Stateful vs. stateless traffic analysis
|
|
|
- Erick Lamb
- 10 years ago
- Views:
Transcription
1 Stateful vs. stateless traffic analysis Rahul Patel Business Line Manager, Advanced Products Group Hifn, Inc. Introduction Over the past few years, the Internet has become a conduit of diverse and complex forms of communication, a new way to do business, and to an extent, a medium for socialization; ultimately taking productivity to a level that has never been experienced before for the benefit of the environment, economy, and life in general. The challenges for most of the providers and users of services (ISPs, networking OEM manufacturers, enterprises, end-users and others) that enable the use and benefit of the Internet is to create a business model that will help them, not only sustain, but also profit from their participation in the new Internet economy. Recently, many of the providers of the Internet have failed to keep up with the challenge to maintain a sustainable business model, and hence succumbed to failure in what is widely termed as Internet bust. Hence, going forward, the mantra for the Internet provider is simple: create a sustainable business model. Internet is a service. Like in any service oriented business, accountability, reliability and robustness are key elements of making the business, not only sustainable, but also profitable. ISPs are actively looking up to equipment deployed in their networks to be intelligent enough to account for a service, and to make it more reliable in executing the customer agreed upon service level agreements (SLA). This effectively transfers some or most of the responsibility for intelligence in the network on OEM equipment manufacturers. Intelligent equipment may be defined as equipment that can do one or more of the following type services in a very reliable and robust form: QoS, firewall, security, NAT/ PAT (L3/L4) transforms, bandwidth/traffic management, monitoring, metering etc. This means that any and every data gram (packet) that gets serviced by the networking equipment would need to be parsed for its whereabouts, and analyzed in context of the application it is associated with - i.e. perform a thorough deep, granular, applicationaware classification. Stateful & Stateless Classification of Network Traffic Network traffic classification is a process in which network traffic is parsed and analyzed based on certain pattern matching and/or underlying protocol decoding schemes. This processing function gives the policy engines information that makes the policy engine implementation more robust and reliable. The finer and precise the classification is, the better the policy based decision-making process. Figure 1. Classification of Network Traffic (Packets) Today, there are two prominent types of classification capability available in the networks: stateful and stateless. Stateful classification depends predominantly on packet pattern matching and decoding of the underlying protocols and their states throughout their evolution. Some protocols are spawned on pre-defined port numbers, also known as well-know ports numbers. Some other protocols 86 IIC-China/ESC-China 2002 Conference Proceedings
2 are spawned on dynamically negotiated port numbers based on resource availability. These dynamically negotiated protocols are spawned on dynamically assigned port numbers, also known as ephemeral port numbers. Stateful classifiers track the dynamic negotiations and hence have the ability to predict and decode traffic spawned on ephemeral ports. Today, most of the classification of network traffic is based on packet pattern-matching and 4-tuple look-up. This kind of analysis does not classify traffic based on underlying protocols and its states, and hence, it is referred to as stateless classification. Stateless classification is parsing of individual packets without any context preservation to any related stream of packets/flows/sessions/protocols/applications. Further, this kind of classification does not have the capability to anticipate or track flow relationships on flow/sessions spawned on dynamically assigned (ephemeral) ports, ultimately making stateless classification not an applicationaware or true (OSI) layer-7 classification solution. This form of classification is based on individual packet inspection only i.e. 4/5-tuple look for source/destination IP addresses and TCP port numbers (first two fields of the packet as show in Figure 1). Stateless classification solutions are also referred to as packet classifiers. Today, there are numerous IC based packet classification solutions available, and are widely deployed in core routing based policy applications. Stateful classification is not only a parsing function but also a detailed analysis of complete data streams (or related packets), or flows, or sessions, breaking them into their constituent components with full association to end-applications, which may consist of one or more inter-related protocols. Some of these inter-related protocols can also be spawned on ephemeral ports. A stateful classifier preserves context of the relationships and has the ability to anticipate dynamically assigned port numbers. This capability coupled with the ability to decode protocols makes this kind of solution application-aware. Stateful classification, on some packets, may require a thorough and detailed analysis of the entire packet (packet header and payload as show in Figure 1). Stateful classification solutions are also referred to as flow classifiers. Ideal flow classification based policy engine applications include firewalls (including intrusion detection, denial of service attacks and other attacks), security, NAT/PAT transforms, QoS (access edge of the internet for Class of Service), bandwidth management, load balancing, billing, metering and monitoring. Benefits of stateful classification over stateless classification Analyzing network traffic at layer-3 (of the OSI model) with embedded protocol decoding intelligence enables true layer-7/end-application aware policies. This feature is the single largest benefit of stateful classification. This benefit is best demonstrated using an example of a complex, multimedia protocol H.323 (a relational protocol with sub-protocols). Figure 2 depicts a tree of network protocols that are spawned as sub-protocols in a typical H.323 protocol session. Further, this figure also illustrates stateless/packet classifier s and stateful/flow classifier s analysis capability over a H.323 protocol session. H.323 spawns two TCP (Transmission Control Protocol) connections, one for call setup (Q.931) and other for call configuration (H.245). Then at least eight UDP (User Datagram Protocol) streams are spawned for audio and video transmission. H.323-H.245 (call control protocol) sets up various audio and video related RTP (Real-time Transport Protocol) and RTCP (RTP Control Protocol) streams. Although the RTP streams are spawned by a parent protocol (like H.323-H.245) they do not contain any information that Figure 2. Benefits of Stateful Classification over Stateless Classification IIC-China/ESC-China 2002 Conference Proceedings 87
3 relates them to the applications that spawned them. The ephemeral TCP and UDP ports are negotiated by parent flows: H.323-Q.931 is the parent of H.323-H.245, and H.323-H.245 is the parent of RTCP/RTP ( connectionless ) streams. Stateless (or Packet) classifiers can relate to protocols spawned on well-known ports only like H.323-Q.931 (on port#1720). Although all the RTCP and RTP streams are negotiated by Q.931, packet classifiers are unable to relate them the parent protocol. Hence, all the subsequent audio and video streams are unaccounted for in light of the endapplication. On the other hand, stateful (or flow) classifiers start analyzing packets at the beginning of the flow (H.323-Q.931). Further, flow classifiers maintain flow entries in a flow database to track and analyze the relationships of the evolving dynamic flow (spawned on ephemeral ports) empowering the policy engine to relate every packet (even on an associated connectionless RTP streams like audio and video) to the end-application. All relationships are preserved as hierarchical/parent-child relationships. In this example, every audio and video packet would be related to H.323-Q.931, which may be spawned by streaming media applications like NetMeeting, MSMedia, Real Player, and other Web multi-media applications. This ability of flow classifiers aids network infrastructure in providing intelligent policy, routing, queuing, firewall and security services related decisions based on deeper understanding of network traffic applications. An Example of a Flow Classifier Figure 3 indicates a high-level block diagram of Hifn s MeterFlow Accelerator (MFA) - a flow classifier. A flow classifier like MFA would identify/parse, and then analyze, all packets on the network connection. Packets are queued on a packet input queue. MFA first identifies the flow associated with each packet, and then builds a flow entry in the flow database for every new flow that is analyzed. MFA dynamically updates the flow entries upon performing stateful classification on packets in the associated flows as more packets are received and the protocol on the connection evolves. Flow entries also reflect hierarchical relationships between one or more related flows, flows and related protocols, one or more protocols, and protocols related to (layer-7 OSI model) applications. MFA then stores it in local SDRAM memory. Protocol/application specific decoding micro-code is embedded in the MFA. This enables MFA to decode and track the state of the protocol or the application as it evolves. Hifn s Protocol Definition Language (PDL) not only provides most of the widely deployed protocols and applications decoding engines, but also provides the flexibility to extend the protocol/application coverage to incorporate proprietary and newer protocols/applications. For every packet received, MFA outputs a packet result on the packet result queue, which identifies the flow entry ID, application protocol, and state of the protocol. This packet result is used for applications that need to make a policy decision (or packet modification, marking, deny/permit decision) on every packet in policy applications such as Figure 3. MeterFlow Accelerator (MFA) Device firewalls, DiffServ and MPLS edge routers, load balancers, etc. The policy-engine application will utilize MFA s application-aware results to perform a look-up in its database in order to arrive at a policy for the packet under scrutiny. Periodically, MFA outputs a flow report on the flow report bus, identifying the state of the flow and all child flows associated with the parent flow. The flow report is used for metering applications, such as bandwidth management, billing applications, SLA (service level agreement) validation/ verification etc. The metering applications may use the flow reports to measure usage and/or time, as well as bandwidth, jitter, and latency QoS characteristics of the connection, and may send notices based on the state of the flow. Additionally, the host sub-system may asynchronously request the current state of a flow entry in the flow database. These requests are made on the run-time control queue, and the response is output on the flow report queue. The run-time control queue is also used for MFA system configuration. Application Example: Stateful & Stateless Classification based Firewall To further illustrate the benefits of a stateful/flow classifier over a stateless/packet classifier, lets look at it running in a firewall implementation, (Below is a snapshot of H.323 rules in a firewall Access Control List). Assume this ACL snapshot is for an internal system InternalSystem#1, H.323 related traffic is bi-directional (i.e. InternalSystem#1 can communicate with any system outside the protected network, while any protected outside system can only respond to call initiated by InternalSystem#1). Stateless/Packet Classification based Firewall Since packet classifiers classify packets predominantly based on IP and TCP headers, the scope of ACL rules is limited to IP (source and destination) addresses and TCP (source and destination) port numbers. Table 1 illustrates a packet classifier (IP and TCP headers) based ACL. Rules can be compartmentalized into two major sections, i.e. one for outbound traffic and other for inbound traffic. Associated InternalSystem#1 IP address and destination port number tracks outbound H.323-Q.931 protocol packets. Q.931 spawns on a well-known port number (1720). Subsequent child flows (or sub-protocols) are spawned on 88 IIC-China/ESC-China 2002 Conference Proceedings
4 Table 1. Firewall ACL (H.323 snapshot) based on a Stateless/Packet Classifier dynamically allocated (ephemeral) ports. Usually, ephemeral port numbers are 1024 and higher. Hence, any and every UDP or RTP or TCP related packets that have a destination port number of 1024 and higher would also suffice rule#2. This creates a hole in the firewall as non-h.323 related audio or video stream would also be permitted by the firewall. Similarly, on the inbound section of the ACL, any UDP, RTP, or TCP related traffic would require permission by the firewall to enable response traffic to an outbound call set up. This in turn leaves an open hole for any audio or video stream, enabling not only various attacks like DoS (Denial of Service), Syn-flooding etc. but also unwarranted inbound UDP or RTP or TCP packets. Hence, Table 1 clearly demonstrates some of the shortcomings of a packet classifier based firewall. Stateful/Flow Classification based Firewall A flow classifier based firewall ACL would comprise of rules that would track protocols and applications. Protocols/applications that get spawned on well-known ports are easily identified. Protocols/applications that get spawned on IIC-China/ESC-China 2002 Conference Proceedings 89
5 dynamically assigned (ephemeral) ports would be tracked by their hierarchical/parent-child relationships. Table 2 illustrates a snapshot of an H.323 protocol based rule set for the same example as in the prior section. Outbound H.323-Q.931 protocol related packets are easy to identify as Q.931 spawns on a well-known port number (1720). Any and every dynamically assigned (ephemeral) port number based protocols that get spawned by Q.931 (e.g. H.323- RTCP and H.323-RTP) would bear a parent-child relationship. Hence, RTP traffic that is not related to Q.931 would not have a parent-child identifier linking it to the parent protocol Q.931. Further, protocol based condition-checking fills the holes that would be otherwise un-filled by a packet classifier. Similarly, for the inbound traffic rules, clear relationships to the outbound traffic will be preserved via tracking of states of the protocol. Hence, no new inbound flows or packets without any relationship (ultimately) with outbound H.323-Q.931 set up will be permitted through the firewall. Again, this level of condition checking fills the holes that would be otherwise not filled by a packet classifier. This implementation is simpler compared to in-line mode implementation of the flow classifier. Also, this implementation relies on a sophisticated policy engine like an NP, and such flow classification implementations are not deemed as high-performance as what an in-line mode implementation would be. Flow Classifier in In-line Mode When stateful classification is required to perform on every packet that arrives into the network, and the performance of classification is significant to the overall system performance, then a flow classifier should be implemented in in-line mode. Figure 5 illustrates an in-line mode of a flow classifier. Hardware implementation examples of a policy system A stateful classification based policy system consists of a policy decision engine, typically a Network Processor (NP) or a custom implementation of a similar function (in an ASIC), policy rules database (SRAM), a command CPU (a general purpose processor), and a flow classification engine (that analyzes the traffic to empower the policy decision engine with reliable intelligence). These individual functions can be assembled in different flow classifier based configurations, two of which are more prominent i.e. Coprocessor mode, or In-line mode. Flow classifier in co-processor model In this configuration, as shown in Figure 4, a flow classifier is not in the fast (data) path. The flow classifier depends on the policy engine (NP or ASIC) to route packets to it. Upon receiving packets from the NP or ASIC, the flow classifier presents the NP or ASIC with appropriate classification results. The NP or ASIC makes the decision based on the policy rules associated with underlying protocol/application, and ultimately performs an action. The NP or ASIC accordingly marks (for QoS, traffic shaping like applications), modifies (security, NAT/PAT like applications), routes (for load balancing, switching like applications), or denies/permits (for firewall like applications) packets. Figure 5. Flow Classifier in In-line mode Packets from the back plane (MAC- Media Access Control interface) would be sent directly to the flow classifier and the NP (or a FIFO, if NP does not have the capacity to buffer packets while packets are classified). The flow classifier performs at line-rate and presents results to the NP to make the policy related decision. Policy rules may be stored in the system memory. NP also interfaces to the back plane for redirecting policy-enforced packets. In-line mode implementations are significantly complex compared to a co-processor mode implementation. A significant advantage of a flow classification based implementation is that a policy engine may not have to hash the policy rule database on all packets if a classifier (through its packet-flow association) can present the policy engine with action handles based on prior packets in the same flow. This capability enhances overall system performance. Conclusion Stateful/flow classification is quickly becoming a necessity for IP service providers to implement intelligent network service platforms comprising of services like QoS, security, firewalls, bandwidth management, monitoring, metering, billing etc. It is becoming more apparent that stateful classification is more complex than stateless classification. Implementing a flow classification solution otherwise (i.e. with a stateless/packet classifier IC and/or combination of other processing ICs and software) has significant drawbacks on power consumption, system costs and form factor fronts. The need for a line rate performance implementation of services translates into an absolute necessity to implement flow classification in a single-chip. Figure 4. Flow Classifier in a Co-processor mode 90 IIC-China/ESC-China 2002 Conference Proceedings
6 About the author Rahul Patel Hifn, Inc. 750 University Avenue, Los Gatos, CA USA Phone: (+1-408) Fax: (+1-408) Rahul Patel, Business Line Manager, is responsible for Hifn s application-classification line of products. Previously, he was the Senior Marketing Manager for Samsung Semiconductor. Prior to Samsung, Mr. Patel was a Strategic Marketing Engineer for Epson Electronics America. Starting as a Senior ASIC-CAD Engineer for Epson, he was awarded numerous Outstanding Achievements awards. Mr. Patel holds a BS in Electronics & Communication Engineering from Regional Engineering College, Warangal, India, a MS in Computer Science from Arizona State University, and a MBA from Santa Clara University. Mr. Patel has written numerous articles in various industry publications and has also spoken at industry conferences in the past. IIC-China/ESC-China 2002 Conference Proceedings 91
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Internet Quality of Service
Internet Quality of Service Weibin Zhao [email protected] 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
The need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
Certes Networks Layer 4 Encryption. Network Services Impact Test Results
Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE
CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service
How Network Transparency Affects Application Acceleration Deployment
How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Polycom. RealPresence Ready Firewall Traversal Tips
Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you
Distributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary
Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
Software Datapath Acceleration for Stateless Packet Processing
June 22, 2010 Software Datapath Acceleration for Stateless Packet Processing FTF-NET-F0817 Ravi Malhotra Software Architect Reg. U.S. Pat. & Tm. Off. BeeKit, BeeStack, CoreNet, the Energy Efficient Solutions
18: Enhanced Quality of Service
18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions
1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are
A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
FIREWALLS IN NETWORK SECURITY
FIREWALLS IN NETWORK SECURITY A firewall in an information security program is similar to a building s firewall in that it prevents specific types of information from moving between the outside world,
Definition of a White Box. Benefits of White Boxes
Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies [email protected] Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
The Basics. Configuring Campus Switches to Support Voice
Configuring Campus Switches to Support Voice BCMSN Module 7 1 The Basics VoIP is a technology that digitizes sound, divides that sound into packets, and transmits those packets over an IP network. VoIP
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage
Lecture 16: Quality of Service CSE 123: Computer Networks Stefan Savage Final Next week (trust Blink wrt time/location) Will cover entire class Style similar to midterm I ll post a sample (i.e. old) final
CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding
CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell [email protected] our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
WAN Optimization in MPLS Networks- the Transparency Challenge!
DATE OF ISSUE May 2005 AUTHOR Efi Gat mor 103 Eisenhower Parkway Roseland, NJ 07068 USA TEL +1.888.892.1250 +1.973.618.9000 FAX +1.973.618.9254 www.expand.com WAN Optimization in MPLS Networks- the Transparency
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
Are Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services [email protected] Firewall Overview Firewalls provide
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
IVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
CompTIA Convergence+ 2006 Examination Objectives
CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
WhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Ethernet Fabric Requirements for FCoE in the Data Center
Ethernet Fabric Requirements for FCoE in the Data Center Gary Lee Director of Product Marketing [email protected] February 2010 1 FCoE Market Overview FC networks are relatively high cost solutions
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking NEC SV8100 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches
6 Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches Contents Introduction................................................... 6-3 Terminology................................................
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Radware s Multi-homing Solutions
Radware s Multi-homing Solutions White Paper May 5, 2003 North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg St Tel Aviv
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
Quality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Successful IP Video Conferencing White Paper
Successful IP Video Conferencing White Paper The success of an IP video conference is dependent on two things: connection to the remote system and consistent bandwidth during a call. Connection to a system
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71
Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP,
Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks
Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Huawei Technologies Co., Ltd. All rights reserved. Contents Contents 1 Overview... 1 2 H.323...
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:
Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1
Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Who am I? David Attias Installing VoIP systems for over 7 years Mikrotik user for 5 years Mikrotik certifications MTCNA, MTCRE
EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking NEC SV8300 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 May 18, 2012 CHANGE HISTORY Version Date Change Details Changed By 1.0 5/18/2012
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Hands on VoIP. Content. Tel +44 (0) 845 057 0176 [email protected]. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
