|Moonv6 2006 Whitepaper||UNH-IOL||
During the July 2006 test set, protocol-specific test plans were executed at both the UNH-IOL and the JITC Ft. Huachuca sites. IPv6 Information Assurance vulnerabilities assessment identified vulnerabilities in individual devices and within networks that are representative of operational DoD systems. Testing involved network applications including Network Time Protocol (NTP), DoD IPv6 Information Assurance, IPSec, DNS, DHCP, Firewalls and Applications, Transition Mechanisms and Dual-Stack Routing.
|July 20, 2007||White Papers|
|TCP Testing Requirements (Test Plan Supplement)||UNH-IOL||
The purpose of this document is to specify requirements to perform the Transmission Control Protocol Test Specification.
|March 12, 2007||Tutorials|
|Performance Evaluation of TCP over IEEE 802.11 WLANs||Sachin Goel||
Transmission Control Protocol (TCP) is a communication protocol that is used to provide reliable data delivery between hosts. As TCP is the most highly used transport-layer protocol, many have worked on addressing the issue of performance. Performance issues have been studied in various environments, especially when using 802.11 Wireless Local Area Networks (WLANs). Wireless networks are prone to a higher number of packets loss and corruption. 802.11 WLANs have an equivalently fast acknowledgement mechanism as TCP to ensure reliability of traffic over it. This duplication of functionality between TCP and 802.11 WLAN creates unexpected behaviors that can result in high costs in terms of overall performance. A significant amount of analytical and simulation work has been done in the past to study the behaviour of TCP over 802.11 WLANs. The main contribution of this work is the analysis of TCP interaction in an 802.11 WLAN topology by using real commercial-grade equipments. A testing methodology is designed to do the quantitative performance evaluation in a network topology consisted of wired as well as a wireless connection. The methodology contains test scenarios with different configurable settings on an Access Point (AP) and various controlled impairments in the network topology such as latency, packet drop, noise interference, etc. The performance of TCP is measured in terms of the throughput. This work provides a comprehensive set of experiments to study the behaviour of TCP over 802.11 WLANs. The results can provide insight into the performance cost associated with TCP traffic on 802.11 WLANs under different network environments and configurations on the AP. The results of this work thus have a value to equipment manufacturers and network operators.
|September 1, 2006||Theses|
|Clause 40 Auto-Crossover White Paper||Matthew Hersh||
A brief tutorial that covers the basics behind the Clause 40 Automatic MDI/MDI-X Configuration.
|April 18, 2006||Tutorials|
|Moonv6 2005 Whitepaper||UNH-IOL||
This round of testing aimed to improve the conformance, stability, and internetworking capability of multiple commercial implementations of IPv6. The event was attended by 11 organizations. Where previous rounds of testing were focused on testing core network areas, objectives for this round were to demonstrate advances in IPv6 applications, including DHCP, voice services, mobility, DHCP, DNS/DHCP resolution, application layer (VoIP), and security (IPsec). A successful VoIP call was made over IPv6 from New Hampshire to South Korea using commercial software.
|March 20, 2006||White Papers|
|MPLS World Congress 2006||Jambi Ganbar, Jonathan Morin, Cartsen Rossenhoevel, and Gabriele Schrenk||
The MPLS World Congress 2006 interoperability event included 15 different companies and was hosted by the EANTC and UNH-IOL and was endorsed by the MPLS Forum and Frame Relay Alliance, held in Berlin, Germany. This event focused the convergence of both old and new MPLS services such as VPLS, BGP-VPNs, Layer 2 VPNs while still being guaranteed by Fast Reroute and MPLS Diff Serve. The event was especially successful in focusing on converged services as it included all classes of MPLS devices.
|February 6, 2006||White Papers|
|Comparison of Environments on 802.11 Throughput Performance||Diana Lewis, Justin Rebe, Jeremy deVries||
The chaotic nature of the radio frequency medium of 802.11 wireless networks makes it problematic to obtain accurate and precise repetition of performance tests and measurements. Environmental variables that deeply influence link performance must be addressed before throughput testing can be accurately measured across various devices. An RF shielded room with anechoic foam provides the most ideal environment for throughput tests compared to either an RF shielded room without foam or an open air laboratory. Location within the RF shielded room with anechoic foam was shown to have a negligible effect on performance, but using an RF absorbing rubber mat under a device was shown to reduce reflections, producing an optimal environment for throughput testing.
|September 18, 2014||White Papers|
|The Ethernet Effect: Collaboration, Interoperability, and Adoption of New Technologies||Seamus Crehan, George Kimura, Eric Lynskey and Chris Volpe||
Representing the first public summary of objective, multi-vendor Ethernet conformance and interoperability testing conducted over an extended period. This whitepaper summarizes seven years of Fast and Gigabit Ethernet testing data gathered through the end of 2005, including test reports from 900 individual products representing several hundred companies.
|January 1, 2006||White Papers|
|Wireless Networking Overview||Kevin Karcz, Jeremy Kent||
An overview of various wireless networking technologies, their relationship to one another, and a look at emerging standards.
|September 18, 2014||Tutorials|
|WPA-PSK: Step-by-Step||Jeremy deVries||
In today's age of ubiquitous SOHO networks and ever more Wi-Fi in laptops, security is a paramount concern. Unsecured or improperly set up wireless networks can leave you vulnerable to intrusion, viruses, hijacking of bandwidth, and more problems than one can list, which is why properly setting up your secured network using an authentication mechanism such as WPA-PSK is a crucial step in creating a wireless network. This article provides an overview of the Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) security mechanism, and a step-by-step guide to securing your wireless network.
|September 30, 2005||Tutorials|