Thursday, January 03, 2008

The impact of out of order packets on successful transmission

Wide Area Networking Alert

Network World logo
NetworkWorld.com | LANs & WANs Research Center | Update Your Profile
The impact of out of order packets on successful transmission

Steve Taylor By Steve Taylor and Jim Metzler
In the last two newsletters (see here and here) we commented on the fact that data replication was significantly different than other data applications and that it could be negatively impacted by small amounts of packet loss. Today, we'll talk about ways to overcome the impact of packet loss, talk about the impact that out of order packets has on goodput, and return to a topic that we know is a hot issue for our readers: what functions should be done in a router. Read full story

Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. For more detailed information on most of the topics discussed in this newsletter, connect to Webtorials, the premier site for Web-based educational presentations, white papers, and market research. Taylor can be reached at taylor@webtorials.com

Jim Metzler is the Vice President of Ashton, Metzler & Associates, a consulting organization that focuses on leveraging technology for business success. Jim assists vendors to refine product strategies, service providers to deploy technologies and services, and enterprises evolve their network infrastructure. He can be reached via e-mail.

MORE STORIESARROW


SPONSORED BY CISCO
rule

Security Threats and Vulnerabilities
Read this report, "Cisco 2007 Annual Security Report" for a snapshot of the state of security from January through September 2007. The report also includes predictions for 2008 and future years. Learn more today about the key risk areas you should know about. Download this report now.

rule
RELATED NEWS:

Editor's Note: Due to an editing error, the Wide Area Network Alert dated Dec. 13, 2007 should have referenced 802.1X Wired as the correct name of the network authentication protocol. The archived version of the newsletter has been corrected. We apologize for the error.

Crystal ball: Carrier landscape continues to shift, 12/20/2007 Every now and then, several trends combine at the same time to totally reshape an industry. Indications are that this is happening in 2008: When ...

What really matters in IT today, 12/20/07 Security clearly matters today, and the costs of getting wrong can be staggering. But many companies till don’t get it. Consider, for example, that few companies encrypt data on laptops, even though on average companies lose 4% to 5% of their laptops each year.

10 biggest newsmakers, 12/20/2007 What makes a top newsmaker? Sometimes a company generates lots of buzz by doing particularly innovative things, or someone with a catalyzing ...

Cisco Subnet's top Cisco lists Quiz: How much do you know about Cisco?; Cisco Subnet's top 10 of 2007; 7 Cisco bad luck happenings in '07: Top 6 Cisco acquisitions of 2007 and what it should buy in 2008; Valuable networking how-tos and hints and tips from our Cisco Subnet bloggers.

Network design best practices: Inside Cisco design validation program Cisco Validated Design Program outlines design validation and proof of concept testing, plus provides in-depth lab testing to produce designs with "zero observable operation impacting defects within the given test parameters."

Cutting link failure detection time with BFD IP routing expert Jeff Doyle discusses reducing link failure detection time with Bidirectional Forwarding Detection.

Cisco Subnet January giveaways: Win an iPod Touch; win a copy of 'Firewall Fundamentals' book This month we're giving away a 16GB Apple iPod Touch courtsey of Cisco Learning Partner Global Knowledge. We've also got 15 copies of the Cisco Press book Firewall Fundamentals by Wes Noonan and Ido Dubrawsky up for grabs.


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY CISCO
rule

Security Threats and Vulnerabilities
Read this report, "Cisco 2007 Annual Security Report" for a snapshot of the state of security from January through September 2007. The report also includes predictions for 2008 and future years. Learn more today about the key risk areas you should know about. Download this report now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/03/08

TODAY'S MOST-READ STORIES:

  1. Eight can't-miss tech predictions for 1998
  2. The 15 best downloads of the year
  3. AOL to end support for Netscape browser
  4. 12 IT skills that employers can't say no to
  5. Storm switches tactics third time
  6. Everything that matters in IT
  7. Security dominates 2008 IT agenda
  8. 20 great Firefox extensions
  9. The 25 most innovative products of the year
  10. Management in '08: Can you say automate?

FEATURED BUYER'S GUIDE:
Network Monitoring and Management


Free trial: VoIP Monitoring Software

Stop problems before they start by proactively analyzing VoIP quality across your WAN with a 30-day trial of Orion VoIP Monitor. Start your free evaluation today and you'll have detailed VoIP performance reporting in minutes!

Click here for your free trial.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Wide Area Networking Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: