Mapping Tool for Networks Using OSPF and LLTD Protocols
|
|
|
- Rosalyn West
- 9 years ago
- Views:
Transcription
1 Mapping Tool for Networks Using OSPF and LLTD Protocols PAVEL KRIZ, FILIP MALY Department of Informatics and Quantitative Methods University of Hradec Kralove Rokitanskeho 62, Hradec Kralove CZECH REPUBLIC Abstract: This article deals with enhancing of an existing functionality of OSPF network topology discovery tool. Enhancements are necessary to facilitate the use of the original tool in any network that uses OSPF routing protocol and routing software Zebra/Quagga. Enhancements consist primarily in an easier way of obtaining topological data. Furthermore the concept of future functionality is discussed. It consists of two main features: topological data export to other analytical tools and the use of LLTD protocol for local L2 topology discovery. Key-Words: OSPF, topology discovery, wireless community networks, LLTD, Dijkstra, Quagga, GraphViz. 1 Introduction During the development of community networks the need to obtain a clear and reliable picture of the entire network topology appeared. With this information it is possible to further develop the network efficiently, solve problems in network, or clarify dependencies between individual nodes according to the real topology. By analyzing the dependencies we can properly inform users about planned network outages, since it is known on which nodes and connections is the end node (user) functionally dependent. In addition the knowledge of the topology may be used for supporting the analysis of unplanned outages by network users, as outlined below. 2 The main goals and current status A tool for analyzing and planning the OSPFbased network topology was designed and developed based on needs HKFree community network. OSPF dynamic routing protocol is popular among the other networks and the resulting application is useful outside the community wireless networks area as well. The primary goals of this application are discovery and analysis of an unknown OSPF topology and assisting the network administrators (users) in planning the topology changes and solving potential problems with the OSPF configuration [1]. The application enables analysis of very large networks as it's able to visualize only the selected part of the network. The part was originally defined as a part of the sub-graph G' G determined by the initial node and the depth to which the original graph G is traversed. This solution was insufficient, since the existence of nodes with many neighbors (core backbone elements) caused the visualization of large amount of (irrelevant) nodes. As a result it was difficult to overview such a graph. Therefore, interactive mode has been added to support the incremental revealing of neighboring nodes. Using this approach we achieved functionality the user can see just a part of the network that he or she needs. Of course it is possible to hide the nodes back again. The application also has a network history analysis mode that among other things is suitable to detect hot spots where are frequent (unwanted) topological changes. This analysis also allows analyzing the historical states of the network, so expost we are able to identify the possible causes of failure such as temporary malfunction or misconfiguration of a router. Some known anomalies, like asymmetric OSPF costs in two directions of the same link, may occur in the network configuration. It may be the intention of administrator as well as a misconfiguration. Application is able to warn the users about these anomalies and visually highlight them in the resulting graph. Application currently provides basic statistical analysis of the network graph. This allows us to identify critical points in network, i.e. nodes or edges, whose failure leads to dividing the graph (i.e. the real network) into two or more components. The more components occur, the more critical given node or link is. In future versions we plan to visually highlight these critical areas. ISBN:
2 The structure of a wide network of routers can be hardly overviewed by a user. It is however expected that the user knows the approximate geographic location of the router(s). That is why we developed the feature to layout the graph according to the GPS positions, assuming that the positions of some network devices will be available. Network routing is one of the most important issues that administrators deal with. Proper OSPF cost assigning to the links is the only way to influence the way the data are physically routed. Assigning these costs is often very sensitive issue. At the moment when the administrator sets the router in the way he or she wants, it is appropriate to test the running configuration using ping and/or traceroute tools. Using our tool, administrator will not have to configure and test the real device or whole network as the tool is able to simulate his or her changes showing the shortest paths in the network. There is an option to display the tree of shortest paths from a selected router to all other available network routers. To calculate the shortest paths tree the Dijkstra's algorithm is used in the same way as in an OSPF implementation. The visualized map also properly handles and simulates any interactive changes in costs of links, switching routers and links on or off and inserting new routers or links to the model. In this case the shortest paths are immediately recalculated. The user is able to simulate various situations that may actually occur. The tool is able to properly work with links connecting more than two routers. Such a link may in fact be made of more point-to-point links, but these are inter-connected at the Layer-2 (L2) and such links are not captured in OSPF in detail. Therefore the actual physical topology is not known in this regard. Such a multi-link behaves to OSPF like a full-mesh inter-connection between all participating routers. However, displaying full-mesh is not very appropriate since it will strongly increase the number of displayed links and visual appearance has no benefit for users. So we implemented the transformation procedure, that transforms a multilink to a special node type (which doesn't correspond to the router) and this node is adjacent using edges to all the nodes representing routers participating in the original multi-link. This is a reasonable compromise to emphasize information about the likely complicated L2 topology (although without the knowledge of its details) and also to simplify visualization [2]. Figure 1 shows an example output map of the part of network that was incrementally visualized using the interactive mode. Fig. 1. Example output map of the part of a real network 3 Making the tool more general One of the current goals is to reach a wider group of users. This was problematic as the application was designed for the specific needs of HKFree community network. First of all, we are working on the localization. According to the original target group of users, the application was available only in Czech language. We will translate it into English. 3.1 Changes in deployment architecture The dependency on the central server (OSPF snapshot archive server), which provided regular saving of OSPF database to text files, becomes a specific limitation for news users. The archives of these files were created on the server and were then on-demand downloaded by the application. The original architecture is shown in Figure 2. This solution is robust enough for long-term deployment, especially if we want to analyze historical changes of the network. (Java) HTTP request to archive Response with OSPF snapshot archive OSPF snapshot archive server (shell+perl) Reverse DNS requests Responses Scheduled requests to Quagga console (port 2604) Textual responses (OSPF database) Fig. 2. Original architecture running Quagga ISBN:
3 However, the requirement for the server part is restrictive for users who want to try the tool or use it only occasionally. Therefore we are developing a solution that allows direct connection of the tool into the (running Zebra/Quagga router implementation). After this improvement the user will be able to use the tool without being forced to install the server part. He or she will only enter the address of the router, the port on which the Quagga's telnet-console listens and password to access the console. When analyzing this solution the problem with the translation of RouterID to the router name appeared. RouterID, a unique router identifier, is an assigned four-byte value often corresponding to the main IP address of the router. To assign appropriate human-friendly names the standard solution based on a DNS server is used. The DNS server is able to do a reverse lookup of particular IP address and translate it to the router's domain name. RouterIDs are often picked out of the private address space [3], especially today, when the public IPv4 addresses are exhausted. Unfortunately these private addresses cannot be translated by publicly available DNS servers on the Internet. We must translate the RouterID to the name of the router using the right private DNS server that is not part of the public DNS hierarchy. As we don't want the user to be forced to change his or her default system DNS server the application will allow entering the address of the (private) DNS server to be used for translation RouterID to the name of the router. This problem was not discovered during the testing of the original architecture because the server part was deployed inside the private network and the server was configured to use the private DNS server as its default system DNS server. A new alternative architecture is shown in Figure 3. Of course, it is still possible to use the original solution employing the server part. (Java) Reverse DNS requests Responses On demand requests to Quagga console (port 2604) Textual responses (OSPF database) Fig. 3. New alternative architecture running Quagga name (e.g..hkfree.org ). This suffix was the same for all routers in a network. As a result, the names displayed in the map are considerably shorter and thus the map is clearer. The same suffix had no added value so we lost no information. As we want to simplify the application by eliminating the server part the name trimming functionality must be added to the tool. So we will develop the automatic major suffix detection. It will analyze all the names and identify the major suffix that will be trimmed off. User will not have to predefine this suffix. The application will have a general-purpose while maintaining comfort by reducing the displayed names' length. Threshold frequency for determining the major suffix will be empirically selected. Nodes with the major suffix trimmed off as well as nodes with full names (not using major suffix) may appear in the resulting network map. The dot symbol will be added at the end of non-trimmed (i.e. full) names to avoid ambiguity of the actual domain name. So it will be clear which names are full domain names and which are using the major suffix that was trimmed off. It may also happen that the IP address of the node cannot be looked up using the DNS server. This can occur when the given node is not inserted into the DNS server or when the DNS server is completely unavailable or does not exist. In this situation, the map will display only the IP address. An example of all possible options is shown in Table 1 (note the dot after the com domain). We assume that the algorithm identified.hkfree.org as the major domain suffix. Node Name Display Name gw.transit.example.com gw.transit.example.com. r1.backbone1.hkfree.org r1.backbone Table 1. Node name display options In case that no major suffix is identified, no trimming is performed and so all names will be displayed in full. From these steps, we expect to extend the user base and to get a feedback from users in the form of bug reports or suggestions for improvements. We would like to address other developers who would actively participate in this project and contribute to it as well. 3.2 Automatic suffix detection Originally the server part trimmed off the predefined domain name suffix from the router's ISBN:
4 4 Export to other analytical tools During our research of analysis of the network graph, we have found the CytoScape tool [4]. It was originally intended for the area of bioinformatics, specifically the analysis of interacting molecule networks. Using plugins CytoScape was successfully adapted for use in other fields such as social networks or semantic web. So we plan to evaluate this tool in the context of computer network topology visualization and analysis. The easiest first step is to export our topology to a format suitable for import into CytoScape. E.g. Graph Modeling Language (GML), which is also supported by other popular tools for working with graphs such as yed Graph Editor. In case that the use of CytoScape for network topology will be successful, we will consider a possible future integration of both tools, whether such as developing a plug-in for CytoScape or integrating parts of CytoScape into our tool (this is possible thanks to the open-source license). 5 L2 topology mapping extension Another extension is designed to support the mapping of the local topology at the Layer-2 (L2) and Layer-3 (L3) without the use of OSPF. This will enable to analyze the topology of L2 within the user's home network and to analyze statically routed network edges. This extension will require a software component deployed to the user's PC. This component is temporarily called the topology. Its mission is to perform a local topology discovery, in cooperation with other s, and send the topology to the topology server that will combine these local topologies the global one. Existing available methods, such as Link Layer Topology Discovery (LLTD) protocol by Microsoft, which is implemented in Windows Vista and later operating systems, will be used for local mapping [5]. We can use well-known traceroute-based methods for L3 topology discovery [6]. Conceptual architecture of the new solution is shown in Figure 4. The communication layer, providing interconnection among topology s and other components, may be implemented using our Mobile-Oriented Scalable Cooperative Architecture[7]. Global topology Cooperative P2P DNS (router/node names) Topology server Local L2 topology gathering OSPF database (L3 topology) Fig. 4. Conceptual architecture supporting L2 topology discovery 5.1 Testing LLTD As the LLTD in MS Windows is quite promising for our tool, we have done a basic testing and analysis of this protocol and implementation. The protocol uses two main roles for devices: Mapper and Responder. Mapper is a device that initiated the process of mapping local topology and at the end of the process gets the final map. Responder is simpler and serves to provide Mapper information about its existence and other details (how the device is connected to the network, etc.). Responder can be installed install into Windows XP. Mapping can be performed only if the PC is configured to be connected into a private network. Using the System Policies the functionality of the Responder may be enabled even for public or domain network type. Responder can be deployed into other devices than just PCs. E.g. it can be installed into gaming consoles, wireless access points and other equipment for the consumer market. LLTD is well adapted for mapping local networks using wireless technology based on IEEE LLTD works strictly on the second layer (L2), so it does not map the topology beyond the first router. Therefore a new component called topology deployed into the PC in every L2 network segment is necessary to perform local topology discovery and to pass the topology to the server. For testing we used several PCs with Windows XP, Vista and Seven and two Wi-Fi routers that were able to work as a simple wireless access points (AP). We proposed and built 10 different testing topologies. For each topology the discovery process was done several times using the built-in Network Map tool in Windows. We also developed a simple tool designed to perform its own topology discovery (using LLTD) that is independent of the Microsoft's ISBN:
5 implementation of the Mapper. The output of this tool is a text file describing the graph topology in the format specific for the GraphViz visualization tool that can finally render the resulting map picture. Results of testing showed that both the original Microsoft's Network Map and our prototype implementation of the Mapper provide good results. Discovered topology roughly corresponds to the real topology and contains additional information such as wireless network names (ESSIDs). However both solutions cannot provide completely reliable results and in some cases, the resulting topology slightly differed when we ran the discovery process several times. LLTD results should be therefore considered approximate. It turned out that some results were adversely affected by the suspending and reawakening of equipment (e.g. laptop). 6 Conclusion The described tool is very well proven by HKFree community wireless network administrators and is actively used by them. Several obstacles complicating the general use of the tool will be removed through enhancements as described here. The main enhancements are: - the possibility of direct connection to the based on Zebra/Quagga software without installing the server part, - automatic detection of the DNS suffix used within the network. We believe that these enhancements will bring wider adoption of the tool by other network administrators and will address developers to participate in the development of this project. Further, the function for export the topology to other analytical tools is proposed. We also outlined the concept of an extension for local L2 topology discovery based on LLTD protocol that was briefly tested. The tool was developed during our research of community wireless networks and is available at References: [1] Kriz, P. Maly, F. Topology Discovery in Wireless Community Network. In Proceedings of the 2nd European Conference of Computer Science (ECCS '11), pp , Puerto De La Cruz, Tenerife, Spain, World Scientic and Engineering Academy and Society (WSEAS). ISBN [2] Menzel, J. Administration, design and visualization of net of routers using OSPF protocol, Czech Republic, Diploma thesis. University of Hradec Kralove. [3] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J. & Lear, E. Address Allocation for Private Internets, Internet Engineering Task Force (IETF), 1996, RFC [4] Smoot, M.E., Ono, K., Ruscheinski, J., Wang, P.L., Ideker, T. Cytoscape 2.8: new features for data integration and network visualization. Bioinformatics Feb 1;27(3): Epub 2010 Dec 12. PubMed PMID: ; PubMed Central PMCID: PMC [5] Microsoft Research. A Windows Rally Specification LLTD: Link Layer Topology Discovery Protocol. [Online] URL: aspx?id=72439 [6] Donnet, B., Friedman, T. Internet topology discovery: A survey. IEEE Communications Surveys and Tutorials. 2007, 9, 4, pp ISSN X. [7] Maly, F. Kriz, P. Mobile-oriented Scalable Cooperative Architecture. In Proceedings of the 15th WSEAS international conference on Computers, pp , Greece, World Scientific and Engineering Academy and Society (WSEAS). ISBN ISBN:
IPv4 and IPv6: Connecting NAT-PT to Network Address Pool
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
ISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)
A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
software networking Jithesh TJ, Santhosh Karipur QuEST Global
software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient
70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.
70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Step-by-Step Guide for Setting Up IPv6 in a Test Lab
Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6
Modeling and Simulation of Routing Protocols in the Cloud
220 ICT Innovations 2014 Web Proceedings ISSN 1857-7288 Modeling and Simulation of Routing Protocols in the Cloud Dejan Spasov, Igor Jakimovski Faculty of Computer Science and Engineering Skopje, Macedonia
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING
DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
ETRX2 and ETRX357 Wireless Mesh Networking Modules. Application Note Accessing Modules over the Internet
Telegesis ETRX2, ETRX35x TG-APP-Internet-100 Application Note ETRX2 and ETRX357 Wireless Mesh Networking Modules Application Note Accessing Modules over the Internet (Rev 1.00) Table of Contents 1 INTRODUCTION...
CAMPUS NETWORK SECURITY AND MANAGEMENT
CAMPUS NETWORK SECURITY AND MANAGEMENT 1 S. Sudharsan, 2 M. Naga Srinivas, 3 G. Sai Shabareesh, P.Kiran Rao 1 Department of Computer science 2 Department of Computer science 3 Department of Computer science
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
Charter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
An Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
Evaluation guide. Vyatta Quick Evaluation Guide
VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
ECView Pro Network Management System. Installation Guide. www.edge-core.com
ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01
Planning for Information Network
Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
IPv6 Autoconfiguration Best Practice Document
IPv6 Autoconfiguration Best Practice Document Produced by the CESNET-led working group on IPv6 (CBPD117) Authors: Tomáš Podermański, Matěj Grégr August 2011 Original version 2011 English translation TERENA
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Deploying Secure Internet Connectivity
C H A P T E R 5 Deploying Secure Internet Connectivity This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security
IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org
IST STREP Project Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer http://www.ist-plastic.org Project Number : IST-26955 Project Title : PLASTIC Deliverable Type : Report
Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications
Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, 500 03 Hradec Kralove Czech
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Leveraging Best Practices for SolarWinds IP Address Manager
Leveraging Best Practices for SolarWinds IP Address Manager Share: Leveraging Best Practices for SolarWinds IPAM SolarWinds IP Address Manager (IPAM) is a comprehensive IP address management solution that
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking
StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Software installation and configuration IEC-line series
Software installation and configuration IEC-line series update: 04-10-2014 IEC-line by OVERDIGIT overdigit.com Table of contents 1. Installing the software... 3 1.1. Installing CoDeSys... 4 1.2. Installing
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Cisco IP Solution Center MPLS VPN Management 5.0
Cisco IP Solution Center MPLS VPN Management 5.0 As part of the Cisco IP Solution Center (ISC) family of intelligent network management applications, the Cisco ISC MPLS VPN Management application reduces
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
University of Hawaii at Manoa Professor: Kazuo Sugihara
University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji ([email protected]) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes
Deployment Guide Version 1.2 Deploying the BIG-IP LTM with What s inside: 2 Prerequisites and configuration notes 3 Configuration Worksheet 4 Using the BIG-IP LTM Application Template for 8 Modifying the
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011
CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
A Model Design of Network Security for Private and Public Data Transmission
2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**
Course: Interconnecting Cisco Networking Devices, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,295.00 Learning Credits: 33 Certification: CCNA Route/Switch Description: The Interconnecting
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
v6sonar Report Service Overview and Case Study By Nephos6, Inc.
v6sonar Report Service Overview and Case Study By Nephos6, Inc. What is the Challenge? Whether you are an IPv6 enthusiast who managed to get your IT organization excited about the opportunities offered
RIP: Routing Information Protocol
Laboratory 6 RIP: Routing Information Protocol A Routing Protocol Based on the Distance-Vector Algorithm Objective The objective of this lab is to configure and analyze the performance of the Routing Information
Lightpath Planning and Monitoring
Lightpath Planning and Monitoring Ronald van der Pol 1, Andree Toonk 2 1 SARA, Kruislaan 415, Amsterdam, 1098 SJ, The Netherlands Tel: +31205928000, Fax: +31206683167, Email: [email protected] 2 SARA, Kruislaan
OnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
The PostBase Connectivity Wizard
The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through
How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D
Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: [email protected] Configuring a Vyatta 4.0 release
RedRapid X WIRELESS MODEM ROUTER. Quick Installation Guide (DN-7060)
RedRapid X WIRELESS MODEM ROUTER Quick Installation Guide (DN-7060) 1. Product Introduction Congratulations on purchasing this Wireless N ADSL2/2+ Router. This router is a cost-effective ADSL2+ router,
Self-Service Active Directory Group Management
Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
Chapter 16 Route Health Injection
Chapter 16 Route Health Injection You can configure an HP Routing Switch to check the health of the HTTP application and inject a host route into the network to force a preferred route to an actively responding
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Analysis of QoS Routing Approach and the starvation`s evaluation in LAN
www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,
