ns-3 Direct Code Execution Lacage (INRIA) ns-3 DCE GEC9 1 / 14

Size: px
Start display at page:

Download "ns-3 Direct Code Execution Lacage (INRIA) ns-3 DCE GEC9 1 / 14"

Transcription

1 ns-3 Direct Code Execution Lacage (INRIA) ns-3 DCE GEC9 1 / 14

2 Objective Scenario Lacage (INRIA) ns-3 DCE GEC9 2 / 14

3 Objective Scenario VLC Server Wifi STA Router Router Wifi AP VLC Client Lacage (INRIA) ns-3 DCE GEC9 2 / 14

4 Goals Study the impact of wifi routing on video stream quality Lacage (INRIA) ns-3 DCE GEC9 3 / 14

5 Goals Study the impact of wifi routing on video stream quality Develop new wifi adhoc routing protocols Lacage (INRIA) ns-3 DCE GEC9 3 / 14

6 Problem Need simulations: Reproducibility Debuggability Testability Lacage (INRIA) ns-3 DCE GEC9 4 / 14

7 Problem Need simulations: Reproducibility Debuggability Testability Need real-world experiments: Wireless medium realism Lacage (INRIA) ns-3 DCE GEC9 4 / 14

8 Problem Need simulations: Reproducibility Debuggability Testability Need real-world experiments: Wireless medium realism BUT: Must maintain two implementations Lacage (INRIA) ns-3 DCE GEC9 4 / 14

9 Manual Modifications Convert global variables in arrays Lacage (INRIA) ns-3 DCE GEC9 5 / 14

10 Manual Modifications Convert global variables in arrays Convert system calls in simulation calls Lacage (INRIA) ns-3 DCE GEC9 5 / 14

11 Manual Modifications Convert global variables in arrays Convert system calls in simulation calls BUT, does not scale: Painful to do once Impossible to do for software updates Lacage (INRIA) ns-3 DCE GEC9 5 / 14

12 Manual Modifications Convert global variables in arrays Convert system calls in simulation calls BUT, does not scale: Painful to do once Impossible to do for software updates The solution: Direct Code Execution Automate global variable virtualization Automate system call redirection Provide simulation system call replacements Lacage (INRIA) ns-3 DCE GEC9 5 / 14

13 Related Work Network Simulation Cradle: Automated source modifications for C code Hard to extend to C++ Lacage (INRIA) ns-3 DCE GEC9 6 / 14

14 Related Work Network Simulation Cradle: Automated source modifications for C code Hard to extend to C++ Weaves: Automated textual assembly modifications Does not work in practice Lacage (INRIA) ns-3 DCE GEC9 6 / 14

15 Related Work Network Simulation Cradle: Automated source modifications for C code Hard to extend to C++ Weaves: Automated textual assembly modifications Does not work in practice COOJA: Automated memory virtualization Slow Lacage (INRIA) ns-3 DCE GEC9 6 / 14

16 ns-3 DCE Adhoc ELF Loader: Fast Automated memory virtualization Automated system call redirection Lacage (INRIA) ns-3 DCE GEC9 7 / 14

17 ns-3 DCE Adhoc ELF Loader: Fast Automated memory virtualization Automated system call redirection Userspace system calls Lacage (INRIA) ns-3 DCE GEC9 7 / 14

18 ns-3 DCE Adhoc ELF Loader: Fast Automated memory virtualization Automated system call redirection Userspace system calls Kernelspace system calls Lacage (INRIA) ns-3 DCE GEC9 7 / 14

19 Loader Performance Scenario: udp-perf userspace DCE Linux UDP/IP Linux UDP/IP udp-perf userspace DCE Linux UDP/IP kernelspace DCE kernelspace DCE kernelspace DCE PointToPointLink PointToPointLink Lacage (INRIA) ns-3 DCE GEC9 8 / 14

20 Loader Performance Average packets per wall clock second Number of nodes Cooja dlmopen Lacage (INRIA) ns-3 DCE GEC9 9 / 14

21 Loader Performance Average memory usage (KB) Cooja dlmopen Number of nodes Lacage (INRIA) ns-3 DCE GEC9 10 / 14

22 System Performance Average packets per wall clock second 1e dce-none dce-user dce-user+kernel Number of nodes Lacage (INRIA) ns-3 DCE GEC9 11 / 14

23 System Performance Average memory usage (KB) dce-none dce-user dce-user+kernel Number of nodes Lacage (INRIA) ns-3 DCE GEC9 12 / 14

24 Conclusion Reuse existing protocol implementations: Userspace: ping, traceroute, quagga, etc. Kernelspace: IP, TCP, etc. Lacage (INRIA) ns-3 DCE GEC9 13 / 14

25 Conclusion Reuse existing protocol implementations: Userspace: ping, traceroute, quagga, etc. Kernelspace: IP, TCP, etc. Debugging platform: Single debugger controls all protocol instances Lacage (INRIA) ns-3 DCE GEC9 13 / 14

26 Conclusion Reuse existing protocol implementations: Userspace: ping, traceroute, quagga, etc. Kernelspace: IP, TCP, etc. Debugging platform: Single debugger controls all protocol instances Development platform Lacage (INRIA) ns-3 DCE GEC9 13 / 14

27 Conclusion Reuse existing protocol implementations: Userspace: ping, traceroute, quagga, etc. Kernelspace: IP, TCP, etc. Debugging platform: Single debugger controls all protocol instances Development platform Test platform Lacage (INRIA) ns-3 DCE GEC9 13 / 14

28 Future Work Improve userspace API coverage: fork, wait, exec Add X11 connection forwarding More testing Documentation Write paper Lacage (INRIA) ns-3 DCE GEC9 14 / 14

ns-3 Direct Code Execution (DCE) ns-3 Annual Meeting June 2018 ns-3 training, June

ns-3 Direct Code Execution (DCE) ns-3 Annual Meeting June 2018 ns-3 training, June ns-3 Direct Code Execution (DCE) ns-3 Annual Meeting June 2018 1 Outline DCE Introduction Download and Installation of DCE with Bake DCE examples with custom application: iperf ping Q&A 2 Credits DCE originated

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Session 4. DCE 를활용한실제 시스템과 NS-3 연동. 이규진 Multimedia & Wireless Networking Laboratory, SNU

Session 4. DCE 를활용한실제 시스템과 NS-3 연동. 이규진 Multimedia & Wireless Networking Laboratory, SNU Session 4. DCE 를활용한실제 시스템과 NS-3 연동 이규진 Multimedia & Wireless Networking Laboratory, SNU gjlee@mwnl.snu.ac.kr 1 Overview 2 NS-3 DCE DCE (Direct Code Execution) A framework provides facilities to execute

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

Efficient and Large Scale Program Flow Tracing in Linux. Alexander Shishkin, Intel

Efficient and Large Scale Program Flow Tracing in Linux. Alexander Shishkin, Intel Efficient and Large Scale Program Flow Tracing in Linux Alexander Shishkin, Intel 16.09.2013 Overview Program flow tracing - What is it? - What is it good for? Intel Processor Trace - Features / capabilities

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

SCHOOL OF INFORMATION, COMPUTER AND COMMUNICATION TECHNOLOGY SIRINDHORN INTERNATIONAL INSTITUTE OF TECHNOLOGY THAMMASAT UNIVERSITY ASSIGNMENT REPORT

SCHOOL OF INFORMATION, COMPUTER AND COMMUNICATION TECHNOLOGY SIRINDHORN INTERNATIONAL INSTITUTE OF TECHNOLOGY THAMMASAT UNIVERSITY ASSIGNMENT REPORT ! SCHOOL OF INFORMATION, COMPUTER AND COMMUNICATION TECHNOLOGY SIRINDHORN INTERNATIONAL INSTITUTE OF TECHNOLOGY THAMMASAT UNIVERSITY ASSIGNMENT REPORT CSS331 Fundamentals of Data Communication Experiment

More information

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing 521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service

More information

COMS Introduction to Computers. Networking

COMS Introduction to Computers. Networking COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:

More information

ETSF10 Internet Protocols Network Layer Protocols

ETSF10 Internet Protocols Network Layer Protocols ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4

More information

Chapter 4 Advanced Settings and Features

Chapter 4 Advanced Settings and Features Chapter 4 Advanced Settings and Features This chapter describes the features you can configure or view under Advanced in the main menu of your WiFi range extender. Advanced Wireless Settings Note: The

More information

Network Emulation in the NS Simulator. Kishore Ramachandran

Network Emulation in the NS Simulator. Kishore Ramachandran Network Emulation in the NS Simulator. Kishore Ramachandran Emulation the why and the how. Motivation (Why?) Simulations make simplifying assumptions. Results not always basis for real-world deployment.

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

WiFi Center s Trouble shooting

WiFi Center s Trouble shooting WiFi Center s Trouble shooting This document intends to: Show different network setups and their strength and weaknesses Explain how to solve common problems Preferable this document should be read in

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

Network Forensics (wireshark) Cybersecurity HS Summer Camp

Network Forensics (wireshark) Cybersecurity HS Summer Camp Network Forensics (wireshark) Cybersecurity HS Summer Camp Packet Sniffer a packet sniffer captures ( sniffs ) messages being sent/received from/by your computer; it will also typically store and/or display

More information

M2M CDMA Router. Watchdogs Whitepaper

M2M CDMA Router. Watchdogs Whitepaper M2M CDMA Router Watchdogs Whitepaper Copyright Copyright 2013 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part of this document

More information

ns-3 Training Session 8: Monday 3:30pm ns-3 Annual Meeting May 2014

ns-3 Training Session 8: Monday 3:30pm ns-3 Annual Meeting May 2014 ns-3 Training Session 8: Monday 3:30pm ns-3 Annual Meeting 1 NS-3 Annual Meeting Outline Emulation modes Tap Bridge FdNetDevice Direct Code Execution (DCE) Applications Linux Kernel DCE Cradle NS-3 Annual

More information

Distributed Systems Exam 1 Review Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems Exam 1 Review Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 2015 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 1 Question 1 Why did the use of reference counting for remote objects prove to be impractical? Explain. It s not fault

More information

How to setup CV-7428nS Wi-Fi Ethernet Bridge on a Windows PC

How to setup CV-7428nS Wi-Fi Ethernet Bridge on a Windows PC How to setup CV-7428nS Wi-Fi Ethernet Bridge on a Windows PC CV-7428nS is a WiFi bridge which catches your home network s WiFi signal and converts it to Ethernet ports. Plug your Ethernet devices like

More information

GreenEye Monitor. GEM Communication Setup Manual. For GEM model: GEM-W. (Wifi Only Option)

GreenEye Monitor. GEM Communication Setup Manual. For GEM model: GEM-W. (Wifi Only Option) GreenEye Monitor GEM Communication Setup Manual For GEM model: GEM-W (Wifi Only Option) Document Code: COM-W Ver 1.7 2013-10-23 Copyright Brultech Research Inc. 2013 Introduction CONTENTS 1 Introduction...

More information

IKR SimLib-QEMU: TCP Simulations Integrating Virtual Machines

IKR SimLib-QEMU: TCP Simulations Integrating Virtual Machines IKR SimLib-QEMU: TCP Simulations Integrating Virtual Machines ICCRG 87. IETF Berlin July 31, 2013 Thomas Werthmann Mirja Kühlewind

More information

Configuring Routes on the ACE

Configuring Routes on the ACE CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up

More information

A5500 Configuration Guide

A5500 Configuration Guide A5500 Configuration Guide Sri Ram Kishore February 2012 Table of contents Gateway Configuration... 3 Accessing your gateway configuration tool... 3 Configuring your broadband Internet access... 3 Configuring

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

6. Correspondence relationship between Educational goals and Course goals

6. Correspondence relationship between Educational goals and Course goals 1. Course Title (Course Code) Fundamentals of Information Networks (2201) 2. Instructor Teruaki YOKOYAMA 3. Term Fall 2 4. Outline and Objectives In this course the students study the technologies for

More information

Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping

Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping Martin Serror, Jörg Christian Kirchhof, Mirko Stoffers, Klaus Wehrle, James Gross Communication and Distributed Systems,

More information

CSE 461 Module 10. Introduction to the Transport Layer

CSE 461 Module 10. Introduction to the Transport Layer CSE 461 Module 10 Introduction to the Transport Layer Last Time We finished up the Network layer Internetworks (IP) Routing (DV/RIP, LS/OSPF, BGP) It was all about routing: how to provide end-to-end delivery

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

SOLVING ANDROID IPTV VIDEO STREAMING ISSUES

SOLVING ANDROID IPTV VIDEO STREAMING ISSUES 1 2 3 SOLVING ANDROID IPTV VIDEO STREAMING ISSUES 1-2-3 with Globeron 26 Sep 2017 DISCLAIMER Wi-Fi professionals use enterprise level tools, but these can be quite expensive for persons who want to troubleshoot

More information

Troubleshooting Network analysis Software communication tests and development Education. Protocols used for communication (10 seconds capture)

Troubleshooting Network analysis Software communication tests and development Education. Protocols used for communication (10 seconds capture) Lab 1 Wireshark Wireshark is an open source and free packet analyser used for many purposes, such as: Troubleshooting Network analysis Software communication tests and development Education This reports

More information

bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651

bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651 bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651 Bitcoin distributed, reliable ("hard to falsify") time-stamping network each time-stamp record

More information

WalT: testing sensor networks and distributed environments

WalT: testing sensor networks and distributed environments WalT: testing sensor networks and distributed environments E. Dublé, F. Rousseau, J. Baranguán, J. Zeni, I. Juc, P.-H. Frohring, B. Faure April 7, 2014 LIG / DRAKKAR 1 / 18 The problem Contents 1 The problem

More information

Using NAT in Overlapping Networks

Using NAT in Overlapping Networks Using NAT in Overlapping Networks Document ID: 13774 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Related Information

More information

Table of Contents. Cisco NAT Order of Operation

Table of Contents. Cisco NAT Order of Operation Table of Contents NAT Order of Operation...1 Document ID: 6209...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 NAT Overview...1 NAT Configuration and Output...2

More information

Network Defenses 21 JANUARY KAMI VANIEA 1

Network Defenses 21 JANUARY KAMI VANIEA 1 Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 First, the news The Great Cannon of China https://citizenlab.org/2015/04/chinas-great-cannon/ KAMI VANIEA 2 Today Open System Interconnect (OSI) model

More information

ns-3 Project Plan June 24, NSF CRI-PI Meeting 2006 NSF CRI-PI Meeting 1

ns-3 Project Plan June 24, NSF CRI-PI Meeting 2006 NSF CRI-PI Meeting 1 ns-3 Project Plan Tom Henderson and Sumit Roy, University of Washington Sally Floyd, ICSI Center for Internet Research George Riley, Georgia Institute of Technology June 24, 2006 2006 NSF CRI-PI Meeting

More information

User Manual. ESP8266 Wifi Shield

User Manual. ESP8266 Wifi Shield User Manual Of ESP8266 Wifi Shield Description The shield is designed based on esp8266 by Espressif Systems, pin-compatible with Arduino UNO/Mega2560 DevBorad. Which can be used as two independent part,

More information

LibOS as a regression test framework for Linux networking

LibOS as a regression test framework for Linux networking LibOS as a regression test framework for Linux networking Hajime Tazaki 2016/02/12 netdev 1.2 outline libos introduction testing framework introduction case studies QA what is LibOS? Library version of

More information

Automating ns-3 Experimentation in Multi-Host Scenarios

Automating ns-3 Experimentation in Multi-Host Scenarios Automating ns-3 Experimentation in Multi- Scenarios Alina Quereilhac, Damien Saucez, Thierry Turletti, Walid Dabbous To cite this version: Alina Quereilhac, Damien Saucez, Thierry Turletti, Walid Dabbous.

More information

Prototyping and Evaluation of Mobility First Architecture

Prototyping and Evaluation of Mobility First Architecture Prototyping and Evaluation of Mobility First Architecture Kiran Nagaraja, Ivan Seskar Rutgers, The State University of New Jersey Contact: nkiran (at) winlab (dot) rutgers (dot) edu NSF FIA MobilityFirst

More information

Network Defenses KAMI VANIEA 1

Network Defenses KAMI VANIEA 1 Network Defenses KAMI VANIEA 26 SEPTEMBER 2017 KAMI VANIEA 1 First the news http://arstech nica.com/secu rity/2015/04/ meet-greatcannon-theman-in-themiddleweapon-chinaused-ongithub/ 2 First the news http://arstechni

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated

More information

Lab 8.5.2b NAT: Dynamic Translation with Multiple Pools Using Route Maps

Lab 8.5.2b NAT: Dynamic Translation with Multiple Pools Using Route Maps Lab 8.5.2b NAT: Dynamic Translation with Multiple Pools Using Route Maps Objective In this lab, dynamic Network Address Translation (NAT) will be configured with multiple pools using Route Maps. Scenario

More information

Static routing KTHNOC/SUNET. January 18, 2004

Static routing KTHNOC/SUNET. January 18, 2004 Static routing KTHNOC/SUNET January 18, 2004 The goal with this lab is to introduce you to configuring a Cisco router and your workstation. You will also learn how to set up the router for static routing.

More information

User Manual V1.1 Date: WiFi RS-232 Adapter. Red LED: IP Address Blue LED: TX/RX 5V Out (Pin 9)

User Manual V1.1 Date: WiFi RS-232 Adapter. Red LED: IP Address Blue LED: TX/RX 5V Out (Pin 9) 1. Package Contents: WiFi RS-232 adapter x 1 Battery power line with connector x 1 User manual x 1 USB Cable x 1 2 dbi Dipole Antenna x 1 WiFi RS-232 Adapter White box: Dimension: 10 x 5.5 x 5 (cm) Weight:

More information

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

Mobile Operating Systems Lesson 04 PalmOS Part 2

Mobile Operating Systems Lesson 04 PalmOS Part 2 Mobile Operating Systems Lesson 04 PalmOS Part 2 Oxford University Press 2007. All rights reserved. 1 PalmOS Memory Support Assumes that there is a 256 MB memory card(s) The card RAM, ROM, and flash memories

More information

Configuring the IP Settings

Configuring the IP Settings This section describes how to set up and configure the Management, DATA1, and DATA2 ports for the D9800 Network Transport Receiver. Setting up the IP Information, page 1 Setting up the Unicast Routing

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Table of Contents 1 System Maintaining and Debugging 1-1

Table of Contents 1 System Maintaining and Debugging 1-1 Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4

More information

Configuring IP SLAs ICMP Echo Operations

Configuring IP SLAs ICMP Echo Operations This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices

More information

2-Days Workshop on Simulation of TCP Variants using NS-3

2-Days Workshop on Simulation of TCP Variants using NS-3 2-Days Workshop on Simulation of TCP Variants using NS-3 jointly organized by Poornima University, Jaipur & IIIT-Kota(Mentored by MNIT,Jaipiur) Rahul Hada rahul.hada@poornima.edu.in Ashutosh Kumar ashutosh.kumar@poornima.edu.in

More information

HD CLOCK Camera TP-CH0136 User Manual

HD CLOCK Camera TP-CH0136 User Manual HD CLOCK Camera TP-CH0136 User Manual APP : P2PCAMM Please pull out the battery insulator for first use!!! Contents 1:1-9 English specifications Sketch Map of Product 1 (3-1) (3-2) (3-3) instructions Figure:(3-1)(3-2)(3-3)

More information

ECE 498 Linux Assembly Language Lecture 1

ECE 498 Linux Assembly Language Lecture 1 ECE 498 Linux Assembly Language Lecture 1 Vince Weaver http://www.eece.maine.edu/ vweaver vincent.weaver@maine.edu 13 November 2012 Assembly Language: What s it good for? Understanding at a low-level what

More information

SCTP: A new networking protocol for super-computing. Mohammed Atiquzzaman Shaojian Fu Department of Computer Science University of Oklahoma.

SCTP: A new networking protocol for super-computing. Mohammed Atiquzzaman Shaojian Fu Department of Computer Science University of Oklahoma. SCTP: A new networking protocol for super-computing Mohammed Atiquzzaman Shaojian Fu Department of Computer Science University of Oklahoma. atiq@ou ou.edu Networking Characteristics in Supercomputing High

More information

Network Defenses 21 JANUARY KAMI VANIEA 1

Network Defenses 21 JANUARY KAMI VANIEA 1 Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 Similar statements are found in most content hosting website privacy policies. What is it about how the internet works that makes this statement necessary

More information

USR-W600 User Manual. File Version: V Jinan USR IOT Technology Limited 1

USR-W600 User Manual. File Version: V Jinan USR IOT Technology Limited 1 USR-W600 User Manual File Version: V1.0.6.01 1 Contents USR-W600 User Manual... 1 Features... 3 1.Get Start...4 1.1.Application Diagram... 4 2.Product Functions...5 2.1.WIFI mode... 5 2.1.1.STA mode...5

More information

Quality of Service Setup Guide (NB14 Series)

Quality of Service Setup Guide (NB14 Series) Quality of Service Setup Guide (NB14 Series) About This Quality of Service (QoS) Guide Quality of Service refers to the reservation of bandwidth resources on the Nb14 Series router to provide different

More information

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation

More information

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128

More information

Application Example (Standalone EAP)

Application Example (Standalone EAP) Application Example (Standalone EAP) CHAPTERS 1. Determine the Network Requirements 2. Build the Network Topology 3. Log In to the EAP 4. Configure the EAP 5. Test the Network This guide applies to: EAP225-Outdoor

More information

The Administration Tab - Diagnostics

The Administration Tab - Diagnostics The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.

More information

Step 2. Manual configuration of global unicast and link-local addresses

Step 2. Manual configuration of global unicast and link-local addresses Lab: ICMPv6 and ICMPv6 Neighbor Discovery CIS 116 IPv6 Fundamentals Enter your answers to the questions in this lab using Canvas Quiz DHCPv6 Lab. Part 1: Setup Step 1. Basics a. Log into NetLab: ccnp.bayict.cabrillo.edu

More information

Radio over IP. Network Troubleshooting. IWCE 2019 Las Vegas Convention Center Las Vegas, Nevada

Radio over IP. Network Troubleshooting. IWCE 2019 Las Vegas Convention Center Las Vegas, Nevada Radio over IP Network Troubleshooting IWCE 2019 Las Vegas Convention Center Las Vegas, Nevada www.adcommeng.com Demo Network Configuration Page 2 Demo Router Config - Dashboard Router login: adcomm Password:

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013 Final Examination: 14:00-18:00, Friday, November 1, 2013 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed notes,

More information

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status

More information

Reliable Stream Analysis on the Internet of Things

Reliable Stream Analysis on the Internet of Things Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live

More information

The Measurement Manager Modular End-to-End Measurement Services

The Measurement Manager Modular End-to-End Measurement Services The Measurement Manager Modular End-to-End Measurement Services Ph.D. Research Proposal Department of Electrical and Computer Engineering University of Maryland, College Park, MD Pavlos Papageorgiou pavlos@eng.umd.edu

More information

A Convergence Architecture for GRID Computing and Programmable Networks

A Convergence Architecture for GRID Computing and Programmable Networks A Convergence Architecture for GRID Computing and Programmable Networks Christian Bachmeir, Peter Tabery, Dimitar Marinov, Georgi Nachev, and Jörg Eberspächer Munich University of Technology, Institute

More information

Generation of Realistic Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements

Generation of Realistic Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements Generation of Realistic 802.11 Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements Juan-Carlos Maureira 1 and Diego Dujovne 2 and Olivier Dalle 1 1 INRIA, I3S, CNRS, Univ. Nice

More information

802.11n and g Performance Comparison in Office Size for FTP Transmission

802.11n and g Performance Comparison in Office Size for FTP Transmission 802.11n and 802.11g Performance Comparison in Office Size for FTP Transmission Group 6 Chase Wen 301094042 ywa56@sfu.ca Yuheng Lin 301114176 yuhengl@sfu.ca Roadmap Introduction WiFi and IEEE 802.11 standards

More information

sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi

sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi Titolo presentazione Piattaforme Software per la Rete sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17, Alessandro Barenghi Outline 1) Introduction and Netkit-NG 2) Link-Layer Management

More information

ECE 471 Embedded Systems Lecture 4

ECE 471 Embedded Systems Lecture 4 ECE 471 Embedded Systems Lecture 4 Vince Weaver http://www.eece.maine.edu/ vweaver vincent.weaver@maine.edu 12 September 2013 Announcements HW#1 will be posted later today For next class, at least skim

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Improve Performance of Kube-proxy and GTP-U using VPP

Improve Performance of Kube-proxy and GTP-U using VPP Improve Performance of Kube-proxy and GTP-U using VPP Hongjun Ni (hongjun.ni@intel.com) Danny Zhou (danny.zhou@intel.com) Johnson Li (johnson.li@intel.com) Network Platform Group, DCG, Intel Acknowledgement:

More information

Frame Relay IP RTP Priority

Frame Relay IP RTP Priority This feature module describes the feature. Finding Feature Information, page 1 Feature Overview, page 1 Supported Platforms, page 2 Supported Standards and MIBs and RFCs, page 3 Prerequisites, page 3 Configuration

More information

Wireless 300N Gigabit Gaming Router 2.4GHz Gigabit Ethernet / Stream Engine 11N 2x2 (300Mbps)

Wireless 300N Gigabit Gaming Router 2.4GHz Gigabit Ethernet / Stream Engine 11N 2x2 (300Mbps) Wireless 300N Gigabit Gaming Router ESR9855G 2.4GHz Gigabit Ethernet / Stream Engine 11N 2x2 (300Mbps) PRODUCT DESCRIPTION ESR9855G is a Media Enhanced 11N Gaming Router. ESR9855G supports home network

More information

Certified Cisco Networking Associate v1.1 ( )

Certified Cisco Networking Associate v1.1 ( ) Certified Cisco Networking Associate v1.1 (640-802) Exam Description: The Cisco Certified Networking Associate v1.1 640-802 is the composite exam that is associated with Cisco CCNA Routing and Switching

More information

Correlating Network Congestion with Video QoE Degradation - a Last-Mile Perspective

Correlating Network Congestion with Video QoE Degradation - a Last-Mile Perspective Correlating Congestion with Video QoE Degradation - a Last-Mile Perspective Francesco Bronzino, Paul Schmitt, Renata Teixeira, Nick Feamster, Srikanth Sundaresan AIMS 13 March 2018 Last-Mile Measurement:

More information

network security s642 computer security adam everspaugh

network security s642 computer security adam everspaugh network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic

More information

Interoperability and Security of TraSH: A Transport Layer Seamless Handover

Interoperability and Security of TraSH: A Transport Layer Seamless Handover Interoperability and Security of TraSH: A Transport Layer Seamless Handover Panel Session at 23 rd IEEE International Performance, Computing, and Communications Conference April 16, 2004 Dr. Mohammed Atiquzzaman

More information

CL020 - Advanced Linux and UNIX Programming

CL020 - Advanced Linux and UNIX Programming Corder Enterprises International Building World Class MIS Teams, for you! CL020 - Advanced Linux and UNIX Programming Course Description: In-depth training for software developers on Linux and UNIX system

More information

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 9: Network Basics J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science jddevaughn@cs.umass.edu 1 Last time Subversion control

More information

International Journal of Scientific Research and Modern Education (IJSRME) ISSN (Online): ( Volume I, Issue I,

International Journal of Scientific Research and Modern Education (IJSRME) ISSN (Online): (  Volume I, Issue I, EFFECTIVE LEARNING WITH USAGE OF SIMULATORS A CASE OF NCTUNS SIMULATOR IN COMPUTER NETWORKS Subrahmanya Bhat* & Dr. K. R. Kamath** * Department of Computer Application, Srinivas Institute of Management

More information

LECTURE WK4 NETWORKING

LECTURE WK4 NETWORKING LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,

More information