Flow Monitoring With Cisco Routers
|
|
- Cori McCormick
- 3 years ago
- Views:
Transcription
1 CSAMP: A System for Network- Wide Flow Monitoring Vyas Sekar,Michael K. Reiter, Walter Willinger, Hui Zhang,Ramana Rao Kompella, David G. Andersen Presentation by Beletsioti Georgia
2 Flow measurements today There was a router-centric view of current measurements solutions in network, until now. Routers are completely independent of each other, so we have much more flow measurements that we need and inefficient use of router resources So we pass from a router-centric approach to a systemwide approach of monitoring network
3 What is Csamp? Csamp, a system for Network-Wide Flow Monitoring Csamp is made because current flow monitoring solutions are inadequate for many network management applications Csamp is a system for coordinated flow monitoring within an AS (Autonomous System) The goal of csamp is to assign sampling responsibilities to routers in a coordinated manner to optimize network-wide flow monitoring objectives. Coordinated Sampling
4 Motivation Design System Architecture Discussion & Future Work Evaluation Conclusions
5 Motivation In past many people tried to design such network-wide flow monitoring systems, but they were not such efficient such Csamp There are 5 criteria that a flow monitoring system should satisfy provide high flow coverage minimize redundant reports satisfy network-wide flow monitoring objectives work within router resource constraints be general enough to support a wide spectrum of flow monitoring applications
6 Design of Csamp 3 basic ideas Flow sampling instead of packet sampling Hash-based coordination Network-wide optimization
7 Random flow sampling preserves the fidelity of traffic estimation (single router) Each router has a table of hash ranges indexed using a key. By receiving a packet the router looks the hash range (key = hash of packet s header fields), computes the 5-tuple (srcip, dstip, srcport, dstport, protocol) of an IP flow, if the hash falls in the range of the cell, this hash is used as index to a flow table, if the flow already exists it updates the entry else it creates a new one.
8 Random flow sampling preserves the fidelity of traffic estimation (single router) On a single router, do random *flow* (not packet) sampling. Each packet header is hashed Hash range {1,6} {7,9} ok We have an entry in flow table Use as index If falls {10, 12}.. Flow table If flow already exists update else create new entry Computes 5-tuple
9 Hash-based coordination uses hash-based selection (using the same hash function but having different hash ranges) to eliminate duplicate measurements in the network. So different routers can monitor disjoint flows without requiring explicit communication between routers (multiple routers, single path)
10 Hash-based coordination multiple routers Hash range Flow table Hash range Flow table Hash range Flow table Hash of any flow will match at most one router s hash range!!
11 Network-wide optimization uses optimization framework to specify and satisfy network wide monitoring objectives while respecting router resource constraints. Note : Many paths = Origin - Destination (OD) pairs in network Single path network Multiple origin-destination pairs in the network. Per origindestination pair, assign non-overlapping ranges to each router.each router has a sampling manifest that specifies the hash range for each origin-destination pair that it might see. For each packet, see if it should be logged (based on hash and origin-destination), and log it. The routers then generate flow reports which can be sent back to existing applications
12 {1,5} {7,9} Hash range for each OD pair Get OD-pair from packet Green or Yellow????
13 Csamp algorithm for router Get OD-pair from packet (usually based on packet information, src & dst IP addresses) Compute hash (flow = packet 5-tuple) Look up hash-range for OD-pair from sampling manifest Log if hash falls in range for this OD-pair
14 To achieve flow monitoring goals specified in terms of OD- pairs, csamp optimization engine needs the traffic matrix and routing information. Traffic matrices obtained by using estimation techniques that may have errors, so appropriate techniques are used in order to minimize the error.
15 input Traffic matrix Routing information Optimization engine output Sampling manifests dissemination Make reports
16 System Architecture Mechanisms Obtaining Origin Destination pairs in network for packets the ingress routers mark each packet header with the OD-pair identifier (given by optimization engine). Responding to long-term (e.g. uses traffic during previous week) & short-term traffic dynamics avoiding underfitting and overfitting the optimization engine must be able to predict the traffic matrix to compute the sampling manifests
17 Manage memory resources on routers We store only flow counters in StaticRam(SRAM) instead of storing the whole flow record (the IP 5-tuple, the OD-pair identifier, and counters). Computing the optimal solution In order to respond in near-real time to network dynamics, use new more efficient algorithms. Handling routing changes Precompute sampling manifests for different scenarios in a given measurement cycle, so if there is a change an appropriate sampling manifest corresponding to this scenario is already available.
18 Evaluation Comparison between Csamp and other previous systems
19 Coverage
20 Redundant flow reporting
21 Flow coverage per OD-pair
22 Coverage VS optimal solution Estimated traffic with our engine Vs Actual traffic
23 Discussion & Future Work OD-pair identifiers Modifications to packet header Upgrades to border routers to compute the engress router for each packet Router memory exhaustion A router s flow memory might be exhausted due to traffic dynamics Find better choice of eviction of flow records Changes cause loss of flow coverage or duplicates Applications Confirm that csamp provides better fidelity to traditional traffic engineering applications
24 Conclusion Existing solutions focus on incrementally improving single-router sampling algorithms, instead of Csamp, a system that takes a network wide approach to flow monitoring.
25 So.. Much greater monitoring coverage Better use of router resources Satisfy better flow monitoring goals compared to existing solutions
26 Questions???
Network optimization and Flow Management Design
CSAMP: A System for Network-Wide Flow Monitoring Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, David G. Andersen Carnegie Mellon University, UNC-Chapel Hill, AT&T Labs-Research,
More informationBetter Architectures and New Security Applications for Coarse Network Monitoring
Better Architectures and New Security Applications for Coarse Network Monitoring Michael Reiter reiter@cs.unc.edu Lawrence M. Slifkin Distinguished Professor Department of Computer Science University of
More informationRevisiting the Case for a Minimalist Approach for Network Flow Monitoring
ACM, 2. This is the authors' version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version is available at http://doi.acm.org/.45/8794.87986.
More informationRevisiting the Case for a Minimalist Approach for Network Flow Monitoring
Revisiting the Case for a Minimalist Approach for Network Flow Monitoring Vyas Sekar Carnegie Mellon University Pittsburgh, PA vyass@cs.cmu.edu Michael K Reiter UNC Chapel Hill Chapel Hill, NC reiter@cs.unc.edu
More information8. 網路流量管理 Network Traffic Management
8. 網路流量管理 Network Traffic Management Measurement vs. Metrics end-to-end performance topology, configuration, routing, link properties state active measurements active routes active topology link bit error
More informationSDN Programming Languages. Programming SDNs!
SDN Programming Languages Programming SDNs! The Good Network-wide visibility Direct control over the switches Simple data-plane abstraction The Bad Low-level programming interface Functionality tied to
More informationApplication Note. Stateful Firewall, IPS or IDS Load- Balancing
Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls
More informationMining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning
More informationKeywords: Network Management, Traffic Monitoring, Redundancy Elimination, Network Security, Intrusion Detection
Effective Network Management via System-Wide Coordination and Optimization Vyas Sekar CMU-CS-10-137 Aug 2010 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Thesis Committee:
More informationDetecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
More informationDistributed Network Traffic Monitoring and Analysis using Load Balancing Technology
Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology Soon-Hwa Hong, Jae-Young Kim, Bum-Rae Cho and James W. Hong Dept. of Computer Science and Engineering, Pohang Korea Email:
More informationFirewall Examples. Using a firewall to control traffic in networks
Using a firewall to control traffic in networks 1 1 Example Network 1 2 1.0/24 1.2.0/24.4 1.0.0/16 Rc 5.6 4.0/24 2 Consider this example internet which has: 6 subnets (blue ovals), each with unique network
More informationHow To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4
Cisco - Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switch...Page 1 of 10 Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationNetwork Virtualization Based on Flows
TERENA NETWORKING CONFERENCE 2009 June 9, 2009 Network Virtualization Based on Flows Peter Sjödin Markus Hidell, Georgia Kontesidou, Kyriakos Zarifis KTH Royal Institute of Technology, Stockholm Outline
More informationNetwork Security through Software Defined Networking: a Survey
jerome.francois@inria.fr 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
More informationNetwork Tomography and Internet Traffic Matrices
Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert
More informationWireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology cwhite@riverbed.com SHARKFEST
More informationApplication Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
More informationOutline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions
Outline The Problem BGP/Routing Information BGP-Inspect Information Extraction from BGP Update messages VAST Internet AS topology Visualization Netflow/Traffic Information Flamingo Internet Traffic Exploration
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationFacility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationBOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES. Thesis SCALABLE COORDINATION TECHNIQUES FOR DISTRIBUTED NETWORK MONITORING MANISH RAJ SHARMA
BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Thesis SCALABLE COORDINATION TECHNIQUES FOR DISTRIBUTED NETWORK MONITORING by MANISH RAJ SHARMA B.E., Birla Institute of Technology, 1998 Submitted
More informationOpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
More informationLoad-Balancing Introduction (with examples...)
Load-Balancing Introduction (with examples...) For AFNOG 2015 By Frank Kuse (Rework of slides from Joel Jaeggli and Laban Mwangi) 1 Load-Balancing Introduction (with examples...) For AFNOG 2015 By Frank
More informationEfficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
More informationDesign and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
More informationApplication Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
More informationMikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012
MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8
More informationAn Analysis of the DiffServ Approach in Mobile Environments
1 An Analysis of the DiffServ Approach in Mobile Environments Torsten Braun, University of Berne, Switzerland. (braun@iam.unibe.ch) Claude Castelluccia, INRIA Rhône-Alpes, France. (claude.castelluccia@inrialpes.fr)
More informationLimitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationTowards Load Balancing in SDN Networks During DDoS attacks
Towards Load Balancing in SDN Networks During DDoS attacks Mikhail Belyaev St.Petersburg Polytechnic University Svetlana Gaivoronski Moscow State University ARCCN DDoS - attacks DDoS attack distributed
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationDr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
More informationConflict Classification and Analysis of Distributed Firewall Policies
Conflict Classification and Analysis of Distributed Firewall Policies 1 Ehab Al-Shaer and Hazem Hamed School of Computer Science DePaul University, Chicago, USA Email: {ehab, hhamed}@cs.depaul.edu Raouf
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationLeveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks arajagopal@foundrynet.com Agenda 2 Why Load
More informationIntegrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationAgenda. sflow intro. sflow architecture. sflow config example. Summary
sflow Features Agenda sflow intro. sflow architecture sflow config example Summary 1 What is sflow? sflow is a technology for monitoring traffic in data networks containing switches and routers. S9700
More informationMPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
More informationEE627 Lecture 22. Multihoming Route Control Devices
EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices
More informationEnabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches
Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches Revised 2/1/2007 Introduction...2 Requirements...2 Catalyst 4500 Series...2 Enabling NetFlow...2 Configuring a NetFlow Destination...3
More informationPanopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks
Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks Dan Levin withmarco Canini, Stefan Schmid, Fabian Schaffert, Anja Feldmann Enterprise Network Management Policy changes
More information6/8/2011. Document ID: 12023. Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction
Page 1 of 9 Products & Services Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents Introduction Prerequisites Requirements Components Used Conventions
More informationCS 91: Cloud Systems & Datacenter Networks Networks Background
CS 91: Cloud Systems & Datacenter Networks Networks Background Walrus / Bucket Agenda Overview of tradibonal network topologies IntroducBon to soeware- defined networks Layering and terminology Topology
More informationBoosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007. Sanjay Khanna Foundry Networks skhanna@foundrynet.
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007 Sanjay Khanna Foundry Networks skhanna@foundrynet.com Agenda Why we need Load-Sharing Methods to boost capacity Trunks/Link
More informationRouter Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
More informationExperimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA (Amir.Krifa@sophia.inria.fr) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
More informationEthernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
More informationDiscovery of Policy Anomalies in Distributed Firewalls
Discovery of Policy Anomalies in Distributed Firewalls Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
More informationStatic Load Balancers Implemented with Filters
www.netoptics.com 2 1 This application note explains the concept of static load balancing and illustrates how to create them using filters. ackground The purpose of load balancing in a network traffic
More informationDistributed Denial of Service Attacks & Defenses
Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011 Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources:
More informationJ-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
More informationFIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationInternet Ideal: Simple Network Model
Middleboxes Reading: Ch. 8.4 Internet Ideal: Simple Network Model Globally unique identifiers Each node has a unique, fixed IP address reachable from everyone and everywhere Simple packet forwarding Network
More informationInternet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb Intelligence at the end-systems Different communication paradigms Connection oriented
More informationLink-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP
Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Dahai Xu, Ph.D. Florham Park AT&T Labs - Research Joint work with Mung Chiang and Jennifer Rexford (Princeton University)
More informationIP Traffic Engineering over OMP technique
IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,
More informationLoad Balancing Using PCC & RouterOS
Load Balancing Using PCC & RouterOS 1. What is load balancing and why would I want it? 2. Which method should I pick and how does it work? 3. Ok, I want it but how do I set it up? Typical Scenario Requiring
More informationTool Optimization. Benefits. Introduction. Technical Brief. Extend the usage life of tools and avoid costly upgrades
Tool Optimization Technical Brief Benefits Extend the usage life of tools and avoid costly upgrades Increase the accuracy and results of data analysis Extend capacity of storage media by optimizing data
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationSteve Worrall Systems Engineer. sworrall@foundrynet.com
Steve Worrall Systems Engineer sworrall@foundrynet.com Agenda 100GbE Load sharing/link aggregation Foundry Direct Routing 2 100 Gigabit Ethernet 3 Current Status PAR approved, 802.3ba task force set up
More information- EtherChannel - Port Aggregation
1 Port Aggregation - EtherChannel - A network will often span across multiple switches. Trunk ports are usually used to connect switches together. There are two issues with using only a single physical
More informationIP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
More informationRapidIO Network Management and Diagnostics
RapidIO Network Management and Diagnostics... Is now even easier! Release 1.1 Overview RapidIO Discovery and Diagnostic Basics Loopback Diagnostic Mode (NEW) Multiple Simultaneous Routing paths (New) Controlling
More informationConfiguring Advanced Server Load Balancing
CHAPTER 5 This chapter describes how to configure advanced server load balancing (SLB) on the CSM and contains these sections: Configuring URL Hashing, page 5-1 Configuring Firewall Load Balancing, page
More informationWhat s New in VMware vsphere 5.5 Networking
VMware vsphere 5.5 TECHNICAL MARKETING DOCUMENTATION Table of Contents Introduction.................................................................. 3 VMware vsphere Distributed Switch Enhancements..............................
More informationUnderstanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility
More informationFIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING
FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information
More informationHow To Establish IPSec VPN connection between Cyberoam and Mikrotik router
How To Establish IPSec VPN connection between Cyberoam and Mikrotik router Applicable Version: 10.00 onwards Scenario Establish IPSec VPN connection between Cyberoam and Mikrotik router using Preshared
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationTable of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
More informationOn the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
More informationSavera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
More informationReformulating the monitor placement problem: Optimal Network-wide wide Sampling
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot
More informationVanguard Applications Ware IP and LAN Feature Protocols. Firewall
Vanguard Applications Ware IP and LAN Feature Protocols Firewall Notice 2008 Vanguard Networks. 25 Forbes Boulevard Foxboro, Massachusetts 02035 Phone: (508) 964-6200 Fax: 508-543-0237 All rights reserved
More information---------------------------------------------------------------------------------
Offline Flow Analysis Tool (OFAT) Version 2 Documentation, March 9, 2010 OFAT.pbs Year, month, day, router name, UVA_gap, UVA_min_flowlength, UVA_long, UVA_short, code directory, output directory yyyy
More informationThe Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
More informationEMIST Network Traffic Digesting (NTD) Tool Manual (Version I)
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...
More information100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.com 1 Agenda 2 40GE/100GE Timeline to Standardization The Ethernet Alliance
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationPort evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
More informationMultiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
More informationFirewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
More informationLoad Balancing Using PCC & RouterOS
Load Balancing Using PCC & RouterOS About Me Steve Discher, from College Station, Texas, USA Class of 87 Texas A&M University Using MikroTik since early 2004 when I started my first WISP Author of the
More informationAdaptive Multi-task Monitoring System Based on Overhead Prediction
Adaptive Multi-tas Monitoring System Based on Overhead Prediction Imed Lassoued, Chadi Baraat Planete Project-Team, INRIA Sophia-Antipolis, France {Imed.Lassoued, Chadi.Baraat}@sophia.inria.fr ABSTRACT
More informationLEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement
LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement Chia-Wei Chang, Guanyao Huang, Bill Lin, Chen-Nee Chuah University of California, San Diego, University of California, Davis ABSTRACT
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
More informationLink Aggregation and its Applications
Link Aggregation White Paper Link Aggregation and its Applications Asante 47709 Fremont Blvd Fremont, CA 94538 USA SALES 408-435-8388 TECHNICAL SUPPORT 408-435-8388: Worldwide www.asante.com/support support@asante.com
More informationChapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
More informationPART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
More informationAlgorithms for Advanced Packet Classification with Ternary CAMs
Algorithms for Advanced Packet Classification with Ternary CAMs Karthik Lakshminarayanan UC Berkeley Joint work with Anand Rangarajan and Srinivasan Venkatachary (Cypress Semiconductor) Packet Processing
More information