use UDP  Audio-video conferencing etc
  • 32. Network Stack Tuning Jumbo Frames Path MTU Discovery TCP Extensions:  Window Scaling - RFC 1323  Fast Retransmit Fast Recovery  Selective Acknowledgements
  • 33. Jumbo Frames Increase MTU used at link layer, allowing larger maximum sized frames Increases Network Throughput Fewer larger frames means:  Fewer CPU interrupts and less processing overhead for a given data transfer size Some studies have shown Gigabit Ethernet using 9000 byte jumbo frames provided 50% more throughput and used 50% less CPU!  (default Ethernet MTU is 1500 bytes)
  • 34. Jumbo Frames (cont) Pitfalls:  Not widely deployed yet  Many network devices may not be capable of jumbo frames (they’ll look like bad frames)  May cause excessive IP fragmentation  BER may have more impact on jumbo frames  Eg. A single bit-error can cause a large amount of data to be lost and retransmitted  May have negative impact on host processing requirements:  More memory for buffering, newer NICs
  • 35. Path MTU Discovery MTU (Max Transmission Unit)  Max sized frame allowed on the link Path MTU  Min MTU on any network in the path between 2 hosts IP Fragmentation & Reassembly Path MTU Discovery MSS (Max Segment Size) What happens without PMTU discovery?  Might select wrong MTU and cause fragmentation  Suboptimal selection of TCP MSS (536 default?)
  • 36. Path MTU Discovery (cont) A B R1 R3 R2 MTU=4474 MTU=9000 MTU=1500 MTU=9000 Path MTU is 1500 IP fragmentation may occur
  • 37. TCP Sliding Window TCP uses a flow control method called “Sliding Window”  Allows sender to send multiple segments before it has to wait for an ACK  Results in faster transfer rate coz sender doesn’t have to wait for an ACK each time a packet is sent  Receiver advertises a window size that tells the sender how much data it can send without waiting for ACK
  • 39. Slow Start In actuality, TCP starts with small window and slowly ramps it up (upto rwin) Congestion Window (cwnd)  controls startup and limits throughput in the face of congestion  cwnd initialized to 1 segment  cwnd gets larger after every new ACK  cwnd gets smaller when packet loss is detected Slow Start is actually exponential
  • 40. Congestion Avoidance Assumption: packet loss is caused by congestion When congestion occurs, slow down transmission rate  Reset cwnd to 1 if timeout  Use slowstart until we reach the half way point where congestion occurred.  Then use linear increase  Increase cwnd by ~ 1 segment/RTT
  • 41. TCP Behavior Recovery after a loss can be very slow on today’s high delay/bandwidth links  (graph from Peter O’Neill, NCAR) CWND slow start: exponential increase congestion avoidance: linear increase packet loss, D-ACK time retransmit: slow start again timeout
  • 42. TCP Throughput Acceleration rtt (msec) 0-100Mbps (sec) 5 0.216 10 0.864 20 3.45 50 21.6 100 86.4 200 345 (From Phil Dykstra)
  • 43. TCP Window Size Tuning TCP performance depends on:  Transfer rate (bandwidth)  Round trip time BW*Delay product TCP Window should be sized to be at least as large as the BW*Delay product
  • 44. BW*Delay Product BW*Delay product measures:  Amount of data that would fill the network pipe  Buffer space required at sender and receiver to achieve the max possible TCP throughput  Amount of unacknowledged data that TCP must handle in order to keep pipe full
  • 45. BW*Delay example A path from Penn to Stanford has:  Round trip time: 60 ms  Bandwidth: 120 Mbps BW * Delay =  60/1000 sec * 120 * 1000000 bits/sec  = 7200000 bits = 7200 Kbits  = 900 Kbytes So TCP window should be at least 900KB
  • 46. TCP Window Scaling RFC 1323: TCP Extensions for High Performance Allows scaling of TCP window size beyond 64KB (16 bit window field)  Introduces new TCP option Note: In previous example, TCP needs to support Window Scaling to use 900KB window
  • 47. Window Scaling Pitfalls Why not use large windows always?  Might consume large memory resources  May not be useful for all applications  Isn’t useful in the campus/LAN environment
  • 48. Fast Retransmit Fast Recovery TCP required to send immediate D-ACK when out-of- order packet received After 3 D-ACKs, sending TCP retransmits only one segment Also perform congestion avoidance but not slow start 1 2 73 4 5 6 Packet loss, causing D-ACK
  • 49. TCP Selective Acks (SACK) RFC 2018 Allows TCP to efficiently recover from multiple segment losses within a window Without retransmitting entire window
  • 51. Performance depends on App So, understand application’s requirements (high throughput, low latency, low jitter), eg:  File Transfer using TCP  Needs high throughput  Intolerant of packet loss  May be more tolerant of delay  Interactive Video Conferencing application  Tolerant of some loss  More intolerant of delay and jitter
  • 52. Quality of Service (QoS) A method to selectively allocate scarce network resources A mechanism to offer varying degrees of service to varying classes of traffic Service: delay, jitter, proportion of link bandwidth etc
  • 53. Quality of Service (QoS) cont Requires deployed QoS infrastructure  Might require  Traffic marking capabilities in hosts and network hardware  Traffic classification and identification capabilities  Multiple traffic queues with different service characteristics  Different queue servicing algorithms  Mechanisms to specify and enforce QoS policy  Signalling mechanisms IEEE 802.1p, IP precedence, IntServ/RSVP, DiffServ, MPLS
  • 54. Performance Measurement Tools To measure “real” performance of an app, you need to instrument the app with measurement code! However, independent measurement of some common network perf metrics can be done Two kinds:  Active and Passive measurement
  • 55. Active Measurement Ping Traceroute Netperf http://www.netperf.org/ Iperf http://dast.nlanr.net/Projects/Iperf/ Pathchar ftp://ftp.ee.lbl.gov/pathchar/ Pathrate http://www.pathrate.org/ Mping
  • 56. Passive Measurement OCxMON/PCMon Router/switch stats collected via  SNMP  Netflow, etc tcpdump, snoop, etherfind
  • 57. Some tuning examples Microsoft Windows  Newer versions: Win98, Win2K, WinXP support many of the features (window scaling, PMTU discovery, SACK etc)  May require registry tweaks to turn some of them on  TCPTune: A TCP Stack Tuner for Windows  http://moat.nlanr.net/Software/TCPtune/
  • 58. More tuning examples MacOS X  [need to find out more, who knows?]  Supports window scaling:  $ sysctl net.inet.tcp.rfc1323  net.inet.tcp.rfc1323: 1  Socket buffer raising:  Kernel tunable kern.ipc.maxsockbuf  TCP send/receive buffer tuning:  Tunables supported:  net.inet.tcp.sendspace  net.inet.tcp.recvspace
  • 59. More tuning examples Linux  In /proc/sys/net/core/ set:  rmem_default  rmem_max  wmem_default  wmem_max  In /proc/sys/net/ipv4 set:  tcp_windowscaling  tcp_sack
  • 60. More tuning examples Solaris 2.x - 8  ndd -set /dev/tcp tcp_max_buf xxx  ndd -set /dev/tcp tcp_xmit_hiwat xxx  ndd -set /dev/tcp tcp_recv_hiwat xxx  ndd -set /dev/ip ip_path_mtu_discovery 1  ndd -set /dev/tcp tcp_sack_permitted 2
  • 61. Web100 Project http://www.web100.org/ Enhance TCP capabilities with:  Better (finer grain) kernel instrumentation  Automatic controls Availability:  Today: Linux (patches for 2.4.16 kernel)  Being ported to other operating systems.
  • 62. Things you can do (WAN) Make sure app offers adequately sized receive windows and send buffers But don’t run your system out of memory Find out your path RTT with ping Check your path with traceroute Determine bottleneck capacity and available bandwidth on path Make sure your OS uses Path MTU discovery Make sure your OS uses TCP Large Windows, Fast Retransmit, SACK
  • 63. Things you can do (Campus) Check your host  (80% of the problems) Check your host  Bandwidth/Duplex problems  Network stack tuning  Application tuning Talk to campus networking folks
  • 64. Conclusion Understand performance requirements of your application What are the issues?  Campus/LAN environment  WAN environment What can you do to ask for help?
  • 65. Any Questions? Deke Kassabian  deke@isc.upenn.edu Shumon Huque  shuque@isc.upenn.edu