SNMP-based enterprise IP network topology discovery

Size: px
Start display at page:

Download "SNMP-based enterprise IP network topology discovery"

Transcription

1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2011; 21: Published online 25 August 2010 in Wiley Online Library (wileyonlinelibrary.com).756 SNMP-based enterprise IP network topology discovery Suman Pandey 1, Mi-Jung Choi 2, *, Young J. Won 1 and James Won-Ki Hong 1,3 1 Department of Computer Science and Engineering, POSTECH, Pohang, Korea 2 Department of Computer Science, Kangwan National University, Chuncheon, Korea 3 Division of IT Convergence Engineering, POSTECH, Pohang, Korea SUMMARY Precise network topology information is required to perform management activities such as fault detection, root cause analysis, performance monitoring, and load balancing in enterprise networks. To accomplish these management tasks, both network discovery and connectivity information are essential. This paper examines various problems with the existing topology discovery mechanisms and proposes an SNMP-based approach to discover physical as well as logical topology. We present algorithms for identifying network device types and discovering connectivity among them. The connectivity of end host and management information base (MIB)-enabled devices with switches and routers is discussed and evaluated. We also present an algorithm for discovering logical topology, such as VLAN and subnet connectivity. Finally, we present a combination of graph and tree layouts, to visualize connectivity information. Copyright 2010 John Wiley & Sons, Ltd. Received 20 May 2009; Revised 31 March 2010; Accepted 31 March INTRODUCTION Networks are becoming more complex and larger as the number of users as well as the applications increase. Knowledge of network topology of the enterprise network is required for achieving several network management objectives, including root cause analysis [27], traffic bottleneck, failed components, resource management, planning, and deployment of new elements. All these management activities can be made easier and can be shown on a network topology map, so that administrators can have a clear view of the network. An inexperienced network administrator joining an organization faces many difficulties if there is no discovery tool that shows topology information based on type of device, subnets and virtual local area network (VLAN) with an understandable user interface. Even for the experienced administrator, keeping track of devices and their connectivity details without having a proper method of visually presenting them is labor intensive. Network topology can be defined as the study of arrangements of nodes and their interconnection and it can be categorized as link layer topology, Internet topology and overlay topology, as proposed by Donnet and Friedman [18]. Our research falls into the category of link layer and router-level topology of an organization or an autonomous system (AS). This is an intra-domain topology discovery task. Network topology is the arrangement of the elements (e.g., links, nodes) of a network and the physical and logical interconnections among its nodes. In physical network topology peers are connected to ports on devices via a transmission link; in logical network topology a network is divided into logical segments through subnets and VLANs [16,17]. The network can be viewed at different levels of abstraction using a logical topology view. *Correspondence to: Mi-Jung Choi, Department of Computer Science, Kangwon National University, Chuncheon, South Korea. mjchoi@kangwon.ac.kr Copyright 2010 John Wiley & Sons, Ltd.

2 170 SUMAN PANDEY ET AL. Various techniques exist for automatically discovering topologies, including ICMP tracerouter [23], DNS [22], ARP[21], end-to-end measurement [10] and Simple Network Management Protocol (SNMP) [15]. We chose to use SNMP to accomplish this task, and did a detailed analysis of management information base (MIB) modules which will be utilized to accomplish this. The reason for choosing SNMP is its better performance compared to other techniques [1] and its capability to derive multiple properties of the devices, which can help in finding accurate connectivity with interface details and device types. We tried to achieve simplicity, accuracy and efficiency in our algorithm. SNMP-based automatic topology discovery is featured in many network management tools, including IBM Tivoli and HP Open view; however, these tools mainly discover network layer topology [2,3]. Some other tools such as Riversoft NMOS and Micromuse Netcool support layer 2 discoveries, but they are based on proprietary technology. We have no access to their proprietary technology; moreover, all these commercial tools are expensive. Cisco proposed Physical Network Topology Identification and Discovery (PTOPO-MIB) and standardized it in RFC 2922 [9], but unfortunately Cisco is the only vendor who implements this MIB. For these reasons we explored only standard MIB modules which are implemented by all vendors. Apart from the commercial efforts by IBM Tivoli and HP Open view, there has also been much effort made by the research community to explore the standard MIB for topology discovery. Siamwalla et al. [1] proposed mechanisms to discover topology by combining various methods such as ping, traceroute, SNMP, DNS, and ARP. Similarly Wood et al. [26] used non-snmp protocols and techniques to discover the network, including watching ARP and RIP packets, ICMP ping and traceroute. However, these methods could discover only L3-level topology, and the report did not propose any mechanisms to discover L2- or host-level topology. Breitbart et al. [2] proposed a mechanism for discovering an L2-level topology that is heterogeneous, irrespective of any kind of network, but this mechanism requires ICMP spoofing in order to get a complete forwarding table, which is not allowed in most of today s networks. Originally, in their method, they assumed that all the physical addresses were cached in every switch, and to reach this condition they sent a ping message between each pair of hosts (ICMP spoofing). Their algorithm is then applied to each pair of switch ports to find connectivity. Their work was then extended by Bejerano [25] to discover accurate topology including dumb devices such as a hub. These algorithms are time-consuming and resource-intensive. They also failed to provide details on SNMP MIB modules required for gathering topology information and stitching them together. Lowekamp et al. [3] then proposed a mechanism to discover L2-level topology that did not require complete forwarding information of bridges; their approach contradicted that of Breitbart et al. [2]. They define a simple connection as a pair of switch ports that connects two switches, possibly with another switch between them. Their algorithm is sufficient for discovering L2-level topology; however, we need a solution to discover end host topology with switches and a way to combine L3, L2 and end host topologies. Another less studied area in the enterprise network is VLAN. Sung et al. [24] highlighted the importance of VLAN in an enterprise network; however, their focus is on systematic design of the VLAN. Our contribution is significant in the following ways: We obtained various configurations and device properties using MIB modules, and logically combined them together to get useful topology information. Identifying different type of devices is an important part of finding link layer topologies. Depending on different types of devices we need to utilize different connectivity algorithms. Previously only system.sysservices MIB and ipforwarding MIB were used to identify routers and switches. In contrast, we utilized more complex configurations finding accurate topological details, interface-to-interface connectivity and different types of services in MIB-enabled devices such as printer, servers, web server, and multimedia servers. The discovery of L2 with end host connectivity has generated little attention. We propose a heuristics-based algorithm to connect end hosts and MIB-enabled devices such as printers and servers with the L2 switches. In addition to the interconnectivity we also show logical-level topology by detailing the VLAN and subnet discovery and interconnection of devices in VLAN and subnets. We highlighted the difference between standard VLAN implementation and Cisco switch s VLAN implementation.

3 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 171 The remainder of the paper is organized as follows. Section 2 describes the proposed methods and our algorithms. Section 3 describes system design and implementation details. Section 4 discusses topology view and analyses the results, while Section 5 concludes the paper and discusses future work. 2. PROPOSED METHOD Our goal was to design an algorithm that determines both the physical and logical topology using the interface connectivity details of an enterprise network. To accomplish this goal, various MIB modules are used to fetch information related to routing tables, ARP cache, and Bridge-MIB from the network elements. The proposed algorithm is divided into seven main steps in Algorithm 1. The basic inputs to Algorithm 1 include: IP address of gateway routers, boundary information (range of IP addresses to be discovered), SNMP community string and SNMP port number. Multiple IP ranges and multiple community strings can be specified to discover elements in more than one range and community. After accepting the inputs the device discovery starts, it uses the routing table and ARP cache table through SNMP standard MIB-II [12] to discover devices. For each discovered device, it first checks whether the device supports SNMP. If it does, then device type identification is performed e.g., routers, L2/L3/L4/L7 switches, printers, network terminal nodes and, depending on the type of device, the relevant MIB objects (explained in Section 2.1) are loaded into the database. This information is used to discover connectivity among L2 and L2 devices, L2 and L3 devices, L3 and L3 devices, and L2/L3 devices and end hosts. If the device does not support SNMP then it is considered end host and for discovering connectivity it depends on the information retrieved from switches and routers. To provide logical topology connectivity information, the connectivity algorithm for a single subnet and VLAN is implemented SNMP MIB modules The proposed discovery mechanism is based on SNMP. We used standard MIB modules such as RFC-1213 [12], BRIDGE-MIB [13], Q-BRIDGE-MIB [14], Cisco private MIB, and CISCO-VTP- MIB [7]. MIBII (RFC-1213) is divided into three groups: system, interface and ip. The sysservices object from the system group is used for determining the type of device. The iftable from the interface group helps us gather the details of the interfaces of the switches. The iproutetable from the ip group stores the routing information of L3 devices. This includes information about the next hop taken to reach the destination and helps us discover L3-level topology. The ipnettomediatable maintains the ARP cache table for the mapping of MAC addresses to IP addresses; we use this table to discover more devices. Bridge-MIB helps us gather L2-level topology. dot1dbaseportentry maps from Bridge Port to ifindex. The dot1dtpfdbtable provides us with a forwarding table, which is also referred to as the address Algorithm 1. Overall algorithm for network discovery 1. Take network information inputs 2. Device discovery a. Device discovery using next hop mechanism b. Device discovery using ARP cache entries 3. Device type discovery 4. Device grouping based on IP address 5. Connectivity discovery a. L2 to L2 connectivity b. L2 to L3 connectivity c. L3 to L3 connectivity d. L2 and L3 to end host connectivity 6. Subnet discovery and connectivity discovery in subnet 7. VLAN discovery and connectivity discovery in VLAN

4 172 SUMAN PANDEY ET AL. forwarding table (AFT). The combination of L2- and L3-level topology can also uncover the connectivity between L2 and L3 elements. The dot1dstp MIB module is also used for collecting spanning tree information about the L2 and L3 devices. Q-BRIDGE-MIB is used for VLAN discovery. Table 1 explains all the SNMP MIB modules and their significance in relation to discovery and connectivity algorithms. The detailed use of these MIB modules is explained in subsequent sections Device discovery Algorithm 2 describes the device discovery. RFC-1213 defines a simple, workable structure of managed objects for managing TCP/IP-based networks. The managed objects mentioned in this RFC are standard and implemented by all the vendors. We utilized their minimum and workable architecture in discovering topology, and we found that this information is sufficient for discovering almost all the devices in a network. The routing table of the device is maintained by iproutetable, which contains an entry for each route. We utilize only the iproutenexthop and iproutetype entries of these tables (line 7). iproutenexthop is the IP address of the next hop in the route. There are four types of iproutetype: direct, indirect, invalid, and other. The direct type refers to the same device with multiple IP addresses, so we discard entries of the direct, invalid, and other types. We filter the records and take only those entries that are indirect. iproutetable is used to discover all the routers or L3 devices. To discover end hosts and L2 devices, we use ipnettomediatable (line 18) i.e., an IP address translation table that contains the mapping of IP addresses to corresponding physical addresses. This table also includes a listing of active members on the network, since they exchange their ARP information in the network. As soon as we discover a node, we use all the unique ipnettomedianetaddress entries to discover another set of new nodes. An important step in discovering devices is considering synonyms for a single device. This is the fourth step of Algorithm 1. A device can have multiple IP addresses that correspond to the multiple subnets to which the device belongs. ipaddrtable contains the IP address assigned to the multiple interfaces in the managed node. There can be one interface for one subnet. Whenever a new device is discovered, it is possible that the new IP address is a synonym of an already discovered device. To check for this condition, a table of synonyms of the already discovered devices is maintained, and before confirming that the discovered device is new verification is performed by checking these synonyms. Algorithm 2. Device discovery 1. Procedure Device_discovery 2. R[] <- Stack of router IP address, initially empty 3. D[] <- Stack of router already visited, initially empty 4. R[].push(gateway_router_IP) 5. For each R[n] 6. If (snmpget(r[n]) == TRUE) then 7. N_H[] <- Get next hop set for R[n]<- iproutenexthop if iproutetype is indirect 8. For each N_H[m] 9. If(R[] contains N_H[m]) then continue 10. R[].push(N_H[m]) 11. If (D[] contains N_H[m]) then continue 12. D[].add(N_H[m]) 13. Else 14. R[n].type= host 15. D[].add(Rn) 16. For each D[i] 17. If(snmpget(D[i]== TRUE) then 18. N_D[] <- Get nettomediatable for D[i] <- ipnettomedianetaddress 19. For each N_D[j] 20. If(D[] contains N_D[j]) then continue 21. D[].add(N_D[j])

5 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 173 Table 1. MIB information for topology discovery. MIB MIB object Significance of MIB in our algorithm MIBII (REF-1213-MIB) CISCO-VTP-MIB (Only for Cisco devices) Q-BRIDGE-MIB (Devices from vendor other than Cisco) BRIDGE-MIB for connectivity discovery BRIDGE-MIB for spanning tree discovery System sysservices system sysdescr Iftable ifindex iftable ifdescr iftable ifphyaddress ip ipforwarding ip iproutetable iproutenexthop ip iproutetable iproutetype ip ipaddrtable ipadentaddr ip ipaddrtable ipadentnetmask ip ipnettomediatable ipnettomedianetaddress ip ipnettomediatable ipnettomediaphysaddress vtpvlanstate qbridgemib qbridgemibobject do1qvlan do1qportvlantable do1qportvlanentry dot1qpvid dot1dbrige dot1dbase dot1dbaseporttable dot1dbaseportentry dot1dbaseport dot1dbrige dot1dbase dot1dbaseporttable dot1dbaseportentry dot1dbaseportifindex dot1dbrige dot1dtp dot1dtpfdbtable dot1dtpfdbentry dot1dtpfdbaddress dot1dbrige dot1dtp dot1dtpfdbtable dot1dtpfdbentry dot1dtpfdbport dot1dbrige dot1dtp dot1dtpfdbtable dot1dtpfdbentry dot1dtpfdbstatus dot1dbrige dot1dstp dot1dstpporttable dot1dstpportentry dot1dstpport dot1dbrige dot1dstp dot1dstpporttable dot1dstpportentry dot1dstpportstate dot1dbrige dot1dstp dot1dstpporttable dot1dstpportentry dot1dstpportdesignatedroot dot1dbrige dot1dstp dot1dstpporttable dot1dstpportentry dot1dstpportdesignatedbridge dot1dbrige dot1dstp dot1dstpporttable dot1dstpportentry dot1dstpportdesignatedport Identify device type Device description Device interface Interface description Interface MAC address Decides whether device can forward data or not The next hops that can be reached If value is direct, the next hop is another IP of the same machine Obtain multiple IP addresses for one device Calculate subnets Obtain the ARP table entries Obtain mapping of the IP address to the physical address Cisco private MIB for VLAN identification, obtain the Bridge-MIB information corresponding to each VLAN using community string indexing VLAN identification information for non Cisco device Same as dpt1dtpfdbport, mapped with the dot1dbaseportifindex, which is same as ifindex entries Mapped to ifindex The addresses in the forwarding table Interface to which the forwarded entry is connected Status of the interface STP-related information for interface Entries whose ports are not broken or invalid is considered Root bridge in STP Bridge directly connected or bridge s own ID Port on the designated bridge 2.3. Device type discovery Device type discovery is an important part of finding connectivity information. Once the device type is known, different algorithms can be used to find connectivity among various types of devices. To discover the types of devices, we use the sysservices MIB object and convert it into a seven-bit string. Each bit corresponds to the seven layers of an OSI network model. If a device has sysservices 78

6 174 SUMAN PANDEY ET AL. Figure 1. Flow chart for device type discovery. ( ) i.e., its second, third, fourth, and seventh bits are set then the device is an L7 switch that provides services for all four layers. This algorithm also uses dot1dbrige, iftable, and service specific MIB. It uses Bridge-MIB information to check whether the device can support interface-to-interface connectivity at L2. Such information helps us decide if the device can show interface-to-interface connectivity in the network view map. We categorize such a device as a switch. sysservices and Bridge-MIB are normally utilized to discover the device type [2,4]; our approach differs in that we also utilized iftable and service specific MIB such as Printer MIB for finer granularity of discovering device type. The iftable MIB helps us decide whether the L3 devices are configured to have the same MAC address for multiple interfaces. This helps us filter the L3 devices for situations where we cannot show the interface-to-interface connectivity with other devices, because they have the same MAC addresses for multiple ports and it is not possible to distinguish ports to which the other devices are connected. Printer MIB is used to check whether the device is a printer or not. To identify other types of services and product-specific information like a printer we can utilize various other MIB modules [20], including WWW-MIB, APACHE-MIB, and cisco specific VPN, Storage networking products, voice telephony and messaging software MIB. The flow chart in Figure 1 explains the algorithm used to distinguish device type. The different output boxes in the flow chart show the different types of devices discovered. The subsequent section explains the connectivity discovery among various types of devices Connectivity discovery Algorithm 3 describes connectivity discovery, which is divided into four sub-procedures: switch-toswitch, switch-to-router, router-to-router, and switch- and router-to-end host connectivity. As soon as the device type is discovered, we determine what types of MIB modules need to be stored in the database to find connectivity; for example, if the device is an L2, L3, L4, or L7 switch, and if it supports Bridge-MIB, then we retrieve the Bridge-MIB of that device and store it in the database. If

7 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 175 Algorithm 3. Connectivity discovery 1. Procedure Connectivity_discovery() 2. S[] <- L2, L3, L4, L7 switch 3. R[] <- L3 router 4. D[] <- Devices other than switch and router 5. Switch_pair_set { (S[1],S[2])... (S[i-1],S[i])} 6. Switch_router_pair_set { (S[1],R[1])... (S[i],R[k])} 7. Subprocedure Switch_to_switch_connectivity() 8. For each Switch_pair_set (S[i],S[j]) 9. M_Si[] <- MAC address of switch S[i] <- ifphyaddress 10. M_Sj[] <- MAC address of switch S[j] <- ifphyaddress 11. For each M_Si[m] 12. If (connectivity already found for M_Si[m]) then continue 13. AFT_M_Si[] <- AFT of switch Si for MAC M_Si[m] <- dot1dbaseportentry 14. For each M_Sj[n] 15. If( connectivity already found for M_Sj[n]) then continue 16. AFT_M_Sj[] <- AFT of switch Sj for MAC M_Sj[n] <- dot1dbaseportentry 17. If (AFT_M_Si[] contains M_Sj[n] ) and (AFT_M_Sj[] contains M_Si[m] ) 18. pm= Get_mapping_port(M_Si[m]) <- ifindex 19. pn=get_mapping_port(m_sj[n]) <- ifindex 20. Set_connection(pm, pn) 21. Subprocedure Switch_to_router_connectivity() 22. For each Switch_router_pair_set (S[i], R[j]) 23. M_Si[] <- MAC address of switch Si <- ifphyaddress 24. M_Rj[] <- MAC address of switch Rj <- ifphyaddress 25. For each M_Si[m] 26. If (connectivity already found for M_Si[m] ) then continue 27. AFT_M_Si[] <- AFT of switch Si for MAC M_Si[m] <- dot1dbaseportentry 28. If (AFT_M_Si[] contains M_Rj[] ) 29. pm= Get_mapping_port(M_Si[m]) <- ifindex 30. Set_connection(pm, R[j]) 31. Subprocedure Switch_and_router_to_endhost_connectivity() 32. SUB[] <- Get subnet of all the devices 33. For each subnet SUB[k] 34. SR[] <- Switch and router in subnet SUB[k] 35. D[] <- Device in subnet SUB[k] 36. M_D[] <- MAC address of device in subnet SUB[k] <- ipnettomedianetaddress 37. ST <- Get spanning tree for SR[] in SUB[k] <- dot1dstp 38. LS[] <- ST.edgenode.leafnode 39. For each LS[i] 40. M_LS[] <- MAC address of LS[i] 41. For each M_LS[m] 42. If (connectivity already found for M_LS[m] ) then continue 43. AFT_M_LS[m] <- AFT of switch LS for MAC M_LS[m] <- dot1dbaseportentry 44. For each M_D[n] 45. If (AFT_M_LS[m] contains M_D[n]) then 46. Set_connection(Get_mapping_port(M_LS[m],M_D[n]) the device is a Cisco switch, then we apply community string indexing [6] and load the Bridge-MIB for each VLAN. If the device is an L3, L7, or L4 switch or router, then we load the routing table MIB. Furthermore, this information is used to discover connectivity among the devices. Switch-to-switch connectivity (lines 7 20) is discovered using Bridge-MIB. Two different kinds of bridging techniques exist in today s networks: transparent bridging, which is predominant in Ethernet networks; and source-route transparent (SRT) bridging, which is supported in token ring networks. The dot1dtp group of Bridge-MIB contains the objects that describe the device state with respect to transparent bridging and SRT. The dot1dstp group contains the objects that denote the bridge s state with respect to the spanning tree. Bridge-MIB also has a relationship with some of the standard MIB modules; thus it is assumed that the bridge implementing Bridge-MIB will also implement at least the

8 176 SUMAN PANDEY ET AL. system group and the interface group, as defined in MIB-II. The interface group is mandatory and contains information about the device s interface, where each interface is attached to a subnetwork. The port of the bridge is associated with one interface. Each port is uniquely identified by port number dot1dbaseport in the bridge. dotdbaseport is mapped with interface ifindex by dot1dbaseportentry. All of the data are sent and received via this port. We first retrieve the set of L2 devices S (line 2), which support Bridge-MIB from the database. These also can be L2, L3, L4, or L7 switches, all of which support Bridge-MIB. Then, we run a loop on each pair of L2 devices S[i] and S[j] (line 8). Interfaces of the switch will have a MAC address. We retrieve the MAC address for the switch pair (lines 9, 10). Each switch will have an AFT for each port, which will contain the address forwarding information about that port (lines 13, 16). Here, port and interface are used interchangeably. The dot1dtpfdbtable will have entries for each port (dot1dtpfdbport) and their forwarding MAC addresses (dot1dtpfdbaddress). dot1dtpfdbport will be mapped with dot1dbaseportentry and dot1dbaseportentry will be mapped with ifindex. We will search the MAC address (ifphyaddress) of the switch S[i] in the AFT table of switch S[j] and vice versa (line 17). If mapping is found, then the mapping ifindex is retrieved (lines 18, 19) and connectivity for these interfaces of the switches is stored in the database (line 20). Switch-to-router connectivity (lines 21 30) is also discovered using Bridge-MIB. Our approach is similar to the Breitbart et al. [2] approach, except that we have elaborated specific MIB modules as well. If a router supports Bridge-MIB, then we can find the interface of the switch through which a router is connected, but we cannot find the interface of the router through which the switch is connected. L3 devices support L3 in sysservices and do not provide Bridge-MIB or, they are configured to have the same MAC address for multiple interfaces. First, a list of all L2 devices and L3 devices is obtained (lines 2, 3). For each L2 device, a list of ports is retrieved for which the connectivity is yet to be found. After finding all such interfaces, we check whether the dot1dtpfdbaddress entries of that port (dot1dtpfdbport) have the MAC address (ifphyaddress) of any of the L3 devices (line 28). If the mapping is found, then the L2 and L3 devices are considered connected with that port (dot1dtpfdbport). We also get the actual ifindex entries by mapping dot1dtpfdbport to dot1dbaseportentry and dot1dbaseportentry to ifindex. The interface-to-interface connectivity between the L2 and L3 devices are then stored in the database (line 30). Router-to-router connectivity is discovered using the routing table. This is the most common and well-established way to discover L3-level topology. iproutenexthop for each pair of routers is utilized to determine whether they are next hops to each other. If the mapping is found, then the connectivity between those L3 devices is established. In this situation again, since they do not support Bridge-MIB, the interface-to-interface connectivity goes undiscovered. The switch (L2/L3) and router-to-end host connectivity is discovered using the subnet information and spanning tree information of the L2 devices (lines 31 46). Each device in an Ethernet belongs to a subnet. We can find the subnet information for each device using the SNMP ipadentnetmask MIB. If a device does not support SNMP, the subnet information is obtained through ICMP address-mask reply messages. There are various proposed subnet-guessing algorithms [1]; these algorithms are also used to discover subnets in the absence of SNMP (line 32). Once we obtain subnet information about the devices, the devices are grouped based on the subnet. We retrieve IP to MAC mapping for all hosts (devices other than switches and router) in the subnet using ipnettomedianetaddress (line 36). Afterwards we discover the spanning tree of the devices in the subnet (line 37). The dot1dstp group contains the objects that denote the bridge s state with respect to the spanning tree algorithm. The edge nodes of the spanning tree are discovered next (line 38). The spanning tree mechanism works as follows. First, the bridges in the network elect one of their members as a root bridge. Then, each bridge other than a root bridge determines its distance to the root bridge and selects one of its ports, called the root port, closest to the root bridge. Then, the bridge elects one port on each subnetwork, called the designated port, which is connected to the designated bridge. The designated bridge will be closest to the LAN subnetwork. The dot1dstp MIB module helps us discover the designated bridge of each switch and reach the edge node of the network. Once we have the edge switches in the subnet, and the MAC address of the hosts in the subnet, we look for the MAC address of the hosts in the AFT table of each interface of each edge node (line 45). If the mapping is found for the interface, then connectivity is established between host and the edge node (line 46). This

9 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 177 is a heuristic-based approach, but by verifying manually we found that this method generates correct results in a POSTECH network Logical connectivity discovery One of our goals was to discover logical topology, that is, subnet topology and VLAN topology along with physical topology. The ipadentnetmask MIB helps discover the subnet for devices. Once the device IP address (i.e., ) and subnet mask from ipadentnetmask (i.e ) are obtained, a bit-wise AND operation is conducted on the IP address and subnet mask, to obtain the network address or subnet address that will be This method is used to find the subnet addresses of all devices. Once the subnet addresses of all devices are obtained, then the devices are grouped according to subnet. The connectivity among those devices is found by applying our algorithm for connectivity discovery. To find inter-subnet connectivity, we filter out the devices that are part of more than one subnet. Mostly, routers are part of inter-subnet connectivity. This level of abstraction provides the user with a logical view of the network, based on subnets. VLAN is an important component of modern networks: therefore, it is worthwhile to discuss VLAN discovery and connectivity. Each VLAN is associated with a VLAN identifier. If a network supports VLAN and a packet is forwarded in the network, then the VLAN identifier tag is appended to the packet. VLAN-aware bridges identify VLAN-tagged frames and forward packets accordingly. Each VLAN can have its own spanning tree or, depending on vendor implementation, there can be a single spanning tree associated with all of them. Cisco supports multiple spanning trees for multiple VLANs. Our work is closely associated with the Cisco VLAN, although we also explore a vendor-neutral solution to support VLAN discovery based on standard MIB. To discover VLANs in Cisco switches, we use CISCO-VTP-MIB. The active VLANs on a switch are obtained using the vtpvlanstate object. We used the vtpvlanstate object rather than vtpvlanname, because with the former we could determine the index number of operational VLANs in one SNMP operation. VLAN discovery in Cisco switches is based on community string indexing [5,6]; to access MIB modules that have a separate instance for each VLAN, community string indexing is used is added as a suffix to the community name in the SNMP query while retrieving the Bridge-MIB. If the device does not support the Cisco private MIB, then we propose a solution that is based on the IETF standard MIBs such as Q-BRIDGE-MIB (RFC-2674) and BRIDGE-MIB (RFC-1493). For such a device, VLAN information is obtained using dot1qpvid MIB from dot1qportvlantable. First, we deduce the boundary of our discovery and target Virtual Bridged LAN, i.e., the IP address in our boundary using a nexthop mechanism, as explained in Section 2.2. Next, the type of device is determined and Bridge-MIB for the L2 and L3 devices are retrieved. The spanning tree-related information is stored in the dot1dstpporttable of the BRIDGE-MIB. We check the dot1dstpportstate variable of each row and discard entries whose port state is broken. VLANs associated with the selected ports are also extracted by retrieving dot1qpvid from the associated entry of the dot1qportvlantable. Given all this information, we create one row of our internal table for each combination of VLAN identifier and port identifier. Information such as the bridge address, port identifier, VLAN identifier, designated root, designated bridge, and designated port are stored in each row. This information helps us to create a VLAN spanning tree. To construct the VLAN spanning tree, the first entry from the VLANs group entries is selected as the current entry. If the bridge address and the designated bridge address of the current entry are not identical, this bridge address is set as the child of the designated bridge address of the spanning tree and the port number of this entry is marked as the exit port on this bridge, and the designated bridge port number as the entry port of the designated bridge. If the bridge address and the designated bridge address of the current entry are identical, then we select the next unvisited entry as the current entry. The spanning tree is constructed when all the entries of the VLAN identifier have been visited. This procedure provides us with the spanning tree for each VLAN in the network, and gives us a logical view of the network, for troubleshooting each VLAN separately.

10 178 SUMAN PANDEY ET AL. 3. SYSTEM DESIGN In this section we explain our system design. Figure 2 shows the overall architecture of the topology discovery system. This system follows the client server software architecture. The client is a web client. The administrator or normal user can give inputs to the server module and the server provides the topology to the client for viewing. The administrator can customize certain devices using the customization module. The basic customizations that the administrator can conduct are changing the location, vendor, purpose, or type of device. The server of a topology discovery system contains four main modules. The first module device discovery uses next hop discovery and an ARP table loader to retrieve the devices in the network; the SNMP server is responsible for sending SNMP queries to clients and handling concurrent responses. This is implemented based on a threading mechanism, to enable the simultaneous handling of multiple requests and responses. The second module is the supporting module for device discovery; this module helps the device discovery mechanism by grouping the discovered device based on multiple IP addresses for a single device. This module also discovers device type and based on device type it loads the SNMP MIB modules for the device in the database. The third module the connectivity discovery module discovers connectivity among devices; it takes its input from the database where we stored the relevant MIB modules for each device. The connectivity discovery module is divided into four smaller modules, for discovering switch-to-switch, switch-to-router, router-to-router, and switch and router-to-end host connectivity. The last module is the logical topology discovery module, which is responsible for discovering subnet and VLAN topologies; it takes input from the database and uses a connectivity discovery algorithm to discover connectivity for each subnet and VLAN. Figure 3 shows the internal data structure and relationship among the tables of the topology. All the fields in the database are mapped to the MIBs outlined in Table 1. A unique identifier for each discovered device is generated using the singleton class identifier. Our program has only one instance of the identifier class, and this class is responsible for generating a unique key for each new device. The IP address is not used as an identifier, since there can be multiple IP addresses belonging to one device. For the devices supporting SNMP, MIB modules such as system, iftable, iproutetable, ipaddrtable, ipnettomediatable, vtpvlanstate, and dot1dbrige (see Table 1) are stored in the appropriate database tables, as shown in Figure 3. IP address, forwarding info, sysservice, and sysdesc are stored in IPTable. In RouteTable, the next hop information is stored. The multiple addresses belonging to a device, such as the router and switch for each subnet, are stored in AddressTable. In InterfaceTable, we store the information about the interfaces which are also called ports of the switches and routers. Figure 2. Overall architecture for topology discovery.

11 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 179 Figure 3. ER diagram for topology database. Each interface of the device also has a physical address, an ifindex, and an interface description. When we find the connectivity between the devices, we also find the interface-to-interface connectivity between the devices supporting Bridge-MIB. NetToMediaTable stores the device lists that are reachable from the node; it also stores the mapping of the physical address with the IP address. BridgeMIBtable stores the Bridge-MIBs of all the L2 devices. VlanTable is an optional table; if the network comprises devices other than Cisco, then we use this table to calculate the VLAN and the spanning tree associated with the VLAN. Once we update the database with all the device information, we start finding the connectivity and build the ConnectivityTable, which is our output table that helps generate topology views. 4. IMPLEMENTATION AND EVALUATION In this section we present the implementation details and describe functionality and views of our system; we will also evaluate our system compared to other research work. We used Advent Net Java APIs [11] for the SNMP library. These APIs offer a comprehensive development tool kit for SNMPbased network management applications. An important aspect of the discovery tool is the ability to view a network map; thus JGraphT [8], a free Java graph library that provides mathematical graphtheory objects and algorithms, is used. We provided various types of abstraction of the network view, and each abstraction is implemented by each menu in our system. There are four main menus: List View, Tree View, Graph View, and VLAN View. There are three submenus: Device View, All Device View, and Subnet View under Tree View and Graph View. Also, there are two submenus: Switch, VLAN and VLAN, Switch under VLAN View. Graph view and Tree view are used in combination: the graph module shows connectivity among L3 devices, and once we click on the L3 device in graph, the detailed L2- and lower-level devices are shown in tree format in the next frame. Since there can be cycles in the L3-level connectivity, the connectivity cannot be shown using the tree. When we click on the nodes in the graph, the tree attached to each node of the graph can be seen in the next frame. Since the L2 devices support the spanning tree, there will consequently be no loop at this level, and we can show this level connectivity with a tree form. Figure 4 shows a graph view of the L3 devices in the left frame and a tree view of the L2 devices in the right frame. Showing the connectivity in tree form has various advantages, including the ability

12 180 SUMAN PANDEY ET AL. Figure 4. Graph view of L3 and tree view of L2 devices in POSTECH. to expand and contract the nodes and see the network hierarchy. Moreover, showing all the devices of the network in one layout is difficult, so this level of abstraction helps in viewing network connectivity. After double-clicking on each device, various properties of the device, such as device IP addresses, sysservices, forwarding info, system description, the support of different network layers, multiple subnets that a given device belongs to, interface details, the connectivity details of each interface, and some administrator custom entries can be viewed in a separate window. We can view the same window in the right frame of Figure 5. Figures 5 and 6 show the subnet view and VLAN view, respectively. The left frame lists all the subnets and VLANS available in the network. The next frame shows the connectivity among the devices of the subnet and VLAN in the tree view. Subnet and the VLAN views are significant as they show the logical abstraction of the network. Now we will explain results retrieved after running our algorithm on different networks. We applied our system to two different enterprise networks: POSTECH and Korea University. Using our tool we found that in Korea University there are total of 2019 devices, including 14 routers and L3 switches, 29 L2 switches, five L4 switches, 42 subnets, and 28 VLANs. In POSTECH we found a total of 7495 devices, including 522 L2 switches, eight routers, 76 L3 switches, five L4 switches, 208 subnets, and 149 VLANs. The SNMP mechanism with an ARP cache table (NetToMediaTable) is used in our methods to discover the devices. We loaded the ARP cache of all the routers and switches; in this way, we were able to discover almost all the devices on the network. We noticed that the numbers of L2/L3/L4/L7 switches, routers, subnets, and VLANs discovered in multiple tests were the same, but that the number of discovered end hosts varied, with an error range of 1 2%. The cause of this error is the ARP cache table, which also contains inactive devices; furthermore, the entries in the ARP cache are not aged out, so in those situations some extra devices were discovered. We verified our results with the actual data existing with the POSTECH network administrators, and we found that we discovered 99% of the devices correctly; however, there was a 1% error of extra devices, i.e., those that were no longer active. In the case of connectivity discovery among the devices, there were many L2 switches such as BlackDiamond switches [19] that do not support SNMP. For such devices, we could not discover the connectivity.

13 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 181 Figure 5. Subnet view, showing list of subnets, connectivity among devices in subnet and properties of the device. Figure 6. VLAN view, showing list of VLANs, devices in VLANs and connectivity among the devices. We introduced a thread mechanism for resource discovery with the ARP cache module, as this module consumes most of the time. In this module, the NetToMedia table for routers and switches are retrieved and snmpget message is sent to each device in the NetToMedia table. Scalability testing shows a normal linear trend: if the number of devices increases, then the amount of time taken to discover the device also increases linearly. This trend can be seen in Figure 7 for POSTECH and in Figure 8 for Korea University. We recorded the time taken for discovering 100 devices, and then increased the number of devices by 200, 300, and 400 to However, some packet loss was found if we increased the number of threads in this process, which primarily depend on the processing power of the machine, bandwidth, and the underlying SNMP server implementation. Our code works well

14 182 SUMAN PANDEY ET AL. Figure 7. Threaded discovery of POSTECH. Figure 8. Threaded discovery of Korea University. with 10 simultaneous threads. Time-out for the snmpget request was set to 5 seconds for the tests shown in Figures 7 and 8. By reducing the time out to 3 and 1 seconds the overall time of execution was reduced by 34% and 55%, respectively. After running our tests several times we made various conclusions, and compared the benefits of our work with the current state of the art. Table 2 shows a comparison of previous research with the proposed method and explains the benefits of our algorithm. We utilized the SNMP mechanism to discover devices and connectivity; therefore, our algorithms are faster and generate less traffic. In terms of completeness, we discovered many type of devices, and also discovered connectivity among those devices in efficient ways. Using single-thread and 1-second SNMP time-out, discovering 7495 devices takes approximately 5 hours. Using 10 threads it takes 50 minutes. Connectivity discovery for 7495 devices only took 10 minutes 40 seconds. We discovered VLANs and subnet connectivity, which provides us with a logical view of the network. Our experiments were done on large networks with thousands of devices, and hundreds of VLAN and subnets. 5. CONCLUSION AND FUTURE WORK In this paper, we extended the work of others by introducing a heuristic-based algorithm to connect the end host with a network and showing logical (subnet and VLAN level topology) as well as physical topologies. We discovered different types of devices, including routers, L2/L3/L4/L7 switches, printers, MIB-enabled devices and end hosts, and enhanced the already existing technique of device type discovery. We utilized the SNMP mechanism, which is the most efficient and generates the least amount of traffic in comparison to mechanisms in previous research. Our work can act as a guideline for implementing an SNMP-based topology discovery system. Our extensive tests are significant in terms of efficiency and the number of devices discovered. This work can be extended by integrating it with weather maps or monitoring tools to provide greater management functionality. Our future goals include integrating more link characteristics such as link capacity and mean delay to the links, and discovering connectivity for the L2 switches, such as the BlackDiamond switch, which does not support SNMP. For greater accuracy, our end host connectivity algorithm needs more refinement. We also plan to find a way to reduce the discovery and connectivity time. We aim to acquire a mechanism to perform fast topology update functionality as well. Various analyses of changes to topology will also be done in the future, which could help us discover the growth patterns of networks.

15 SNMP-BASED ENTERPRISE IP NETWORK TOPOLOGY 183 Table 2. Comparison of network topology discovery methods. Method Types of devices discovered Subnet/ inter-subnet connectivity VLAN discovery Performance Siamwalla et al. (1999) [1] Ping/broadcast ping/traceroute/ zone transfer DSN server/ SNMP/subnet guessing algorithm Routers/hosts Subnet guessing algorithms; heuristics; no inter-subnet connectivity Lowekamp et al. (2001) [3] SNMP L2 devices, hubs, dumb devices Not supported Breitbart et al. (2004) [2] Nazir (2007) [4] Proposed method SNMP (ICMP spoofing/ heuristics) Routers/L2 switches/ hosts Inter-subnet connection, complicated formulas Not supported Not supported Complex formulae for VLAN connectivity Compares performance of SNMP, ping, traceroute etc.; SNMP performs best No significant performance data ICMP spoofing and calculating AFT table at frequent intervals takes a long time SNMP/ping Router/L2, L3 switches/ hosts/printers Intelligent subnet-guessing algorithms Not supported No significant performance data Only SNMP Router/L2, L3, L4, L7 switches/ printers/hosts/mib enabled devices Subnet map; inter-subnet connectivity VLAN supported; Switch VLAN and VLAN Switch map 7000 nodes discovered ACKNOWLEDGEMENTS This work was supported in part by the IT R&D program of MKE/KEIT (KI003594, Novel Study on Highly Manageable Network and Service Architecture for New Generation) and by the WCU (World Class University) program through National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (R ). REFERENCES 1. Siamwalla R, Sharma R, Keshav S. Discovering internet topology. Technical report, Cornell University, May Breitbart Y, Garofalakis M, Jai B, Martin C, Rastogi R, Silberschatz A. Topology discovery in heterogeneous IP networks: the NetInventory system. IEEE/ACM Transactions on Networking 2004; 12(3): Lowekamp B, O Hallaron DR, Gross TR. Topology discovery for large Ethernet networks. In ACM SIGCOMM, San Diego, CA, August 2001; Nazir F, Tarar TH, Javed F, Suguri H, Ahmad HF, Ali A. Constella: a complete IP network topology discovery solution. In APNOMS 2007, Sapporo, Hokkaido, Japan, October 2007; Cisco. How to get dynamic CAM entries (CAM table) for catalyst switches using SNMP. tech/tk648/tk362/technologies_tech_note09186a a9b.shtml [12 June 2010]. 6. Cisco. SNMP community string indexing. note09186a ff.shtml [12 June 2010]. 7. CISCO-VTP-MIB. [12 June 2010]. 8. JGraphT. Implementation and source code. [12 June 2010]. 9. Bierman A, Jones K. Physical topology MIB. IETF RFC-2922, September Bobelin L, Muntean T. Algorithms for Network Topology Discovery using End-to-End Measurements. In Proceedings of the 2008 International Symposium on Parallel and Distributed Computing, 2008: AdventNet. AdventNet SNMP API. [12 June 2010]. 12. McCloghrie K, Rose M. Management information base for network management of TCP/IP-based Internets, MIB-II. IETF RFC 1213, March Decker E, Langille P, Rijsinghani A, McCloghrie K. Bridge MIB. IETF RFC 1493, July Bell E, Smith A, Langille P, Rijsinghani A, McCloghrie K. Q-BRIDGE-MIB. IETF RFC 2674, August Case J, Fedor M, Schoffstall M, Davin J. A Simple Network Management Protocol (SNMP). IETF RFC-1157, May Passmore D, Freeman J. The virtual LAN technology report. [12 June 2010]. 17. IEEE 802.1Q. IEEE Standard for Local and Metropolitan Area Networks: Virtual Bridge Local Area Networks, Donnet B, Friedman T. Internet topology discovery: a survey. IEEE Communications Surveys and Tutorials 2007; 9(4):

16 184 SUMAN PANDEY ET AL. 19. Extreme Networks. BlackDiamond core switching products. [6 30 June 2010]. 20. Product specific MIB, Plummer DC. An Ethernet address resolution protocol or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. IETF RFC 826, November Mockapetris P. Domain names: concepts and facilities. IETF RFC 1034, November Torren M. tcptraceroute: a Traceroute implementation using TCP packets. UNIX man page (2001). code/tcptraceroute/ [12 June 2010]. 24. Sung Y, Rao S, Xie G, Maltz D. Towards systematic design of enterprise networks. ACM CoNEXT, August Bejerano Y. Taking the skeletons out of the closets: a simple and efficient topology discovery scheme for large Ethernet. IEEE INFOCOM, April 2006; Wood DCM, Coleman SS, Schwartz MF. Fremont: a system for discovering network characteristics and problems. In Proceedings of Usenix Winer Conference, January Carofalakis M, Rastogi R. Data mining meets network management: the Nemesis project. ACM SIGMOD International Workshop on Research Issues in Data Mining and Knowledge Discovery, May AUTHORS BIOGRAPHIES Suman Pandey is a researcher in Computer Science and Engineering department at POSTECH. She received her M.S. from POSTECH, Korea in August Her research interests include topology discovery and management, IPTV deployment and machine to machine network management. Mi-Jung Choi is an assistant professor in the Department of Computer Science, Kangwon National University, Korea. She received her B.S. degree in CS from Ewha Womans University in 1998, and M.S. and Ph.D. degrees from the Dept. of CSE at POSTECH in 2000 and 2004, respectively. Her research interests include traffic measurement, and future Internet management. Young J. Won is a postdoctoral researcher at INRIA, France. He received B. Math (2003) from the University of Waterloo, Canada, and M.S. (2006) and Ph.D. (2010) from POSTECH, Korea. James Won-Ki Hong is Professor and Head of Division of IT Convergence Engineering and Dean of Graduate School for Information Technology, POSTECH, Korea. He received a Ph.D. degree from the University of Waterloo, Canada in His research interests include network management, network monitoring and analysis, ubiquitous computing and convergence engineering. James has served as Technical Chair ( ), Vice Chair ( ) and Chair ( ) for IEEE Comsoc Committee on Network Operations and Management (CNOM). He is serving as Director of Online Content for the IEEE Comsoc. He is a NOMS/IM Steering Committee Member and a Steering Committee Member of APNOMS. He was a General Co-Chair of 2010 IEEE/IFIP Network Operations and Management Symposium (NOMS 2010). He is an editorial board member of IEEE TNSM, JNSM, IJNM, JCN and JTM.

IP Network Topology Discovery Using SNMP

IP Network Topology Discovery Using SNMP IP Network Topology Discovery Using SNMP Suman Pandey #1, Mi-Jung Choi #2, Sung-Joo Lee #3, James W. Hong #4 # Dept. of Computer Science and Engineering, POSTECH, Korea 1 suman@postech.ac.kr, 2 mjchoi@postech.ac.kr,

More information

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring 1 Aman Mahajan, 2 Haresh Joshi, 3 Sahil Khajuria, 4 Anil k Verma 1,3,4 CSE, Thapar University, Patiala, India 2 Manager-Technology,CGL Mumbai, India Email: 1 akverma@thapar.edu, 2 haresh.joshi@cgglobal.com,

More information

Network Discovery Tool

Network Discovery Tool Bestin Jose Mahesh Kumar Shyamsunder Computer Science and Engineering Indian Institue of Technology Bombay November 28, 2004 1 Problem Statement 2 Introduction to Netdisco Features of NetDisco 3 4 5 Problem

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401 Topology Discovery in Heterogeneous IP Networks: The NetInventory System Yuri Breitbart, Minos Garofalakis, Member, IEEE, Ben Jai, Cliff

More information

Constella: A Complete IP Network Topology Discovery Solution

Constella: A Complete IP Network Topology Discovery Solution Constella: A Complete IP Network Topology Discovery Solution Fawad Nazir 1,2,4, Tallat Hussain Tarar 3,4, Faran Javed 4, Hiroki Suguri 5, Hafiz Farooq Ahmad 4,5, and Arshad Ali 4 1 National ICT Australia

More information

Configurable device discovery. Belgrade University Computer Centre, Serbia slavko.gajin@rcub.bg.ac.rs

Configurable device discovery. Belgrade University Computer Centre, Serbia slavko.gajin@rcub.bg.ac.rs Configurable device discovery based on SNMP Slavko Gajin Slavko Gajin Belgrade University Computer Centre, Serbia slavko.gajin@rcub.bg.ac.rs Introduction Motivation To avoid manual initial configuration

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

How to Keep Track of Your Network Configuration

How to Keep Track of Your Network Configuration The following paper was originally presented at the Seventh System Administration Conference (LISA 93) Monterey, California, November, 1993 How to Keep Track of Your Network Configuration J. Schonwalder

More information

End-to-End IP Network Measurement for Broadcast Applications

End-to-End IP Network Measurement for Broadcast Applications EBU Tech 3346 End-to-End IP Network Measurement for Broadcast Applications EisStream Software package description Geneva May 2011 1 Conformance Notation This document contains both normative text and informative

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

Visio Enabled Solution: One-Click Switched Network Vision

Visio Enabled Solution: One-Click Switched Network Vision Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

CORPORATE NETWORKING

CORPORATE NETWORKING CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Finding Ethernet-Type Network Topology is Not Easy

Finding Ethernet-Type Network Topology is Not Easy Finding Ethernet-Type Network Topology is Not Easy Hassan Gobjuka, Yuri Breitbart Department of Computer Science Kent State University Kent, OH 44242 {hgobjuka,yuri}@cs.kent.edu 1 Abstract In this paper

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Topology Discovery in Heterogeneous IP Networks

Topology Discovery in Heterogeneous IP Networks Topology Discovery in Heterogeneous IP Networks Yuri Breitbart, Minos Garofalakis, Cliff Martin, Rajeev Rastogi, S. Seshadri, Avi Silberschatz Information Sciences Research Center Bell Labs, Lucent Technologies

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER)

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER) Journal homepage: www.mjret.in ISSN:2348-6953 DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER) Narendra Shewale 1, Sharad Hadke 2, Mayur Kharote 3 Department of Computer Engineering, University

More information

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Network Management & Security (CS 330) RMON

Network Management & Security (CS 330) RMON Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

Towards Autonomic Network Management for Mobile IPv4 Based Wireless Networks*

Towards Autonomic Network Management for Mobile IPv4 Based Wireless Networks* Towards Autonomic Network Management for Mobile IPv4 Based Wireless Networks* Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh, and James W. Hong Departments of Computer Science and Engineering Pohang University

More information

Avaya Visualization Performance and Fault Manager Discovery Best Practices

Avaya Visualization Performance and Fault Manager Discovery Best Practices Avaya Visualization Performance and Fault Manager Discovery Best Practices 2.3 NN48014-105 01.02 June 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Configure A VoIP Network

Configure A VoIP Network Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: alto.ec@gmail.com Ms. Zarna M. Gohil Electronics & Communication

More information

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1 Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation OM2012 Network Monitoring Phil Bracher Sr. Premier Field Engineer Microsoft Corporation Continuous Availability of the Management Group: Resource Pooling Config service Scale and Federation Data Access

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Discovering Topologies at Router Level: Part II

Discovering Topologies at Router Level: Part II Discovering Topologies at Router Level: Part II Alessio Botta, Walter de Donato, Antonio Pescapé, and Giorgio Ventre University of Napoli Federico II (Italy), {a.botta,walter.dedonato,pescape,giorgio}@unina.it

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Effect of Windows XP Firewall on Network Simulation and Testing

Effect of Windows XP Firewall on Network Simulation and Testing Issues in Informing Science and Information Technology Volume 4, 2007 Effect of Windows XP Firewall on Network Simulation and Testing Akram Al-Rawi College of CS & IT, King Faisal University, Al-Hassa,

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Avaya P330 Load Balancing Manager User Guide

Avaya P330 Load Balancing Manager User Guide Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

Fremont: A System for Discovering Network Characteristics and Problems

Fremont: A System for Discovering Network Characteristics and Problems Fremont: A System for Discovering Network Characteristics and Problems David C. M. Wood, Sean S. Coleman, & Michael F. Schwartz University of Colorado ABSTRACT In this paper we present an architecture

More information

How To Manage A Network On A Network With A Global Server (Networking)

How To Manage A Network On A Network With A Global Server (Networking) HIGH AVAILABILITY STRATEGY - GLOBAL TRAFFIC MANAGEMENT PROTOTYPE REPORT Version 1-00 Document Control Number 2460-00004 11/04/2008 Consortium for Ocean Leadership 1201 New York Ave NW, 4 th Floor, Washington

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Ethernet (LAN switching)

Ethernet (LAN switching) Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

OAM Operations Administration and Maintenance

OAM Operations Administration and Maintenance OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

COMPUTER NETWORKS - LAN Interconnection

COMPUTER NETWORKS - LAN Interconnection LAN interconnection Telecommunication s Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information