Abaré: A Deployment and Management Framework for Wireless Mesh Network

Size: px
Start display at page:

Download "Abaré: A Deployment and Management Framework for Wireless Mesh Network"

Transcription

1 Abaré: A Deployment and Management Framework for Wireless Mesh Network Billy Pinheiro Federal University of Pará billy@ufpa.br Vagner Nascimento Federal University of Pará vagner@ufpa.br Waldir Moreira Institute for Systems and Computer Engineering of Porto wjunior@inescporto.pt Antônio Abelém Federal University of Pará abelem@ufpa.br Abstract The adoption of wireless mesh networks as a solution for access networks in indoor and outdoor environments is considered by the academic community and industry as a good alternative for Internet access due to their economic and technical feasibility. However, the existence of proprietary and opensource solutions that are not interoperable and the delay in the standardization makes the deployment of wide scale wireless mesh networks a time consuming task and it may come along with some security problems. In this paper, we propose Abaré, a framework which defines a set of components and steps to aid in the deployment and administration of mesh networks since its inception. I. INTRODUCTION Wireless Mesh Networks (WMNs) emerge as a cheap alternative with extended coverage, because through cooperation between the nodes, a link to the fixed network can be shared, allowing more efficient usage of bandwidth and avoiding the cost with cabling to the end users[1]. However, this type of network still suffers from the lack of standardization[2]. Several companies such as Motorola and Cisco have already developed pre-mesh solutions, but the high costs hamper their adoption on a large scale environment. Moreover, these solutions offer no guarantees of interoperability, making it almost impossible to use them together. As an alternative to proprietary solutions, Wi-Fi (Wireless Fidelity) equipment can be used with modified firmware using a Linux distribution such as OpenWRT [3] or DD-WRT [4]. Such a solution is aimed for embedded devices, enabling the easy sharing of network resources and reducing considerably the total cost of deploying a WMN. This type of solution allows digital cities creation with an accessible cost, providing a range of services to users. Several projects have already shown that the use of this solution is viable, for example namely Vmesh[5]. The easiness offered by WMNs has stimulated its growth and this has caused needs for network maintenance and planning. In a small environment, only one person is able to manage it. However, given an environment that has dozens of distributed points, the maintenance becomes more difficult, demanding more time and resources. This happens because the deployment and management of such networks are still performed through a series of non-formalized steps and lacking standardization regarding the different software s used. Considering networks with a broader coverage, the management task is inherently more complex and crucial, since it involves a large number of equipments and users depending on their services. These services must be secured and maintained adequately, because users expect the same quality found in wired networks. Furthermore, with the great use and heterogeneity of networks, there has been a need for a scheme that offers solutions for managing consistent and structured networks, allowing equipment monitoring and control[6]. In the case of WMNs, management is a significantly more complex task because they are a type of hybrid network with characteristics of infrastructured and ad hoc networks. Therefore, they are not fully supported by existing tools that are usually developed based either on a set of requirements related to the infrastructured network or the ad hoc one[7]. Unlike wired networks, WMNs lack a standardization effort to guarantee, for example, the interoperability between different WMNs. As a result, there are not many management tools focused on WMNs. The few tools found are usually developed by mesh solution suppliers related specifically to their solutions as motomesh[8]. An additional drawback is that they are not open source which would allow their extension to accommodate specific needs. In order to address the limitations and aforementioned issues, we present Abaré 1, a framework with methods to assist and facilitate the deployment, monitoring and management of WMNs based on information collected from routers and the network itself. This paper is structured as follows. Section 2 presents the work related to WMN management. Open Mesh is described in Section 3. In Section 4 the proposed framework Abaré is presented. Section 5 shows the application of the framework. Finally, Section 6 presents the conclusions and future work. II. RELATED WORK This section covers not only work specifically related to mesh network management, but also work on ad hoc and wired networks frameworks, since both have a larger number of work that served as basis for the proposal presented in this paper. Commonly, to perform network management, the Simple Network Management Protocol (SNMP) is used. It is the 1 Indian word which means friend of the man /09/$25.00 c 2009 IEEE

2 standard protocol for monitoring and managing most of the networks due to its wide acceptance and usage in large software management[9]. With SNMP, each node keeps a database of local information that can be managed, known as Management Information Base (MIB), which is periodically accessed by a Network Management System (NMS). Mesh proprietary solutions use either SNMP or some other solution developed by the device manufacturer[8][10][11]. The Distributed Ad-hoc Network Monitoring (DAMON) is a system to monitor distributed and ad-hoc sensor networks, and it was proposed by[12]. There are agents used to collect information from the network and send data to repositories. It is worth emphasizing that this algorithm is dependent on the Ad-hoc On-Demand Distance Vector (AODV) routing protocol for its operation. Jardosh[13] designed the SCUBA framework for interactive visualization to report on problems in large-scale mesh networks. In this framework, several metrics are gathered in a database through a gateway node. This information is used to generate an interactive view. The framework is tested in an initial implementation with 15 mesh nodes which shows the viability of the framework. Riggio[14] proposed the JANUS framework for distributed management of WMNs.However, the actual proposal is restricted to the task of monitoring the network. The testbed used was a simple mesh network using microcomputers with MCL (Mesh Connectivity Layer) installed[15]. Mesh-Mon is a framework proposed and implemented by[16] that performs network monitoring to help the administrator with the task. Charles defined his management system as being scalable and distributed, and that attempts to automatically detect and recover from network failures. However, the framework is reduced to simply monitoring the network taking some actions automatically if the network behavior is different from a standard which was set statically by the author MobiMESH is a WMN implementation that provides a comprehensive framework of analysis the behavior in real environments, including advanced routing support considering multiple radios, channel allocation, as well as managing, monitoring and security platforms[17]. Nevertheless this framework, as it happens for most of the frameworks, has no additional modules that could make them adaptable to the reality of WMNs over time. Badonnel[18] mentions that the process of collecting information may cause overload in the network, and Cheikhrouhou[19] proposes a solution to this problem considering that the management tools of a framework are implemented at application level. That is, the information would be accessed individually at each point of the network and, thus, the data would be collected in the desired way, but it would also be necessary to take proper precautions with the security of messages exchanged between applications. Another important issue on the monitoring task that should be observed is the temporal property of information, this property is determined by the requirements of network management. An example of such property is the task of visualizing the network topology in real time. This task requires that information be processed as quickly as possible; otherwise the representation is not precise enough. It may also be necessary to obtain the history of statistics of a given fixed point which has a very low time restriction. Therefore, the collection interval should be sufficient, but without interfering in the functioning of the network. Thus, we can observe that the implementation, monitoring and administration tasks are very important to the network, and based on these aspects, we propose a framework that meets the needs or fills in the gaps left by other frameworks proposed in the literature and it is not just restricted to the monitoring task as done by most frameworks. Next we define the scope where the proposed framework could be applied. Its focus is on networks that we call Open Mesh which can be implemented in indoor and outdoor environments. III. OPEN MESH At the end of the twentieth century, we saw a movement in which the computers that were sold as a single box containing software and hardware started to be supplied by manufacturers only with the hardware. Therefore, efforts made in the development of operating systems for these products could be allocated for the improvement of hardware which consequently resulted in lower prices of equipment, making them more accessible. It is possible that this movement happen again, but having as target WiFi routers. These manufacturers would supply only the hardware that would be compatible with an operating system offered by third parties. This type of vision is shared by some companies already[20]. From the moment that there is an open firmware, i.e. an operating system with open source code, it is possible to develop an entire solution only with open source software to implement a mesh network[21]. We call the Open WMN a network that has the following components: Routers: Equipments that are independent of manufacturer, brand, and model. They have the same physical and link layers transmission standards and allow changes in their firmware. It is recommended that the amount of RAM (Random Access Memory) and Flash are a minimum of 2MB and 8MB, respectively[22]. GPL 2 Firmware: This is the responsible for abstracting the differences between different router manufacturers, brands and models, providing a homogeneous layer where it is possible to use the same tools and settings. Its development is supported by a community of users who create and use a series of software that are developed for the same platform. Routing Protocol: After the installation of the new firmware, it is possible the installation of any routing protocol that allows the routers to act as mesh routers. Different from Ad hoc networks, where the autonomy 2 General Public License

3 of energy is limited, mesh routers in the networks have a constant power supply allowing that algorithms have higher computational demands. A. Open Mesh Deployment and Management steps The deployment and management of such a network consists of a series of steps. It is important to know these steps to understand the needs of a framework to assist in these tasks: 1) Once sure that the router is compatible with the chosen firmware, the process of firmware installation is done; 2) An initial connection is established with the router, containing the modified firmware already, to set the system root password. This step can be done via telnet or http; 3) Then the network configuration should be done using a scheme based on identification (ID) of the router. It is also worth mentioning that the Extended Service Set ID (ESSID) set in the routers must be the same; 4) In order to have a mesh network, even without any type of authentication, Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS) and a dynamic routing algorithm, are required. Normally, the DHCP and DNS services are already installed, remaining only to conduct the installation of the dynamic routing algorithm that meets the needs of the network[1]; 5) From this point on, the WMN should already be working, leaving just the maintenance tasks that can be performed remotely, and a connection to each router must be established to perform the desired task; 6) The metrics collection must be done at each router. Currently some captive portal tools already receive some information and store it in a database[23]; 7) Any type of management, either security or QoS, will be done by logging in to each router and manually executing all the desired commands; The completion of these steps in a network with few routers is a relatively straightforward task. However, in a network with tens of nodes, the complexity and the work spent on this task becomes impossible or at least very difficult to deploy this type of network. As changes are made only on routers, this type of network is usually deployed as the infrastructure architecture. The network backbone is composed only of mesh routers that provide the basic infrastructure to non-mesh client access. Through this backbone, it is possible to interconnect different networks with different transmission technologies.usually, this is the most widely used mesh architecture, because it requires changes only in the routers. Nevertheless, these networks accept the communication with other types of networks and their respective equipments [24] IV. THE ABARÉ FRAMEWORK The Abaré framework is based on a series of practical observations which are used to assist in the deployment and management of WMNs. In other words, it is the formalization of steps adopted. Thus, Abaré aims to facilitate the deployment and maintenance processes of large-scale WMNs. In this section we describe Abaré, its features and components considering the diagram shown in Figure 1. Fig. 1. Abaré Framework. The framework has 3 layers: the admin layer, which is responsible for interaction with the user; the core layer, which represents the core system where the logical part and storage of information are located; and the router layer, which allows access to the router for direct communication with the operating system of each network node. A description of each framework s component is presented: Installer Agent - responsible for making the routers firmware change and performing their initial configuration. A more precise description about its operation is provided next: Make a request to Abaré Core Application Programming Interface (API) to obtain the suitable firmware available on the server according to the user s choice and the information to correctly integrate the router to the current WMN; Connect to the router and transfer the firmware, rebooting it at the end of the transfer process; The script generated by the Scripts Module containing the configuration information of a mesh node is transferred to the router and executed through the Commands Agent. The router is then rebooted and once it boots it is already part of the mesh network. The new mesh node has its addition to the network confirmed to the Abaré Core API and its settings are stored in the database. Manager Agent - Responsible for providing an interface where, after proper authentication, the user can interact with the system and use the features offered by the

4 Abaré Core. In other words, this is the interface for system management. Its implementation is independent of operating system and programming language. Abaré Core API - The core system, responsible for obtaining and managing information of all the framework s components. It must provide features, usually in webservice format, which can be used by the Manager and Installer Agents. Database Agent - Responsible for writing and reading information in the database. Collection Agent - Requests information to the Routing Agent and sends it to the Abaré Core API. These are some pieces of information that can be requested: Traffic information to identify possible network bottlenecks; Hardware information to prevent routers from overloading; Routing table information to monitor links and possible routing problems; Commands Agent - Responsible for sending commands to the Router Agent. Normally, it is used for administrative tasks; Expander Agent - Enables the extension of the framework through the addition of new modules, providing enough abstraction for allowing easy development of new features. These modules are the default modules of the framework: Control Module: Coordinates the routers IDs and performs the separation of networks and IPs used; Scripts Module: Generates the script with commands that are given to the Commands Agent, which in turn, forwards these commands to the routers to be executed. A set of templates is available, and according to the routers chosen as a target, the templates will have their variables changed according to the information of the routers, thus producing a customized script for each router. Firmware Module: Gets the firmwares inserted by the administrator and provides them according to the need of Installer Agent. Router Agent - Present in the router and is responsible for replying to the requests of the Collection Agent, providing the information requested in the XML format. It must also accept the commands sent by the Command Agent and execute them in the routers. This agent can be divided into layers which are described below. Input and Output: Responsible for receiving requests and forwarding them to the correct layer depending on the type of data received. It is also responsible for sending the results on executed commands and the collected metrics; Exec Commands: Receives commands and executes each one of them sending a positive or negative response regarding the execution; XML Parser (extensible Markup Language): Receives XML information from the upper layer and triggers one of the collectors of the lower layer. In the opposite direction, it receives the collected information converting them into XML so that the upper layer can send them. Collectors: A set of small modules responsible for collecting information and sending it to the top layer. When a request reaches the XML Parser, it only has the name of the collection module to be triggered. Once the collection module is triggered, it must execute this request and respond with the requested information. Thus, it is easy the integration of new collection modules, being necessary only to insert the new module in the router and that the entity which needs to use the metrics provided by such module know its name. For a better understanding of the activities covered by the framework, Figure 2 shows the use case diagram. Fig. 2. Abaré User Case This diagram spans three external entities (Manager, Database and Router) in addition to the functionalities that are offered by the different components of the framework. It is worth mentioning that Abaré follows a centralized architecture, because it needs a Core to manage the network. This architecture brings advantages such as easy detection of problems and safety management, and allows a better information control[25]. Scalability problems are the disadvantages of this proposal. However, this can be solved with the use of load balancing solutions [26]. V. ABARÉ FRAMEWORK APPLICATION The usage of the Abaré framework aims to make the network s deployment and maintenance steps a systematic task and aided by software, that is, to create a roadmap that can be easily executed with the help of a software that meets the framework s requirements framework. The application of the framework in a real environment, as in an open mesh network,

5 follows the structure presented in Figure 3. In this case, the Abaré framework is applied in a WMN Infrastructured Architecture. Fig. 4. Installer Agente. Fig. 3. Abaré Framework Application. Figure 3 shows the agents in the routers and in the computers used for the deployment and management of the network. It is possible to see in the WMN backbone the presence of Router Agents that are embedded in each mesh router. The Abaré Core is located outside the WMN backbone and connected to the gateway through the mesh router. The Abaré Core may be on the same machine hosting the database and the authentication server, but this is not mandatory. The only requirement is that they must be in the same subnet, preferably connected by wired means to avoid security and availability problems. The support team in Figure 3 represents the users of the Installer and Manager agents which will be installed on computers, cell phones, palms, etc, since the Abaré Core is envisioned as a Web Service providing, thus, platform and programming languages independence. To evaluate the framework, we have developed a prototypical implementation, containing all the functionalities of the Installer Agent. A prototype of the Core with firmware, control and scripts modules and a prototype of the Manager Agent with the interfaces to access the modules were also developed. The prototypical implementations employed in our experimental evaluation were developed using the Python language, with technology xmlrpc and ssl for secure exchange of messages, support for authentication and using GTK(GIMP toolkit) for the grafic user interface. Figure 4 presents the interface of the Agent Installer. These are the deployment steps of a WMN using Abaré: 1) The Installer Agent is used to select, from a list of firmwares loaded in the Abaré Core, the firmware compatible with the router. After the choice is made, the agent starts the recording process of the selected firmware in the router. Then, the Installer Agent begins the initial configuration of the router based on the information received from the Abaré Core, such as IP address, network mask, ESSID, root password, etc. It also registers on the server database information regarding the newly added mesh node. 2) At this point, the node has been inserted into the network and it is operating normally with just a few pending maintenance tasks that can be done through the Manager Agent which uses the features offered by the Abaré Core to manage the remote nodes. It is also possible to use scripts to automate repetitive tasks. 3) The collection agents begin a request to Router Agents where collectors perform the information collection requested and pass them to be stored by the DB Agent in a database previously specified. There are a series of resources that can be aggregated by the framework, such as security and QoS management. However, these can be implemented through the Expander Module that allows an easy aggregation of characteristics initially not covered by the framework. Through the conducted tests was possible verify that the framework can guarantee a solid basis for the deployment and administration phases and to allow that the framework answer the specifics needs of where the mesh network will be deployed. To evaluate the solution s scalability, have been performed load test in Abaré Core. For that, we have been considered the worst case that occurs in the deployment step, when the Core needs to read the firmware from the database, to transform to base64 and to send via xml to Agent Installer. In testing the size of the firmware was 2.6 MB and the server was a Pentium 4, 3.0 Ghz with 1 GB of memory. Tests were performed considering the number of 1, 5, 10, 20 and 40 requests. Figure 5 presents the values of the load of processing peak period of each set of requests. The results shows that the server endured the 40 simultaneous requests, generating a percentage of cpu load, equal to 52.4%. It is worth emphasizing that this is the worst case because of the great part of the xmlrpc requests to be exchanged by Abaré shall not exceed 1 KB. Figure 6, on the other hand, presents the response time of the Core to requests made by customers, given the same scenario described above. It is possible to observe a curve almost linear, since all requests are performed without decreasing the system performance. VI. CONCLUSIONS AND FUTURE WORKS The implementation, monitoring and management tasks are important to the network. Despite their importance, only the

6 QoS, mobilite and security management. Fig. 5. Fig. 6. Abaré Cpu Load Abaré Request Time monitoring and a few management tasks have been performed by the existing frameworks. In this paper we present Abaré, the first framework for WMNs that takes into consideration these three aspects simultaneously. This framework should encourage the development of management tools since it provides the required theoretical basis for their creation, given that one of the biggest obstacles to large-scale deployment of Open Mesh Networks is the lack of tools that could assist in this process. Abaré makes possible the deployment and management of Open Mesh with a few number of steps, as discussed throughout the paper. These steps, besides being a small number, are simpler as they are conducted with the support of software which gathers and reuses a variety of information about the network. The tests proved the feasibility of the framework to accommodate a high number of requests without producing an overload in the core. Thus facilitating the deployment and management of large-scale mesh networks. As future work, we intend to implement a tool that includes all Abaré s features and to expand the modules already proposed including other modules such as user management tasks, REFERENCES [1] M. E. M. Campista and at All, Routing metrics and protocols for wireless mesh networks, Network, IEEE, vol. 22, no. 1, pp. 6 12, [Online]. Available: [2] I. of Eletrical and E. Engennering, Ieee draft p802.11s d3.0. IEEE Unapproved Draft Std P802.11s/D3.0, Mar 2009, pp., [3] Openwrt wireless fredom, last accessed, June [Online]. Available: [4] Dd-wrt, last accessed, June [Online]. Available: [5] Vmesh - wireless network testbed, last accessed, June [Online]. Available: [6] J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach (4th Edition). Addison Wesley, [7] E. Hossain and K. K. Leung, Wireless Mesh Networks: Architectures and Protocols, illustrated edition ed. Springer, December [8] Motorola, Motomesh, last accessed, June [Online]. Available: Quattro.html [9] D. Harrington, R. Presuhn, and B. Wijnen, An architecture for describing simple network management protocol (snmp) management frameworks, United States, [10] Cisco, Cisco mesh products, last accessed, June [Online]. Available: [11] O. O. Networks, Order one networks mesh networking products, last accessed, June [Online]. Available: [12] K. Ramachandran, E. Belding-Royer, and K. AImeroth, Damon: a distributed architecture for monitoring multi-hop mobile networks, Oct. 2004, pp [13] A. P. Jardosh, P. Suwannatat, T. Höllerer, E. M. Belding, and K. C. Almeroth, Scuba: Focus and context for real-time mesh network health diagnosis. in PAM, ser. Lecture Notes in Computer Science, M. Claypool and S. Uhlig, Eds., vol Springer, 2008, pp [Online]. Available: [14] R. Riggio, N. Scalabrino, D. Miorandi, and I. Chlamtac, Janus: A framework for distributed management of wireless mesh networks, TridentCom rd International Conference on, [15] Microsoft, Mcl, last accessed, June [Online]. Available: [16] S. Nanda and D. Kotz, Mesh-mon: A multi-radio mesh monitoring and management system, Comput. Commun., vol. 31, no. 8, pp , [17] A. Capone, M. Cesana, S. Napoli, and A. Pollastro, Mobimesh: a complete solution for wireless mesh networking, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, vol. 0, pp. 1 3, [18] R. Badonnel, R. State, and O. Festor, Management of mobile ad hoc networks: information model and probe-based architecture, Int. J. Netw. Manag., vol. 15, no. 5, pp , [19] O. Cheikhrouhou and M. L. Maknavicius, Security architecture in a multi-hop mesh network, June [20] Openrouter, last accessed, June [Online]. Available: [21] N. Tsarmpopoulos, I. Kalavros, and S. Lalis, A low-cost and simpleto-deploy peer-to-peer wireless network based on open source linux routers, pp , [22] Openwrtdocs openwrt documentation, last accessed, June [Online]. Available: [23] M. Lenczner, Wireless portals with wifidog, Linux J., vol. 2005, no. 140, p. 8, [24] I. F. Akyildiz, X. Wang, and W. Wang, Wireless mesh networks: a survey, Comput. Netw. ISDN Syst., vol. 47, no. 4, pp , [25] J. Dollimore, T. Kindberg, and G. Coulouris, Distributed Systems: Concepts and Design (4th Edition) (International Computer Science Series). Addison Wesley, May [Online]. Available: [26] V. Cardellini, M. Colajanni, and P. S. Yu, Dynamic load balancing on web-server systems, IEEE Internet Computing, vol. 3, no. 3, pp , 1999.

Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010

Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010 Literature Synthesis on Wireless Networks Management Veenesh Jeena (JNXVEE001) CSC4000W 2010 Abstract In this paper, we look a Wireless Mesh Networks (WMN). We discuss the importance of WMN s and some

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Release: 1. ICTTEN5217A Plan a wireless mesh network

Release: 1. ICTTEN5217A Plan a wireless mesh network Release: 1 ICTTEN5217A Plan a wireless mesh ICTTEN5217A Plan a wireless mesh Modification History Not Applicable Approved Page 2 of 10 Unit Descriptor Unit descriptor This unit describes the performance

More information

Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool

Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool 1 Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool Rafael De T. Valle 1, Diego Passos 2, Célio Albuquerque 2, Débora C. Muchaluat Saade 1 Abstract This paper

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

FRONT-END FOR MONITORING MESH NETWORK

FRONT-END FOR MONITORING MESH NETWORK FRONT-END FOR MONITORING MESH NETWORK By Lesetsa Mojapelo A thesis submitted in partial fulfillment of the requirements for the degree of Honours in Computer Science The University of the Western Cape

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

EAP350 EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

EAP350 EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW Long Range Ceiling Mount Access Point 2.4 GHz 300Mbps 11b/g/n 29dBm AP/WDS/Repeater PRODUCT OVERVIEW is a 300Mbps wireless-n ceiling mount AP which offers users extended coverage, strong penetration, secure

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

MAYA: A Tool For Wireless Mesh Networks Management

MAYA: A Tool For Wireless Mesh Networks Management MAYA: A Tool For Wireless Mesh Networks Management David Manzano, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni Universidad Politecnica de Valencia Camino de Vera, s/n, 4622 Valencia, SPAIN

More information

EAP300. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

EAP300. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW Long Range Ceiling Mount Access Point 2.4 GHz 300Mbps 11b/g/n 29dBm AP/WDS/Repeater PRODUCT OVERVIEW is a 300Mbps wireless-n ceiling mount AP which offers users extended coverage, strong penetration, secure

More information

Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks

Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks Vishalakshi Prabhu H / International Journal of Engineering Research and Applications (IJERA) Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks Vishalakshi Prabhu

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

D-View 7 Network Management System

D-View 7 Network Management System Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

EAP300. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

EAP300. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW Long Range Ceiling Mount Access Point 2.4 GHz 300Mbps 11b/g/n 29dBm AP/WDS PRODUCT OVERVIEW is a 300Mbps wireless-n ceiling mount AP which offers users extended coverage, strong penetration, secure network

More information

Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed

Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed Sébastien Badia, Alexandra Carpen-Amarie, Adrien Lèbre, Lucas Nussbaum Grid 5000 S. Badia, A. Carpen-Amarie, A. Lèbre, L. Nussbaum

More information

EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW Long Range Ceiling Mount Access Point 2.4 GHz 300Mbps 11b/g/n 28dBm AP/WDS PRODUCT OVERVIEW is a 300Mbps wireless-n ceiling mount AP which offers users extended coverage, strong penetration, secure network

More information

Preinstallation Requirements Guide

Preinstallation Requirements Guide Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Enabling individual experiments in KAUMesh Case Study Final Report

Enabling individual experiments in KAUMesh Case Study Final Report Enabling individual experiments in KAUMesh Case Study Final Report Investing in the future by working together for a sustainable and competitive region Enabling individual experiments in KAUMesh Peter

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Smart Business Architecture for Midsize Networks Network Management Deployment Guide Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

TEST AUTOMATION FRAMEWORK

TEST AUTOMATION FRAMEWORK TEST AUTOMATION FRAMEWORK Twister Topics Quick introduction Use cases High Level Description Benefits Next steps Twister How to get Twister is an open source test automation framework. The code, user guide

More information

Network Management Card. User Manual

Network Management Card. User Manual User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

A Novel Distributed Wireless VoIP Server Based on SIP

A Novel Distributed Wireless VoIP Server Based on SIP A Novel Distributed Wireless VoIP Server Based on SIP Yuebin Bai 1,Syed Aminullah 1, Qingmian Han 2, Ding Wang 1, Tan Zhang 1,and Depei Qian 1 1 (School of Computer Science and Engineering, Beihang University,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Comparison of Protocols for Device Management and Software Updates

A Comparison of Protocols for Device Management and Software Updates B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

OS Installation Guide Red Hat Linux 9.0

OS Installation Guide Red Hat Linux 9.0 OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Shoal: IaaS Cloud Cache Publisher

Shoal: IaaS Cloud Cache Publisher University of Victoria Faculty of Engineering Winter 2013 Work Term Report Shoal: IaaS Cloud Cache Publisher Department of Physics University of Victoria Victoria, BC Mike Chester V00711672 Work Term 3

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

High-performance VoIP Traffic Optimizer Client Solution

High-performance VoIP Traffic Optimizer Client Solution AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

EAP600 SOFTWARE FEATURES. Dual Band Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

EAP600 SOFTWARE FEATURES. Dual Band Long Range Ceiling Mount Access Point PRODUCT OVERVIEW Dual Band Long Range Ceiling Mount Access Point 2.4 GHz + 5GHz 300Mbps + 300Mbps 29dBm AP/WDS/Repeater PRODUCT OVERVIEW is a wireless-11n 600Mbps (300Mbps + 300Mbps) High Power Dual Band concurrent ceiling

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

How To Set Up Foglight Nms For A Proof Of Concept

How To Set Up Foglight Nms For A Proof Of Concept Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Digicom Remote Control for the SRT

Digicom Remote Control for the SRT Digicom Remote Control for the SRT To operate the SRT remotely, use Remote Desktop; this is available free for Linux, Mac OS-X (from Microsoft), and is included with Windows XP and later. As RD uses a

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture

Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture Reference Architecture Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture 2015 Cisco and/or its affiliates. All rights reserved.

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

Implementation of College Network Scenario Module by Using CCNA

Implementation of College Network Scenario Module by Using CCNA Implementation of College Network Scenario Module by Using CCNA Jitender Singh 1, Anshu Rani 2 1 Scholar, Computer Science & Engineering, RPSGOI Mohindergarh, India 2 Scholar, Computer Science & Engineering,

More information

Network Discovery Preparing for Installation

Network Discovery Preparing for Installation Peregrine Network Discovery Preparing for Installation PART NO: PND-5.0.1-ENG-01011-00284 Copyright 2003 Peregrine Systems, Inc. or its subsidiaries. All rights reserved. Information contained in this

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

White Paper. Intrusion Detection Deploying the Shomiti Century Tap White Paper Intrusion Detection Deploying the Shomiti Century Tap . Shomiti Tap Deployment Purpose of this Paper The scalability of Intrusion Detection Systems (IDS) is often an issue when deploying an

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices

More information

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement

More information

AP200 VoIP Gateway Series Design Features & Concept. 2002. 3.5 AddPac R&D Center

AP200 VoIP Gateway Series Design Features & Concept. 2002. 3.5 AddPac R&D Center AP200 VoIP Gateway Series Design Features & Concept 2002. 3.5 AddPac R&D Center Contents Design Features Design Specifications AP200 Series QoS Features AP200 Series PSTN Backup Features AP200 Series Easy

More information

Data Center Virtualization and Cloud QA Expertise

Data Center Virtualization and Cloud QA Expertise Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like

More information

VoIP Conformance Labs

VoIP Conformance Labs VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP

More information

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information