Mapping Tool for Networks Using OSPF and LLTD Protocols

Size: px
Start display at page:

Download "Mapping Tool for Networks Using OSPF and LLTD Protocols"

Transcription

1 Mapping Tool for Networks Using OSPF and LLTD Protocols PAVEL KRIZ, FILIP MALY Department of Informatics and Quantitative Methods University of Hradec Kralove Rokitanskeho 62, Hradec Kralove CZECH REPUBLIC Abstract: This article deals with enhancing of an existing functionality of OSPF network topology discovery tool. Enhancements are necessary to facilitate the use of the original tool in any network that uses OSPF routing protocol and routing software Zebra/Quagga. Enhancements consist primarily in an easier way of obtaining topological data. Furthermore the concept of future functionality is discussed. It consists of two main features: topological data export to other analytical tools and the use of LLTD protocol for local L2 topology discovery. Key-Words: OSPF, topology discovery, wireless community networks, LLTD, Dijkstra, Quagga, GraphViz. 1 Introduction During the development of community networks the need to obtain a clear and reliable picture of the entire network topology appeared. With this information it is possible to further develop the network efficiently, solve problems in network, or clarify dependencies between individual nodes according to the real topology. By analyzing the dependencies we can properly inform users about planned network outages, since it is known on which nodes and connections is the end node (user) functionally dependent. In addition the knowledge of the topology may be used for supporting the analysis of unplanned outages by network users, as outlined below. 2 The main goals and current status A tool for analyzing and planning the OSPFbased network topology was designed and developed based on needs HKFree community network. OSPF dynamic routing protocol is popular among the other networks and the resulting application is useful outside the community wireless networks area as well. The primary goals of this application are discovery and analysis of an unknown OSPF topology and assisting the network administrators (users) in planning the topology changes and solving potential problems with the OSPF configuration [1]. The application enables analysis of very large networks as it's able to visualize only the selected part of the network. The part was originally defined as a part of the sub-graph G' G determined by the initial node and the depth to which the original graph G is traversed. This solution was insufficient, since the existence of nodes with many neighbors (core backbone elements) caused the visualization of large amount of (irrelevant) nodes. As a result it was difficult to overview such a graph. Therefore, interactive mode has been added to support the incremental revealing of neighboring nodes. Using this approach we achieved functionality the user can see just a part of the network that he or she needs. Of course it is possible to hide the nodes back again. The application also has a network history analysis mode that among other things is suitable to detect hot spots where are frequent (unwanted) topological changes. This analysis also allows analyzing the historical states of the network, so expost we are able to identify the possible causes of failure such as temporary malfunction or misconfiguration of a router. Some known anomalies, like asymmetric OSPF costs in two directions of the same link, may occur in the network configuration. It may be the intention of administrator as well as a misconfiguration. Application is able to warn the users about these anomalies and visually highlight them in the resulting graph. Application currently provides basic statistical analysis of the network graph. This allows us to identify critical points in network, i.e. nodes or edges, whose failure leads to dividing the graph (i.e. the real network) into two or more components. The more components occur, the more critical given node or link is. In future versions we plan to visually highlight these critical areas. ISBN:

2 The structure of a wide network of routers can be hardly overviewed by a user. It is however expected that the user knows the approximate geographic location of the router(s). That is why we developed the feature to layout the graph according to the GPS positions, assuming that the positions of some network devices will be available. Network routing is one of the most important issues that administrators deal with. Proper OSPF cost assigning to the links is the only way to influence the way the data are physically routed. Assigning these costs is often very sensitive issue. At the moment when the administrator sets the router in the way he or she wants, it is appropriate to test the running configuration using ping and/or traceroute tools. Using our tool, administrator will not have to configure and test the real device or whole network as the tool is able to simulate his or her changes showing the shortest paths in the network. There is an option to display the tree of shortest paths from a selected router to all other available network routers. To calculate the shortest paths tree the Dijkstra's algorithm is used in the same way as in an OSPF implementation. The visualized map also properly handles and simulates any interactive changes in costs of links, switching routers and links on or off and inserting new routers or links to the model. In this case the shortest paths are immediately recalculated. The user is able to simulate various situations that may actually occur. The tool is able to properly work with links connecting more than two routers. Such a link may in fact be made of more point-to-point links, but these are inter-connected at the Layer-2 (L2) and such links are not captured in OSPF in detail. Therefore the actual physical topology is not known in this regard. Such a multi-link behaves to OSPF like a full-mesh inter-connection between all participating routers. However, displaying full-mesh is not very appropriate since it will strongly increase the number of displayed links and visual appearance has no benefit for users. So we implemented the transformation procedure, that transforms a multilink to a special node type (which doesn't correspond to the router) and this node is adjacent using edges to all the nodes representing routers participating in the original multi-link. This is a reasonable compromise to emphasize information about the likely complicated L2 topology (although without the knowledge of its details) and also to simplify visualization [2]. Figure 1 shows an example output map of the part of network that was incrementally visualized using the interactive mode. Fig. 1. Example output map of the part of a real network 3 Making the tool more general One of the current goals is to reach a wider group of users. This was problematic as the application was designed for the specific needs of HKFree community network. First of all, we are working on the localization. According to the original target group of users, the application was available only in Czech language. We will translate it into English. 3.1 Changes in deployment architecture The dependency on the central server (OSPF snapshot archive server), which provided regular saving of OSPF database to text files, becomes a specific limitation for news users. The archives of these files were created on the server and were then on-demand downloaded by the application. The original architecture is shown in Figure 2. This solution is robust enough for long-term deployment, especially if we want to analyze historical changes of the network. (Java) HTTP request to archive Response with OSPF snapshot archive OSPF snapshot archive server (shell+perl) Reverse DNS requests Responses Scheduled requests to Quagga console (port 2604) Textual responses (OSPF database) Fig. 2. Original architecture running Quagga ISBN:

3 However, the requirement for the server part is restrictive for users who want to try the tool or use it only occasionally. Therefore we are developing a solution that allows direct connection of the tool into the (running Zebra/Quagga router implementation). After this improvement the user will be able to use the tool without being forced to install the server part. He or she will only enter the address of the router, the port on which the Quagga's telnet-console listens and password to access the console. When analyzing this solution the problem with the translation of RouterID to the router name appeared. RouterID, a unique router identifier, is an assigned four-byte value often corresponding to the main IP address of the router. To assign appropriate human-friendly names the standard solution based on a DNS server is used. The DNS server is able to do a reverse lookup of particular IP address and translate it to the router's domain name. RouterIDs are often picked out of the private address space [3], especially today, when the public IPv4 addresses are exhausted. Unfortunately these private addresses cannot be translated by publicly available DNS servers on the Internet. We must translate the RouterID to the name of the router using the right private DNS server that is not part of the public DNS hierarchy. As we don't want the user to be forced to change his or her default system DNS server the application will allow entering the address of the (private) DNS server to be used for translation RouterID to the name of the router. This problem was not discovered during the testing of the original architecture because the server part was deployed inside the private network and the server was configured to use the private DNS server as its default system DNS server. A new alternative architecture is shown in Figure 3. Of course, it is still possible to use the original solution employing the server part. (Java) Reverse DNS requests Responses On demand requests to Quagga console (port 2604) Textual responses (OSPF database) Fig. 3. New alternative architecture running Quagga name (e.g..hkfree.org ). This suffix was the same for all routers in a network. As a result, the names displayed in the map are considerably shorter and thus the map is clearer. The same suffix had no added value so we lost no information. As we want to simplify the application by eliminating the server part the name trimming functionality must be added to the tool. So we will develop the automatic major suffix detection. It will analyze all the names and identify the major suffix that will be trimmed off. User will not have to predefine this suffix. The application will have a general-purpose while maintaining comfort by reducing the displayed names' length. Threshold frequency for determining the major suffix will be empirically selected. Nodes with the major suffix trimmed off as well as nodes with full names (not using major suffix) may appear in the resulting network map. The dot symbol will be added at the end of non-trimmed (i.e. full) names to avoid ambiguity of the actual domain name. So it will be clear which names are full domain names and which are using the major suffix that was trimmed off. It may also happen that the IP address of the node cannot be looked up using the DNS server. This can occur when the given node is not inserted into the DNS server or when the DNS server is completely unavailable or does not exist. In this situation, the map will display only the IP address. An example of all possible options is shown in Table 1 (note the dot after the com domain). We assume that the algorithm identified.hkfree.org as the major domain suffix. Node Name Display Name gw.transit.example.com gw.transit.example.com. r1.backbone1.hkfree.org r1.backbone Table 1. Node name display options In case that no major suffix is identified, no trimming is performed and so all names will be displayed in full. From these steps, we expect to extend the user base and to get a feedback from users in the form of bug reports or suggestions for improvements. We would like to address other developers who would actively participate in this project and contribute to it as well. 3.2 Automatic suffix detection Originally the server part trimmed off the predefined domain name suffix from the router's ISBN:

4 4 Export to other analytical tools During our research of analysis of the network graph, we have found the CytoScape tool [4]. It was originally intended for the area of bioinformatics, specifically the analysis of interacting molecule networks. Using plugins CytoScape was successfully adapted for use in other fields such as social networks or semantic web. So we plan to evaluate this tool in the context of computer network topology visualization and analysis. The easiest first step is to export our topology to a format suitable for import into CytoScape. E.g. Graph Modeling Language (GML), which is also supported by other popular tools for working with graphs such as yed Graph Editor. In case that the use of CytoScape for network topology will be successful, we will consider a possible future integration of both tools, whether such as developing a plug-in for CytoScape or integrating parts of CytoScape into our tool (this is possible thanks to the open-source license). 5 L2 topology mapping extension Another extension is designed to support the mapping of the local topology at the Layer-2 (L2) and Layer-3 (L3) without the use of OSPF. This will enable to analyze the topology of L2 within the user's home network and to analyze statically routed network edges. This extension will require a software component deployed to the user's PC. This component is temporarily called the topology. Its mission is to perform a local topology discovery, in cooperation with other s, and send the topology to the topology server that will combine these local topologies the global one. Existing available methods, such as Link Layer Topology Discovery (LLTD) protocol by Microsoft, which is implemented in Windows Vista and later operating systems, will be used for local mapping [5]. We can use well-known traceroute-based methods for L3 topology discovery [6]. Conceptual architecture of the new solution is shown in Figure 4. The communication layer, providing interconnection among topology s and other components, may be implemented using our Mobile-Oriented Scalable Cooperative Architecture[7]. Global topology Cooperative P2P DNS (router/node names) Topology server Local L2 topology gathering OSPF database (L3 topology) Fig. 4. Conceptual architecture supporting L2 topology discovery 5.1 Testing LLTD As the LLTD in MS Windows is quite promising for our tool, we have done a basic testing and analysis of this protocol and implementation. The protocol uses two main roles for devices: Mapper and Responder. Mapper is a device that initiated the process of mapping local topology and at the end of the process gets the final map. Responder is simpler and serves to provide Mapper information about its existence and other details (how the device is connected to the network, etc.). Responder can be installed install into Windows XP. Mapping can be performed only if the PC is configured to be connected into a private network. Using the System Policies the functionality of the Responder may be enabled even for public or domain network type. Responder can be deployed into other devices than just PCs. E.g. it can be installed into gaming consoles, wireless access points and other equipment for the consumer market. LLTD is well adapted for mapping local networks using wireless technology based on IEEE LLTD works strictly on the second layer (L2), so it does not map the topology beyond the first router. Therefore a new component called topology deployed into the PC in every L2 network segment is necessary to perform local topology discovery and to pass the topology to the server. For testing we used several PCs with Windows XP, Vista and Seven and two Wi-Fi routers that were able to work as a simple wireless access points (AP). We proposed and built 10 different testing topologies. For each topology the discovery process was done several times using the built-in Network Map tool in Windows. We also developed a simple tool designed to perform its own topology discovery (using LLTD) that is independent of the Microsoft's ISBN:

5 implementation of the Mapper. The output of this tool is a text file describing the graph topology in the format specific for the GraphViz visualization tool that can finally render the resulting map picture. Results of testing showed that both the original Microsoft's Network Map and our prototype implementation of the Mapper provide good results. Discovered topology roughly corresponds to the real topology and contains additional information such as wireless network names (ESSIDs). However both solutions cannot provide completely reliable results and in some cases, the resulting topology slightly differed when we ran the discovery process several times. LLTD results should be therefore considered approximate. It turned out that some results were adversely affected by the suspending and reawakening of equipment (e.g. laptop). 6 Conclusion The described tool is very well proven by HKFree community wireless network administrators and is actively used by them. Several obstacles complicating the general use of the tool will be removed through enhancements as described here. The main enhancements are: - the possibility of direct connection to the based on Zebra/Quagga software without installing the server part, - automatic detection of the DNS suffix used within the network. We believe that these enhancements will bring wider adoption of the tool by other network administrators and will address developers to participate in the development of this project. Further, the function for export the topology to other analytical tools is proposed. We also outlined the concept of an extension for local L2 topology discovery based on LLTD protocol that was briefly tested. The tool was developed during our research of community wireless networks and is available at References: [1] Kriz, P. Maly, F. Topology Discovery in Wireless Community Network. In Proceedings of the 2nd European Conference of Computer Science (ECCS '11), pp , Puerto De La Cruz, Tenerife, Spain, World Scientic and Engineering Academy and Society (WSEAS). ISBN [2] Menzel, J. Administration, design and visualization of net of routers using OSPF protocol, Czech Republic, Diploma thesis. University of Hradec Kralove. [3] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J. & Lear, E. Address Allocation for Private Internets, Internet Engineering Task Force (IETF), 1996, RFC [4] Smoot, M.E., Ono, K., Ruscheinski, J., Wang, P.L., Ideker, T. Cytoscape 2.8: new features for data integration and network visualization. Bioinformatics Feb 1;27(3): Epub 2010 Dec 12. PubMed PMID: ; PubMed Central PMCID: PMC [5] Microsoft Research. A Windows Rally Specification LLTD: Link Layer Topology Discovery Protocol. [Online] URL: aspx?id=72439 [6] Donnet, B., Friedman, T. Internet topology discovery: A survey. IEEE Communications Surveys and Tutorials. 2007, 9, 4, pp ISSN X. [7] Maly, F. Kriz, P. Mobile-oriented Scalable Cooperative Architecture. In Proceedings of the 15th WSEAS international conference on Computers, pp , Greece, World Scientific and Engineering Academy and Society (WSEAS). ISBN ISBN:

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,

More information

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Comprehensive IP Traffic Monitoring with FTAS System

Comprehensive IP Traffic Monitoring with FTAS System Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)

A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG) A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

software networking Jithesh TJ, Santhosh Karipur QuEST Global

software networking Jithesh TJ, Santhosh Karipur QuEST Global software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient

More information

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf. 70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

Modeling and Simulation of Routing Protocols in the Cloud

Modeling and Simulation of Routing Protocols in the Cloud 220 ICT Innovations 2014 Web Proceedings ISSN 1857-7288 Modeling and Simulation of Routing Protocols in the Cloud Dejan Spasov, Igor Jakimovski Faculty of Computer Science and Engineering Skopje, Macedonia

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information

Nemea: Searching for Botnet Footprints

Nemea: Searching for Botnet Footprints Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech

More information

Lab - Observing DNS Resolution

Lab - Observing DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

ETRX2 and ETRX357 Wireless Mesh Networking Modules. Application Note Accessing Modules over the Internet

ETRX2 and ETRX357 Wireless Mesh Networking Modules. Application Note Accessing Modules over the Internet Telegesis ETRX2, ETRX35x TG-APP-Internet-100 Application Note ETRX2 and ETRX357 Wireless Mesh Networking Modules Application Note Accessing Modules over the Internet (Rev 1.00) Table of Contents 1 INTRODUCTION...

More information

CAMPUS NETWORK SECURITY AND MANAGEMENT

CAMPUS NETWORK SECURITY AND MANAGEMENT CAMPUS NETWORK SECURITY AND MANAGEMENT 1 S. Sudharsan, 2 M. Naga Srinivas, 3 G. Sai Shabareesh, P.Kiran Rao 1 Department of Computer science 2 Department of Computer science 3 Department of Computer science

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates

More information

White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Charter Text Network Design and Configuration

Charter Text Network Design and Configuration MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Evaluation guide. Vyatta Quick Evaluation Guide

Evaluation guide. Vyatta Quick Evaluation Guide VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

ECView Pro Network Management System. Installation Guide. www.edge-core.com

ECView Pro Network Management System. Installation Guide. www.edge-core.com ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

IPv6 Autoconfiguration Best Practice Document

IPv6 Autoconfiguration Best Practice Document IPv6 Autoconfiguration Best Practice Document Produced by the CESNET-led working group on IPv6 (CBPD117) Authors: Tomáš Podermański, Matěj Grégr August 2011 Original version 2011 English translation TERENA

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Deploying Secure Internet Connectivity

Deploying Secure Internet Connectivity C H A P T E R 5 Deploying Secure Internet Connectivity This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security

More information

IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org

IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org IST STREP Project Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer http://www.ist-plastic.org Project Number : IST-26955 Project Title : PLASTIC Deliverable Type : Report

More information

Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications

Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, 500 03 Hradec Kralove Czech

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

Leveraging Best Practices for SolarWinds IP Address Manager

Leveraging Best Practices for SolarWinds IP Address Manager Leveraging Best Practices for SolarWinds IP Address Manager Share: Leveraging Best Practices for SolarWinds IPAM SolarWinds IP Address Manager (IPAM) is a comprehensive IP address management solution that

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this

More information

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Software installation and configuration IEC-line series

Software installation and configuration IEC-line series Software installation and configuration IEC-line series update: 04-10-2014 IEC-line by OVERDIGIT overdigit.com Table of contents 1. Installing the software... 3 1.1. Installing CoDeSys... 4 1.2. Installing

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Cisco IP Solution Center MPLS VPN Management 5.0

Cisco IP Solution Center MPLS VPN Management 5.0 Cisco IP Solution Center MPLS VPN Management 5.0 As part of the Cisco IP Solution Center (ISC) family of intelligent network management applications, the Cisco ISC MPLS VPN Management application reduces

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world

More information

Welcome to Todd Lammle s CCNA Bootcamp

Welcome to Todd Lammle s CCNA Bootcamp Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot

More information

University of Hawaii at Manoa Professor: Kazuo Sugihara

University of Hawaii at Manoa Professor: Kazuo Sugihara University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji ([email protected]) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes Deployment Guide Version 1.2 Deploying the BIG-IP LTM with What s inside: 2 Prerequisites and configuration notes 3 Configuration Worksheet 4 Using the BIG-IP LTM Application Template for 8 Modifying the

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

A Model Design of Network Security for Private and Public Data Transmission

A Model Design of Network Security for Private and Public Data Transmission 2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch** Course: Interconnecting Cisco Networking Devices, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,295.00 Learning Credits: 33 Certification: CCNA Route/Switch Description: The Interconnecting

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Terminology. Internet Addressing System

Terminology. Internet Addressing System Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

v6sonar Report Service Overview and Case Study By Nephos6, Inc.

v6sonar Report Service Overview and Case Study By Nephos6, Inc. v6sonar Report Service Overview and Case Study By Nephos6, Inc. What is the Challenge? Whether you are an IPv6 enthusiast who managed to get your IT organization excited about the opportunities offered

More information

RIP: Routing Information Protocol

RIP: Routing Information Protocol Laboratory 6 RIP: Routing Information Protocol A Routing Protocol Based on the Distance-Vector Algorithm Objective The objective of this lab is to configure and analyze the performance of the Routing Information

More information

Lightpath Planning and Monitoring

Lightpath Planning and Monitoring Lightpath Planning and Monitoring Ronald van der Pol 1, Andree Toonk 2 1 SARA, Kruislaan 415, Amsterdam, 1098 SJ, The Netherlands Tel: +31205928000, Fax: +31206683167, Email: [email protected] 2 SARA, Kruislaan

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

The PostBase Connectivity Wizard

The PostBase Connectivity Wizard The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through

More information

How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D

How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: [email protected] Configuring a Vyatta 4.0 release

More information

RedRapid X WIRELESS MODEM ROUTER. Quick Installation Guide (DN-7060)

RedRapid X WIRELESS MODEM ROUTER. Quick Installation Guide (DN-7060) RedRapid X WIRELESS MODEM ROUTER Quick Installation Guide (DN-7060) 1. Product Introduction Congratulations on purchasing this Wireless N ADSL2/2+ Router. This router is a cost-effective ADSL2+ router,

More information

Self-Service Active Directory Group Management

Self-Service Active Directory Group Management Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request

More information

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

Chapter 16 Route Health Injection

Chapter 16 Route Health Injection Chapter 16 Route Health Injection You can configure an HP Routing Switch to check the health of the HTTP application and inject a host route into the network to force a preferred route to an actively responding

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,

More information