...Project Benchmarking of Wireless Routers Pedro Bustamante Noopur Chowdhary School of Information Science University of Pittsburgh Pittsburgh, United States pjb63@pitt.edu School of Information Science University of Pittsburgh Pittsburgh, United States noc13@pitt.edu Abstract— This paper explores a basic technique for Network Performance Analysis: Compare alternate equipment based on real measurements. Further, this work describes the comparison between two wireless routers configured as access points. The analysis of the equipment was implemented in terms of throughput (TCP) and jitter (UDP). In this way, this work aims to show the results of the benchmarking process of two wireless routers from different vendors through the utilization of a basic performance terminal tool such as “iperf”. Keywords—benchmarking; wireless; routers. network; performance; II. GOALS • First, this project seeks to execute, analyze and evaluate a Network Performance Analysis based on real measurements. • To benchmark two wireless routers of different vendors using an active software network performance tool such as iperf. • To measure and evaluate the total available throughput of parallel TCP connections over tested wireless routers (acces points) in a server/client configuration. • To determine and exanimate the average jitter and percentage of lost packets of parallel UDP connections over the tested wireless routers (acces points) in a ...
Words: 4964 - Pages: 20
...Network Design Student Name Course 2 July 2014 Professor Identify hardware and software needed to secure your choice of networks against all electronic threats. A network that helps a workstation to connect with each other is called a Networking hardware. If a company uses both routers and firewall, the company is assured protection of both wireless and cabled networks that are used in the company. Network hardware is suitable in any organization in the keeping of the organizations network safe. In the software part I will choose to use McAfee Anti-virus security software. This software in conjunction with firewall is a sure way of protecting a company. Routers when used along with hardware are the best security hardware needed if the company needs to increase the security of their network to a level where none of the intruders can be able to access it (Radu, 2002). The function of the firewall in an organization is to ensure that all unwanted activities are blocked including hackers that can retrieve important and delicate information of the company. Hacking will be a very dangerous exercise where criminal can access the important information that a company has and use this information in blackmailing the company and its customers. Networking software’s also plays a major role in securing an organizations network security. The software has the capabilities of detecting viruses that may attack an organization and make an organization loose its critical...
Words: 1080 - Pages: 5
...the fly but this also opens up Kudler Fine Foods to cyber attacks that they have not had to think about before. Hardware is a key component to securing a network. Kudler Fine Foods new network will have multiple hardware choices to make. Each location has Point of Sale (POS) computers that need to be secured from attack; there are office computers that will need to be secure. The POS server will need to be secured as well. There is the wireless Ethernet switch that will connect to the modem and Wide Area Network (WAN) between the three stores. The central hub location for the WAN (the Del Mar store) will also need to make sure the data servers are secured as well as everything else already mentioned. The desktop computers are going to be up to personal preference for Kudler Fine Foods, most desktops are just about the same weather they come from the big companies like Dell and HP. Each location will have two office desktop computers as well as four POS computers, a Standalone UPS in case of power outage. There will also need to be a wireless Ethernet switch for the WLAN inside of each building and a special cable modem (one with a WAN interface card built into it) to be able to access the...
Words: 1056 - Pages: 5
...(VoIP or PBX) * Video Conferencing * Remote Access * Department connectivity over WAN (VLAN) The plan will be to interconnect all locations stateside and connect China into the Atlanta office allowing further contact with all other satellite offices. Atlanta will be the center location due to the headquarters being at this location. All departments will be interconnected via the network to include three distribution locations, Chicago, Phoenix, and New York. Engineering in Atlanta office will be connected to HQ, manufacturing plant in China, and the three distribution locations. All locations will have the following services available: * Voice Communications * Tele-conferencing * Video Conferencing * Wireless Access * Remote Access The following document will outline the equipment needs, configuration, and security to implement the recommendations of this network design. Network Architecture A frame-relay circuit will connect the...
Words: 1468 - Pages: 6
...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the networks...
Words: 1253 - Pages: 6
...SKILLS WAN Infrastructure : MPLS, VPN, Leased Line, ISDN/Dial-Up, Frame Relay circuits, Metro Ethernet. WAN Technologies : HDLC, PPP LAN Technology : Workgroup, Domain, HSRP, VRRP, DHCP, Static, VLAN, STP, VTP, Ether Channel IP Technology : Class, Sub netting, VLSM Routing Technology : RIP, RIPV2, IGRP, EIGRP, OSPF, TCP/IP, Static and Dynamic Routing. Network Products : CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Routers 3600, 3800, 7200. CISCO Switches 1900, 2950, 2950, 2960G. CISCO Campus Switches 3550XL, 4948 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, Motorola Vanguard Router 342 & 6435, 3Com Core 4007/Access Switch 3300, D-Link Layer 2/3 switches 3326SR, Nortel Baystack Switches, CISCO - CSS 11500 Switch. Voice & Video : CISCO IP Phone 7900, Polycom Video Conferencing Device, Smart Call Voice Recorder. Wireless & Wi-Fi : Canopy Wireless Device (p-p/pMp), DLink Wireless (point to point), DLink Access Point, CISCO 500, 1242 AGK9 series Access Point, and CISCO Linksys Wireless/Wi-Fi Router. WAN Optimizer : Steelhead - Riverbed WAN Optimizer Security & VPN : Cisco PIX 535 & ASA Firewall, FWSM, Fortigate Firewall, Gajshield Securegate Firewall, Sonicwall Firewall NSA2400, Cisco NAC, Watchguard Firewall, ACL-Access Control List, Portwise VPN Software, NAT, PAT, VPN Client, Bluecoat Proxy SG, Bluecoat Reporter, Bluecoat AV, Juniper SSG-550M, McAfee IPS M2950, Forefront Threat Management Gateway (TMG) 2010...
Words: 274 - Pages: 2
...AT&T Corporation AT&T AT&T is one of the most popular companies that provide variety of services; voice, data, and communications and is the largest provider for mobile telephony and fixed telephony. There is a main server called the proxy server which AT&T uses, which acts as a server and a client in making request on behalf of other clients, it can provide routing and can enforce policy. The proxy server is an application layer service that routes SIP request and replies; it hides the identities of endpoint and it may be redundant because its functions overlap with those of the firewall proxy service. Proxy servers are rarely implemented in SIP networks because of the cost, delay, delay variation, and complexity they add to the service. The next server would be a redirect server; which makes mobile and nomadic users reachable as well as users who have new phone numbers it is a part of the availability service as well as geographic location services provided by the location server. The type of switches this company uses is the Cisco switches they are used to create a network by connecting and controlling all of your organizations computers, printers, and servers and it can also increase efficiency, productivity, and allow your devices to talk to one another through information sharing and resource allocation. Cisco offers two types of network switches: * Cisco unmanaged switches, which are found in home networks work right out of the box and are not designed to be...
Words: 870 - Pages: 4
...FREE ONLINE RESEARCH PAPERS Navigation Sign In Create Account Forgotten Password About Us Subscription Cancelation SIWES Project in Computer Science CHAPTER 1 INTRODUCTION 1.1 Overview of SIWES SIWES refers to the employment of students nearing under-graduation in firms or organizations, which operate on activities related to the respective student’s major subjects. The course, CSC 3299 as offered in Ajayi Crowther University is a compulsory subject offered by every computer science student in the 2nd semester of the third academic year with the objective of enabling students to come into contact with real life applications regarding the knowledge and skills gained in both theoretical and practical courses of the university. The core courses of Computer Science offered by ACU are both theory and laboratory practical -based and aid in providing a theoretical concept or ‘base’ to the students so that they are equipped with sufficient knowledge for joining the work force after completion of under-graduation. SIWES on the other hand helps the students familiarize themselves with the experience of being employed in their field and effectively learning and applying the knowledge required by carrying out their activities in the offices and fields. 1.2 Objectives of SIWES The general objectives if SIWES are outlined as follows: Helping students break free from the theoretical world of textbooks and class courses and leap into...
Words: 4317 - Pages: 18
...Data Communication Theory What is dotted decimal notation on IPv4 addresses? Answer: It is presentation form for the numerical data that consists of a string of decimal numbers each pair is separated by a dot. The common use is to write the numbers in the octet group based 10 (decimal) numbers separated by dots. In computer networking, Internet Protocol Version 4 addresses are commonly written using quad-dotted notation of four decimal integers, ranging from 0 to 255 each. Chapter 6- Explain the Peer-to Peer network and what are its advantages? Answer – In Peer to Peer network, network hosts don’t have a specific role. They provide specific services and also consume network services. We have hosts that will fulfill a variety of different roles, like one computer can have printer connected to it which is then shared on to the network. Another computer can have a large hard drive attached to it and everyone else is allowed to use the hard drive for data storage, modification etc. In Such network we have hosts that both provide and consume network services. In essence they function both as a Client and as a Server at the same time. The advantage of Peer to Peer network is the ease of installation. We can share our resources on the network and everyone can share the benefits. On the other hand is not very scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of...
Words: 1023 - Pages: 5
...Routers Term Paper INTRODUCTION Router is a hardware device designed to take incoming packets, analyzing the packets and then directing them to the appropriate locations, moving the packets to another network, converting the packets to be moved across a different network interface, dropping the packets, or performing any other number of other actions. In the picture to the down, is a Linksys BEFSR11 router and is what most home routers look like. [pic] A router has a lot more capabilities than other network devices such as a hub or a switch that are only able to perform basic network functions. For example, a hub is often used to transfer data between computers or network devices, but does not analyze or do anything with the data it is transferring. Routers however can analyze the data being sent over a network, change how it is packaged and send it to another network or over a different network. For example, routers are commonly used in home networks to share a single Internet connection with multiple computers. [pic] In the above example of a home network there are two different examples of a router, the router and the wireless router. As can be seen in the example the router is what allows all the computers and other network devices access the Internet. Below are some additional examples of different types of routers used in a large network. Brouter Short for Bridge Router, a "brouter" is a networking...
Words: 569 - Pages: 3
...redundancy in this level. Distribution layer: The routers are using as a routing protocol EIGRIP. Access layer: This layer connects the users with the routers through 4 switches and 40 wireless access points. Users: Here are approximately 700 people connected to the network with up to 1.500 devices mostly using wireless. Internet edge: A 2 Gbit external fiber connection is available and a firewall...
Words: 1684 - Pages: 7
...well as networking devices (eg. Switches/hubs). Select the appropriate network media to use. The network media necessary for this is as follows: Switch x11 – For each room that requires more than one computer and the server rooms. The reason for this is so that ports can be allocated accordingly to staff or students as well. Patch Panel x11 – For each room that has a switch so that multiple computers can access the ports on the switch. The patch panel will provide the network with a connection point between network equipment and the ports to which the PCs are connected. Router x1 – This is where the default gateway for the network will be and is located at the demarcation point. It is used to route information obtained by the network and deliver packets returned by the Internet. Wireless Access Point x1 – The WAP will be located in the Library and is used to grant wireless access to the internet via the router to those who need it. select the appropriate network connecting devices to use The network connecting devices that will be used are: Shielded Cat5 Twisted pair cabling that are plenum-rated. These cables will be used within the drop ceiling of the building when...
Words: 407 - Pages: 2
...Hubs are multiple ports repeater. All the devices attached to hub are belongs to one collision. TASK 2 Task 2(1) - Components of LAN Network interface card: - it is the basic component which allows the computer to communicate across the network. Now day it built up with motherboard. It can be separate card for the use in slots or external units. Network can be operating on wire, wireless or both of them. NCI acts as physical interface between the computer and network cables. On a local area network (LAN) typically contain a network interface card specifically designed for the LAN transmission technology. The specification of a general NIC card is listed below;- Purpose of NIC and specification Compatibility: Ethernet Version 2.0/IEEE802.3 Network interface: RJ45,...
Words: 565 - Pages: 3
...Wireless Router Configuration- Gateway Configuration Cisco Linksys Products (http://homesupport.cisco.com/en-us/wireless/lbc/WRT54G) Model # WRT54G Firmware : v1.4 – v 4.20. Barry Rodricks Outline Introduction. Configuring the Router as a Gateway. References Introduction What is a default Gateway ? A default gateway is the device that passes traffic from the local subnet to devices on other subnets. The default gateway often connects a local network to the Internet, although internal gateways for local networks also exist. In simple words the Gateway (normally associated with a router ) is an entry and an exit point for network traffic. A depiction below shows a SOHO and how the wireless router acts as a gateway for all the devices connected. In big enterprises, the device playing the part of a gateway could also act as a proxy server and a firewall. In most cases the gateway is a router, which use headers and forwarding tables to determine where packets are sent. Configuring the Router as a Gateway Login to the router’s web interface (refer to router guide) , and click on the “Setup Tab” and proceed to the “Advanced Routing option” Use the instructions as given below : If the Router is directly connected to the DSL/Cable modem, select the default option of Gateway. In this example , we will attempt to configure the router as a gateway . Our assumption would be that the customer only has one wireless router connecting to the Cable/DSL...
Words: 304 - Pages: 2
...Bridge A software/hardware that have job as a media to connect separate networks together so they can communicate each other called as a bridge. For example, there a two networks. The first one the device are connected by wireless technology and other by cables. The device which using wireless only can communicate with other wireless and the wired device only can communicate with wired also. So, all device can communicate with each other using a network bridge. It also determines a data packet are allowed or not to the other part of the Ethernet segments. Router Router is a device that allows the similar network to interchanges data packets between them. Similar network like same servers, workstations and protocols. Routers forward data based on information at layer 3. Nowadays, every home share a broadband internet connection by using a wireless routers. Also, people can give password to their routers to...
Words: 777 - Pages: 4