Before jumping into the exercises perhaps we should recall the FlowVisor API calls which can be reached by using the command fvctl as shown below:
|
|
- Lilian Wilkerson
- 5 years ago
- Views:
Transcription
1 Flowvisor Objective FlowVisor Recap. FlowVisor API listslices getsliceinfo <slicename> createslice <slicename> <controller_url> < > changeslice <slicename> <key> <value> deleteslice <slicename> changepasswd <slicename> listflowspace removeflowspace <ID> addflowspace <DPID> <PRIORITY> <FLOW_MATCH> <SLICEACTIONS> changeflowspace <ID> <DPID> <PRIORITY> <FLOW_MATCH> <SLICEACTIONS> FLOW_MATCH structure Slice Actions struct Topology (or port-based) Slicing Protocol based slicing Objective In this exercise you will learn how to manipulate FlowVisor. You will achieve this by creating different types of slicing. First, you will create topology based slicing. Then you will create protocol based slicing. In both cases some programs have been prepared to enable to verify whether your slicing is correct. Therefore it is essential that you do you exercise work in the FlowVisor directory which has been prepared. For example, for topology exercise, use the directory flowvisor/flowvisor-topo. Download the VM here. The username and password for the VM are both openflow. FlowVisor Recap. Before jumping into the exercises perhaps we should recall the FlowVisor API calls which can be reached by using the command fvctl as shown below: listslices FlowVisor API listslices Displays the currently configured slices.
2 getsliceinfo <slicename> Displays the slicename's controller URL, contact information, and who created this slice. createslice <slicename> <controller_url> < > Creates a new slice. Note that the slicename cannot contain any of the following characters:!:=[] or new lines. The controller URL is of the form tcp:hostname[:port] so " tcp:controller.myco.com" or " tcp: :12345", with the default port being The is used as the administrive contact point if there is a problem with the slice. changeslice <slicename> <key> <value> Allow a slice user to change values associated with their slice. Currently only "contact_ ", "controller_host" and "controller_port" are changable. deleteslice <slicename> Deletes a slice and removed all of the flowspace corresponding to the slice. changepasswd <slicename> Change the password for slice slicename. listflowspace Lists the FlowVisor's flow-based slice policy rules, i.e., the flowspace. removeflowspace <ID> Removes rule with id=id. addflowspace <DPID> <PRIORITY> <FLOW_MATCH> <SLICEACTIONS> Creates a new rule and returns the new rule's ID. See below for the format of DPID, FLOW_MATCH, and SLICEACTIONS. changeflowspace <ID> <DPID> <PRIORITY> <FLOW_MATCH> <SLICEACTIONS>
3 Replaces rule ID with a new rule with the specificed parameters. See below for the format of DPID, FLOW_MATCH, and SLICEACTIONS. FLOW_MATCH structure The following field assignments describe how a flow matches a packet. If any of these assignments is omitted from the flow syntax, the field is treated as a wildcard; thus, if all of them are omitted, the resulting flow matches all packets. The string all or any is used to specify a flow that matches all packets. in_port=port_no Matches physical port port_no. Switch ports are numbered as displayed by fvctl getdeviceinfo DPID. dl_vlan=vlan Matches IEEE 802.1q virtual LAN tag vlan. Specify 0xffff as vlan to match packets that are not tagged with a virtual LAN; otherwise, specify a number between 0 and 4095, inclusive, as the 12-bit VLAN ID to match. dl_src=mac Matches Ethernet source address mac, which should be specified as 6 pairs of hexadecimal digits delimited by colons, e.g. 00:0A:E4:25:6B:B0. dl_dst=mac Matches Ethernet destination address mac. dl_type=ethertype Matches Ethernet protocol type ethertype, which should be specified as a integer between 0 and 65535, inclusive, either in decimal or as a hexadecimal number prefixed by 0x, e.g. 0x0806 to match ARP packets. nw_src=ip[/netmask] Matches IPv4 source address ip, which should be specified as an IP address, e.g The optional netmask allows matching only on an IPv4 address prefix. The netmask is specificed "CIDR-style", i.e., /24. nw_dst=ip[/netmask] Matches IPv4 destination address ip. nw_proto=proto Matches IP protocol type proto, which should be specified as a decimal number between 0 and 255, inclusive, e.g. 6 to match TCP packets.
4 nw_tos=tos/dscp Matches ToS/DSCP (only 6-bits, not modify reserved 2-bits for future use) field of IPv4 header tos/dscp, which should be specified as a decimal number between 0 and 255, inclusive. tp_src=port Matches transport-layer (e.g., TCP, UDP, ICMP) source port port, which should be specified as a decimal number between 0 and (in the case of TCP or UDP) or between 0 and 255 (in the case of ICMP), inclusive, e.g. 80 to match packets originating from a HTTP server. tp_dst=port Matches transport-layer destination port port. Slice Actions struct Slice actions is a comma separated list of slices that have control over a specific FlowSpace. Slice actions are of the form "Slice:slicename1=perm[Slice:slicename2=perm[...]]". Each slice can have three types of permissions over a flowspace: DELEGATE, READ, and WRITE. Permissions are currently a bitmask specified as an integer, with DELEGATE=1, READ=2, WRITE=4. So, "Slice:alice=5,bob=2" would give Alice's slice DELEGATE and WRITE permissions (1+4=5), but Bob only READ permissions. Improving this inter? face is on the TODO list. For example, fvctl addflowspace all 2 any Slice:slice1=4,Slice:slice2=2 Topology (or port-based) Slicing In this exercise we are going to cut up the topology and each slice will have a subset of the full topology given here.
5 The mininet topology given will create this topology, to start it run: sudo mn --custom topo.py --topo fvtopo --mac --controller=remote The sudo password is openflow Since we have included a slice visualizer here, there are few guidelines to follow to ensure that everything works: * create three slices named respectively "first", "second", and "third" * At a minimum when adding flowspace you must at least specify the DPID and the in_port, otherwise the visualizer will be confused. ;) From this point on, you are on your own. Go ahead and create the slices and flowspace. Once you think you have something which is working do the following: openflow@tutorialvm:~/flowvisor/flowvisor-topo/scripts$./start_visualizer.sh Then point your browser on your host operating system to You should see a webpage containing something similar to below.
6 If you mouseover the router in your browswer you should be able to see the DPID of the device. Try various port-based slices. See how creative you can be. If you are feeling adventurous, you can add more switches in the topo.py file and restart mininet. Protocol based slicing Here, we will create protocol based slices as shown in the diagram below:
7 A mininet script file has been prepared to build this topology. Moreover, it has been augmented such that each mininet host is running an ssh, http, and telnet daemon. To start this mininet setup run: sudo python proto.py Then create your slices make sure you place your hosts in the correct slice. Then, point each slice to a controller. This could be multiple NOX instances simply running on different ports. It fine to have them run a simple learning switch each. For example start NOX in a new terminal by running: openflow@tutorialvm:~/nox/build/src$./nox_core -i ptcp:6634 pyswitch Note that there are multiple ways to configure FlowVisor here. Some are more naive than others. _Hint:_ You can use an extra slice to make you configuration of your protocol based slices simpler. Once you think you have correctly sliced your network, you can start an xterm for each mininet host by running mininet> xterm h10 at the mininet terminal where h10 is the name of the host. Change that to get a shell for another host. If you have configured everything correctly you should see the following your your telnet slice:
8 telnet Trying Connected to localhost. Escape character is '^]'. Telnet Server> win Welcome winner!!! Telnet Server> and for the ssh slice: ssh Welcome to h13, enjoy your sliced SSH network password: and finally for the http slice (you can use lynx or wget, firefox will not work):
9 wget :18: Connecting to localhost :80... connected. HTTP request sent, awaiting response OK Length: 101 [text/html] Saving to: `index.html' 100%[======================================>] K/s in 0s :18:57 (16.0 MB/s) - `index.html' saved [101/101] root@tutorialvm:~/flowvisor/flowvisor-proto# cat index.html <!DOCTYPE html> <html> <body> <h1>cool! Come on in!</h1> <p>access granted!</p> </body> </html> root@tutorialvm:~/flowvisor/flowvisor-proto# If you have not configured FlowVisor correctly and you end up somehow logging into the wrote machine a nasty message will be waiting for you ;).
OpenFlow network virtualization with FlowVisor
OpenFlow network virtualization with FlowVisor Research Project 2 Sebastian Dabkiewicz System and Network Engineering University of Amsterdam 17th October 2012 Sebastian Dabkiewicz OpenFlow network virtualization
More informationACL Compliance Director Tutorial
Abstract Copyright 2008 Cyber Operations, Inc. This is a tutorial on ACL Compliance Director intended to guide new users through the core features of the system. Table of Contents Introduction... 1 Login
More informationA Simplified Example of TCP/IP Communication Chuck Cusack
A Simplified Example of TCP/IP Communication Chuck Cusack This is a simple example of how messages are sent from one machine to another (from a source to a destination) using the four-layer Internet software
More informationProgramming Assignment
Overview Programming Assignment In this assignment, you will program the OpenFlow controller POX and use it to implement two applications. Task 1: Firewall In this part, your task is to implement a layer-2
More informationLab Assignment 3 for ECE374
Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you
More informationLab Capturing and Analyzing Network Traffic
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationLab 1: Packet Sniffing and Wireshark
Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer
More informationCCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11
CCNA Semester 1 labs Part 2 of 2 Labs for chapters 8 11 8.1.4.6 Lab - Calculating IPv4 Subnets 8.1.4.8 Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme 8.2.1.5 Lab - Designing and Implementing
More information521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service
More informationCOMS3200/7201 Computer Networks 1 (Version 1.0)
COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total
More informationNetwork concepts introduction & wireshark
Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationCCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal
More informationLesson 9 OpenFlow. Objectives :
1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationNetwork Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015
Network Security Introduction to networks Radboud University, The Netherlands Autumn 2015 What is a (computer) network Definition A computer network is two or more computers that are connected, so that
More informationBSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario
BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark
More informationAssignment 5: Software Defined Networking CS640 Spring 2015
Assignment 5: Software Defined Networking CS640 Spring 2015 Due: Thursday, May 7 at 11pm Overview For this project you will implement two control application for a software defined network (SDN). A layer
More informationConfiguring an IP ACL
9 CHAPTER This chapter describes how to configure IP access control lists (ACLs). This chapter includes the following sections: Information About ACLs, page 9-1 Prerequisites for IP ACLs, page 9-5 Guidelines
More informationPort Forwarding Setup (RTA1025W Rev2)
Port Forwarding Setup (RTA1025W Rev2) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly
More informationADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow
Spring Term 2015 ADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow Assigned on: 7 May 2015 Due by: 20 May 2015, 23:59 1 Introduction The goal of this assignment is to give an introduction
More informationADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow
Spring Term 2014 ADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow Assigned on: 8 May 2014 Due by: 21 May 2014, 23:59 1 Introduction The goal of this assignment is to give an introduction
More informationReview of Important Networking Concepts TCP/IP
Review of Important Networking Concepts / / Protocol Suite Assignment of Protocols to Layers Addressing / Layers in the Example Encapsulation and Demultiplexing Different Layers Views of Networking / Protocol
More informationAssignment 2: Getting to know yanc and Mininet
ECEN 5023/CSCI 7000-0005: Advanced Networking Spring 2014 Assignment 2: Getting to know yanc and Mininet Due Fri 2/28/2014 In this assignment, we ll get some exposure to Floodlight and Mininet. I encourage
More informationConfigure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch
Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch Objective Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are transportation
More informationOutline. SDN Overview Mininet and Ryu Overview Mininet VM Setup Ryu Setup OpenFlow Protocol and Open vswitch Reference
1 Mininet and Ryu 2 Outline SDN Overview Mininet and Ryu Overview Mininet VM Setup Ryu Setup OpenFlow Protocol and Open vswitch Reference 3 SDN Overview Decoupling of control and data planes Directly Programmable
More informationQuality of Service Setup Guide (NB14 Series)
Quality of Service Setup Guide (NB14 Series) About This Quality of Service (QoS) Guide Quality of Service refers to the reservation of bandwidth resources on the Nb14 Series router to provide different
More informationTCP/IP. Model and Layers Bits and Number Bases IPv4 Addressing Subnetting Classless Interdomain Routing IPv6
TCP/IP Model and Layers Bits and Number Bases IPv4 Addressing Subnetting Classless Interdomain Routing IPv6 At the beginning of the course, we discussed two primary conceptual models of networking: OSI
More informationProject 4: SDNs Due: 11:59 PM, Dec 12, 2018
CS168 Computer Networks Fonseca Project 4: SDNs Due: 11:59 PM, Dec 12, 2018 Contents 1 Introduction 2 2 Overview 2 2.1 Architecture......................................... 3 3 Shortest-path Switching
More informationQuick Note 05. Configuring Port Forwarding to access an IP camera user interface on a TransPort LR54. 7 November 2017
Quick Note 05 Configuring Port Forwarding to access an IP camera user interface on a TransPort LR54 7 November 2017 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions... 3 1.3 Corrections...
More informationOpenFlow Ronald van der Pol
OpenFlow Ronald van der Pol Outline! Goal of this project! Why OpenFlow?! Basics of OpenFlow! Short Demo OpenFlow Overview! Initiative of Stanford University! Run network research experiments
More informationA short walk-through of Mininet and POX
A short walk-through of Mininet and POX This tutorial has three parts. The first part covers the basics of the Mininet network emulation environment under which your programming assignment will be carried
More informationLab 3: Simple Firewall using OpenFlow
Lab 3: Simple Firewall using OpenFlow This lab builds on the knowledge acquired through Lab 1 where you were first introduced to the Mininet environment. It will also help you prepare for the class project.
More informationConfiguring IPv6 ACLs
CHAPTER 37 When the Cisco ME 3400 Ethernet Access switch is running the metro IP access image, you can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them
More informationTCP/IP Networking Basics
TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationcs144 Midterm Review Fall 2010
cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)
More information6170 Shiloh Road Alpharetta, Georgia (770) FAX (770) Toll Free
Instruction Manual Ethernet Option W8, W18 March 2012, Rev. E Data, drawings, and other material contained herein are proprietary to Cross Technologies, Inc., but may be reproduced or duplicated without
More informationModular Policy Framework. Class Maps SECTION 4. Advanced Configuration
[ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a
More informationOPENFLOW & SOFTWARE DEFINED NETWORKING. Greg Ferro EtherealMind.com and PacketPushers.net
OPENFLOW & SOFTWARE DEFINED NETWORKING Greg Ferro EtherealMind.com and PacketPushers.net 1 HUH? OPENFLOW. What is OpenFlow? From the bottom up. With big words. How OpenFlow does stuff. Then WHY we want
More informationChapter 1: Conceptual Basis Section 2
1 V 2.1 10/3/18 Chapter 1: Conceptual Basis Section 2 Based on textbook Conceptual Computer Networks by: 2018 José María Foces Morán, José María Foces Vivancos. All rights reserved Typical Internet Protocol
More informationCCNA Course Access Control Lists
CCNA Course Access Control Lists Access Control Lists (ACL) Traffic Filtering Permit or deny packets moving through router Permit or deny (VTY) access to or from a router Traffic Identifying for special
More informationLab Exercise 3 (part A) Introduction to Mininet
Lab Exercise 3 (part A) Introduction to Mininet Objectives: Learn the basic commands in Mininet Learn how to create basic network topologies in Mininet Learn Mininet API Marks: This exercise forms the
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationA Client-Server Exchange
Socket programming A Client-Server Exchange A server process and one or more client processes Server manages some resource. Server provides service by manipulating resource for clients. 1. Client sends
More informationDHCP Server RADIUS Proxy
The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies
More informationTo make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at
To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a
More informationStatic routing lab KTH/CSC. Juniper version. Group Nr. Name 1. Name 2. Name 3. Name 4. Date. Grade. Instructor s Signature
KTH/CSC Static routing lab Juniper version Group Nr Name 1 Name 2 Name 3 Name 4 Date Grade Instructor s Signature Table of Contents 1 Goals...3 2 Preparation questions...3 3 Host configuration...4 4 Static
More informationMininet Tutorial. Leonardo Richter Bays Gustavo Mio7o Marcelo Caggiani Luizelli Luciano Paschoal Gaspary
Mininet Tutorial Leonardo Richter Bays Gustavo Mio7o Marcelo Caggiani Luizelli Luciano Paschoal Gaspary Outline Introduc?on Installing Mininet SeAng Up First Steps in Mininet Ini?aliza?on Main commands
More informationConfiguring IP Version 6
CHAPTER 24 Configuring IP Version 6 Internet Protocol version 6 (IPv6), formerly called IPng (next generation), is the latest version of IP. IPv6 offers many advantages over the previous version of IP,
More informationWEB TECHNOLOGIES CHAPTER 1
WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960
More informationPexip Infinity and Amazon Web Services Deployment Guide
Pexip Infinity and Amazon Web Services Deployment Guide Contents Introduction 1 Deployment guidelines 2 Configuring AWS security groups 4 Deploying a Management Node in AWS 6 Deploying a Conferencing Node
More informationSDN-based Defending against ARP Poisoning Attack
Journal of Advances in Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 8, No. 2, May 2017), Pages: 95- www.jacr.iausari.ac.ir SDN-based
More informationHow to Work with Fast-Failover OpenFlow Groups
How to Work with Fast-Failover OpenFlow Groups Background Redundant links are frequently used in network topology design in order to reduce the risk of end-to-end connectivity failure due to a single link
More informationUse of the TCP/IP Protocols and the OSI Model in Packet Tracer
Communication Networks [Netw501] Spring 2018 Tutorial 3 Packet Tracer Activity 3 Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Introduction: In Packet Tracer simulation mode, detailed
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2010 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable calculators are permitted
More informationData Communication & Computer Networks MCQ S
Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay
More informationLink Gateway Initial Configuration Manual
Link Gateway Initial Configuration Manual Copyright 2016 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationCisco Monitor Manager Application Configuration Guide, Release 1.6
Cisco Monitor Manager Application Configuration Guide, Release 1.6 First Published: June 11, 2014 Last Modified: July 25, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationCSCI Networking Name:
CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct
More informationCan the Production Network Be the Testbed?
Can the Production Network Be the Testbed? Rob Sherwood Deutsche Telekom Inc. R&D Lab Glen Gibb, KK Yap, Guido Appenzeller, Martin Cassado, Nick McKeown, Guru Parulkar Stanford University, Big Switch Networks,
More informationCOMPUTER NETWORKS. CPSC 441, Winter 2016 Prof. Mea Wang Department of Computer Science University of Calgary
COMPUTER NETWORKS CPSC 441, Winter 2016 Prof. Mea Wang Department of Computer Science University of Calgary Introduction: Wireshark and tshark Running tshark Running Wireshark Exercise: Analyze HTTP traffic
More informationCisco Nexus Data Broker for Network Traffic Monitoring and Visibility
Guide Cisco Nexus Data Broker for Network Traffic Monitoring and Visibility Solution Implementation Guide 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationSoftware Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks.
MOBILE COMMUNICATION AND INTERNET TECHNOLOGIES Software Defined Networks and Courtesy of: AT&T Tech Talks http://web.uettaxila.edu.pk/cms/2017/spr2017/temcitms/ MODULE OVERVIEW Motivation behind Software
More informationLab 1: Creating Secure Architectures (Revision)
Lab 1: Creating Secure Architectures (Revision) A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For
More informationChapter 6 Global CONFIG Commands
Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationBeginning HTML. The Nuts and Bolts of building Web pages.
Beginning HTML The Nuts and Bolts of building Web pages. Overview Today we will cover: 1. what is HTML and what is it not? Building a simple webpage Getting that online. What is HTML? The language of the
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationCOMP2330 Data Communications and Networking
COMP2330 Data Communications and Networking Dr. Chu Xiaowen (Second semester, 2009-2010 academic year) Laboratory 3 Last update: Feb-3-2009 Use Wireshark to Analyze IP Packet Objectives: (1) Use Wireshark
More informationSoftware-Defined Networking (Continued)
Software-Defined Networking (Continued) CS640, 2015-04-23 Announcements Assign #5 released due Thursday, May 7 at 11pm Outline Recap SDN Stack Layer 2 Learning Switch Control Application Design Considerations
More information2. Layer-2 Ethernet-based VPN
2.1. Full Ethernet Virtualization The key concept of the method of realizing VPN by SoftEther VPN is the full virtualization of Ethernet segments, layer-2 Ethernet switches and Ethernet adapters. In order
More informationBusiness Data Networks and Security 10th Edition by Panko Test Bank
Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationBSc. (Hons.) Computer Science with Network Security. Examinations for 2016 / Semester 2
BSc. (Hons.) Computer Science with Network Security Cohort: BCNS/15A/FT Examinations for 2016 / Semester 2 MODULE: Network Programming MODULE CODE: CAN 2113C Duration: 2 ½ Hours Instructions to Candidates:
More informationPacket Capturing with TCPDUMP command in Linux
Packet Capturing with TCPDUMP command in Linux In this tutorial we will be looking into a very well known tool in Linux system administrators tool box. Some times during troubleshooting this tool proves
More informationSlicing a Network. Software-Defined Network (SDN) FlowVisor. Advanced! Computer Networks. Centralized Network Control (NC)
Slicing a Network Advanced! Computer Networks Sherwood, R., et al., Can the Production Network Be the Testbed? Proc. of the 9 th USENIX Symposium on OSDI, 2010 Reference: [C+07] Cascado et al., Ethane:
More informationONOS-P4 Tutorial Hands-on Activity. P4 Brigade Work Days, Seoul (Korea) September 18-29, 2017
ONOS-P4 Tutorial Hands-on Activity P4 Brigade Work Days, Seoul (Korea) September 18-29, 2017 Tutorial VM Download (~4GB) http://bit.ly/onos-p4-dev-vm Run The VM is in.ova format and has been created using
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationCreate a pfsense router for your private lab network template
Create a pfsense router for your private lab network template Some labs will require a private network where you can deploy services like DHCP. Here are instructions for setting up an uplink router for
More informationApplication Protocols and HTTP
Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due
More informationInternet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses
Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support
More informationCIT 380: Securing Computer Systems. Network Security Concepts
CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationLab 2: Creating Secure Architectures
Lab 2: Creating Secure Architectures A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For this you will
More informationLAN Setup Reflection
LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other
More informationVERSION Lab 3: Link Layer
Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and
More informationCCNA Exam File with Answers. Note: Underlines options are correct answers.
CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.
More informationProtocol Analysis: Capturing Packets
Protocol Analysis: Capturing Packets This project is intended to be done on the EiLab Network, but if you want to try to VPN into the EiLab Network on your own PC from your home or workplace, follow these
More informationSSE232-LE Serial Server- User s Manual
www.exemys.com Rev.6 1 Products are in constant evolution to satisfy our customer needs. For that reason, the specifications and capabilities are subject to change without prior notice. Updated information
More information