cnetmon: Ncurses-based Network Interface Activity Monitor

Size: px
Start display at page:

Download "cnetmon: Ncurses-based Network Interface Activity Monitor"

Transcription

1 Int'l Conf. Software Eng. Research and Practice SERP' cnetmon: Ncurses-based Network Interface Activity Monitor Steve Hutchinson 1, John Wittkamper 1, Jovina Allen 1, Robert F. Erbacher 2 1 ICF International for US Army Research Laboratory, Adelphi, MD US Army Research Laboratory, Adelphi, MD Abstract - This report illustrates the development and use of a network interface activity monitoring tool named cnetmon. This tool is intended to aid system administrators and developers with network-oriented software projects. The main objective for this project was to develop a capability to monitor network activity for all or selected interfaces on a system simultaneously and continuously. We use a display generated by the Linux ncurses library that is updated using a configurable interval. We show added capabilities including interactive response to window-resizing using SIGWINCH. A novel debug-line display capability is provided to show dynamic debug messages on a dedicated line of the display. Keywords: network traffic monitoring, network interface, systems administration, ncurses 1 Introduction cnetmon 1 is a very lightweight command-line tool to display network traffic (packet activity) on any or all of the network interfaces (NIs) on a Linux-based system It uses a ncurses-library-based display that is compatible with any character-based pseudo terminal, and as such, does not require the use of the system graphical user interface (GUI) or Xserver:DISPLAY. cnetmon is intended for use in the field for remote access into devices such as (network) sensors or other network-attached Linux systems when an administrator with user-level access needs to obtain a dynamic indication of all network traffic entering and leaving that system. Because it does not use the GUI, the complexity and access requirements are very minimal. cnetmon can be invoked by any logged-in user, it does not require sudo access, and it can operate within a typical secure shell (ssh) or telnet session. 1 Throughout this paper, Linux commands are set in an italic font. 2 Motivation Server farms, cloud computing, compute clusters, and grid computing are all examples of a common technique to combine multiple computer systems into a cooperative network of systems. These systems often intercommunicate using two or more NIs (on each system). Clusteredcomputers are often rack-mounted for higher density and, as a result, often lack a keyboard or monitor; therefore, they are frequently managed and configured remotely via ssh or telnet over a network connection. During system configuration, installation, and testing, it is often difficult to determine whether network traffic is being sent and received by each interface. In general, such systems are built and configured in a central location and then shipped to remote locations to be added to other servers in a system rack or as a single distributed sensor. cnetmon allows the installer to observe network traffic from each or all NIs to verify that the system seems properly configured for the installed environment. It also does not require the use of the system GUI or Xserver/client because cnetmon will create tabular displays of all traffic using the LIBCURSES library for display on any attached ASCII terminal emulator. cnetmon can be used from a remote location, accessed and invoked typically from a ssh command-line, and can be invoked by any logged-in user; it does not require root-level access. Many techniques to observe or sample traffic from any NI require super-user privileges, but obtaining elevated privileges is often forbidden, hence a benefit of cnetmon. In this paper, we describe a few use-cases for cnetmon. First, cnetmon can be used on a laptop computer, which often has two NIs: wired (eth1) and wireless (wlan), along with the internal loopback interface. Laptop-users often must transition between networks without rebooting. cnetmon is easily invoked from a command window and will show all NI activities to verify communications to the desired network(s). Second, on a desktop or small server with multiple wired or wireless interfaces, cnetmon can show all network activity for each interface dynamically in this more complex network topology. Third, compute-server administration and configuration tasks are often performed using a separate administrative system and command-line tools. cnetmon facilitates server configuration and testing and was developed for use in these more complex, multi-network

2 158 Int'l Conf. Software Eng. Research and Practice SERP'15 environments. We frequently use one cnetmon window per server during configuration, development, and testing, to obtain a real-time picture of network inter-communications and to verify proper configuration and operation. 3 Related work: bmon In the search for a user-level, multi-ni monitor, we noticed the bmon tool [1], which provides indications of network bandwidth utilization from multiple interfaces using the /proc/ file-system [2] and a curses-interface. We use this strategy to implement a curses-based multi-interface activity tool, cnetmon, providing various command-line and keypress event-driven parameters to control the display and monitoring update interval. Although bmon was intended to show network bandwidth utilization, we liked its design paradigm using a ncurses display using periodic updates obtained from /proc/net/. Our goal was not to show estimated bandwidth utilization, but to show concurrent network activity measured in terms of packet counts and transfer rates per sampling interval and accumulated for the session. 4 How it works A long-standing problem for understanding network activity between (Linux or *nix) systems has been the requirement to obtain root or super-user privileges to access and configure devices, such as a NI. ifconfig is the Unix or Linux command to display the status of NI devices on a system. Upon executing the ifconfig command, the following information is produced on the console, shown below in Figure 1. The first 6 lines pertain to the hardware and network address parameters for each interface as well as the status of the interface. The remaining lines show counts of transmitted and received packets, error counts, and finally the interrupt number and buffers memory location. user@asc2:~$ ifconfig eth0 Link encap:ethernet HWaddr 00:24:81:1c:fd:7d inet addr: Bcast: Mask: inet6 addr: 2601:a:4680:3e6:5cf:ea3d:eed0:64e0/64 Scope:Global inet6 addr: fe80::224:81ff:fe1c:fd7d/64 Scope:Link inet6 addr: 2601:a:4680:3e6:224:81ff:fe1c:fd7d/64 Scope:Global UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:370 errors:0 dropped:0 overruns:0 frame:0 TX packets:120 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:46300 (46.3 KB) TX bytes:20936 (20.9 KB) Interrupt:19 Memory:f f Figure 1. Typical ifconfig output. Although it is true that we could issue ifconfig repeatedly to obtain the configuration and counts for network devices, this function call is not intended for repeated invocation to determine network traffic rates. Modern Linux systems provide a /proc/ file system to allow user-level processes to easily read a wide variety of counts for devices; these values are maintained and updated by the kernel in a virtual file system, /proc/. The /proc/ file system was originally intended as a way to provide information about processes in a system. As such, it also was a convenient means of exposing kernel information to a structured file system requiring only user-access rights to read this information. A corresponding application programming interface (API) is provided for read and write access using sysctl (system control) calls to configure parameters of the running kernel [3]. This capability was gradually introduced into Unix systems starting as early as 1984; the current implementation in Linux is as an extended, virtual file system contained only in memory and has directories for other kernel information categories such as kernel-modules, filesystems, interrupts, and devices including NIs, kernel messages, drivers, and CPUs. The cnetmon executable periodically examines the /proc/net/dev file on the Linux system. These values are sampled on each loop cycle (by default, one second), which is configurable on invocation or by pressing a number-key while running. Linux systems also maintain an uptime value, the number of seconds since last rebooting. cnetmon saves this date-time value at launch (fork) time and displays the session length time in the screen header section Contents of /proc/net/dev: Interface lo: bytes packets 6267 frame 0 multicast 0 bytes packets 6267 colls 0 carrier 0 eth0: bytes packets frame 0

3 Int'l Conf. Software Eng. Research and Practice SERP' multicast 3120 bytes packets colls 0 carrier 0 5 Implementation The design goals and requirements for cnetmon are to periodically examine the network device-file in the /proc directory on a Linux system to: Enumerate NIs Collect traffic statistics Convert traffic counts to display quantities and units Allow a variety of command-line arguments We also provide a release make/build capability for most Linux systems (including embedded devices, such as Raspberry Pi, etc.) After initialization during which command-line arguments are parsed, cnetmon enters the main_loop. With each pass through main_loop, it obtains new counts for packets, bytes, errors, drops, collisions, etc., and calculates display values as requested updating the ncurses display at the end of each interval. Display values are calculated from the following: Li update loop interval, in seconds Tu Linux uptime in seconds (since reboot) Tnow current Linux system time, epoch time seconds T0 cnetmon invocation start timestamp in epoch time seconds Ls session time length in seconds: (Tnow T0) P[i] packet count parameter from /proc/net/dev, at time interval = i B[i] byte count parameter from /proc/net/dev, at time interval = i For each interface and at each interval: SessionPKT s P[ Tnow ] P[ T 0] (1) IntervalPK Ts P[ Tnow ] P[ now i] (2) SessionRat e ( B[ Tnow ] B[ T 0]) /1000 * Li] (3) IntervalRa te P[ Tnow ] P[ T 0] (4) Command-line programs used for monitoring often generate display data output in the form of one-line records and then render them into a scrolling console window. Very wide, or multi-line records, when scrolled like this, are difficult to understand. Since network interface data is of this nature, a scrolling display will be difficult to use. Instead, we use a display technique that renders these parameters in strict rows and columns such that the location of each on the screen does not change. This tabular process makes the changing parameters more obvious. Cell contents can change with the fixed regularity of the chosen update loop interval. Although this is a somewhat primitive display technique compared with GUI implementations, such a capability is easily provided by the Linux, Ncurses library. Ncurses allows development of rather sophisticated tabular displays, useful in situations in which a GUI display is unavailable (as would be the case for many headless server or computeclustered environments). 6 Ncurses library Ncurses [4] stands-for new curses a reimplementation of the curses library to use a text-based terminal to emulate a more dynamic interface that has some attributes of a modern GUI. Curses was originally developed at the University of California at Berkeley for a Berkeley Software Division (BSD) release around Ncurses contains enhancements to curses and was made available starting in the mid-1990s under a Permissive free software license and not the General Public License (GPL) to afford wide redistribution and linking to this library.

4 160 Int'l Conf. Software Eng. Research and Practice SERP'15 interface row-sets that will fit in the new window and updates the display generation parameters in ncurses without resetting any of the current packet counts and rates. Figure 2 illustrates the various sub functions within main_loop, showing the generation and response to window size changes. Figure 3 below shows the help message with option switches and their meaning. Help message: cnetmon -H cnetmon [ad:ehhi:lm:n:rttu:] -a Show errors, data rate & totals (-ert) -D # Debug level (0-15) -e Show error data -H Help message -i name Ignore interface name -L List interfaces (with some statistics) -m name Show only interface name -n # Show total bytes for system uptime -r Show data rate -t Show data totals -T Show total bytes the Quick display -u # Update frequency, seconds (default 1) Interactive: d/d Scroll down interface list q/q Quit r/r Reset Session time u/u Scroll up interface list 1-9 Load value into interval time Figure 3. Usage help message. Figure 2. Resize of window to reveal additional interface row-sets. cnetmon, like many other ncurses programs, obtains terminal window geometry parameters from the terminal emulator when the program is launched. The combination of command-line switches will determine the number of rows needed to describe each interface; by default, the display will require one row per interface with the addition of three header rows. Use of the -a switch will result in the display of 7 or more rows per interface. cnetmon calculates how much space (height) is needed, and then it only displays as many interface row-sets as can fit in the current window geometry. Use of up/down (U/D keys) allows the user to scroll up or down an interface (row-set) at any time. To avoid requiring the user to quit, resize the terminal, and re-launch in order to see additional interfaces, we support dynamic changes in window size using the SIGWINCH signal (window change), which is supported by most terminal emulators. When the user changes the window geometry, the program receives the SIGWINCH signal and obtains new window geometry. cnetmon recalculates the number of 7 Usage scenario An actual usage scenario is shown below. We have an existing Linux server (Ubuntu server) that will be used to provide various services to three separate networks, shown in Figure 4 as Internet, MeshNet_1, and MeshNet_2. This server does not have an attached display. We use a 2 nd system with a terminal emulator and establish ssh session to the server. We copy the cnetmon executable onto our /home/user/ directory using scp (secure copy command). This session is established through the Internet and gateway attached to eth0. Invoking cnetmon, we easily observe network activity on eth0 and no activity on eth1 or eth2. cnetmon does enumerate other interfaces such as the local loopback (lo) and a virtual bridge for use by associated libraries to offer network address translation (NAT). It is normal for local loopback to accumulate and show significant traffic during network traffic sessions as it is used for process-process communications. We then connect a second network (MeshNet_1) gateway to eth1. This interface had been configured already to accept a DHCP-issued

5 Int'l Conf. Software Eng. Research and Practice SERP' address. cnetmon clearly showed packets corresponding to DHCP requests and lease responses. After obtaining another user shell (ssh) to the server, we were able to access the web admin service on the gateway to continue configuration of this network. We then connected MeshNet_2 gateway to eth2. cnetmon observed no activity on eth2. This required further investigation. /etc/network/interfaces is the configuration file used by Linux systems to initialize and configure all NIs. eth2 had not yet been configured, and it was activated by adding the following to /etc/network/interfaces (these must be done as admin or root access): auto eth2 iface eth2 inet dhcp This change required restarting the networking services: sudo /etc/init.d/networking restart cnetmon showed no eth2 activity after restarting the network services. Next, we tried a shutdown reboot which did reconfigure the interfaces and driver. After rebooting, cnetmon showed activity on all three physical NIs as well as the virtual loopback interface. Figure 4. Server with connection to 3 networks. If the server had been pre-configured prior to installation, it is likely that cnetmon would have allowed us to observe and verify each of the network gateway additions in real-time at power-on. In this case, additional configuration requiring root-level access was required. We were able to observe resulting network activity in real time using cnetmon in a second session window. 8 Compute-server example To illustrate additional capabilities of cnetmon, we show results from running it on a blade-server with 5 NIs. This type of server is common today and is used to populate the many rack spaces at internet and content hosting facilities. Although this server has 5 NIs as shown in the DEBUG: line, the display window geometry affords

6 162 Int'l Conf. Software Eng. Research and Practice SERP'15 space for only 2 complete record sets, (lo) and (em1) shown in Figure 5. This server has been up (running) for just over 105 days and cnetmon has been running for 85 seconds, updating at 1-second intervals. Figure 5. cnetmon D 1 r showing counts and rates for the session and for the last main_loop interval. Notice this also shows the D flag, which adds an additional debug-message line to the display. Here, a cd_printf statement has been included to show the first and total number_interfaces available.

7 Int'l Conf. Software Eng. Research and Practice SERP' Debug print Coding and debugging an ncurses program can be very challenging. To facilitate debugging, we incorporate a debug display activated using a command-line switch. The code snippet below from cnetmon.c :main() illustrates how to print messages to the debug message line using the -D 1 command-line argument. // Step through device list for (j = 0, i = first_interface; i <= number_interfaces; i++) { int display = 1; if (!prog_flags.first_time prog_flags.match_inface ) { display = 0; } } ///////////////////////////////////////// cd_printf("first_interface:%d number_interfaces:%d", first_interface, number_interfaces); ///////////////////////////////////////// refresh (); // Update display 11 References [1] Travis Graf. bmon bandwidth monitor and rate estimator, retrieved from June 15, [2] Terry Dawson. Exploring the /proc/net/ directory, O Reilly, retrieved from n.html, March 26, [3] M. Tim Jones. Access the Linux kernel using the /proc filesystem, IBM developerworks Technical Library, 2006, retrieved from April 15, [4] Free Software Foundation. Announcing ncurses release 5.9. Free Software Foundation, 2011, retrieved from March 26, Conclusions We have shown how cnetmon can provide easy access to the network activity from multiple interfaces, on multiple systems; however, the executable must first be available on each system. Therefore, we intend to provide cnetmon to be available as opensource code, providing the sources, documentation, a makefile, and a pre-compiled, 32-bit binary. Although most systems today are 64-bit architecture, the precompiled 32-bit binary should run on almost any Linux operating system. A sophisticated developer-user can recompile cnetmon from the sources, possibly adding new features and debugging cd_printf statements to facilitate the application and intended uses. We also will approach major Linux packagers and distribution groups, notably Red Hat, Fedora and Ubuntu, to encourage inclusion of cnetmon in future distribution releases.

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab single-host Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,

More information

bigbluebutton Open Source Web Conferencing

bigbluebutton Open Source Web Conferencing bigbluebutton Open Source Web Conferencing My favorites Project Home Downloads Wiki Issues Source Search Current pages for BigBlueButtonVM Download and setup your own BigBlueButton 0.81 Virtual Machine

More information

Virtual Systems with qemu

Virtual Systems with qemu Virtual Systems with qemu Version 0.1-2011-02-08 Christian Külker Inhaltsverzeichnis 1 Image Creation 2 1.1 Preparations.................................. 2 1.2 Creating a Disk Image.............................

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - alvaro@nsrc.org Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands

More information

Introduction to NetGUI

Introduction to NetGUI Computer Network Architectures gsyc-profes@gsyc.escet.urjc.es December 5, 2007 (cc) 2007. Algunos derechos reservados. Este trabajo se entrega bajo la licencia Creative Commons Attribution-ShareAlike.

More information

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works.

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Assalam-u-alaikum, This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Created : Mid 2007 Last updated: Mid 2007 The following link is very nice tutorial

More information

BASIC TCP/IP NETWORKING

BASIC TCP/IP NETWORKING ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires

More information

How To Install Openstack On Ubuntu 14.04 (Amd64)

How To Install Openstack On Ubuntu 14.04 (Amd64) Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking

More information

Host Configuration (Linux)

Host Configuration (Linux) : Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support

More information

McAfee Asset Manager Sensor

McAfee Asset Manager Sensor Installation Guide McAfee Asset Manager Sensor Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Note: Guide not yet tested in the SFU Surrey Linux Lab (SUR4080). Some changes may be needed.

Note: Guide not yet tested in the SFU Surrey Linux Lab (SUR4080). Some changes may be needed. Quick Start Guide for BeagleBone Black by Brian Fraser Last update: Oct 28, 2015 This document guides the user through: 1. Installing Ubuntu in a virtual machine. 2. Connecting to the target using serial

More information

Wireless LAN Apple Bonjour Deployment Guide

Wireless LAN Apple Bonjour Deployment Guide Wireless LAN Apple Bonjour Deployment Guide Document ID: 113443 Contents Introduction Prerequisites Requirements Components Used Conventions Deployment Considerations Configure the Controller to Support

More information

Twin Peaks Software High Availability and Disaster Recovery Solution For Linux Email Server

Twin Peaks Software High Availability and Disaster Recovery Solution For Linux Email Server Twin Peaks Software High Availability and Disaster Recovery Solution For Linux Email Server Introduction Twin Peaks Softwares Replication Plus software is a real-time file replication tool, based on its

More information

Building a Penetration Testing Virtual Computer Laboratory

Building a Penetration Testing Virtual Computer Laboratory Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network

More information

Aire-6 Acceso Inalámbrico a Redes IPV6. Christian Lazo R. Universidad Austral de Chile

Aire-6 Acceso Inalámbrico a Redes IPV6. Christian Lazo R. Universidad Austral de Chile Aire-6 Acceso Inalámbrico a Redes IPV6 Christian Lazo R. Universidad Austral de Chile Proyecto Frida 2004 Objetivos HOT SPOT IPv6 NATIVO IPv6 + WiFI E2E, Always On, Movilidad AAAC (Authentication, Authorization,

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch By Falko Timme Published: 2009-01-11 19:32 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch Version 1.0 Author: Falko Timme

More information

Forensic Network Analysis Tools

Forensic Network Analysis Tools Forensic Network Analysis Tools Strengths, Weaknesses, and Future Needs Eoghan Casey Author, Digital Evidence and Computer Crime Editor, Handbook of Computer Crime Investigation Technical Director, Knowledge

More information

Linux TCP/IP Network Management

Linux TCP/IP Network Management Linux TCP/IP Network Management Arnon Rungsawang fenganr@ku.ac.th Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok, Thailand.

More information

VLAN for DekTec Network Adapters

VLAN for DekTec Network Adapters Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs

More information

Advanced SSH Tunneling by Bill Brassfield, Dev Ops Technical Consultant, Taos

Advanced SSH Tunneling by Bill Brassfield, Dev Ops Technical Consultant, Taos White Paper Advanced SSH Tunneling by Bill Brassfield, Dev Ops Technical Consultant, Taos First, a review of simple TCP SSH tunnels: Forwarding a local TCP port to a remote TCP port: (using the -L option)

More information

Change Log. 2 per vices corporation

Change Log. 2 per vices corporation P E R V I C E S C O R P O R AT I O N C R I M S O N Q U I C K S TA R T G U I D E 2 per vices corporation Change Log 2015-01-06: Rev A: Initial Release 2015-01-12: Rev B: Added SFP+ configuration information.

More information

VoIP Laboratory B How to re flash an IP04

VoIP Laboratory B How to re flash an IP04 VoIP Laboratory B How to re flash an IP04 (cc) Creative Commons Share Alike Non Commercial Attribution 3 This lab guides you through the process of re flashing an IP04. To re flash a unit is useful when

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

System administration basics

System administration basics Embedded Linux Training System administration basics Michael Opdenacker Thomas Petazzoni Free Electrons Copyright 2009, Free Electrons. Creative Commons BY SA 3.0 license Latest update: Dec 20, 2010, Document

More information

Red Hat Linux Networking

Red Hat Linux Networking The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,

More information

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to

More information

Version Author(s) E-mail Web Description

Version Author(s) E-mail Web Description Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Netkit The poor man s system for experimenting computer networking Version Author(s) E-mail Web

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

IP Address: the per-network unique identifier used to find you on a network

IP Address: the per-network unique identifier used to find you on a network Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different

More information

Canopy Wireless Broadband Platform

Canopy Wireless Broadband Platform 1 Canopy Wireless Broadband Platform Frequently Asked Questions Software Ordering and License Fulfillment Process May 2007 CONTENTS GENERAL SOFTWARE ORDERING PROCESS...2 USING THE LICENSING PORTAL...5

More information

Get quick control over your Linux server with server commands

Get quick control over your Linux server with server commands Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with

More information

In-System Programmer USER MANUAL RN-ISP-UM RN-WIFLYCR-UM-.01. www.rovingnetworks.com 1

In-System Programmer USER MANUAL RN-ISP-UM RN-WIFLYCR-UM-.01. www.rovingnetworks.com 1 RN-WIFLYCR-UM-.01 RN-ISP-UM In-System Programmer 2012 Roving Networks. All rights reserved. Version 1.1 1/19/2012 USER MANUAL www.rovingnetworks.com 1 OVERVIEW You use Roving Networks In-System-Programmer

More information

Command Line Interface How To. Version 8.0.0

Command Line Interface How To. Version 8.0.0 Command Line Interface How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...

More information

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture

More information

Lab 1: Introduction to the network lab

Lab 1: Introduction to the network lab CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,

More information

Create a virtual machine at your assigned virtual server. Use the following specs

Create a virtual machine at your assigned virtual server. Use the following specs CIS Networking Installing Ubuntu Server on Windows hyper-v Much of this information was stolen from http://www.isummation.com/blog/installing-ubuntu-server-1104-64bit-on-hyper-v/ Create a virtual machine

More information

Configuring Your Computer and Network Adapters for Best Performance

Configuring Your Computer and Network Adapters for Best Performance Configuring Your Computer and Network Adapters for Best Performance ebus Universal Pro and User Mode Data Receiver ebus SDK Application Note This application note covers the basic configuration of a network

More information

Corso di Configurazione e Gestione di Reti Locali

Corso di Configurazione e Gestione di Reti Locali Corso di Configurazione e Gestione di Reti Locali Marco Bonola Lorenzo Bracciale A.A. 2011/2012 TOC Netkit: installation, configuration, use Lab0-interfaces: basic IP configuration IP Networking (ifconfig,

More information

OPERATING SYSTEM SERVICES

OPERATING SYSTEM SERVICES OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

ZCP trunk (build 50384) Zarafa Collaboration Platform. Zarafa HA Manual

ZCP trunk (build 50384) Zarafa Collaboration Platform. Zarafa HA Manual ZCP trunk (build 50384) Zarafa Collaboration Platform Zarafa HA Manual Zarafa Collaboration Platform ZCP trunk (build 50384) Zarafa Collaboration Platform Zarafa HA Manual Edition 2.0 Copyright 2015 Zarafa

More information

Collecting Router Information for Error Diagnosis and Troubleshooting in Home Networks

Collecting Router Information for Error Diagnosis and Troubleshooting in Home Networks Collecting Router Information for Error Diagnosis and Troubleshooting in Home Networks Andreas Müller, Gerhard Münz and Georg Carle Chair for Network Architectures and Services Technische Universität München,

More information

1.0 Basic Principles of TCP/IP Network Communications

1.0 Basic Principles of TCP/IP Network Communications Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems

More information

Adafruit's Raspberry Pi Lesson 3. Network Setup

Adafruit's Raspberry Pi Lesson 3. Network Setup Adafruit's Raspberry Pi Lesson 3. Network Setup Created by Simon Monk Last updated on 2016-01-04 12:07:57 PM EST Guide Contents Guide Contents Overview Using a Wired Network Buying a USB WiFi Adapter Setting

More information

What s New in Centrify Server Suite 2014

What s New in Centrify Server Suite 2014 CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance

More information

SI455 Advanced Computer Networking. Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class

SI455 Advanced Computer Networking. Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class SI455 Advanced Computer Networking Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class WHAT TO HAND IN: 1. Completed checklist from the last page of this document 2. 2-4 page write-up

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring

System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in

More information

Network Diagnostic Tools. Jijesh Kalliyat Sr.Technical Account Manager, Red Hat 15th Nov 2014

Network Diagnostic Tools. Jijesh Kalliyat Sr.Technical Account Manager, Red Hat 15th Nov 2014 Network Diagnostic Tools Jijesh Kalliyat Sr.Technical Account Manager, Red Hat 15th Nov 2014 Agenda Network Diagnostic Tools Linux Tcpdump Wireshark Tcpdump Analysis Sources of Network Issues If a system

More information

Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6

Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6 Kernel comparison of OpenSolaris, Windows Vista and Linux 2.6 The idea of writing this paper is evoked by Max Bruning's view on Solaris, BSD and Linux. The comparison of advantages and disadvantages among

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Partek Flow Installation Guide

Partek Flow Installation Guide Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

Wolfr am Lightweight Grid M TM anager USER GUIDE

Wolfr am Lightweight Grid M TM anager USER GUIDE Wolfram Lightweight Grid TM Manager USER GUIDE For use with Wolfram Mathematica 7.0 and later. For the latest updates and corrections to this manual: visit reference.wolfram.com For information on additional

More information

IT Essentials II: Network Operating Systems V 3.0

IT Essentials II: Network Operating Systems V 3.0 IT Essentials II: Network Operating Systems V 3.0 Linux Labs - Knoppix Version Student Manual v3 1-77 IT Essentials II v3 Linux Labs - Knoppix version November 2005 Configuring Knoppix as an NIS Client

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

CS244A Review Session Routing and DNS

CS244A Review Session Routing and DNS CS244A Review Session Routing and DNS January 18, 2008 Peter Pawlowski Slides derived from: Justin Pettit (2007) Matt Falkenhagen (2006) Yashar Ganjali (2005) Guido Appenzeller (2002) Announcements PA

More information

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3

More information

Introduction. Created by Richard Bell 10/29/2014

Introduction. Created by Richard Bell 10/29/2014 Introduction GNU Radio is open source software that provides built in modules for standard tasks of a wireless communications system. Within the GNU Radio framework is gnuradio-companion, which is a GUI

More information

Setting up WiFi with BeagleBone Black

Setting up WiFi with BeagleBone Black Setting up WiFi with BeagleBone Black Created by Tony DiCola Last updated on 2014-08-27 05:45:20 PM EDT Guide Contents Guide Contents Overview Hardware HDMI Port Interference Power Configuration Kernel

More information

How To Connect A Raspberry Pi To The Internet On A Microsoft Moonstone 2 (Microsoft) Microsoft Powerbook 2 (Powerbook 2) (Powerboard 2) And Powerbook 3 (Powerstation 2)

How To Connect A Raspberry Pi To The Internet On A Microsoft Moonstone 2 (Microsoft) Microsoft Powerbook 2 (Powerbook 2) (Powerboard 2) And Powerbook 3 (Powerstation 2) Adafruit's Raspberry Pi Lesson 3. Network Setup Created by Simon Monk Last updated on 2013-11-06 11:45:18 AM EST Guide Contents Guide Contents Overview Using a Wired Network Buying a USB WiFi Adapter Setting

More information

Command Line Interface User Guide for Intel Server Management Software

Command Line Interface User Guide for Intel Server Management Software Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel

More information

OpenCPN Garmin Radar Plugin

OpenCPN Garmin Radar Plugin OpenCPN Garmin Radar Plugin Hardware Interface The Garmin Radar PlugIn for OpenCPN requires a specific hardware interface in order to allow the OpenCPN application to access the Ethernet data captured

More information

Security Configuration Guide P/N 300-010-493 Rev A05

Security Configuration Guide P/N 300-010-493 Rev A05 EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed

More information

ebus Player Quick Start Guide

ebus Player Quick Start Guide ebus Player Quick Start Guide This guide provides you with the information you need to efficiently set up and start using the ebus Player software application to control your GigE Vision or USB3 Vision

More information

Figure 1 - T1/E1 Internet Access

Figure 1 - T1/E1 Internet Access Page 1 of 17 TECH NOTE Configuring T1 and E1 Internet Access in AOS Overview This guide explains how to configure an Adtran Operating System (AOS) router for T1/E1 Internet access. You should use this

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

RACADM Command Line Reference Guide for idrac6 1.95, idrac6 3.5, and CMC 3.2

RACADM Command Line Reference Guide for idrac6 1.95, idrac6 3.5, and CMC 3.2 RACADM Command Line Reference Guide for idrac6 1.95, idrac6 3.5, and CMC 3.2 Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Private Cloud in Educational Institutions: An Implementation using UEC

Private Cloud in Educational Institutions: An Implementation using UEC Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,

More information

CT505-30 LANforge-FIRE VoIP Call Generator

CT505-30 LANforge-FIRE VoIP Call Generator 1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP

More information

A virtual network laboratory for learning IP networking

A virtual network laboratory for learning IP networking virtual network laboratory for learning IP networking Lluís Fàbrega, Jordi Massaguer, Teodor Jové, avid Mérida roadband ommunications and istributed Systems Group Institut d Informàtica i plicacions Universitat

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

Digi Connect WAN Application Helper Configuring and Testing the Digi Connect WAN GSM

Digi Connect WAN Application Helper Configuring and Testing the Digi Connect WAN GSM Digi Connect WAN Application Helper Configuring and Testing the Digi Connect WAN GSM IP Address and Pre-configuration Information Ethernet Connectivity: Connect your workstation or device to the Digi Connect

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Ruckus Wireless ZoneDirector Command Line Interface

Ruckus Wireless ZoneDirector Command Line Interface Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................

More information

Setting up a Raspberry Pi as a WiFi access point

Setting up a Raspberry Pi as a WiFi access point Setting up a Raspberry Pi as a WiFi access point Created by lady ada Last updated on 2015-03-10 04:30:11 PM EDT Guide Contents Guide Contents Overview What you'll need Preparation Check Ethernet & Wifi

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

High Availability in Linux Firewalls using VRRP

High Availability in Linux Firewalls using VRRP Translated Document ( from Spanish original) High Availability in Linux Firewalls using VRRP Original by Sancho Lerena 15 Abril 2002 Translated by Ben Terry 10 June 2002. It is prohibited

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

PBX DIGITAL TELEPHONE EXCHANGE MAINTENANCE GUIDE

PBX DIGITAL TELEPHONE EXCHANGE MAINTENANCE GUIDE PBX DIGITAL TELEPHONE EXCHANGE MAINTENANCE GUIDE PBX MAINTENANCE GUIDE MARCH -2010 II Version Table DATE/VERSION OF GUIDE 24.03.2010/AAA DS200L PBX BK REV. AAA 24.03.2010 KAREL reserves the right to make

More information

IP Address and Pre-configuration Information

IP Address and Pre-configuration Information IP Address and Pre-configuration Information Ethernet Connectivity: Connect your workstation or device to the Digi Cellular Device via one of these methods: Direct from workstation to Digi Cellular Device

More information

Written by Saif ur Rab Monday, 07 December 2009 07:19 - Last Updated Monday, 27 December 2010 09:19

Written by Saif ur Rab Monday, 07 December 2009 07:19 - Last Updated Monday, 27 December 2010 09:19 I have been trying to learn Asterisk and as many of you know about that main Service Povider has blocked the voice ports in Pakistan. Therefore, we cannot connect to asterisk servers through xlite, 3cx

More information

PARALLELS SERVER 4 BARE METAL README

PARALLELS SERVER 4 BARE METAL README PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels

More information

Linux Driver Devices. Why, When, Which, How?

Linux Driver Devices. Why, When, Which, How? Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

Lab 11.5.6.1 Configure Syslog on AP

Lab 11.5.6.1 Configure Syslog on AP Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

Unified Access Point Administrator's Guide

Unified Access Point Administrator's Guide Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November

More information

Remote Access Server - Dial-Out User s Guide

Remote Access Server - Dial-Out User s Guide Remote Access Server - Dial-Out User s Guide 95-2345-05 Copyrights IBM is the registered trademark of International Business Machines Corporation. Microsoft, MS-DOS and Windows are registered trademarks

More information

Abstract. Microsoft Corporation Published: November 2011

Abstract. Microsoft Corporation Published: November 2011 Linux Integration Services Version 3.2 for Hyper-V (Windows Server 2008, Windows Server 2008 R2, Microsoft Hyper-V Server 2008, and Microsoft Hyper-V Server 2008 R2) Readme Microsoft Corporation Published:

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

CELLTRACKS ANALYZER II. Networking Guide J40169EN

CELLTRACKS ANALYZER II. Networking Guide J40169EN CELLTRACKS ANALYZER II Networking Guide J40169EN CELLTRACKS ANALYZER II Networking Guide LBL50902 2014-01-01 J40169EN Proprietary Notice This document discloses subject matter in which Janssen Diagnostics,

More information

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

Introduction to WebSphere Administration

Introduction to WebSphere Administration PH073-Williamson.book Page 1 Thursday, June 17, 2004 3:53 PM C H A P T E R 1 Introduction to WebSphere Administration T his book continues the series on WebSphere Application Server Version 5 by focusing

More information