APPLYING C4.5 CLASSIFICATION TO THE MONITORING OF NETWORK DEVICE CONNECTIVITY

Size: px
Start display at page:

Download "APPLYING C4.5 CLASSIFICATION TO THE MONITORING OF NETWORK DEVICE CONNECTIVITY"

Transcription

1 APPLYING C. CLASSIFICATI TO THE MITORING OF NETWORK DEVICE CNECTIVITY Rangsipan Marukatat *, Watcharapong Suebsiri, Supapong Putthayangkura, Sorarath Ngantawee, and Siriprapa Srigrajang Department of Computer Engineering, Faculty of Engineering, Mahidol University, Thailand. egrmr@mahidol.ac.th ABSTRACT We developed a Network Device Connectivity Monitor (NeDCoM) which retrieves data such as latency, bandwidth, and connectivity from network devices. Using such data, it constructs a C. classification model to predict possible failures of these devices. Thereafter, NeDCom monitors the devices and raises an alarm should a condition indicated by C. s prediction arise. Index Terms Network monitoring, simple network management protocol, SNMP, classification, C.. INTRODUCTI As network becomes one of the most critical infrastructures in many organizations, it is vital to insure its availability and reliability. Besides malicious attacks, user behaviors can contribute to network vulnerability. An evidence is the flood of internet traffic that led to Google s crash moment after the death of Michael Jackson [, ]. In organization scale, heavy traffic tends to have recurring pattern. Fowler and Leland [] observed R&D department s network and found congestion during.00.00,.00.00, and of each day. Kotz and Essien [] observed campus wireless network and found traffic bursts during of each day and on Monday of each week, coinciding with class activities. Power outage and cable cut are also causes of disruption that sometimes possess patterns. For instance, they might occur frequently in stormy season. A number of research have sought to detect early signs of breakdown or performance degradation in the network. Data mining fits perfectly with such detective role. Bivens et al [] used neural network to predict souces of network congestion. Their input was packet measures (average count, variance, and third moment) of each network device, and output was a bit vector encoding suspecious devices. The flow rate of these devices can then be restricted, manually or automatically, to avoid the foreseen problem. In Yamanishi and Maruyama [6], dynamic syslog mining was employed to detect symptoms of failure and identify new emerging failure patterns. Correlation between devices in the event of any failure was also discovered. Other works on predicting network fault or congestion are, for example, [8,9] (they are reviewed in Section.). Our Network Device Connectivity Monitor (NeDCoM) employs data mining techniques to analyze traffic behavior in local area networks and detect possible breakdown of a certain device. It consists of three main modules:. Data Retriever. This module probes network devices by using Simple Network Management Protocol (SNMP) and ping commands. It stores the data in a log file.. Data Analyzer. This module builds a C. classification model by using the logged data. The model describes conditions in which a device connectivity will be or OFF.. Device Monitor. This module periodically feeds the latest data from each device to the classification model. It raises an alarm once an OFF status is predicted. The rest of this paper is organized as follows. Section briefly reviews SNMP and C. classification which are the central ideas of our research. Section presents NeDCoM framework, followed by system testing results in Section. Section finally concludes the paper.. RELATED BACKGROUND.. Simple network management protocol (SNMP) SNMP is set of standard, simple operations that remotely monitor and manage network devices. Manageable devices include any IP device running SNMP agent. The agent may be a separate program or a builtin component of the device. The protocols are based on requests and responses between SNMP manager and managed devices. The former queries certain information from the latter, or requests the latter to perform certain operations. Responses are conveyed in MIB (Management Information Base) variables [] which can be categorized into ten groups, as shown in Table. There are MIB variables in total. Many of them convey redundant information. Thottan and Ji [8] chose five 9

2 MIB variables, from IF (ifinoctets and ifoutoctets) and IP (ipinreceives, ipindelivers, and ipoutrequests) groups, to predict network fault by using statistical techniques. On the other hand, Kulkarni et al [9] predicted network congestion by feeding three variables from IP group (ipinreceives, ipforwdatagrams, and ipoutdiscards) and router s queue statistics to CART and C.0 classification models. Based on their findings, IF and IP variables are the most useful ones for detecting network fault and congestion. These variables, however, convey overlapped information as the traffic flows between the interface and the IP layers. For example, ipinreceives accumulates incoming traffic from all network interfaces, with the measure for each interface being ifinoctets. In the same layer, ifinucastpkts, ifinnucastpkts, ifoutucastpkts, and ifoutnucastpkts measure the amount of incoming unicast, incoming nonunicast, outgoing unicast, and outgoing nonunicast traffic, respectively. The first two variables are added to ifinoctets while the other two variables are added to ifoutoctets. Following the above rationale, we initially focus on IF variables, ifinoctets and ifoutoctets. These variables count the number of octets received and transmitted through each network interface. The total number of interfaces can be checked from ifnumber variable. These information allow us to compute the total volume of incoming and outgoing octets for each device. The SNMP manager was implemented by using Java SNMP API, version. []... C. Classification C. builds a classification model from training data. The model describes the condition of independent attributes that leads to each class prediction. It is typically in the form of a decision tree with the following properties: leaf nodes are the predicted classes; internal nodes are the independent attributes; and arcs leaving an internal node are decisions according to the attribute values of that node. The C. algorithm is roughly as follows: the whole set of data is first regarded as a single tree node. Within each iteration, an independent attribute that best split the data in the current node is selected. Then, child nodes are generated each of them contains the data in each split. The algorithm stops once all the data are successfully classified or certain criteria are met. Otherwise, another independent attribute is selected to split a wavering node. An attribute is selected on the basis of its yielding information gain ratio. That is, entropy before and after the split are measured. The most reduction of entropy indicates the most stability incurred by the classification, hence the most information gain. This measure is normalized to weight out the effect of multiway split (i.e. high information gain, but too many trivial nodes). Details of C. can be found in [, ]. We implemented C. classification by using Javabased Weka API, version.. []. Table. Groups of MIB variables Group System IF AT IP ICMP TCP UDP EGP Transmission SNMP Description Device s name, location, description Network interface (adapter) and traffic Address translation Statistics about IP packets Statistics about ICMP messages TCP algorithms, parameters, statistics Statistics about UDP traffic Statistics about exterior gateway protocol Mediaspecific MIBs Statistics about SNMP traffic Fig. NeDCoM s main window. NEDCOM FRAMEWORK The Network Device Connectivity Monitor (NeDCoM) was written in Java, requiring Java Runtime Environment (JRE) version.6 or higher. Fig. shows its main window. In this research, it ran on a personal computer (NeDCoM host) connected to wired and wireless local area networks (LAN and WLAN, respectively). The maximum speed of LAN is 0 Mbps and that of WLAN is Mbps. Managed devices or hosts in the LANWLAN are Router, FTP Server, File Server, and two other personal computers. Each of them ran Windows XP or Vista with SNMP service, and received or transmitted data via a single network interface... Data retriever module C. model Latest status Log file NeDCoM probes the hosts by using ping commands and SNMP. It stores the following data in a log file: IP address Utilization (%) Average latency (ms) 0

3 Timerelated data (six attributes: day of week, date, month, year, hour, and minute) Connectivity Latency and connectivity are obtained from ping results. Ping communicates with a host via Internet Control Message Protocol (ICMP). It sends ICMP Echo Request to a host and waits for ICMP Echo Reply. The connectivity is set to OFF if the percentage of lost packets exceeds a certain threshold; otherwise, it is set to. Lost packets, indicated by timedout echo replies, occur by a couple of reasons. For example, the host may be broken, not configured properly, disconnected from LANWLAN, or sit behind a firewall. These cases typically incur 0% loss rate. Furthermore, the network may become congested that some replies cannot be delivered in time (the term OFF is slightly misleading, but it is an indication that the host is potentially vulnerable). class J8 { public static void main(string[] args) throws Exception { Object[] i = new Object[9]; int status = 0; i[0] = args[0]; i[] = Double.valueOf(args[]).doubleValue(); i[] = Double.valueOf(args[]).doubleValue(); i[] = args[]; i[] = Double.valueOf(args[]).doubleValue(); i[] = args[]; i[6] = Double.valueOf(args[6]).doubleValue(); i[] = Double.valueOf(args[]).doubleValue(); i[8] = Double.valueOf(args[8]).doubleValue(); System.out.println(J8.classify(i)); public static double classify(object[] i) throws Exception { double p = Double.NaN; p = J8.N660(i); return p; static double N660(Object[] i) { double p = Double.Nan; if (i[] == null) { p = 0; else if (((Double)i[]).doubleValue() <=.0) { p = 0; else if (((Double)i[]).doubleValue() >.0) { p = J8.Neff8(i); return p;... Fig. Classification model embedded in J8 class Fig. Classification model rendered in a decision tree Bandwidth utilization is calculated from SNMP octet measures [] as follows: ( ifinoctets ifoutoctets) 8 Utilizatio n = 0. () Speed Time ifinoctets and ifoutoctets are the number of incoming and outgoing octets within an observed time interval. Timerelated data are taken from NeDCoM host s clock. This log file is used as training data for classification models, with the first nine attributes being independent attributes and the last one being the target attribute or class... Data analyzer module NeDCoM lets user construct a C. (also known as J8 in Weka) classification model from the log file. Parameters required for the model construction includes Binary or multiway split Minimum size of leaf node Pruning strategy The model, embedded in a Java class (see Fig. ), reads the values of independent attributes and predicts whether a host would be or OFF. It can be rendered in a decision tree, as shown in Fig.... Device monitor module NeDCoM periodically feeds the latest data from each host to the classification model. These latest data are also displayed in its main window (see Fig. ). Summarized in Table, the responses to prediction and actual events can be categorized into five cases as follows:. If the host s previous, predicted, and current status are s, NeDCoM moves the current status to the previous one and continues checking the latest status against the prediction.. When the host is OFF unexpectedly, NeDCoM adds this case to the log file, for it to be used in training a new classification model. Furthermore, misprediction count is increased. Once this count reaches a certain threshold, users will be warned that a new, improved classification model should be constructed.. If the previous status is but the predicted status is OFF, NeDCoM raises an alarm. Because our goal is to prevent such problem, wrong prediction (i.e. the host is still ) in this case is desirable and expected.. If, despite the alarm, the foreseen problem still occurs (i.e. the host is eventually OFF), we regard this case as a critical one. Therefore, it will be used to train the next classification model, making the model better aware of this problem in the future.. If the host s previous status is OFF, NeDCoM simply waits until the host is reconnected.

4 Table. Prediction and responses Correct Logged Previous Predicted Current?? OFF OFF OFF OFF OFF Recall that the OFF status does not necessarily mean total host failure. In many cases, it is an indication of heavy congestion at that particular host, which results in too many ping s timedout replies. Once the host is reconfigured, either automatically or manually, and the amount of traffic is dropped, the connectivity status will return to. For flexibility, NeDCoM allows offsets to be added to the current utilization and time. For example, suppose that the utilization offset is %. An alarm will be raised if the host s current utilization is within % of that predicted to cause disconnectivity, given that the other attribute values also match the predicted ones. Likewise, if the time offset is minutes, an alarm will be raised minutes earlier than the predicted time.. SYSTEM TESTS Two synthetic data sets were used to train first classification models. Each data set contained 800 records. The utilization ranged from 0 to 0% and the latency ranged from 0 to 60 ms. The connectivity was either or OFF according to the following conditions: Data set A If (utilization ), then OFF If (utilization AND latency ), then Otherwise, Data set B If (utilization AND latency 0), then OFF Otherwise, Functional tests on NeDCoM s alarms (cases and in Table ) and responses to unexpected misprediction (case ) were conducted. The following were set up for the tests:. L and L: The personal computers within the LAN continuously downloaded files of various sizes from the File Server. Initial classification models were built from data set A in L and data set B in L.. W and W: Likewise, the personal computers within the WLAN continuously downloaded files from the FTP Server. Initial classification models were built from data set A in W and data set B in W.. L: After a period of smooth traffic in the LAN, cable connected to a host was unplugged.. W: After a period of smooth traffic in the WLAN, a host s wireless signal receiver was switched off. Table. Alarming tests in LAN, observed on File Server L L Util Latency Alarm Util Latency Alarm Table. Alarming tests in WLAN, observed on Router W W Util Latency Alarm Util Latency Alarm 6 Table. of FTP Server and NeDCoM s warning about misprediction (and new model construction) Previous L Predicted Misprediction Warning Previous W Predicted Misprediction Warning L, L, W, and W were simulated ten times each. Average utilization, average latency, and alarming results on the monitored hosts are displayed in Tables and. In summary, everytime the current latency and utilization of the monitored host matched any OFF condition, an alarm was duly raised by NeDCoM. L and W were simulated five times each. of the monitored hosts and warning about misprediction are

5 shown in Table. Because the misprediction threshold was set to, the warning was raised every time the host was unexpectedly disconnected. Unfortunately, due to the rarity of the events, they had no impact on the new classification model despite being included in the training data set. These tests only affirm that NeDCoM is able to monitor network devices and response to classes of events as it was designed to. But the testing environments are only LAN and WLAN connecting a few devices, and the simulated traffic may not reflect the real one. To further evaluate NeDCoM s performance, strengths, and weaknesses, true pictures of the traffic in various conditions are first needed. It is indeed one of our ongoing research directions.. CCLUSI This paper has presented a Network Device Connectivity Monitor (NeDCoM). It retrieves data from network devices via SNMP and ping, and builds a C. classification model from these data. The model is used to monitor each device thereafter. Once a sign of device disconnectivity is detected, NeDCoM raises an alarm. It also keeps track of the model s accuracy and when the misprediction count reaches a certain threshold, users will be warned that a new model is needed. As mentioned earlier, one of our research directions is to evaluate NeDCoM in conditions where traffic behavior is close to the real one. We have yet to fully analyze the model construction policy, e.g. when and upon which data set a new model should be constructed. Other issues such as false alarms and the effect of NeDCoM s probing on the overall network performance should also be investigated. In another direction, NeDCoM itself can be enhanced. For example, more data can be extracted from other MIB variables, and alternative classification techniques can also be incorporated. Finally, although ping is a simple tool for checking the status of network devices, there are a few limitations in real practice. A common problem is that ping s ICMP packets are blocked as a precaution against pingsweeping or pingflooding attacks. An alternative strategy is to check whether a device is connected to some particular services by using connectionbased protocols such as TCP (Transmission Control Protocol). This will be included in our future work. 6. REFERENCES [] M. Shiels, Web slows after Jackson s death, BBC News, 6 June 09. Retrieved from 80.stm. [] H. J. Fowler and W. E. Leland, Local area network characteristics, with implication for broadband network congestion management, IEEE Journal on Selected Areas in Communications, 9(), pp. 99, 9. [] D. Kotz and K. Essien, Analysis of a campuswide wireless network, Wireless Networks, (), pp., 0. [] J. A. Bivens, B. K. Szymanski, and M. J. Embrechts, Network congestion arbitration and source problem predition using neural networks, Smart Engineering System Design,, pp., 0. [6] K. Yamanishi and Y. Maruyama, Dynamic syslog mining for network failure monitoring, Proc. of the th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, Chicago, IL, pp. 9908, 0. [] K. McCloghrie and M. Rose, Management information base for network management of TCPIPbased internets: MIBII, RFC, 9. [8] M. Thottan and C. Ji, Statistical detection of enterprise network problems, Journal of Network and Systems Management, (), 99. [9] P. G. Kulkarni, S. I. McClean, G. P. Parr, and M. M. Black, Deploying MIB data mining for proactive network management, Proc. of the rd Intl. IEEE Conf. on Intelligent Systems, pp. 06, 06. [] Java SNMP package (opensource), [] J. R. Quinlan, C.: programs for machine learning, Morgan Kaufmann, 9. [] I. H. Witten and E. Frank, Data mining: practical machine learning tools and techniques ( nd ed), Elsevier Inc., 0. [] Weka: data mining software in Java (opensource), [] D. Mauro and K. Schmidt, Essential SNMP ( nd ed), O Reilly Media Inc., 0. [] O. Garnham, Michael Jackson fan traffic crashes Google, Twitter and other sites, IT World Canada Newsletter, June 09. Retrieved from ac68ba96e0.html.

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

Lecture 12: Network Management Architecture

Lecture 12: Network Management Architecture Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Have your JACE also monitor your Ethernet network

Have your JACE also monitor your Ethernet network Have your JACE also monitor your Ethernet network It may not be well known that besides monitoring/ controlling your HVAC systems, your lights, your security systems, etc. your JACE can also be used to

More information

How To Manage Network Performance

How To Manage Network Performance Performance Management: Best Practices White Paper Document ID: 15115 Contents Introduction Background Information Critical Success Factors Indicators for Performance Management Performance Management

More information

Development of Monitoring Tools for Measuring Network Performances: A Passive Approach

Development of Monitoring Tools for Measuring Network Performances: A Passive Approach IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun,

More information

Cisco Performance Management: Best Practices White Pap

Cisco Performance Management: Best Practices White Pap Cisco Performance Management: Best Practices White Pap Table of Contents Performance Management: Best Practices White Paper...1 Introduction...1 Background Information...1 Critical Success Factors...2

More information

A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data

A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection

More information

OpenDaylight Project Proposal Dynamic Flow Management

OpenDaylight Project Proposal Dynamic Flow Management OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do

More information

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

MULTI WAN TECHNICAL OVERVIEW

MULTI WAN TECHNICAL OVERVIEW MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

Keywords- Network Management, DoS attack, Network Diagram.

Keywords- Network Management, DoS attack, Network Diagram. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient Network

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

A standards-based network monitoring system

A standards-based network monitoring system A standards-based network monitoring system Javier F. Díaz Laura A. Fava Alejandro J. Sabolansky Computer Science School, National University of La Plata 50 and 120, 2nd floor, La Plata, Buenos Aires,

More information

52-20-16 Using RMON to Manage Remote Networks Gilbert Held

52-20-16 Using RMON to Manage Remote Networks Gilbert Held 52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright

More information

AIMMS The Network License Server

AIMMS The Network License Server AIMMS The Network License Server AIMMS AIMMS 4.0 July 1, 2014 Contents Contents ii 1 The Aimms Network License Server 1 1.1 Software requirements........................ 1 1.2 Installing and deploying

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

School of Information Science (IS 2935 Introduction to Computer Security, 2003) Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack

More information

Using Ranch Networks for Internal LAN Security

Using Ranch Networks for Internal LAN Security Using Ranch Networks for Internal LAN Security The Need for Internal LAN Security Many companies have secured the perimeter of their network with Firewall and VPN devices. However many studies have shown

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Features Overview Guide About new features in WhatsUp Gold v14

Features Overview Guide About new features in WhatsUp Gold v14 Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

A Systemfor Scanning Traffic Detection in 3G WCDMA Network 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology

More information

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship Testing Services and Programs 1200 N. DuPont Highway Dover, DE 19901 https://www.desu.edu/academics/mycaa Contact: Amystique Harris-Church 302.857.6143 achurch@desu.edu Education & Training Plan IT Network

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship University of Texas at El Paso Professional and Public Programs 500 W. University Kelly Hall Ste. 212 & 214 El Paso, TX 79968 http://www.ppp.utep.edu/ Contact: Sylvia Monsisvais 915-747-7578 samonsisvais@utep.edu

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Information Security Training. Assignment 1 Networking

Information Security Training. Assignment 1 Networking Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Firewall Security: Policies, Testing and Performance Evaluation

Firewall Security: Policies, Testing and Performance Evaluation Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK lyu@cse.cuhk.edu.hk,

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

VoIP Reliability in Managed Service Deployments

VoIP Reliability in Managed Service Deployments 1 VoIP Reliability in Managed Service Deployments Technical White Paper Introduction This White Paper introduces the Aspen 365 family of network appliances and explains how service providers offering a

More information

Cisco Bandwidth Quality Manager 3.1

Cisco Bandwidth Quality Manager 3.1 Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

Network Considerations for IP Video

Network Considerations for IP Video Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time

More information

Rapid Assessment Key v2 Technical Overview

Rapid Assessment Key v2 Technical Overview Rapid Assessment Key v2 Technical Overview Overview The Rapid Assessment Key v2 is an extremely easy to use USB device that quickly collects data on networked imaging devices. The key allows office equipment

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Improving Network Efficiency for SMB Through Intelligent Load Balancing

Improving Network Efficiency for SMB Through Intelligent Load Balancing Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469)

Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469) Special Note Connection Problems and Handling Methods (CS203 / CS468 / CS469) Sometimes user cannot find the RFID device after installing the CSL Demo App and the RFID reader is connected. If user cannot

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information

SapphireIMS Business Service Monitoring Feature Specification

SapphireIMS Business Service Monitoring Feature Specification SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Seung-Hwa Chung 1, Deepali Agrawal 1, Myung-Sup Kim 1, James W. Hong 1, and Kihong Park 2 1 DPNM Lab., Dept. of Computer

More information

A Summary of Network Traffic Monitoring and Analysis Techniques

A Summary of Network Traffic Monitoring and Analysis Techniques http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, acecil19@yahoo.com Abstract As company intranets

More information

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch. Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 4 Solutions Out: 12/03 Due: 12/10 1. Routers and QoS Packet # Size Flow 1 100 1 2 110 1 3 50 1 4 160 2 5 80 2 6 240 2 7 90 3 8 180 3 Suppose a router has three input

More information

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information