Rorschach Plots and Network Performance Analysis
|
|
|
- Bennett Hancock
- 10 years ago
- Views:
Transcription
1 Rorschach Plots and Network Performance Analysis Jim Gilsinn Kenexis Consulting Corporation October 19-20, 2013 BSidesDC
2 Rorschach? October 19-20, 2013 BSidesDC
3 Rorschach Plots October 19-20, 2013 BSidesDC
4 Rorschach Plots October 19-20, 2013 BSidesDC
5 Rorschach Plots October 19-20, 2013 BSidesDC
6 ICS Environment October 19-20, 2013 BSidesDC
7 ICS Environment October 19-20, 2013 BSidesDC
8 ICS Systems October 19-20, 2013 BSidesDC
9 What s This All About? I used to work at NIST I left about a year ago I worked on ICS network performance metrics, tests, and tools The test tools I developed have been dormant since leaving The vendors I worked with while at NIST want to tool My new employer won t support open-source development I m here to beg for help! October 19-20, 2013 BSidesDC
10 Performance Testing Methodology: Performance Metrics Publish/subscribe or peer-to-peer communications Main performance metric: Cyclic frequency variability/jitter Real-time EtherNet/IP uses publish/subscribe Requested/Accepted Packet Interval (RPI/API) Measured Packet Interval (MPI) October 19-20, 2013 BSidesDC
11 Performance Testing Methodology: Performance Metrics Command/response or master/slave communications Main performance metric: Latency Large numbers of protocols use this Most (All?) PC-based server/client protocols HTTP(S), (S)FTP, etc. Most industrial protocols Modbus/TCP, Profinet, Ethercat, etc. October 19-20, 2013 BSidesDC
12 IENetP Test Tool Industrial Ethernet Network Performance (IENetP) Current Version = 1.1.2, Released Software Features Analyze existing Wireshark captures Allows user to override default EtherNet/IP filter Isolates individual traffic streams Determine cyclic jitter of those streams Generates HTML report Generates time-space & histogram graphs Graphs allow zooming October 19-20, 2013 BSidesDC
13 NIST Performance Test Tool Industrial Ethernet Network Performance (IENetP) Test Tool Factory Equipment Network Testing (FENT) Framework
14 FENT Framework Universal Client Application Testing Module Testing Module Testing Module Testing Module Analysis Engine Analysis Engine Reporting Engine Universal Client Application API Personality Module Personality Module Personality Module Sensor Gateway Ethernet Fieldbus Internet October 19-20, 2013 BSidesDC
15 FENT Features All Analysis Features From IENetP Analyze Wireshark capture files Build graphs and reports of results Added Features True multi-protocol support Real-time testing capability Extensible framework October 19-20, 2013 BSidesDC
16 FENT Personality Modules Wrapper for Driver Application Implement a TCP-socket interface for UCA-API messaging Build a simple XML-based PM Descriptor file Features Describes Wireshark parameters Allows any protocol to be used Can be built/loaded at run-time UCA API Protocol PM PM Descriptor Driver App October 19-20, 2013 BSidesDC
17 FENT Framework Run-Time Testing Module UCA API Protocol PM PM Descriptor Driver App UCA Analysis Engine Reporting Engine PSML File Wireshark 1. Testing Module! Protocol PM Grab protocol-specific Wireshark parameters via UCA-API 2. Testing Module! Wireshark Start capturing traffic 3. Testing Module! Protocol PM Command driver app to communicate with DUT 4. Testing Module! Wireshark Stop Capturing traffic, process capture file using desired protocol and user parameters, generate PSML file 5. Analysis Engine Read PSML file, analyze packets for desired metrics 6. Reporting Engine Report data to user DUT October 19-20, 2013 BSidesDC
18 FENT UCA-API Schema October 19-20, 2013 BSidesDC
19 FENT Framework Project Home: What s Available: SVN repository & schema FENT software Conduct real-time testing Analyze results Build graphs on-screen NIST SensorSim PM, IEEE 1451 PM EtherNet/IP PlugFest Gold Standard Background Traffic October 19-20, 2013 BSidesDC
20 FENT Framework Known Problems & Issues Doesn t work with Wireshark 1.9+ Tshark argument for getting fields changed Logic problems with using multi-protocol Wireshark headers Software doesn t use true database Testing automation not integrated No installer October 19-20, 2013 BSidesDC
21 FENT Demo October 19-20, 2013 BSidesDC
22 Gold Standard Background Traffic October 19-20, 2013 BSidesDC
23 Gold Standard Background Traffic What Is It? A set of Wireshark captures, Linux scripts, and analysis results Based on EtherNet/IP PlugFest performance testing requirements High precision and accuracy Wireshark captures of PlugFest performance background traffic Linux scripts designed for use in BackTrack Linux ( Analysis results show validation for use in PlugFest performance testing Where Can You Get It? or FENT SVN in Background_Traffic folder October 19-20, 2013 BSidesDC
24 PlugFest Performance Traffic Traffic Type Rate (pps) Baseline Steady-State Managed Steady-State Unmanaged Burst Managed Burst Unmanaged ARP Request Broadcasts 180 Gratuitous ARP Broadcasts 180 DHCP Request Broadcasts 100 ICMP (ping) Request Broadcasts 100 NTP Multicasts 10 EtherNet/IP ListIdentity Request 10 EtherNet/IP Class ARP Burst Requests 240 4k Hz
25 Gold Standard Captures Built From Individual Traffic Streams Each traffic stream generated and captured using NIST Ixia system (a few microseconds jitter) Assembled using editcap and mergecap scripts Final captures are 60-seconds long Can t just loop continuously Longer test captures require rebuilding (not hard) Analyzed Using IENetP Analysis results are included in package Well within spec for PlugFest performance testing needs (<25% of desired packet intervals) October 19-20, 2013 BSidesDC
26 Licensing? The project is Public Domain!!! There are NO LICENSING ISSUES!!! October 19-20, 2013 BSidesDC
27 What s Next? Contact Me Jim Gilsinn [email protected] LinkedIn Review the FENT SourceForge Project Fork the Project October 19-20, 2013 BSidesDC
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Performance Test Methodology for EtherNet/IP Devices
Performance Test Methodology for EtherNet/IP Devices Version 1.0 March 14, 2005 PUB00081R1 Published by EtherNet/IP Implementors Workshop ODVA Document Revision Log Revision Section Remarks Date Author(s)
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
CT505-30 LANforge-FIRE VoIP Call Generator
1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP
Welcome. People Power Partnership. 2015-10-27 PROFIdag 2013 Peter Van Passen Sales & Business Development Manager HARTING Electric 1/44
Welcome 2015-10-27 PROFIdag 2013 Peter Van Passen Sales & Business Development Manager HARTING Electric 1/44 Performant, Deterministic & Time Accurate Networking with FTS & PTP 2015-10-27 PROFIdag 2013
OF 1.3 Testing and Challenges
OF 1.3 Testing and Challenges May 1 st, 2014 Ash Bhalgat (Senior Director, Products), Luxoft Santa Clara, CA USA April-May 2014 1 Agenda OpenFlow : What and Why? State of OpenFlow Conformance Challenges
Troubleshooting LANs with Network Statistics Analysis
Application Note Troubleshooting LANs with Network Statistics Analysis Introduction This application note is one in a series of local area network (LAN) troubleshooting papers from JDSU Communications
Performance Analysis of Time-Triggered Ether-Networks Using Off-The-Shelf-Components
of Time-Triggered Ether-Networks Using Off-The-Shelf-Components AMICS Workshop 2011 Till Steinbach, Franz Korf, Thomas C. Schmidt {florian.bartols,till.steinbach,korf,schmidt} @informatik.haw-hamburg.de
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
TEST AUTOMATION FRAMEWORK
TEST AUTOMATION FRAMEWORK Twister Topics Quick introduction Use cases High Level Description Benefits Next steps Twister How to get Twister is an open source test automation framework. The code, user guide
Wide Area Monitoring, Control, and Protection
Wide Area Monitoring, Control, and Protection Course Map Acronyms Wide Area Monitoring Systems (WAMS) Wide Area Monitoring Control Systems (WAMCS) Wide Area Monitoring Protection and Control Systems (WAMPACS)
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer
Introduction Interoperability & Tools Group Existing Network Packet Capture Tools Challenges for existing tools Microsoft Message Analyzer Slide 2 Interop and Tools What we do Part of Windows Server Org
Analysis of Industrial PROFINET in the Task of Controlling a Dynamic System**
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.65 Maciej Rosó³*, Dawid Knapik*, Dariusz Marchewka*, Krzysztof Ko³ek*, Andrzej Turnau* Analysis of Industrial PROFINET
Packet Sniffer Detection with AntiSniff
Ryan Spangler University of Wisconsin - Whitewater Department of Computer and Network Administration May 2003 Abstract Packet sniffing is a technique of monitoring every packet that crosses the network.
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
The intelligent Protocol Converter
PROTOCOL CONVERTER UNIGATE CL Easy installation Norm compliant Ready-to-use Configurable Programmable Designed & manufactured in Germany THE INTELLIGENT PROTOCOL CONVERTER FOR ETHERNET TCP/IP A SOLUTION
Quality of Service in Industrial Ethernet Networks
György Kálmán, ABB Corporate Research Norway, [email protected] Quality of Service in Industrial Ethernet Networks February 10, 2013 Slide 1 Can we provide appropriate Quality of Service for industrial
PRESTA 10G Platform for High-accuracy 10-Gb/s Network Monitoring
PRESTA 10G Platform for High-accuracy 10-Gb/s Network Monitoring NTT Network Innovation Laboratories Katsuhiro Sebayashi, Kenji Shimizu, Seiki Kuwabara, Tetsuo Kawano, Mitsuru Maruyama 1 Winter 2010 ESCC/Internet2
Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans
Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Contents Overview...3 1. VPLS Traffic CoS Test...3 2. VPLS VSI Isolation Test...5 3. VPLS MAC Address Purge Test...7
Practical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
Figure 1. Wireshark Menu Bar
Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain
How To Analyze Bacnet (Bacnet) On A Microsoft Computer (Barcnet) (Bcfnet) And Get A Better Understanding Of The Protocol (Bafnet) From A Microsatellite) (Malware)
The following article was published in ASHRAE Journal, November 2008. Copyright 2008 American Society of Heating, Refrigerating and Air- Conditioning Engineers, Inc. It is presented for educational purposes
Networks - EtherNet IP Course (Version 5.1)
Networks - EtherNet IP Course (Version 5.) Course No. GCCE 8033 (LMS: 26359) Duration ½ day Pre-Requisites Familiarity with Windows based computers. Objectives Upon successful completion of this course,
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Installation Guide for Basler pylon 2.3.x for Linux
Installation Guide for Basler pylon 2.3.x for Linux Version 2.3.x Document ID Number: AW00100401000 Revision Date: May 27, 2011 Subject to Change Without Notice Basler Vision Technologies Installation
IPSec Virtual Private Networks Conformance and Performance Testing Sample Test Plans
IPSec Virtual Private Networks Conformance and Performance Testing Sample Test Plans Contents 1. IPSec Conformance Test...3 2. Tunnel Scalability Test...5 3. Tunnel Setup Rate Test...7 4. Re-Key Tests...
Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down
Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down Rony Kay www.cpacket.com, 2012 Pervasive Visibility, Monitoring, and Drill Down cpacket delivers solutions for intelligent
Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.
Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...
H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration
H0/H2/H4 -ECOM100 DHCP & HTML 6 H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML 6-2 H0/H2/H4 -ECOM100 DHCP DHCP Issues The H0/H2/H4--ECOM100 is configured at the factory
Configuring PROFINET
CHAPTER 9 This chapter describes how to configure the PROFINET feature on the Cisco IE 3000 switch. Understanding PROFINET, page 9-1, page 9-4 Displaying the PROFINET Configuration, page 9-5 Troubleshooting
Industrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Network Configuration Example
Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking
How To Switch A Layer 1 Matrix Switch On A Network On A Cloud (Network) On A Microsoft Network (Network On A Server) On An Openflow (Network-1) On The Network (Netscout) On Your Network (
Software- Defined Networking Matrix Switching January 29, 2015 Abstract This whitepaper describes a Software- Defined Networking use case, using an OpenFlow controller and white box switches to implement
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
Quick Start for Vendors Handbook
Quick Start for Vendors Handbook A Guide for EtherNet/IP Developers www.odva.org Copyright Notice EtherNet/IP Quick Start for Vendors Handbook Publication Number: PUB00213R0 Copyright 2008 Open DeviceNet
XMVAE Gigabit Ethernet Modules
XMVAE Gigabit Ethernet Modules Ixia's XMVAE Gigabit Ethernet Load Modules offer complete Layer 2-3 network and application testing functionality in a single test system for Automotive Ethernet switch and
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
Evaluating 1588v2 Performance Rev 2
Evaluating 1588v2 Performance Rev 2 Application Note IEEE 1588v2 is the preferred protocol for transport frequency and phase synchronization over Ethernet, which is required for 3G and 4G mobile networks.
19 Comparison of Ethernet Systems
Frithjof Klasen Ever since the end of the 90 s, the usage of industrial Ethernet in automation has been a pursued target. Along with this, the desire emerged to have a universal and standard communication
The Case Against Jumbo Frames. Richard A Steenbergen <[email protected]> GTT Communications, Inc.
The Case Against Jumbo Frames Richard A Steenbergen GTT Communications, Inc. 1 What s This All About? What the heck is a Jumbo Frame? Technically, the IEEE 802.3 Ethernet standard defines
CT505-35 LANforge-FIRE VoIP Call Generator
1 of 7 7/12/2013 2:01 PM Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-35 LANforge-FIRE VoIP Call Generator The CT505-35 supports
Project 4: SDNs Due: 11:59 PM, Dec 11, 2014
CS168 Computer Networks Fonseca Project 4: SDNs Due: 11:59 PM, Dec 11, 2014 Contents 1 Introduction 1 2 Overview 2 2.1 Components......................................... 2 3 Setup 3 4 Shortest-path Switching
Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty
Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely
Modbus and ION Technology
Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. ACCESS meters are compatible with Modbus networks as both slaves and
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
Network Security Monitoring
Network Security Coleman Kane [email protected] September 24, 2014 Cyber Defense Overview Network Security 1 / 23 Passive Passive 2 Alert Alert Passive monitoring analyzes traffic with the intention
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
CiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Firewall. User Manual
Firewall User Manual 1 IX. Firewall This chapter introduces firewall general policy, access rule, and content filter settings to ensure network security. 9.1 General Policy The firewall is enabled by default.
Overview and Applications of PROFINET. Andy Verwer Verwer Training & Consultancy Ltd
Overview and Applications of PROFINET Andy Verwer Verwer Training & Consultancy Ltd What exactly is PROFINET? PROFINET is an open Industrial Ethernet standard developed by the PROFIBUS Organisation. PROFINET
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
Hirschmann Networking Interoperability in a
Automation and Network Solutions Hirschmann Networking Interoperability in a PROFInet Environment Hirschmann Interoperability White Paper Rev. 1.1 Contents Hirschmann Networking Interoperability in a Profinet
QualNet 4.5 Network Emulation Interface Model Library
QualNet 4.5 Network Emulation Interface Model Library February 2008 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements
EDSA-300 ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements Version 2.0 June 2010 Copyright 2010 ASCI - Automation Standards Compliance Institute,
Advanced Internetworking
Advanced Internetworking Lab 5 - Multimedia networking rev 1.0 Markus Hidell Voravit Tanyingyong Royal Institute of Technology (KTH) Telecommunication Systems Lab (TSlab)
Universal network-enabled automation interface for home automation, commercial control, and monitoring applications
BARIONET Universal network-enabled automation interface for home automation, commercial control, and monitoring applications This Manual Describes: Barionet 100 (Original Barionet) Firmware Version: 3.02
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
CGI-based applications for distributed embedded systems for monitoring temperature and humidity
CGI-based applications for distributed embedded systems for monitoring temperature and humidity Grisha Spasov, Nikolay Kakanakov Abstract: The paper discusses the using of Common Gateway Interface in developing
ntopng: Realtime Network Traffic View
ntopng: Realtime Network Traffic View Luca Deri 3/28/14 1 ntop in 1998 In 1998, the original ntop has been created. Available for Unix and Windows under GPL. Contrary to many tools available
Linux Virtual Server Tutorial
Linux Virtual Server Tutorial Horms (Simon Horman) [email protected] VA Linux Systems Japan, K.K. www.valinux.co.jp with assistance from NTT Comware Corporation www.nttcom.co.jp July 2003 http://www.ultramonkey.org/
Real-time Ethernet with TwinCAT network variables
Keywords Real-time Ethernet Network variables Multimaster FC9004 ublish-ubscribe Beckhoff Information ystem Real-time Ethernet with network variables This Application Example describes the function and
Introducing the Adafruit Bluefruit LE Sniffer
Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer
Application Note. EtherCAT Master Architecture. Applicable Products: Yaskawa Servodrives with CANopen over EtherCAT
Application Note EtherCAT Master Architecture Applicable Products: Yaskawa Servodrives with CANopen over EtherCAT Yaskawa America, Inc. Drives & Motion Division 2014 March 5, 2015 Page 1 of 18 Table of
10Gb Ethernet: The Foundation for Low-Latency, Real-Time Financial Services Applications and Other, Latency-Sensitive Applications
10Gb Ethernet: The Foundation for Low-Latency, Real-Time Financial Services Applications and Other, Latency-Sensitive Applications Testing conducted by Solarflare and Arista Networks reveals single-digit
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
OPART: Towards an Open Platform for Abstraction of Real-Time Communication in Cross-Domain Applications
OPART: Towards an Open Platform for Abstraction of Real-Time Communication in Cross-Domain Applications Simplification of Developing Process in Real-time Networked Medical Systems Morteza Hashemi Farzaneh,
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
How To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
and Outline Coordinator: .com brenda@chappellu. University www..lcuportal2.com
Network Traf ffic and Security Ana alysiss Sample Coordinator: 5-Day Course Outline Brenda Cardinal [email protected] Phone: +1 408 378 7841 Fax: +1 408 378 7891 Mail: 5339 Prospect Road, #343 San
Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers
Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers Overview A leading provider of voice, video, and data services to the residential and businesses communities designed
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University Napatech - Sharkfest 2009 1 Presentation Overview About Napatech
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
