RESOURCE DISCOVERY IN AD HOC NETWORKS
|
|
|
- Howard Bradford
- 9 years ago
- Views:
Transcription
1 RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR August 1998 This project is in part supported by FX Palo Alto Laboratories and the National Physical Science Consortium
2 Resource Discovery in Ad hoc Networks by Diane Tang, Chih-Yuan Chang, Kei Tanaka, and Mary Baker {dtang, {chang, Technical Report: CSL-TR August 1998 Computer System Laboratory Departments of Electrical Engineering and Computer Science William Gates Computer Science Building, 4A Stanford University Stanford, California Abstract Much of the current research in mobile networking investigates how to support a mobile user within an established infrastructure of routers and servers. Ad hoc networks come into play when no such established infrastructure exists. This paper presents a two-stage protocol to solve the resource discovery problem in ad hoc networks: how hosts discover what resources are available in the network and how they discover how to use the resources. This protocol does not require any established servers or other infrastructure. It only requires routing capabilities in the network. Key Words and Phrases: Resource Discovery, Ad hoc networks
3 Copyright 1998 by Diane Tang, Chih-Yuan Chang, Kei Tanaka, and Mary Baker
4 Resource Discovery in Ad hoc Networks Diane Tang *, Chih-Yuan Chang +, Kei Tanaka+, Mary Baker * * Stanford University, + FX Palo Alto Laboratories Abstract Much of the current research in mobile networking investigates how to support a mobile user within an established infrastructure of routers and servers. Ad hoc networks come into play when no such established infrastructure exists. This paper presents a two-stage protocol to solve the resource discovery problem in ad hoc networks: how hosts discover what resources are available in the network and how they discover how to use the resources. This protocol does not require any established servers or other infrastructure. It only requires routing capabilities in the network. 1.0 Introduction The combination of the growth of the Internet and the popularity of portable computing devices such as laptops has led to an increasing interest in mobile computing and networking; laptop users wish to connect to the network as they move around and visit different locales. Most research in mobile networking has focused on the case where the mobile user has a home network that he usually uses, in his office perhaps, and tries to solve the problem of how to keep the user connected to the network when he visits some foreign network, perhaps at a different company. Mobile IP [Per], DHCP (Dynamic Host Configuration Protocol) [Dro], and Dynamic DNS (Domain Name Service) [Vix- TRB] all try to deal with the issues that come up in this type of situation. However, all of these protocols assume that they have an established infrastructure within which they may work, namely the Internet, consisting of its routers and previously established servers. 1
5 Introduction A different situation arises when there is no such established infrastructure on which to depend; such a network is called an ad hoc network. An ad hoc network is a temporary network that is built on the fly, and has the following characteristics: A complete lack of established infrastructure: there are no pre-existing base stations to depend on, no established or well-known servers, and perhaps no internet connection. A network spanning multiple hops: a packet sent from node A may not be able to get directly to node B. Instead, a packet might have to traverse several intermediate nodes to reach B from A. The nodes in the network are mobile. A dynamic structure: since the network consists of mobile nodes, the topology of the network is not static, but is instead changing, perhaps rapidly. To make the concept of an ad hoc network more concrete, such a network might be used in the following examples: A conference: people go to conferences, and want to network their laptops together to trade data, paper drafts, etc. The size of the network and the type of hosts brought are not known beforehand. A military situation: the army goes on a mission and needs computer support. Disaster relief: the red cross goes to a disaster site and needs a network to keep track of completed tasks, supplies, etc. A construction site: a construction company goes to a site to build a building and needs to keep track of equipment, workers, etc. The problem of how to construct an ad hoc network has recently become a topic of interest at several research institutions. Some of the research problems include the following: Host naming: in some cases, such as the conference scenario, nodes may come in with a pre-defined name, such as an IP address in their home network. Is the node given a temporary name, or can the node use its own IP address? Does the node get a new name every time it moves within the network? Routing: traditional IP routing does not mean much in this network, unless the ad hoc network is connected to the Internet itself. Even so, since the network is a multihop network, a host will need to discover how to send packets to another host. Security: can anyone join an ad hoc network? Also, how much of the communication is visible by every participant? Resource discovery: even though there may not be any established servers, some nodes may choose to provide a service (files, web, printing, etc.) to other nodes. How do other nodes discover what services are out there and how to use them? In this paper, we address the specific problem of resource discovery in an ad hoc network. Existing solutions, such DHCP [Dro] and dynamic DNS [VixTRB], will not work in an ad hoc network since they require that some sort of server be set up, and as men- 2 Resource Discovery in Ad hoc Networks
6 Proposed solution tioned above, an ad hoc network cannot depend on such established resources or infrastructure. 2.0 Proposed solution The solution we propose is fully distributed with each node advertising the services it provides. There are two stages in our proposed solution: resource discovery, in which nodes discover what resources exist in the network, and resource location, during which nodes locate and discover how to communicate with the servers providing the desired particular resource server. Note that a service is a specific instance of a resource. One node may be looking for a printer resource, and another node may provide the printing service that the first node can discover and use. The main difference between this scheme and the other proposed resource discovery schemes is that there is no dependence on a central server that clients query to discover which services are present in a network. See Section 5.0 for a more detailed description of the related work. 2.1 Naming Before we discuss the two phases of the solution, we need to resolve the name mapping issue: each type of resource, e.g., printers or file servers, has its own multicast group. We do the multicast address assignment by hashing the name of the resource ( Printers, File Servers ) to the last byte of the multicast address, leading to an address of x. This type of hashing is also used by the Appletalk Name-Binding Protocol [App]. We do assume that common resources have a well-known resource name, so that different nodes providing the same type of service use the same multicast group. The advantage gained by using a hashing scheme is that users have a more intuitive grasp of what Printers might be than what might represent. This hashing mechanism might is result in an address collision problem, which occurs when two different types of resources end up using the same multicast group address. There are two possible problems. The first one is whether only one resource will be advertised or both. For both to be advertised, the servers advertising only need to check that the resource name as well as the multicast address are the same. Only if both match do the servers check to see who continues advertising and who stops. The second problem occurs when a client sends a request to the multicast group asking for more information. There are two possible solutions in this case. In the first case, the client can send the resource name in the request packet, and the servers can check to see whether that matches, and if so, then send the information. The other solution is that all the servers can reply, and the client can discard any responses in which it is not interested. The former solution, given today s mobile nodes with more limited bandwidth than CPU power, is a better choice since it uses less bandwidth at the expense of an extra string comparison. Resource Discovery in Ad hoc Networks 3
7 Proposed solution 2.2 Phase I: Resource Discovery This phase addresses how nodes discover what type of resources exist in the network; it is the bootstrapping mechanism. Every node that provides a service sends an advertisement, which includes the multicast address of that service, to a well-known multicast address and port. Any node interested in seeing which resources exist in this network joins this multicast group to receive advertisements. Essentially, we have traded a centralized server for a well-known multicast address. Currently, the advertisement follows the form described in the Session Description Protocol (SDP) [HanJa], and advertisements are sent out according to the Session Announcement Protocol (SAP) [Han]. As a result, any host trying to discover resources needs only to run sdr [SDR], a session directory tool that receives and parses SDP announcements on the SAP multicast address and port. Note that if a node provides multiple types of services, it needs to send a separate advertisement for each service. Also, the client need not run sdr if it knows the resource multicast group, or the resource name to hash to the associated multicast address sdr is merely a bootstrapping mechanism for resource discovery. One refinement we make to prevent multiple nodes from advertising the same resource, and thereby wasting bandwidth, is to have each node that advertises a service also listen for other advertisements; if it sees another node advertising the same service and multicast address, it checks to see which node has the lower address. The node with the lower address keeps on advertising; the other node stops sending advertisements. This assumes that both nodes are participating and behaving properly. Even if the node stops sending advertisements, it still listens to keep track of when advertisements are sent. If an announcement has not been sent within a small multiple of the expected time, then this node starts advertising the resource again. 2.3 Phase II: Resource Location By this phase, the client node knows which type of service it is looking for and the multicast address for that type of service. What the client wants to do now is to get more information about the specific service provided by servers in this group, so that it can choose which servers it wants to use. The client does this by sending a request for information to the multicast address it found in the previous phase and a well known port, currently port Every node providing this service is a member of the multicast group, and therefore receives the request. Upon receiving the request, every server responds with details about the service (a printer might provide details such as paper size, color, and dpi), as well as information on how the client should access the server, such as the unicast address, port, and protocol the client should use to contact the server. The server may also respond with a URL with more information, or even a script the client could execute. 4 Resource Discovery in Ad hoc Networks
8 Dependencies Once the client chooses a particular server, all further communication with that server takes place via whatever mechanism the server specifies, most likely unicast-based, rather than using the resource multicast group. 3.0 Dependencies Having presented the protocol, we can see this resource discovery protocol depends only on having multicast routing. However, for the network to be viable at all, it must have unicast routing. Multicast routing is built on top of unicast routing, and therefore multicast must also work. Further note that this resource discovery protocol does not depend on any properties inherent to ad hoc networks, and could, in fact, be used in any network. The only aspect of ad hoc networks manifest in this protocol is the lack of dependence on any established servers to distribute the resource information. However, we do assume that services have well-known names. 4.0 Open Issues While this protocol does not depend on anything that is not inherent to any network, there are several open issues, both with the underlying function of ad hoc networks and with the resource discovery protocol itself: The stability of multicast routing Scalability Security First, let us look at the stability of multicast routing. An ad hoc network may have a rapidly changing network topology. Current multicast routing algorithms may not be able to keep up with the rate of change, especially if the changes affect which nodes are parents and children in its routing trees. Simulating how multicast routing algorithms behave in a changing topology is one method of determining their stability; different underlying unicast routing algorithms also need to be simulated to see how quickly they converge in an ad hoc network, since this could affect multicast performance as well. Next is the issue of how well ad hoc networks will scale, both with respect to an increasing number of nodes and to more rapid changes in the network topology. Time-to-live (TTL) or administrative scoping can be used so that the protocol will scale for use in large networks. In other words, these scoping mechanisms can be used to limit how far away a client looks for services, thus reducing protocol overhead to local neighborhoods rather than the entire network. The issue of scaling to more rapid changes in network topology is similar to the issue of multicast stability discussed above. The final open issue considered here is security, specifically authentication and authorization. The server needs to be able to authenticate itself to the client so that the client Resource Discovery in Ad hoc Networks 5
9 Related work knows that it is not sending potentially sensitive information to a node impersonating a server. The client also needs to be able to authorize itself to the server, so that the server knows the client is allowed access to the service it provides. There is also a privacy issue, so that no one snooping on the network can get the data sent between the client and server. The security issue is complicated by the fact that there is no established key or certificate server. 5.0 Related work Many proposals for how to do resource discovery are currently being proposed. Some of these, such as DHCP and dynamic DNS [Dro][VixTRB], do not apply to ad hoc networks, since they depend on using an established server to distribute the information. Perhaps the most similar resource discovery protocol is from Appletalk [App]. In this protocol, a client wishing to find a service multicasts a request to a service-type-specific, ethernet-level multicast address. All servers providing a service of this type respond. In addition, a server broadcasts a gratuitous reply (identical to what it would send in response to a client request) when it first joins the Appletalk network. The main differences between the Appletalk Name Binding Protocol (NBP) and what we propose is the difference in addressing (IP address and port as opposed to the Appletalk named socket), and the different method in advertising resources. More recently, the resource discovery working group in the Internet Engineering Task Force (IETF) has been developing the Service Location Protocol (SLP) [VeiGPK]. The main thrust of SLP is in using directory agents, which are established servers with which services register; multicast is used only in small networks or as a backup mechanism. Like our proposal, there is a service-specific multicast address, however, this address is not advertised in SLP as it is in our proposal. However, both proposals use a hash of the resource name to generate the appropriate multicast address. Our proposal is much more lightweight than the SLP proposal, with its directory agents, service agents, and user agents. SLP also includes more features, such as supporting queries for a service with specific properties. Our proposal leaves it to the client to parse the server replies to discover which properties each server provides and to choose appropriately. 6.0 Current Status Currently, we have implemented a prototype. On the server side, a daemon reads in a configuration file listing all the services that host provides. For each service, the configuration file lists a unicast address, port number, resource name, resource description, and other things necessary for the SDP description. In addition, either a URL or a pointer to a script can be included. This daemon advertises these services, listens for other servers advertising the same service to determine whether to keep advertising, stop advertising, or restart advertising. This daemon also joins all appropriate multicast groups to listen for and reply to any requests for information from clients. 6 Resource Discovery in Ad hoc Networks
10 Conclusion and Future Work On the client side, we just use sdr [SDR] to discover the multicast addresses of resources available in the network. Once we have the multicast address, the client is started and sends out a query to the server; the query is resent up to three more times if no replies are received. Once the client starts receiving replies, the descriptions in the replies are listed for the user, and the user can just choose a particular server to use. For source code, please contact Diane Tang at [email protected]. 7.0 Conclusion and Future Work Much of the research that has been done so far in mobile computing and networking has focused on how to maintain connectivity while the user is moving around. This previous research depends on having an established infrastructure of routers and servers. In this paper, we have described a resource discovery protocol for ad hoc networks that does not depend on having any established infrastructure; the protocol depends only on being able to route packets in the network. There are, however, several underlying open issues to make both ad hoc networks, and thus this resource discovery protocol, viable. These include the stability of multicast routing given frequent network topology changes, network scalability, and security. Investigation into the first two issues is underway, and involves simulating ad hoc networks and the routing protocols used. The security issues are still being considered. 8.0 Acknowledgments Much of this work was done at Fuji-Xerox Palo Alto Laboratories (FX-PAL). I d like to thank all of the researchers at FX-PAL and the MosquitoNet group at Stanford University for listening and making great suggestions. 9.0 References [App] [Dro] [Han] [HanJa] Appletalk Name-Binding Protocol. Droms, R. Dynamic Host Configuration Protocol. RFC 1531, October, Handley, M. SAP: Session Announcement Protocol. Internet Draft, November 19, Work in Progress. Handley, M. and Jacobsen, V. SDP: Session Description Protocol. Internet Draft, March 26, Work in Progress. [Per] Perkins, C., ed. IP Mobility Support. RFC 2002, October Resource Discovery in Ad hoc Networks 7
11 References [SDR] sdr. ftp://cs.ucl.ac.uk/mice/sdr/ [VeiGPK] Veizades, J., Guttman, E., Perkins, C., Kaplan, S. Service Location Protocol. RFC 2165, June [VixTRB] Vixie, P., ed., Thomson, S., Rekhter, Y., Bound, J. Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136, April Resource Discovery in Ad hoc Networks 8
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
Visio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Name Resolution in On-Demand MANETs and over External IP Networks
Name Resolution in On-Demand MANETs and over External IP Networks Paal Engelstad, Do Van Thanh, Geir Egeland University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Name Service in IPv6 Mobile Ad-hoc Network
Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,
DNS Extensions to Support Location Management in IP Networks
DNS Extensions to Support Location Management in IP Networks Alexandros Kaloxylos, Stathes Hadjiefthymiades, Lazaros Merakos Communication Networks Laboratory, Department of Informatics, University of
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Mobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, [email protected]. Introduction
IP Anycast: Point to (Any) Point Communications Draft 0.3 Chris Metz, [email protected] Introduction The Internet supports several different communication paradigms. Unicast is defined as a point-to-point
A Dell Technical White Paper Dell Storage Engineering
Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
Chapter 8 Advanced Configuration
Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
HP Switches Controlling Network Traffic
HP Switches Controlling Network Traffic Hewlett-Packard switches offer an array of features designed to provide increased network performance with a minimum of complication and administration. Among features
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
How to Install and Configure the DHCP Service in Windows Server 2008 R2
How to Install and Configure the DHCP Service in Windows Server 2008 R2 I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery
Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery Li Li and Louise Lamont CRC Canada Outline Overview of MANET Service Discovery Schemes OLSR Extension
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Administrative Distance
RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
MS Windows DHCP Server Configuration
MS Windows DHCP Server Configuration Abstract This document describes how to configure option 43 on a Microsoft Windows 2000/2003 DHCP server. This information may be used in an Aruba Networks solution
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
HP Web Jetadmin IP Range Discovery
White Paper October 2004 Document Version: 1 Imaging and Printing Group Hewlett-Packard Company Contents 1 Introduction... 2 2 Configuring for Success... 2 3 IP Range Discoveries (Scanning the Network)...
Recommended IP Addressing Methods for EtherNet/IP Devices
Recommended IP Addressing Methods for EtherNet/IP Devices Version: 1.0 10-June-2003 Published by EtherNet/IP Implementors Workshop Open DeviceNet Vendor Association (ODVA) ControlNet International (CI)
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
ProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
Introduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
Introduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
138 Configuration Wizards
9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP
Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Network Monitoring with SNMP
Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Product Standard General Interworking: Internet Server
General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
Network Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
Port Use and Contention in PlanetLab
Port Use and Contention in PlanetLab Jeff Sedayao Intel Corporation David Mazières Department of Computer Science, NYU PDN 03 016 December 2003 Status: Ongoing Draft. Port Use and Contention in PlanetLab
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
CCNA Exploration: Accessing the WAN Chapter 7 Case Study
Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
- Multicast - Types of packets
1 Types of packets - Multicast - Three types of packets can exist on an IPv4 network: Unicast A packet sent from one host to only one other host. A hub will forward a unicast out all ports. If a switch
Lab 3.4.2: Managing a Web Server
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
IPv6 Advantages. www.compaq.com. Yanick Pouffary. [email protected]
IPv6 Advantages Yanick Pouffary [email protected] IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order
Implementing DHCPv6 on an IPv6 network
Implementing DHCPv6 on an IPv6 network Benjamin Long [email protected] 8-11-2009 Implementing DHCPv6 on an IPv6 network 2 Table of Contents DHCPv6 Overview...3 Terms used by DHCPv6...3 DHCPv6 Message
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
