Network Discovery Tool
|
|
|
- Matthew May
- 9 years ago
- Views:
Transcription
1 Bestin Jose Mahesh Kumar Shyamsunder Computer Science and Engineering Indian Institue of Technology Bombay November 28, 2004
2 1 Problem Statement 2 Introduction to Netdisco Features of NetDisco 3 4 5
3 Problem Statement To implement the algorithm which discovers the network topology information and give it to NetDisco tool. Netdisco then uses this information to moniter and manage the network.
4 Problem Statement To implement the algorithm which discovers the network topology information and give it to NetDisco tool. Netdisco then uses this information to moniter and manage the network.
5 What is NetDisco Problem Statement Introduction to Netdisco Features of NetDisco Netdisco is an Open Source web-based network management tool. ed for moderate to large networks. Configuration information and connection data for network devices are retrieved using SNMP protocol. With Netdisco you can locate the switch port of an end-user system by IP or MAC address.
6 Screenshot of NetDisco Introduction to Netdisco Features of NetDisco screenshot_03.jpg (JPEG Image, 640x473 pixels)
7 Features of NetDisco Switch Ports Problem Statement Introduction to Netdisco Features of NetDisco Central Location to disable/enable switch ports. MAC Address to switch port resolution IP Address to switch port resolution Find Switch Ports with multiple nodes attached Find nodes using multiple IP addresses
8 Features contd. Problem Statement Introduction to Netdisco Features of NetDisco Easy Administration: Controllable through Web Interface or Command Line Interface(CLI). Database store for scalability and speed. Easily extendible to new devices. Network Administration and Security: Automatic inventory and search of network hardware. Duplex Mismatch Finder. Layer Two Traceroute.
9 Features contd. Problem Statement Introduction to Netdisco Features of NetDisco Easy Administration: Controllable through Web Interface or Command Line Interface(CLI). Database store for scalability and speed. Easily extendible to new devices. Network Administration and Security: Automatic inventory and search of network hardware. Duplex Mismatch Finder. Layer Two Traceroute.
10 Features contd. Problem Statement Introduction to Netdisco Features of NetDisco Reporting: Graphing of network topology. Clickable image-map of devices. Link speed shown. Statistics for number of actual nodes connected to network. Inventory of Network Devices: By Operating System (IOS,CatOS,HP...) By Model, Vendor, OSI Layer, DNS Name Find device ports that are blocking (via Spanning Tree Protocol) Find devices using IP s w/out DNS entries
11 Features contd. Problem Statement Introduction to Netdisco Features of NetDisco Reporting: Graphing of network topology. Clickable image-map of devices. Link speed shown. Statistics for number of actual nodes connected to network. Inventory of Network Devices: By Operating System (IOS,CatOS,HP...) By Model, Vendor, OSI Layer, DNS Name Find device ports that are blocking (via Spanning Tree Protocol) Find devices using IP s w/out DNS entries
12 Problem Statement Netdisco autodiscovers devices which support CDP protocol. However, many networks have parts of the topology that are not covered by CDP. We need to fill the information of the devices which does not suppot CDP protocol in netdisco-topology.txt. Our Work To discover the network topology and give the topology information in the format required by Netdisco. For this we will use SNMP protocol.
13 Problem Statement Netdisco autodiscovers devices which support CDP protocol. However, many networks have parts of the topology that are not covered by CDP. We need to fill the information of the devices which does not suppot CDP protocol in netdisco-topology.txt. Our Work To discover the network topology and give the topology information in the format required by Netdisco. For this we will use SNMP protocol.
14 format of netdisco-topology.txt file Let s say you have two CDP speaking devices with a non-cdp speaking device in between them. CISCO BAY HP topology file: ciscoswitch.my.company link:21,bayswitch.my.company,25 bayswitch.my.company link:26,hpswitch.my.company,12
15 Snmp ptotocol Problem Statement SNMP is a protocol designed to give remote management access to a Network device. Features: Enable/disable a port Checks health and performance of the network. Access control. Error statistics etc...
16 Snmp ptotocol Problem Statement SNMP is a protocol designed to give remote management access to a Network device. Features: Enable/disable a port Checks health and performance of the network. Access control. Error statistics etc...
17 Idea of the Algorithm Problem Statement 1 Represents the network by a collection of skeleton paths, Q, between pairs of nodes belonging to the same subnet. 2 Iteratively refines Q to provide more accurate topology information for the network.
18 Idea of the Algorithm Problem Statement 1 Represents the network by a collection of skeleton paths, Q, between pairs of nodes belonging to the same subnet. 2 Iteratively refines Q to provide more accurate topology information for the network.
19 Flow diagram for the Algorithm IDLE STATE START PATH REFINEMENT STATE Collecting Routers, switches and subnet information REQUIREMENTS GATHERING STATE COMPUTING CONSTRAINTS ON EACH PATH REFINING PATHS Collecting AFT Information comment: REFINING PATHS UNTIL NO REFINEMENT IS POSSIBLE COMPUTING INITIAL SKELETON INFORMATION COMPUTE ACTUAL CONNECTIONS
20 Router Information Constraints: address You need to know atleast One Router IP Idea: Repeatedly find the neighboring routers of the currently known routers until no new routers are discovered. Implementation: The neighboring routers of a router R are the set of routers that are next hops for some destination in the iproutetable in MIB-II in R. Shell Command: snmpwalk -0s -c public -v iproutetable Perl Module: Net::SNMP::Hostinfo module
21 Router Information Constraints: address You need to know atleast One Router IP Idea: Repeatedly find the neighboring routers of the currently known routers until no new routers are discovered. Implementation: The neighboring routers of a router R are the set of routers that are next hops for some destination in the iproutetable in MIB-II in R. Shell Command: snmpwalk -0s -c public -v iproutetable Perl Module: Net::SNMP::Hostinfo module
22 Router Information Constraints: address You need to know atleast One Router IP Idea: Repeatedly find the neighboring routers of the currently known routers until no new routers are discovered. Implementation: The neighboring routers of a router R are the set of routers that are next hops for some destination in the iproutetable in MIB-II in R. Shell Command: snmpwalk -0s -c public -v iproutetable Perl Module: Net::SNMP::Hostinfo module
23 Router Information Constraints: address You need to know atleast One Router IP Idea: Repeatedly find the neighboring routers of the currently known routers until no new routers are discovered. Implementation: The neighboring routers of a router R are the set of routers that are next hops for some destination in the iproutetable in MIB-II in R. Shell Command: snmpwalk -0s -c public -v iproutetable Perl Module: Net::SNMP::Hostinfo module
24 Router Information Constraints: address You need to know atleast One Router IP Idea: Repeatedly find the neighboring routers of the currently known routers until no new routers are discovered. Implementation: The neighboring routers of a router R are the set of routers that are next hops for some destination in the iproutetable in MIB-II in R. Shell Command: snmpwalk -0s -c public -v iproutetable Perl Module: Net::SNMP::Hostinfo module
25 contd.. Switch Information A interface of the router connects one subnet to the network. Idea: The IP addresses of the subnet can be determined by knowing the IP address of the interface. Implementation: The IP address of the interface is obtained using ipaddrtable in MIB-II. The subnet entities are computed by enumerating the ip addresses in the subnet corresponding to the IP address of the interface. From the ipnettomediatable we can find subnet,mac address, system name and the number of ports. We determine whether a particular ip address is a device by checking ipforwarding flag or system.sysservice variables. Perl Module: Net::SNMP::Hostinfo module
26 contd.. Switch Information A interface of the router connects one subnet to the network. Idea: The IP addresses of the subnet can be determined by knowing the IP address of the interface. Implementation: The IP address of the interface is obtained using ipaddrtable in MIB-II. The subnet entities are computed by enumerating the ip addresses in the subnet corresponding to the IP address of the interface. From the ipnettomediatable we can find subnet,mac address, system name and the number of ports. We determine whether a particular ip address is a device by checking ipforwarding flag or system.sysservice variables. Perl Module: Net::SNMP::Hostinfo module
27 contd.. Switch Information A interface of the router connects one subnet to the network. Idea: The IP addresses of the subnet can be determined by knowing the IP address of the interface. Implementation: The IP address of the interface is obtained using ipaddrtable in MIB-II. The subnet entities are computed by enumerating the ip addresses in the subnet corresponding to the IP address of the interface. From the ipnettomediatable we can find subnet,mac address, system name and the number of ports. We determine whether a particular ip address is a device by checking ipforwarding flag or system.sysservice variables. Perl Module: Net::SNMP::Hostinfo module
28 contd.. Switch Information A interface of the router connects one subnet to the network. Idea: The IP addresses of the subnet can be determined by knowing the IP address of the interface. Implementation: The IP address of the interface is obtained using ipaddrtable in MIB-II. The subnet entities are computed by enumerating the ip addresses in the subnet corresponding to the IP address of the interface. From the ipnettomediatable we can find subnet,mac address, system name and the number of ports. We determine whether a particular ip address is a device by checking ipforwarding flag or system.sysservice variables. Perl Module: Net::SNMP::Hostinfo module
29 contd.. Switch Information A interface of the router connects one subnet to the network. Idea: The IP addresses of the subnet can be determined by knowing the IP address of the interface. Implementation: The IP address of the interface is obtained using ipaddrtable in MIB-II. The subnet entities are computed by enumerating the ip addresses in the subnet corresponding to the IP address of the interface. From the ipnettomediatable we can find subnet,mac address, system name and the number of ports. We determine whether a particular ip address is a device by checking ipforwarding flag or system.sysservice variables. Perl Module: Net::SNMP::Hostinfo module
30 contd.. Address Forwarding Table(AFT) information Now we got all the MAC addresses of routers and switch in the system. Every Port of a switch or router has Address forwarding table. Definition: AFT for a port is the set of MAC addresses that have been seen as source addresses on frames received at that port. Constraint: AFT information should be complete. AFT info is complete if it contains MAC addresses of all switches and routers from which frames can be received at that particular port. Implementation: Perl Module SNMP::Info::Bridge.
31 contd.. Address Forwarding Table(AFT) information Now we got all the MAC addresses of routers and switch in the system. Every Port of a switch or router has Address forwarding table. Definition: AFT for a port is the set of MAC addresses that have been seen as source addresses on frames received at that port. Constraint: AFT information should be complete. AFT info is complete if it contains MAC addresses of all switches and routers from which frames can be received at that particular port. Implementation: Perl Module SNMP::Info::Bridge.
32 contd.. Address Forwarding Table(AFT) information Now we got all the MAC addresses of routers and switch in the system. Every Port of a switch or router has Address forwarding table. Definition: AFT for a port is the set of MAC addresses that have been seen as source addresses on frames received at that port. Constraint: AFT information should be complete. AFT info is complete if it contains MAC addresses of all switches and routers from which frames can be received at that particular port. Implementation: Perl Module SNMP::Info::Bridge.
33 contd.. Address Forwarding Table(AFT) information Now we got all the MAC addresses of routers and switch in the system. Every Port of a switch or router has Address forwarding table. Definition: AFT for a port is the set of MAC addresses that have been seen as source addresses on frames received at that port. Constraint: AFT information should be complete. AFT info is complete if it contains MAC addresses of all switches and routers from which frames can be received at that particular port. Implementation: Perl Module SNMP::Info::Bridge.
34 contd.. Address Forwarding Table(AFT) information Now we got all the MAC addresses of routers and switch in the system. Every Port of a switch or router has Address forwarding table. Definition: AFT for a port is the set of MAC addresses that have been seen as source addresses on frames received at that port. Constraint: AFT information should be complete. AFT info is complete if it contains MAC addresses of all switches and routers from which frames can be received at that particular port. Implementation: Perl Module SNMP::Info::Bridge.
35 contd.. Address Forwarding Table(AFT) information Now we got all the MAC addresses of routers and switch in the system. Every Port of a switch or router has Address forwarding table. Definition: AFT for a port is the set of MAC addresses that have been seen as source addresses on frames received at that port. Constraint: AFT information should be complete. AFT info is complete if it contains MAC addresses of all switches and routers from which frames can be received at that particular port. Implementation: Perl Module SNMP::Info::Bridge.
36 Original Network Topology Problem Statement x 1 2 e 3 f 1 r s a b 1 q 1 c 2 1 y 1 1 d f 1 1 b
37 contd. Problem Statement s1 a1, a2, b1, b2, c1,c2, d1,d2 t1 S1 a1, a2, b1, b2, c1, c2, d1, d2 T1 x1 b1, b2,c1,c2, e2,e1 y1 X1 E2 e1 b1, b2, c1, c2 y1 u1 b1, b2, c1, c2, d1, d2, e3, e1 v1 u1 e2 e1 b1, b2 c1, c2 d1 d2 v1 r1 a1, a2, b1, b2 q1 r1 a1, a2, b1, b2 q1 Skeleton Paths After first Iteration
38 contd. Problem Statement s1 a1 a2 b1 b2 c1 c2 d1 d2 t1 x1 e1 e2 b1, b2, c1,c2 y1 u1 e2 e1 b1, b2, c1, c2 d1 d2 v1 r1 a1, a2, b1,b2 q1 After second iteration
39 contd. Problem Statement s1 a1 a2 b1 b2 c1 c2 d1 d2 t1 x1 e1 e2 b1 b2 c1 c2 y1 u1 e2 e1 b1 b2 c1 c2 d1 d2 v1 r1 a1 a2 b1 b2 q1 After third iteration
40 contd. Problem Statement r1 e1 q1 a1 a2 b1 b2 c1 s1 d1 u1 e2 x1 c2 y1 d2 Resulting Connections t1 e3 u1
41 We will be using perl language for implementation. The perl modules which will be used are: NET::SNMP Net::SNMP is a collection of various tools relating to the snmp including: An SNMP library Tools to request or set information from SNMP agents. Tools to generate and handle SNMP traps etc.. FUNCTIONS: snmpget, snmpset, snmpwalk, snmpgetnext, snmpstatus snmpnetstat, snmptable, snmptranslate etc...
42 contd. SNMP::INFO Perl5 module to network devices through snmp. SNMP::INFO gives an object oriented interface to information obtained through SNMP. SUB-CLASSES: SNMP::INFO::BRIDGE, SNMP::INFO::CDP, SNMP::INFO::ETHERLIKE, SNMP::INFO::LAYER1 SNMP::INFO::LAYER2, SNMP::INFO::LAYER3, SNMP::INFO::MAU METHODS: device type(), uptime(), name(), ports(), interfaces() etc...
43 References Problem Statement 1 Physical Topology Discovery for Large Multi-Subnet Networks. Yigal Bejerano, Yuri Breitbart, Minos Garofalakis, Rajeev Rastogi. Bell Labs, Lucent Technologies 2 Topology Discovery in Heterogeneous IP Networks. Yuri Breitbart, Minos Garofalakis, Cliff Martin, Rajeev Rastogi, S. Seshadri, Avi Silberschatz. Information Sciences Research Center Bell Labs, Lucent Technologies
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401 Topology Discovery in Heterogeneous IP Networks: The NetInventory System Yuri Breitbart, Minos Garofalakis, Member, IEEE, Ben Jai, Cliff
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
Simple Network Management Protocol
CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a
Details. Some details on the core concepts:
Details Some details on the core concepts: Network documentation Diagnostic tools Monitoring tools Performance tools Active and passive tools SNMP Ticket systems Configuration and change management Documentation
IP Network Topology Discovery Using SNMP
IP Network Topology Discovery Using SNMP Suman Pandey #1, Mi-Jung Choi #2, Sung-Joo Lee #3, James W. Hong #4 # Dept. of Computer Science and Engineering, POSTECH, Korea 1 [email protected], 2 [email protected],
Topology Discovery in Heterogeneous IP Networks
Topology Discovery in Heterogeneous IP Networks Yuri Breitbart, Minos Garofalakis, Cliff Martin, Rajeev Rastogi, S. Seshadri, Avi Silberschatz Information Sciences Research Center Bell Labs, Lucent Technologies
Configurable device discovery. Belgrade University Computer Centre, Serbia [email protected]
Configurable device discovery based on SNMP Slavko Gajin Slavko Gajin Belgrade University Computer Centre, Serbia [email protected] Introduction Motivation To avoid manual initial configuration
Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
Network Documentation & Netdot
Network Monitoring and Management Network Documentation & Netdot These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
Finding Ethernet-Type Network Topology is Not Easy
Finding Ethernet-Type Network Topology is Not Easy Hassan Gobjuka, Yuri Breitbart Department of Computer Science Kent State University Kent, OH 44242 {hgobjuka,yuri}@cs.kent.edu 1 Abstract In this paper
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE Hemanta Kumar Kalita, Manoj K. Nambiar, and Amol Khanapurkar Tata Consultancy Services Ltd TCS Innovation Lab Performance Engineering, Mumbai
IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION
IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION Michael de Castro, DEEC, Instituto Superior Técnico, Lisboa, Portugal November 2008 Abstract. This paper presents a new tool designed to assist in
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Avaya Visualization Performance and Fault Manager Discovery Best Practices
Avaya Visualization Performance and Fault Manager Discovery Best Practices 2.3 NN48014-105 01.02 June 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure
PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram
Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Routing Protocols and Concepts Chapter 2 Conceitos de protocolos de Encaminhamento Cap 2
Static Routing Routing Protocols and Concepts Chapter 2 1 1 Objectives Define the general role a router plays in networks. Describe the directly connected networks, different router interfaces Examine
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
NetBrain Discovery Appliance Manual
NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2
Research Article Volume 6 Issue No. 4
DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha
This watermark does not appear in the registered version - http://www.clicktoconvert.com. SNMP and OpenNMS. Part 1 SNMP.
SNMP and OpenNMS Part 1 SNMP Zeev Halevi Introduction Designed in 1987 by Internet Engineering Task Force (IETF) to send and receive management and status information across networks Most widely used network
SNMP-based enterprise IP network topology discovery
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2011; 21: 169 184 Published online 25 August 2010 in Wiley Online Library (wileyonlinelibrary.com).756 SNMP-based enterprise IP network
ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring
1 Aman Mahajan, 2 Haresh Joshi, 3 Sahil Khajuria, 4 Anil k Verma 1,3,4 CSE, Thapar University, Patiala, India 2 Manager-Technology,CGL Mumbai, India Email: 1 [email protected], 2 [email protected],
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Lab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
ECView Pro Network Management System. Installation Guide. www.edge-core.com
ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application
SAP IT Infrastructure Management. Dirk Smit ALM Engagement Manager SAP Africa [email protected]
SAP IT Infrastructure Management Dirk Smit ALM Engagement Manager SAP Africa [email protected] Challenges in managing heterogeneous IT environments Determine the value that IT contributes to the business
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
SNMP COMMAND SNMP SNMP [HELP] [COMMUNITY SYSCONTACT SYSLOCATION SYSNAME SYSOBJECID/OID TRAPS LIST]
1996 Lundy Ave, San Jose, CA 95131, USA Phone: 408.519.2062 Fax: 408.519.2063 www.anacominc.com SNMP (Rev 78) SNMP COMMAND This command serves to list all SNMP configuration parameters, but it can also
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
ASM Educational Center (ASM) Est. 1992
Cisco CCNP Routing and Switching Certification Course outline ROUTE v2.0 - Implementing Cisco IP Routing Module 1: Basic Network and Routing Concepts Lesson 1: Differentiating Routing Protocols Lesson
Graph Theory Applications in Network Security
Graph Theory Applications in Network Security Jonathan Webb1, Fernando Docemmilli2, and Mikhail Bonin3 Theory Lab - Central Queensland University Wayville SA 5034 E-mail addresses: (1) [email protected]
estpassport Bessere Qualität, bessere Dienstleistungen!
T estpassport Q&A Bessere Qualität, bessere Dienstleistungen! Exam : HP0-Y30 Title : Implementing HP Networking Technologies Version : Demo 1 / 9 1.Which A-Series switch is designed for the large data
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
IBM Tivoli Network Manager 3.8
IBM Tivoli Network Manager 3.8 Configuring initial discovery 2010 IBM Corporation Welcome to this module for IBM Tivoli Network Manager 3.8 Configuring initial discovery. configuring_discovery.ppt Page
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Correlating different network topology layers in heterogeneous environments
Correlating different network topology layers in heterogeneous environments Dennis Pellikaan, Diederik Vandevenne February 11, 2013 Abstract Network Topology Discovery is the process to automatically generate
SAP IT Infrastructure Management
SAP IT Infrastructure Management Legal Disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined
TTM 4128 Network and Service Management (http://www.item.ntnu.no/academics/courses/ttm4128/) Learning Objectives Specification
TTM 4128 Network and Service Management (http://www.item.ntnu.no/academics/courses/ttm4128/) Learning Objectives Specification Contents 1. TTM4128 Course contents 2. Overall Learning Objectives 3. Learning
Discovering Devices CHAPTER
CHAPTER 11 The Cisco Prime Collaboration Manager discovery process involves three phases: Access-level discovery Cisco Prime CM verifies the SNMP, HTTP, CLI, and JTAPI credentials on the devices. For endpoints
Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
An MPI Tool for Automatically Discovering the Switch Level Topologies of Ethernet Clusters
An MPI Tool for Automatically Discovering the Switch Level Topologies of Ethernet Clusters Joshua Lawrence Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 32306 {lawrence,
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
NetBrain Workstation Professional Edition 2.3 Release notes
NetBrain Workstation Professional Edition 2.3 Release notes Major Features...1 Known Issues*...5 NetBrain Workstation Support Site...7 Recommended System Requirements...7 Installation Notes...7 Major Features
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
Lab 3.10.2 Use Network Inspector to Observe STP Behavior
Lab 3.10.2 Use Network Inspector to Observe STP Behavior Objective The purpose of this lab is to observe STP behavior with the Network Inspector switch trace feature. Scenario A new switched network has
CHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 3: Simple Network Management Protocol (SNMP) Operations Objective To become familiar with basic SNMP operations
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Automated Service Discovery for Enterprise Network Management
Automated Service Discovery for Enterprise Network Management William Tu, Priya Thangaraj, Jui-hao Chiang Professor Tzi-cker Chiueh CEWIT Stony Brook University March 8, 2009 1 Introductin A key pillar
End-to-End IP Network Measurement for Broadcast Applications
EBU Tech 3346 End-to-End IP Network Measurement for Broadcast Applications EisStream Software package description Geneva May 2011 1 Conformance Notation This document contains both normative text and informative
Network Topology. White Paper
White Paper Network Topology JANUARY 2015 This document describes the benefits of Cisco Meraki s Network Topology technology and how you can use it to visualize and troubleshoot your network. In addition,
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Algorithms for Network Discovery and Detection of MAC and IP Spoofing Security Attacks
Algorithms for Network Discovery and Detection of MAC and IP Spoofing Security Attacks Paulo Lopes, Paulo Salvador, António Nogueira DETI, University of Aveiro / Instituto de Telecomunicações Aveiro, Portugal
White Paper Case Study:
White Paper Case Study: SNMP CLI Abstract: The purpose of this document is to convey to the reader the usefulness of an SNMP (Simple Network Management Protocol) CLI (Command Line Interface). This document
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Ethernet Topology Discovery: A Survey
Ethernet Topology Discovery: A Survey Kamal A. Ahmat CITY UNIVERSITY OF NEW YORK/Information Technology New York, USA Email: [email protected] ABSTRACT Ethernet networks have undergone impressive
Ethernet-based Software Defined Network (SDN)
Ethernet-based Software Defined Network (SDN) Tzi-cker Chiueh Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 Cloud Data Center Architecture Physical Server
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
Network Management & Monitoring Introduction to SNMP
Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Lightpath Planning and Monitoring
Lightpath Planning and Monitoring Ronald van der Pol 1, Andree Toonk 2 1 SARA, Kruislaan 415, Amsterdam, 1098 SJ, The Netherlands Tel: +31205928000, Fax: +31206683167, Email: [email protected] 2 SARA, Kruislaan
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Ethernet Topology Discovery: A Survey
Journal of Communication and Computer 10 (2013) 951-959 Kamal A. Ahmat Department of Information Technology, City University of New York, New York 10075, USA Received: May 10, 2012 / Accepted: June 12,
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Configuring EtherChannels
25 CHAPTER This chapter describes how to configure EtherChannel interfaces. For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 2950 Desktop Switch Command
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
Discovering Devices. The Cisco Prime Collaboration Manager discovery process involves three phases: Access-level discovery Cisco Prime CM:
CHAPTER 12 The Cisco Prime Collaboration Manager discovery process involves three phases: Access-level discovery Cisco Prime CM: a. Checks whether the device can be pinged (ICMP). If the ICMP is not enabled
Cisco ACI Simulator Release Notes, Release 1.2(1i)
Cisco ACI Simulator Release Notes, Release 1.2(1i) This document provides the compatibility information, usage guidelines, and the scale values that were validated in testing this Cisco ACI Simulator release.
