End-to-End IP Network Measurement for Broadcast Applications
|
|
|
- Barnard Underwood
- 10 years ago
- Views:
Transcription
1 EBU Tech 3346 End-to-End IP Network Measurement for Broadcast Applications EisStream Software package description Geneva May
2 Conformance Notation This document contains both normative text and informative text. All text is normative except for that in the Introduction, any section explicitly labelled as Informative or individual paragraphs that start with Note:. Normative text describes indispensable or mandatory elements. It contains the conformance keywords shall, should or may, defined as follows: Shall and shall not : (mandatory) Should and should not : (recommended) Indicate requirements to be followed strictly and from which no deviation is permitted in order to conform to the document. Indicate that, among several possibilities, one is recommended as particularly suitable, without mentioning or excluding others. OR indicate that a certain course of action is preferred but not necessarily required. OR indicate that (in the negative form) a certain possibility or course of action is deprecated but not prohibited. May and need not : (optional) Indicate a course of action permissible within the limits of the document. Default identifies mandatory (in phrases containing shall ) or recommended (in phrases containing should ) presets that can, optionally, be overwritten by user action or supplemented with other options in advanced applications. Mandatory defaults must be supported. The support of recommended defaults is preferred, but not necessarily required. Informative text is potentially helpful to the user, but it is not indispensable and it can be removed, changed or added editorially without affecting the normative text. Informative text does not contain any conformance keywords. A conformant implementation is one that includes all mandatory provisions ( shall ) and, if implemented, all recommended provisions ( should ) as described. A conformant implementation need not implement optional provisions ( may ) and need not implement them as described.
3 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Contents 1. Introduction Features & Functionalities Device Discovery Physical Topology IP Layer Information End-to-End Physical Path Multicast Maps Software Architecture The NMS Package The NETWORK Package The GUI Package Algorithms Device Discovery Physical Topology Overall Algorithm for Branch Topology Specific Methods for Branch Point Connectivity Determining Connection Type L2-L2 connectivity Analysis L2-L3 connectivity Analysis End-to-End Physical Path Determining Layer 3 Routes Determining Layer 2 Paths Layer 2 Path between Routers Layer 2 Path between Router and Host Multicast Multicast Groups Multicast Channels Physical Path for Multicast Traffic Test Results Next Steps & Further Developments
4 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 Page is deliberately blank 4
5 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) End-to-End IP Network Measurement for Broadcast Applications EisStream software package description EBU Committee First Issued Revised Re-issued EC-N 2011 Keywords: Internet Protocol, Network Management, Broadcasting, MIB, EisStream 1. Introduction In recent years, EBU Members have been increasingly adopting IP networks for the contribution of audio and video in real-time. It is well known that although IP networks are of lower cost and provide more flexibility compared with circuit switched networks, they suffer from longer delays and have much larger jitter, while broadcasters tolerance to these variables is much less than that of normal business IT traffic. To respond to Members use of IP the EBU set up two groups, ECN-ACIP (Audio contribution over IP) and ECN-VCIP (Video contribution over IP) with the tasks of drawing up recommended codes of practice 1. It was also recognised that there would be a strong demand for tools that would enable broadcasters to measure and manage their IP networks properly to suit the many time-critical broadcast applications they would be subjected to. To this end, the ECN-IPM (IP measurement) group was set up. The relationships between these three groups are shown in the following figure. Figure 1: Relationships between ECN groups ACIP, VCIP and IPM The goals of the ECN-IPM group were: 1 ECN-ACIP and ECN-VCIP were formerly known as N/ACIP and N/VCIP respectively. 5
6 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 To define a Quality of Service classification to achieve the requested A/V transmission quality for broadcast applications. To standardise network information exchange between EBU Members and Network providers. To propose a method of collecting end-to-end performance information for management purposes. In achieving these goals the ECN-IPM Group has specified a set of parameters that are important for broadcasters when using IP networks for audio and video transmission and has developed a software mechanism to probe a network for device and topology discovery, physical path tracing for both end-to-end communication and multicast streams, with the potential for multilayer monitoring for streams on a multi-vendor network with fully media-specific parameters. The specified parameters cover both the network layer and application layer (for video and audio). SNMP is employed to collect information on the status of networked devices, such as the transmission rate, error rate, the codec used and multicast streams status. To ensure that all the parameters can be recovered from a variety of different manufacturers IP equipment, the group has designed a MIB (Management Information Base). Although many MIB files have been published over the years, especially on the network side, very little standardisation work has been done on A/V codec MIB files. The EBU ECN-IPM group has therefore proposed a new standard, based upon IEC (Common Control Interface for Networked Audio and Video Systems) to address this issue. Two EBU technical publications have been produced by the ECN-IPM group: EBU Tech 3345 defines the parameters and the new MIB Information. This document, EBU Tech 3346, is a description of the software mechanism, EisStream 2. The software package is written in Java and it provides physical path tracing for IP traffic using SNMP. 2. Features & Functionalities The new monitoring standard defined in EBU Tech 3345 addresses the unique challenge faced by broadcasters in monitoring end-to-end media traffic, especially on multi-vendor networks. It also enables broadcasters to deploy unified third-party monitoring tools across their infrastructure by allowing a larger set of parameters to be measured with a common method. In order to incentives the manufacturers to adopt the new standard, it is necessary to demonstrate the potential advantage their products will have by supporting the new standard. Hence the EBU- IPM group needs to provide the broadcasters a software tool that can monitor the media traffic using the new standard. This software needs to be independent of any operating system, equipment manufacturer or any proprietary technology. Otherwise it would risk the new standard being perceived as being associated with a particular supplier. The lack of any existing suitable licence-free product led the EBU ECN-IPM group to commission the development work on its own software, the EBU IPM SNMP Stream Monitor (EisStream). The objective was to develop a fully automated network monitoring tool that is open-source, standardbased and platform-independent. 2 EBU Integrated Monitoring Solution for Media Streams on IP Networks, 6
7 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) As shown in Figure 2, EisStream is designed to monitor data traffic on multiple layers in the OSI model. The software performs all its discovery, analysis and monitoring functions through processing a small set of common MIB data extracted from different network devices via SNMP (Simple Network Management Protocol). Figure 2: Monitoring Level of EisStream Due to the fact that the development work on EisStream took place in parallel with the drafting of EBU Tech 3345, the first part of the software release only consists of network discovery and analysis functions in Layers 2 and 3 using the existing standard MIB objects that have been widely adopted by all major manufacturers. Table 1 shows a list of these existing MIB objects used by the EisStream software. Table 1: MIB support required by EisStream MIB Table Object Required Support sysdescr (Leaf Objects) sysservices ipforwarding ifindex iftable ifdescr MIB-II ifphysaddress ipadentaddr ipaddrtable ipadentifindex ipadentnetmask iproutedest All Devices iproutetable iprouteifindex iproutenexthop iproutetype ipnettomediaifindex ipnettomediatable ipnettomediaphysaddress ipnettomedianetaddress IP-FORWARD-MIB ipcidrroutetable ipcidrroutedest ipcidrroutemask ipcidrroutenexthop Routers Only ipcidrrouteifindex ipcidrroutetype BRIDGE-MIB dot1dtpfdbtable dot1dtpfdbaddress dot1dtpfdbport Multilayer Switches & Bridges dot1dtpfdbstatus IPMROUTE-STD-MIB ipmroutetable ipmroutenexthoptable ipmroutesource ipmroutesourcemask ipmrouteupstreamneighbor ipmrouteinifindex ipmrouteaddress ipmroutertmask ipmroutenexthopifindex ipmroutenexthopstate Multicast Routers ipmroutescopenametable ipmroutescopenamestring EisStream was designed to provide a purely SNMP-based, universal and open source platform for broadcasters and manufacturers to implement the new monitoring MIB objects proposed in EBU 7
8 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 Tech Therefore once EBU Tech 3345 is fully adopted, the software can be easily updated to provide network monitoring information on the Application Layer, thus providing a single solution for monitoring a multi-vender network. The source codes of the EisStream software have been released on SourceForge: ( ). The current version of EisStream provides five main features: Device Discovery discovering all devices on an unknown network Physical Topology identifying all physical connections on this network IP Layer Information gathering subnet and Layer 3 routing information End-to-End Physical Path tracing all the nodes involved in delivering a IP packet Multicast Maps discovering and mapping the routing structures for all channels 2.1 Device Discovery EisStream is able to start the network discovery from any SNMP-compliant host and discover all the devices in an unknown network, providing the entire network infrastructure supports SNMP and their SNMP community strings are known. This feature not only enables a fully automated analysis of a completely unknown network, but it is also extremely useful for managing networks whose topologies are already known, as it is increasingly difficult to manually keep information up-to-date over time for large-scale networks. Since an SNMP message is only transmitted as a UDP packet in the IP Layer, it can only be sent to a known IP address. Therefore the software will start the discovery process by sending its first SNMP messages to either the local address, or to a user-specified IP address. After obtaining information on the first device, EisStream will then explore the IP addresses of its logical neighbours. The software repeats this process until it has discovered all the devices in the network. As shown in Figure 3, unless the user needs to change the start-up IP address or a non-default SNMP password is being used, EisStream will require no initial input in order to discover the unknown network. Figure 3: Start-up screen of EisStream The discovered devices, including the start-up device, are categorised into three main groups. Routers: devices that forward IP packets. Routers can be identified by reading the value of ipforwarding object in MIB-II. Therefore Gateway PCs are also considered as routers. Routers with bridge ports (non-routed ports) are known as Multilayer Switches. Bridges: often referred to as Layer 2 Switches, bridges are devices that do not forward IP packets and do not have any data entry in the iproutetable. 8
9 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Hosts: network-attached audiovisual equipment and devices including PCs and workstations, that do not forward IP packets but have data entries in the iproutetable. The detailed process for device discovery can be found in 4, Algorithms. 2.2 Physical Topology EisStream is capable of automatically generating a physical network topology by analysing the information collected through the network discovery stage. For the same reason as for Device Inventory, this feature will save network administrators significant amounts of time and effort either in familiarising themselves with a new network or in the day-to-day management of existing networks. More importantly this function also allows any change in the physical connections to be discovered more easily, enabling effective and accurate root-cause analysis to be carried out for network failures. In general every host on the network is connected to a router or a bridge, which is further connected by other routers or bridges. Therefore the hosts are considered as leaves in a physical topology, whereas routers and bridges are considered as branches. EisStream analyses the physical network structure by determining connections between the branches first. Once the topology of the branches is established, the leaves can be simply attached to the branches. EisStream identifies the type of connection between any two physical neighbours as one of the following: L2-L2, between two bridge ports on bridges and multilayer switches. L2-L3, between a bridge port and a routed port. L3-L3, between two routed ports. The connection type of any given port is identified by examining the number of Address Resolution Protocol (ARP) records of this port and its associated entries on the Forwarding Information Base (FIB) of the device. The connection type of a port must be reciprocated by the other port connected to it. The details of the methods for analysing connection types, determining physical neighbourhood and establishing the network topology are described in Section 4 Algorithms. 2.3 IP Layer Information EisStream is also capable of providing accurate information on IP subnets and Layer 3 routing. Currently it fully supports all IPv4 specifications, including classless addressing and subnet zero. These functionalities can also be expanded to support IPv6, although no tests have been carried out to verify this at the time of writing (April 2011). Having a set of comprehensive Layer 3 information is essential for monitoring IP networks. Network administrators rely on this information to find the individual devices and perform higher level tasks, such as monitoring and configuring. As mentioned above, as well as discovering the devices, EisStream also collects the entire set of network data associated with the devices. The Layer 3 information of every network port on a device can be found in this data. IP subnets are identified by calculating the network addresses from the IP addresses and the associated subnet mask values. The Layer 3 routing information for routers can be found in the data for their virtual interfaces. 9
10 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 This is a relatively well-developed functionality in network monitoring tools; hence no further detail is required to describe the methods used in gathering the IP Layer information by EisStream. 2.4 End-to-End Physical Path One of the most important features of EisStream is its ability to trace the end-to-end physical path between any two hosts in a network and identify every individual port number of the various devices involved in the connection chain. Monitoring a media stream between two hosts is currently limited to the application layer only. All physical nodes, such as bridges and routers that are involved in establishing the connection between the hosts, are transparent to most software monitoring tools as a result of the generic characteristics of the layered approach to telecommunication. Many specialist hardware tools or integrated software tools provided by network equipment manufacturers have the capability of monitoring across the layers but they are either proprietary (and therefore are very expensive) or are only applicable to devices made by the same manufacturer. As shown in Figure 4, traditional monitoring software can only provide information about the data stream in the Application Layer, represented by the blue line in the figure. With the new EBU standard MIB and EisStream, it is now possible to do hop-by-hop tracing in the IP and MAC Layers as shown by the green line in the figure, which represents the physical path of a data packet. This function enables EisStream to identify and monitor all the nodes on the path. Layer 7 Source Media Stream Destination Layer 4,5,6 Layer 3 Layer 2 Figure 4: Physical Path of a Media Stream Using the IP layer information collected during the discovery process, EisStream first determines the logical routes between two hosts. If they are found on different subnets, the EisStream would then identify all the routers that established the Layer 3 connection between the subnets. Finally the physical path between the boundary routers and the hosts are mapped out from the physical topology. The detailed elaboration of the end-to-end physical path tracing function of EisStream is explained in 4, Algorithms. 2.5 Multicast Maps Another unique feature of EisStream is the capability of discovering multicast streams and their routing structures. For every multicast channel/stream it discovers, EisStream also maps all the routers and their place in the forwarding structure of this particular channel/stream. Using this function together with the end-to-end physical path-tracing function, EisStream is able to monitor 10
11 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) the traffic and physical path between any multicast source and client. Multicast technology is used extensively for automated routing and network management protocols, such as Routing Information Protocol (RIP), Open Shortest Path First (OSPF) and Network Time Protocol. It is also used widely by broadcasters for audio and video delivery over IP, both for contribution and distribution chains. EisStream gathers all multicast information from the multicast routers through the network discovery stage. It first identifies all the multicast routers, then from the information contained on these routers, it determines multicast channels and their associated multicast addresses. Each of these channels contains a number of hosts as source and clients, and the routers that form the branches of a particular multicast tree. It is possible for a router in a multicast channel to enter an idle state where it does not forward any multicast traffic because no client is subscribing to the channel through it, as shown in Figure 5. EisStream will still include this router in the multicast tree as a branch but with no further branches or leaves, whereas other network monitoring tools based on traffic-sniffing would still exclude such routers from the channel. Figure 5: Idle Router in a Multicast Tree EisStream is able to discover idle routers in a multicast channel because it only gathers information independent of any manual configurations, such as PIM mode, IGMP version, bootstrap router priority and Rendezvous-Point settings. In other words, the software will only learn the true routing behaviour of the routers. Hence as long as a router has the forwarding information of a multicast channel, it is considered as part of the routing structure, regardless of whether it is actively involved or not. Further details of how EisStream discovers and analyses the multicast channels can be found in 4, Algorithms. 11
12 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech Software Architecture The EisStream software was developed in Java for platform independence and potential implementation as web service. This section is to give Java developers a general introduction to the software structure, including the classes of the generic packages and the key methods of each class in the source code of EisStream. In order to be released open-source, the software has included very limited number of licence-free external packages as listed below: SNMP4J: used for sending and receiving SNMP messages. JGraphT: used for generating graphical interactive network diagrams. JGraph: required by JGraphT. Apart from the packages listed above, EisStream has three internal packages that were developed completely in-house by the BBC. NMS: (Network Monitoring Station) manages communications with devices on the network. NETWORK: responsible for all network discovery and analysis functions. GUI: generating and driving the user interface functions. The core functions of the EisStream software are built entirely within the NETWORK package, with NMS being the interfaces to the network and users respectively. The external packages are simply employed for handling basic graphical display and network messaging. Figure 6 shows the relationship between all the EisStream packages. Figure 6: EisStream Package Dependency Structure 3.1 The NMS Package In a typical SNMP monitoring scenario the Network Monitoring Station (NMS) communicates with devices on the monitored network through SNMP messages. Normally the NMS is a physical server that sends and receives UDP packets containing SNMP message strings in the form of dotted decimals. In addition to this, the NMS package in EisStream is also responsible for scrambling the SNMP message string from a MIB file, validating and extracting the data from the replied strings, and sending other types of messages, such as ping. 12
13 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) There are 5 objects in the EisStream NMS package. NMS.java: public class for scrambling SNMP queries and interpreting SNMP replies. MibFileAccessor.java: private class for finding the SNMP message string from a standard MIB file. SnmpMessage.java: private class for containing a single SNMP message object to be used by SNMP4J. SnmpTransponder.java: private class for driving the SNMP4J to send and receive SNMP messages. IcmpSender.java: public class for sending a single Ping packet to a given IP address. Figure 7 shows the relationships between the objects in the NMS package. The NMS object makes exclusive use of all private classes in the package for exchanging SNMP messages with network devices. This is the class that is used by other packages to fetch MIB data from the network devices. The use of the IcmpSender object is explained in 4, Algorithms. Figure 7: Simplified UML object structure of the NMS package Once commanded to send an SNMP message to an IP address, the NMS object first calls the MibFileAccessor.getSnmpMessageByName(String) to obtain SNMP message content from the local MIB file library and stores it as a SnmpMessage object. The NMS object then passes the message object to the SnmpTransponder object and calls the SnmpTransponder.SendSnmpMessage(SnmpMessage) to send and receive the SNMP message from the IP address. Upon receiving of the replied message, the NMS object validates the data and uses the validsnmpreply() method to indicate the data acceptance. 3.2 The NETWORK Package The NETWORK package is the computation and data centre of the EisStream software, responsible for all its functionalities. It was designed to have no direct interface with the users or networks, therefore making it easy to implement as a web service in the future. There are 10 objects in the EisStream NETWORK package. All of them are public classes because they all need to interact fully with other parts of the software. Interface.java: represents a physical port of a device; Device.java: represents a generic object that can either be a host, router or bridge; Switch.java: inheriting Device.java, represents a generic object that can either be a bridge or multilayer switch, both are the most common types of modern routers; Router.java: inheriting Switch.java, represents a router, which could also be a multilayer switch; 13
14 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 Discoverer.java: performs network device discovery function; Layer2Map.java: performs physical topology analysis function; Layer3Map.java: performs Layer 3 information gathering function; Path.java: performs end-to-end physical path tracing function; MulticastGroup.java: represents a multicast forwarding structure consisting of multicast routers, sources and the physical ports on those devices; MulticastMap.java: performs multicast channel mapping function; Figure 8 shows the relationships between the objects in the NETWORK package. The Interface and Device classes are the two fundamental building blocks of all the functionalities, as naturally all networks are made of devices connected together via ports. The three basic types of devices are each represented by the Device, Switch and Router objects. Every basic function of EisStream is also defined as an individual object in the NETWORK package. MulticastGroup is a data object required to represent the special structural relationships of a group of devices. Figure 8: Simplified UML object structure of the NETWORK package The method for commanding the NMS package to send and receive SNMP messages to devices resides within the Device object, thus also inherited by Switch and Router objects. This allows the sending of SNMP messages from certain MIBs to be associated with the appropriate device type, for example only the Switch object can send SNMP messages from the BRIDGE-MIB. Hence in future when the BRIDGE-MIB is changed, only the Switch object needs to be updated. The Discoverer object launches a single thread process through the DiscoverAll(boolean) method. It creates a new Device object each time a new IP address is learned through the recursive nexthopdiscovery(device) or arpcachediscovery(device) methods. The new Device object then populates itself using the Device.populate() method. An Interface object is created and populated within the Device object for every physical port (it discovered??). Then the Discoverer will use the islayer2switch(device) and islayer3router(device) methods to identify the Device as Host, Switch or Router, and cast it into appropriate class if necessary. Both Switch and Router objects have further data fields to populate, which are specific to their routing and bridging functionalities. The cyclic discovery algorithm continues until no new IP address can be found. The software then exists from the discovery process. Once the update(arraylist<router>, ArrayList<Switch>, ArrayList<Device>) method is called, the Layer2Map object takes over the newly discovered set of Routers, Switches and Hosts, and finds the 14
15 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) core of the network using the findcore(arraylist<router>) method. It then runs the various algorithms for physical connection analysis through the buildmap() method, which calls the recursive expand(switch) and findbranchconnections(interface) methods to establish all the branch connections among the Routers and Switches. Then the leaf connections for the Hosts are established using the findleafconnection(interface) method. Once the analysis is finished, the Layer2Map object validates the results by calling the validateconnections() method. There is also a getpath(interface, Device, Interface, ArrayList<Interface>) method, which is used for finding the physical path between two devices. Similarly the Layer3Map also has a method called update(arraylist<router>, ArrayList<Device>), which receives data from the Discoverer object for processing Layer 3 information. Apart from the buildmap() method, which produces a HashMap of subnets and their members, the Layer3Map also provides a routesubnets(string, String) method for finding the IP route among different subnets, which is useful for the end-to-end physical path tracing. The Layer3Map object also provides a set of static functions for IP information processing, such as findipmask(string), findnetworknumber(string, String) and samesubnet(interface, Interface). The Path object makes use of the Layer2Map and Layer3Maps objects and finds the physical path between two IP addresses by calling the getpath(string, String) method. It first makes use of the Layer3Map.routeSubnets(String, String) to locate the Layer 3 nodes, then uses the Layer2Map.getPath(Interface, Device, Interface, ArrayList<Interface>), the Path object finds all physical path between every pair of Layer 3 nodes. Joining these paths together according to the order of the Layer 3 nodes, the Path object then returns the full physical path as an indexed HashMap of Interfaces and Devices. In the same way as the Layer2Map and Layer3Map objects, the MulticastMap object uses update(arraylist<router>, ArrayList<Device>) and buildmap() to receive and processes data to discover the multicast groups and their structures. It stores all the information of a multicast group in a multicastgroup object, and keeps a list of these objects for the entire network. 3.2 The GUI Package The GUI package has been developed to handle the graphical representation of all the network information in the various layers. The main user-interface has a window containing three tabs for displaying Physical Topology, subnets and Multicast. There is also a pop-up window for displaying detailed information and user messages. There are 6 objects in the GUI package. Main.java: starts and stops the EisStream software. GUIWindow.java: creates the main user window object. L2MapTab.java: creates the tab for the interactive physical topology map L3MapTab.java: creates the tab for the interactive IP Subnet information table MulticastMapTab.java: creates the tab for the maps of the multicast channels. InfoWindow.java: creates the pop-up window object. Figure 9 shows the relationships between the objects in the GUI package. 15
16 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 Figure 9: Simplified UML object structure of the GUI package The Main class is principally responsible for launching the GUIWindow, which has to be started from another class. As soon as the window is started, the GUIWindow object assumes the role of the driver of the EisStream software. Before live monitoring functionalities are implemented, the tabs and pop-up window are only there to present information to the user. The discovery and analysis functions of the software are solely driven by the GUIWindow object. On start up the Main object creates a GUIWindow object within itself. The GUIWindow object then takes a few parameter values from the user, who then commences the discovery and analysis process. Once finished, the GUIWindow object will create the L2MapTab, L3MapTab and MulticastMapTab objects in the user window. The tabs use colour-coded boxes in the JGraphT to represent the different types of devices. Once a device box is clicked, an InfoWindow object is created by the tab object calling the displayinfo() method. 4. Algorithms Due to the requirement that EisStream must be open-source and that no proprietary library could be used and because of the lack of suitable licence-free packages, all of the core functionalities of EisStream were developed from scratch. Many original, innovative methods and algorithms were developed as a result. Apart from the function for Layer 3 information, all other features of EisStream are delivered using these original methods and algorithms. 4.1 Device Discovery To start discovering the network, EisStream must be given the IP address of any device that supports SNMP. If this address is not specified, the software can also start from the loopback address of the local machine where the software is running, provided that the local machine supports SNMP. Figure 10 shows the entire discovery process. 16
17 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Figure 10: Discovery Algorithm Two groups of MIB objects are used for discovering new devices: the iproutetable and ipnettomediatable. The iproutetable contains Layer 3 routing information, also known as Next Hop, which is used for discovering the IP addresses of the gateway router of a device. Once a new router is found, the Next Hop of this router leads to the discovery of another router. The ipnettomediatable contains ARP records, which are used for discovering IP addresses of other logical neighbours of the device. Using the ARP record of all devices the recursive algorithm could potentially span over the entire network. Discovery through Next Hop is preferred over ARP, as it leads to the discovery of new routers and therefore has higher chance of discovering more subnets, which leads to the discovery of more devices. Whenever a new device is found, either through Next Hop or ARP from the previous device, the first data to look at is always the Next Hop of the current device. The discovery through ARP only starts when no new router has been found through Next Hop. When the discovered IP address does not respond to SNMP, it is possible that either the device does not support SNMP, or it has been disconnected. If this IP address is a Next Hop, indicating the device is a router, it is more likely that the router is disconnected because it is highly uncommon for a router not to support SNMP. For the same reason given in the next chapter if the device is discovered through ARP, it is more likely to be a connected device without SNMP support. The EisStream has a certain degree of tolerance for devices that do not support SNMP. Instead of returning an error, it creates a dummy device, with a dummy interface for the non-snmp device. This device is taken as a Host as it is impossible to identify the correct type without getting 17
18 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 any device information through SNMP. In a typical broadcaster s network, devices are most likely to be communicating frequently with one another with up-to-date information on its logical neighbours. This scenario is perfect for using EisStream, which depends solely on collecting network information from individual devices via SNMP messages. In certain cases where a network device remains idle for a long period of time, the information about its logical neighbours is often deleted as a result of the house-keeping feature of the device. This presents a challenge for complete network discovery by the EisStream software. Unless the software is able to artificially generate some traffic to or from the IP addresses of these devices, these devices will never be discovered by the software. This problem also has a direct impact on discoverability of the bridges, which under normal operations are transparent to the IP layer. If the IP address of a transparent bridge is not shown on any device s logical neighbour list, the software would not be able to discover them neither. To solve this issue a single ping packet (Internet Control Message Protocol, ICMP) is sent sequentially to every unknown addresses on a known subnet. This will refresh the ARP record for a brief period of time without straining the network. Given the fact that most broadcasters networks have separate management subnets with proper separation from the production subnets, it is recommended to run EisStream in Ping-Enabled mode on a management subnet. It is possible to limit the ICMP destinations to the management network only. This gives absolute guarantee that the production network is not affected by any extra traffic. 4.2 Physical Topology As mentioned previously, all hosts are considered as leaves and all Bridges and Routers as branches on any IP network. Therefore each Bridge or Router is considered as a Branch Point. To establish the full topology of a network, the connections between all the branch points must be determined first. On an overall scope, an algorithm is needed to span from one single branch point to another recursively until the entire network is covered. On a microscopic scale, several other methods are needed to determine the type of the physical connection for a port and find where the other port it is connected to Overall Algorithm for Branch Topology The process for finding branch topology starts by determining a hypothetical core of the network, which is the router that has been the most popular HextNext Hop destination of all other routers. The more a device is routed to by other routers, the more likely this device is located at the centre of the network. Figure 11 shows the algorithm written in Java language for finding the network core. This may not be the designed core router of the network but serves as a very good starting point. 18
19 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) int max_count = 0; router core = new router (); for (every CURRENT_Router) { int current_count = 0; for (every OTHER_Router) { for (every iproutenexthop entry) { if ( iproutetype = indirect) { if (CURRENT_Router s IP address list.contains( ifroutenexthop )) { ++current_count; } } } } if (current_count > max_count) { core = CURRENT_Router; max_count = current_count; } } return core; Figure 11: Algorithm for finding hypothetical network core in Java syntax. With the core chosen, a neighbourhood structure around it can be built up by finding directly connected branch points. For each of its neighbours, the same process continues until all branch points have been placed onto this core neighbourhood. There is also a catch-all function for branch points that cannot be reached from the core. Each of these branch points is expanded to reach other branch points that are already found on the core neighbourhood as shown by Figure 12. Figure 12: Example of finding the Branch Point Topology 19
20 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech Specific Methods for Branch Point Connectivity The backbone of a network consists of interconnected branch points. As mentioned earlier, there are three types of physical connections; therefore any two physically connected ports must have their corresponding connection types. To find a connected port for any given port, all other device ports with matching connection types are selected. Then the connectivity analysis suitable for the type of connection can be carried out among the candidates to find the actual connected port Determining Connection Type The algorithm for examining physical connectivity starts by analysing the type of connection a port is likely to have. Based on the connection type, an appropriate algorithm is used for finding the physical neighbour of this port. Using the logic shown in Table 2, the connection type of a port on a router or a bridge can be accurately decided. Table 2: Decision Table for Determining Connection Type Connection Type Number Of Entries In FIB 0 1 n Number of 0 n/a L2-L2 L2-L2 ARP 1 L3-L3 L2-L3 L2-L2 Entries n L3-L2 L2-L2 L2-L2 For example if a port does not appear on the MAC address Forwarding Information Base (FIB), it is likely to be a routed port. Then looking at the ARP record of the port, if it has multiple data entries, the port is likely to be connected to a switch port of another branch point. Therefore the connection to this port is likely to be a L3-L2 connection L2-L2 connectivity Analysis As shown in Figure 13, the FIB of a bridge or multilayer switch specifies the port to which a Layer 2 packet with an external destination MAC address should be forwarded. The FIB data is contained in dot1dtpfdbtable in BRIDGE-MIB, with the external destination MAC address of the Layer 2 packet stored in a dot1dtpfdbaddress object and the index of the forwarded port in dot1dtpfdbport. The set of all dot1dtpfdbaddress entries on a bridge with the same dot1dtpfdbport is a collection of all the destination MAC addresses of all Layer 2 packets sent by this port. On the other hand, all Layer 2 packets arriving at a port on a bridge will be forwarded onto the other ports. Therefore the set of all dot1dtpfdbaddress entries less those forwarded to a particular port, plus the MAC address of that port, is a collection of all possible destinations of the Layer 2 packet received by this port. 20
21 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Figure 13: Layer2 Connectivity Theorem In a physical port-to-port connection, all packets sent by a port must be received by the connected port. Hence by comparing the Layer 2 packets sent and received by two ports, the L2-L2 connectivity between two ports can be successfully established. LAYER 2 CONNECTIVITY THEOREM (proposed by EisStream developer): If port x on bridge A is connected to port y on bridge B, then the set of all the "dot1dtpfdbaddress" entries of A with their "dot1dtpfdbport" value equal to x, less any entry equal to the ifphysaddress of B, should be equal to the set of all "dot1dtpfdbaddress" with their dot1dtpfdbport values unequal to y. As shown in Figure 14, F is the set of all destination MAC addresses of the packets leaving x, B is the set of all "ifphysaddress" on all ports of B, and F is the set of all "dot1dtpfdbaddress" with their values unequal to y: F - B = F This theorem applies to all L2-L2 connections including those between trunk ports or bridges with multiple redundancies enabled with Spanning Tree. Figure 14: Bridges connected in a daisy chain Due to the complex nature of the Layer 2 connections, it is unrealistic to expect that applying a universal algorithm will result in a guaranteed accuracy and success rate. In order to be robust in 21
22 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 handling practical issues such as the presence of a hub, incomplete MIB data or incorrect manual configurations, an element of fuzzy logic is introduced to the algorithm. Instead of looking for an exact match, the algorithm will first select a group of possible candidates against a certain threshold of criteria. It then applies filters to the selected candidates to eventually find the most likely match. Instead of looking for the perfect match between both sides of the equation, therefore, a threshold can be specified and expressed as: Hence the theorem could also be written as: (F - B) F = (F B) or F If port x on bridge A is connected to port y on bridge B, then the set of all the "dot1dtpfdbaddress" entries of A with their "dot1dtpfdbport" value equal to x, less any entry equal to the ifphysaddress of B, should be A SUBSET OF all "dot1dtpfdbaddress" with their dot1dtpfdbport values unequal to y or vice versa. However the fuzzy logic causes problems when determining connections involving 3 or more bridges in daisy-chain or ring structures. In the example shown in Figure 15, a3 can be determined by the fuzzy algorithm as being connected to either port b1 or c1. This is because the sum of all possible destinations of the packets leaving a3 is a subset of all "dot1dtpfdbaddress" on port b1 as well as being a subset of those on c1. Figure 15: Bridges connected in a daisy chain 22
23 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) This problem is solved by further investigating the "dot1dtpfdbaddress" entries on the ports, as c1 is also forwarding packets to MAC address o, which can only be sent from b2. This fuzzy algorithm also accommodates the presence of hubs. When a hub is present, one port on a branch point will seem to be connected to multiple hosts, as determined by the algorithm L2-L3 connectivity Analysis A L2-L3 connection only exists between a switch port and a routed port, where the MAC address of the routed port is the only dot1dtpfdbaddress entry in the bridge s FIB with the dot1dtpfdbport value pointing to the switch port. Figure 16: L2-L3 Connectivity Discovery Algorithm As shown in Figure 16, L2-L3 connectivity is discovered through the following steps, which are also used for discovering the L3-L2 connectivity. 1) Find the number of entries in the bridge s FIB with dot1dtpfdbport equal to the ifindex of the port; 2) If only one such entry is found, check the number of entries in the ARP table of the port; 3) If only one ARP entry is found, check if the ipnettomediaphysaddress matches the ifphysaddress of the other port; 4) If matches, the L2-L3 connection is determined. 23
24 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech End-to-End Physical Path To trace the end-to-end physical path between two hosts in a network is the ultimate goal of building a complete network diagram. Nevertheless without correctly utilizing the Layer 3 routing information on all the routers, it is still impossible to accurately identify the path an IP packet must travel from source to destination. Figure 17 is an example of a typical modern network of 3 subnets. Figure 17: Example of a typical modern network of 3 subnets Subnet 1 and 2 are routed via Router A and Subnet 2 and 3 via Router B. Bridge 2 is a backbone switch with ports configured for all subnets, where port 2-3 is connected to port 1-3 on Bridge 1 in subnet 1 and port 2-4 is connected to port 3-3 on Bridge 3 in subnet 3. In terms of physical ports, any IP packet from the source in subnet 1 to the destination in subnet 3 would follow this path: s >>1-1>1-2 >>a1>a2 >>2-1>2-2 >>b1>b2 >>3-1>3-2 >>d Where >> indicates a physical cable and > indicates the internal switching or routing in a device from one port to another. However on a simple physical topology diagram without Layer 3 information the path could easily be misinterpreted as: s >> 1-1>1-3 >> 2-3>2-4 >> 3-3>3-2 >> d To correctly identify the physical path for any end-to-end connection, it is important to identify the Layer 3 routes between the source and destination. 24
25 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Determining Layer 3 Routes By investigating the source s Default Gateway setting in the iproutenexthop object, the first router on the Layer 3 route can be identified easily. For hosts without this setting, their network numbers can be deduced from the IP address in the ipadentaddr object and the subnet mask in ipadentnetmask. The router can be found by comparing the host s network number with every router s locally routed subnets, stored in iproutedest entries with iproutetype equal to 3. Once the router on the host network is found, by looking for the destination network number or the default route in its routing table, iproutetable or ipcidrroutetable, the next router can be found. Repeat this step until the router in the destination network is found. It is important that information of the downstream interface to the next router is recorded for every router. For multilayer switches the downstream interface could refer to a subnet with multiple switch ports. In this case, information about every individual switch port is to be collected and kept with the router Determining Layer 2 Paths Layer 2 paths are to be determined individually between every two adjacent routers, as well as between routers and hosts at each end of the route. It is relatively easy to spot the path on a diagram between two points. Nevertheless an algorithm similar to Spanning Tree is required to find the path programmatically Layer 2 Path between Routers Within the same subnet, using the physical topology information, the Layer 2 connection from the all the downstream ports of the first router is traced to the immediate neighbours, then to the neighbours neighbours, and so on until the next router on the path is reached Layer 2 Path between Router and Host The same algorithm applies for finding the physical path between a router and a host, except that the starting device is always the router. This is to accommodate the fact that a host can be connected to a router via a hub and some of the hosts may not support SNMP. 4.4 Multicast Multicast Groups By extracting the ipmroutescopenamestring data from all routers on the network, a full list of available multicast groups can be made. A multicast address is the textual name that uniquely identifies a multicast group. Every multicast group contains a source and a number of receivers. It is possible to have multicast groups with no receiver. The IP address and subnet mask of the sources are stored in the ipmroutesource and ipmroutesourcemask objects respectively. The router IP address and subnet mask for the Rendezvous Point (RP) of a multicast group is found in the ipmroutertaddress and ipmroutertmask objects respectively. IP address of a router, from which a particular multicast stream is received, is found in the ipmrouteupstreamneighbor object. 25
26 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech Multicast Channels For a particular multicast group, a complete channel structure can be established from the sources down to all the routers involved in forwarding the traffic of this multicast group. By reading values of the ipmrouteinifindex and ipmroutenexthopifindex, the physical port where a multicast stream is received from and the interface where the stream is forwarded to,can be obtained respectively. When a router is enabled with IGMP, the forwarding interface is a physical port; when not, the forwarding interface is a subnet. In the case of forwarding to a subnet, the multicast stream is broadcasted on all switch ports in that subnet. EisStream constructs the multicast maps solely based on the information gathered from the multicast routers. This is because the multicast forwarding structure is decided entirely by the multicast routers, as they negotiate among themselves to decide the final path of the multicast traffic. Bridges that support IGMP, which serve the only function of stopping the Layer 2 multicast packets being broadcast to all the ports, deliver the packets passively from the multicast routers to the receiving hosts. Their behaviour is irrelevant to how the multicast route is constructed. Hence bridges are excluded from the multicast map by EisStream. Their existence in a multicast traffic path can be worked out simply by finding the end-to-end physical path between the last multicast router and the receiving host. Figure 18: Route Map of a Multicast Channel For example in Figure 18, even though the yellow bridges know the shorter path through the red router, because the red router is not part of the multicast structure, they must obey the Layer 3 route and forward the multicast packets to the green routers only. For this reason, bridges are excluded by EisStream from the multicast map. Their existence in the path of multicast traffic could nonetheless be worked out simply by finding the end-to-end physical path between the last multicast router and the receiving host. 26
27 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Physical Path for Multicast Traffic Using the mechanism for end-to-end physical path discovery and the information on the channel structure of all multicast groups, every node involved in the delivery of a particular multicast stream can be identified. Figure 19: Physical Path for Multicast Traffic As shown in Figure 19, the physical path for connections between routers, connections between a source and its RP, and connections between receivers and multicast routers can be determined in exactly the same manner as for an end-to-end connection. 5. Test Results The EisStream software was developed by BBC R&D using the Agile Software Development method and it was rigorously tested on the BBC R&D network at every iteration cycle. Figure 20 shows that the BBC R&D network consists of a single router and many bridges and hosts; over 250 in total. Each transparent box in the figure indicates a device that does not support SNMP (EisStream times out when attempting to contact such devices). The software was also tested live on VRT's distribution network in Belgium. The output of the topology analysis is shown in Figure 21. The software was able to discover all the routers and bridges in the network. There are also a large number of hosts that do not support SNMP in this network, which resulted in the software running in excess of 20 minutes to finish its analysis. 27
28 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 Figure 20: EisStream analysis of the BBC R&D Office Network 28
29 Tech 3346 End-to-End IP Network Measurement for Broadcast (EisStream software) Figure 21: EisStream analysis of VRT s Distribution Network Throughout the entire discovery process, the overall network traffic did not much exceed 500 kbit/s but the CPU utilisation saturated at 50%, as shown in Figures 22 & 23. It is recommended that the software be run on a CPU of at least 1.3 GHz clock frequency. 29
30 End-to-End IP Network Measurement for Broadcast (EisStream Software) Tech 3346 Figure 22: CPU load of PC running EisStream Figure 23: Network use during EisStream analysis 6. Next Steps & Further Developments With EBU Tech 3345 and Tech 3346 (this document), describing respectively a new network measurement standard tailored for media requirements and a universal software platform capable of monitoring any device port for a media stream, an integrated solution for fully audiovisualoriented network monitoring is now in place. The next step is to promote the new standard and tool with a view to an industry-wide adoption by major manufacturers. Once the new MIB standard achieves widespread adoption the EisStream software will be able to achieve the ultimate goal of multilayer monitoring for streams on a multivendor network with fully media-specific parameters. The functions of the EisStream can potentially be developed into web services and deployed in a remote monitoring scenario as shown in Figure 24. APIs for distributed or embedded deployment can also be developed from the existing software packages. Figure 24: EisStream as a Web Service 30
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes
IP Network Topology Discovery Using SNMP
IP Network Topology Discovery Using SNMP Suman Pandey #1, Mi-Jung Choi #2, Sung-Joo Lee #3, James W. Hong #4 # Dept. of Computer Science and Engineering, POSTECH, Korea 1 [email protected], 2 [email protected],
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Visio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring
1 Aman Mahajan, 2 Haresh Joshi, 3 Sahil Khajuria, 4 Anil k Verma 1,3,4 CSE, Thapar University, Patiala, India 2 Manager-Technology,CGL Mumbai, India Email: 1 [email protected], 2 [email protected],
Layer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:
Using Discovery 1/3 Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
The IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Troubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
FioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Port Trunking. Contents
12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2
LANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
RESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, [email protected] Campus Best Practices - Resilient network design Campus
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
- Multicast - Types of packets
1 Types of packets - Multicast - Three types of packets can exist on an IPv4 network: Unicast A packet sent from one host to only one other host. A hub will forward a unicast out all ports. If a switch
Port Trunking. Contents
13 Port Trunking Contents Overview.................................................... 13-2 Port Trunk Features and Operation........................... 13-4 Trunk Configuration Methods................................
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram
Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
IBM Tivoli Network Manager 3.8
IBM Tivoli Network Manager 3.8 Configuring initial discovery 2010 IBM Corporation Welcome to this module for IBM Tivoli Network Manager 3.8 Configuring initial discovery. configuring_discovery.ppt Page
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Configuration Guide. DHCP Server. LAN client
DHCP Server Configuration Guide 4.0 DHCP Server LAN client LAN client LAN client Copyright 2007, F/X Communications. All Rights Reserved. The use and copying of this product is subject to a license agreement.
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
Chapter 6 Configuring IP
Chapter 6 Configuring IP This chapter describes the Internet Protocol (IP) parameters on HP ProCurve routing switches and switches and how to configure them. After you add IP addresses and configure other
Software Defined Networking and OpenFlow: a Concise Review
Software Defined Networking and OpenFlow: a Concise Review Stefano Forti [email protected] MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 3: Simple Network Management Protocol (SNMP) Operations Objective To become familiar with basic SNMP operations
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Lab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
How To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C
esafe Gateway/Mail v. 3.x Load Balancing for esafe Gateway 3.x with Cisco Web NS and CSS Switches Design and implementation guide esafe Gateway provides fast and transparent real-time inspection of Internet
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Set Up a VM-Series Firewall on the Citrix SDX Server
Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa
How To Configure InterVLAN Routing on Layer 3 Switches
How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
DHCP and DNS Protocols
DHCP and DNS Protocols DHCP (Dynamic Host Configuration Protocol) is an industry standard protocol that lets a DHCP server (Unix/Window/As400 system) allocate temporary IP addresses and other network parameters
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
IP Service Manager User Guide
IP Service Manager User Guide Infrastructure Client for ISM Provision Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 http://www.extremenetworks.com Published: April,
VPN Configuration Guide. Dell SonicWALL
VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs
How To Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs Introduction In a large network where internal users cannot be trusted, it is nearly impossible to stop a host from
Traffic Engineering Management Concepts
3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
CHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
Cisco Data Centre: Introducing Cisco Data Center Networking
coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â
Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
