State of the Art Report on Techniques for Visualizing Network Traffic

Size: px
Start display at page:

Download "State of the Art Report on Techniques for Visualizing Network Traffic"

Transcription

1 State of the Art Report on Techniques for Visualizing Network Traffic Experimental Investigation of Visualization in Network Monitoring Software By Fabian Bendix Thomas Rongitsch Supervised By DI Wolfgang Meyer Technical University of Vienna

2 Index Index Visualization Techniques and Goals Visualizing Networks Problems Visualizing Networks Motivation Available Tools AdRem Netcrunch Distinct Network Monitor Etherpeek What s up Gold FrameVis Concept and Design Colour and Size TreeView Top-Subnet and Top-Host View Advantages and Disadvantages Visualizing Networks possible Solutions Summary Appendix Tables of figures Links References

3 The main goal of this paper is to give an overview over the available techniques and tools of network monitoring with respect to information visualization. In the internship about FrameVis the authors have discovered that there are a lot of useful tools for network monitoring, but only a little number of these tools represent the actual status of a computer network in a graphical way. In the first section we will discuss the main techniques and goals of visualization in the field of networking. The following section introduces the tools we have found on the web. In most cases the implementations lack of details or actual methods in information visualization. But there are useful concepts for graphical representations. In the next section we will describe the project we did for an internship at the Institute of Computer Graphics and Algorithm at the Technical University of Vienna [L5] FrameVis. Finally all the tools represented before are compared and some of the advantages and disadvantages are described in more detail. 1. Visualization Techniques and Goals The field of information visualization is a growing scientific topic. Visualization itself consists of two fields: Scientific Visualization o Volume Visualization o Flow Visualization Information Visualization Visualizing network traffic belongs to Information Visualization. The main goal of visualizing data is to gain cognition, deeper understanding and a properly new insight into data or processes. The most important aspect of visualization is to deliver an overview of the data to user. Afterwards the user should have the possibility to zoom and filter the data and retrieve details on demand. Information visualization knows several different techniques. Some of the most relevant ones are: Geometric Techniques o Scatter plots o Parallel Coordinates Icon-Based Techniques o Stick-Figures Graph-Based Techniques o Polyline o Curved Line Hierarchical Techniques o Cone Trees o Cam Trees Depending on the goal of the visualization application in other words: depending on what you want to visualize each technique has got its advantages and disadvantages. Due to the tools we discuss in this paper and due to FrameVis we focus on Icon-Based Techniques and on Hierarchical Techniques. 2. Visualizing Networks Problems Before visualizing network data we have to consider several relevant aspects. Each visualization application is a kind of filllimited. In other words we cannot draw everything on the screen we want, because there is not that much space available. Due to this, well-implemented tools filter data right from the start. The first attempt should be to deliver just an overview over the current status of the complete network. The designer of network management visualization tools has also to consider whether he wants to illustrate the network in two dimensional or a three dimensional way. In the case of visualizing data just in two dimensions the designer must be aware that on the one hand possibly one presentation attribute is lost and on the other hand less space for the visualization is available. Three dimensional design depict the problem of overlapping objects and the possible loss of orientation of the user if the complete scene is rotatable and transformable [2]. Another very important aspect is the kind of data that should be visualized. The data could be generated on the fly by the application or the data could be delivered by another application or machine (e.g. a router). Other important factors are the temporal behaviour of the data and of course the amount of data [2]. If we assume that the data is delivered by a router, we are interested in very different information, because we visualize the throughput of a whole network, whereas the sniffing tools listen on the traffic within a network. Furthermore the data provided by 3

4 the router is aggregated, that means we don t have to deal with all the bits send through the gateway, but with the relevant information: the bytes send and received from every host inside the network to some destination in the internet. Due to that the visualization will not show the absolute traffic among the hosts, but the traffic to the internet. Sniffing tools like Etherpeek get IP-packets and analyse its content, which will result in a huge amount of detailed information that should be displayed. FrameVis a representative of the router-data tools only gets the information of how many bytes are transmitted from where to where. Thus, the data is already enhanced and then can be displayed. Surely, the amount of data delivered from a router measured over time is either small, because each flow of each particular host is recorded. The most important point might be: what should be drawn in which way. There are different aspects in monitoring networks. Sometimes e.g. if critical servers are monitored the system or network administrator might be more interested in the availability of the computers than in the rate of traffic. But an Internet Service Provider might be interested in how mach traffic the clients on his own network produce. Of course there are also cases in which both, the availability in the traffic rate are interesting. 3. Visualizing Networks Motivation Simply the main goal of visualization is to make the life easier especially for system administrators. The maintenance of a network isn t that easy, so there is a more and more growing need of obtaining an insight in the network. However, the interest of people in visualizing the traffic of a network can be driven by two basic motivations: availability traffic detection Large companies often run computer systems such as web servers, application servers, mail servers and so on that should be available 24 hours a day and 7 days a week. Each minute these servers are offline produces costs and probably loss of image. Driven by these factors a lot of tools have been developed to monitor computer networks. Most of these applications do not support visualization of network data. Due to this cognition and perception of the status of the network might not always be easy for network administrators. To defend the network against attacks Denial of Service is a favoured method the administrator is interested in the distribution of the produced traffic of single hosts in relation to the others to detect anomalies. Another point of motivation represents the large field of intrusion detection. This topic is far to complex for discussing it within this paper. The compared tools which are presented in section 4 - shall cover the whole range of network visualization tools and researches. They range from network sniffing tools [L1,L2,L3L4] which visualize the up-time of machines to router-data fed tools FlowScan [3] or FrameVis that overviews the whole network traffic and gives the network administrator the insight into the traffic distribution to identify activities that require further investigations, as discussed in [4]. 4. Available Tools In this section the authors try to give an overview over four commonly used applications in the field of network visualization. The investigated tools differ on the one hand in their dedication, detail of visualization and on the other hand in their type of network management. Most tools provide a lot of network specific functionality, but lack of functionality in the field of visualization. 4.1 AdRem Netcrunch NetCrunsh 2.2 by AdRem Software [L1] aims at the first motivation mentioned in Section 3: the reliability of a network is the main interest of a company. Due to the fact that NetCrunsh is a standalone application the data acquisition is accomplished by scanning the local or remote network. Using ICMP and SNMP the program can rescan user-specified host (servers, routers, workstations) to provide a continuous monitoring of these critical hosts. From the point of view of visualization NetCrunsh 2.2 offers the user the total liberty to arrange the scanned hosts. So, the application is not fixed to one visualization: primarily the topology of the network either 4

5 physically or logically is defined by the user and therefore displayed. More or less an Icon-based technique (see Figure 1) is used, combined with a hierarchically approach. Hosts or whole subnets are displayed by user-defined glyphs (e.g. computers) on a user-defined map with symbolizes the physical or logical context (e.g. a map of Europe). If the user selects an icon and the icon represents a network, then the user is linked to the detailed visualization of the selected network if the selected icon is a host, then the monitored status of that particular host is displayed (Detail-on demand). As a conclusion, we can say that NetCrunsh works right according to the Visual Information Seeking Mantra [5]: Overview first, zoom and filter, then details on demand. The main drawbacks result from the fact, that the icon-based techniques are 2Dvisualizations and in combination with the hierarchical linking of networks and their subnets in 2D, the user completely looses the context if a subnet is selected, the whole display is used to show that particular subnet. offered for a easier overview of the whole traffic analysed by different characteristics (e.g.: port, protocol, address, etc.) received by the network interface card. Primarily this tool s design intention is network information and not network visualization. Nevertheless the job of network analysis is well done: the interesting information are provided (e.g. port, source and destination address, etc.) and as mentioned the traffic is analysed and on the one hand listed and on the other hand visualized by diagrams. Figure 2: Pie chart with additional information in text form 4.3 Etherpeek Wildpackets Etherpeek (EP) is a full-featured network-sniffing tool. It collects and analyses all packets received and sent by the local NIC (network interface card). Figure 3 shows the application window with a big pie chart showing the protocols the local machine is currently using and three tachometers on the lower left side. Figure 1: View with Texture and Icons 4.2 Distinct Network Monitor The intension of the Network Monitor by Distinct [L2] is the analysis of IP packets, that are captured from the local network interface card. It tries to translate the encoded information of the IP packets into a natural language due to that fact the use is intended for experienced network users or administrators. In terms of visualization the tool offers only a graphical representation of the filtered information, not a real visualization. The data is displayed in tables and as a sort of add-on bar charts or pie charts (see Figure 2) are Figure 3: Pie chart showing packet size distribution of one computer 5

6 From the point of visualization EP does not provide new or very sophisticated techniques to display information. The application allows only switching between the pie chart as seen in Figure 3 and a bar chart. In other words: EP implements visualization techniques similar to Microsoft Excel. The three tachometers show from left to right the rate of utilization, the packets received per second and the errors occurred per second. However, EP provides enough functionality in the field of computer networking. The application collects information about nodes, protocols and complete networks this has been disabled for demo use and is able to filter data in various ways. EP even provides the generation of statistics and comes with a history function (Figure 4). assume, WUG shows different icons (see Figure 5). Figure 4: History Bar Chart Conclusion: EP comes with a lot of nice features for monitoring protocols and packets in real time. The visualization techniques used in EP are rather simple. The application supports as hardly another application the system administrator in detecting errors in network connections and services (protocols). The visualization techniques are limited to bar charts, pie charts and tachometers. These visualizations only document packet sizes, traffic history and the current rate of packets, errors and utilization of the NIC. EP does not provide any functionality for visualizing the structure of the network or the current state of other computers in the network. Figure 5: Default Icons in WUG WUG is designed for monitoring servers and other important computers. The tool provides several methods for notifying the system administrator if a computer has crashed, is currently not available or just a single service is not responding. Figure 6 shows a map of computers in a network. The user can immediately identify that the computers on the tight lower side are down (exactly: the computers lost more than eight packets in a row). 4.4 What s up Gold What s up Gold (WUG) is developed and published by Ipswitch [L4]. The visualization is done by icon-based techniques using arrows to show dependencies between network nodes. For each state a computer or server can Figure 6: Map-View in WUG 6

7 In general WUG is an adequate tool for monitoring a server farm or a cluster. It provides additional functionality in discovering devices over SNMP, ICMP or from the Microsoft Windows Network Neighbourhood. Logging and report generation deliver satisfactory information to the system administrator. Via SMS (Short- Message-Service) notification WUG sends alerts directly to a pager or cell-phone. The main problem as mentioned above in the section about Netcrunch represents the space limitation in arranging icons, e.g. if huge networks should be monitored. WUG handles this problem with acoustical alerts and sophisticated notification mechanisms. The layout, the icons and the structure of the network depends on the work of the user, who has to generate complete maps. WUG does automatic layout if complete networks are scanned, but these are neither very concise and nor coherent. 5.2 Colour and Size The main idea was to display the traffic of a subnet and a host by scaling the appropriate cube, which represents the subnet/host. The big advantage of that method is that the user easily perceives the relevant subnets/hosts because of their size. So, in average networks are plenty of subnets with again plenty of hosts. Therefore we are hardly space limited and thought of an additional differentiation: the colour. The maximum size of the cubes is fixed to common size by an user defined value. Each cube, which has traffic that would produce a bigger size, is first set to the fixed maximum size and additionally the cubes are coloured according to their traffic (see Figure 8). 5. FrameVis 5.1 Concept and Design The goal of FrameVis is to deliver an overview of subnets and hosts in a complex computer network in a three dimensional way. On the one hand the most traffic consuming subnets and hosts should be found immediately on the other hand the complete computer network should be illustrated. In other words the main goal of this project is to find an assignment of the Internet bandwidth to computer subnets and hosts. FrameVis has been designed for visualizing huge networks (e.g.: network with several hundreds of subnets). Figure 7 shows the FrameVis main window. Figure 8: FrameVis colouring scheme 5.3 Tree View The tree-view provides a complete view over all subnets of the monitored network. At the top level the routers from and to the Internet are symbolized as a single node - the root node. All subnets are displayed in the shape of a circle below. The size and the colour of each subnet depend on the traffic it has produced in the last "data-validity" period. Below the activated subnet, which is labelled by an IP- Address and/or a name, the hosts are displayed (see Figure 9). The front most host represents the host that produces the sum of all received and sent packets the most traffic within this subnet. Figure 7: FrameVis Application in action 7

8 5.4 Top-Subnet and Top-Host View Figure 9: Subnet (terminator) with its hosts As mentioned in section 2 of this paper it is often a problem to draw everything onto the screen. In most cases only some nodes might be relevant to the system administrator. Occlusion depicts a serious problem. Objects that are behind other objects do not influence the visualization and the cognition of the user. Therefore FrameVis implements a kind of distortion technique which actually is unnamed until now. The main idea was to gain more space between the nodes in the front and to shrink the objects in the rear. Figure 10 illustrates this concept. Figure 10: distorting ring This mechanism does not avoid occlusions completely, but supports the user in identifying the most relevant objects. From a non very scientific point of view we can say: with this additional feature FrameVis looks even better. Top subnet view and top host view provide chart diagrams about the most traffic producing subnets and hosts in the monitored computer network and their temporal behaviour. The front row symbolizes the actual traffic of the subnets/hosts. At each new timeinterval the traffic of each element starts with zero and no recalculation (reordering) is done. If new router generated data are read, the traffic is added to the current traffic that has been produced until now in this time period. In this way the user perceives immediately what had happened for e.g. the last 24 hours. The shading on a box symbolizes the border between incoming and outgoing traffic. The subnets/hosts are ordered by their traffic from the left side to the right side (default view). On the left most position the selected subnet/host is displayed. A very nice feature provides the Watchdog- List. This feature allows monitoring any subnet or host similar to the top-ten subnets/host. 6. Advantages and Disadvantages In this section the authors try to compare the tools presented in the previous section. Table 1 delivers an overview of the analysed tools. This comparison is divided into three sections. The first part compares the analysed tools in the field of visualization. It is described how the tools gain data, how these data are visualized and the available and missing interaction possibilities. The next part of this table discusses the differences in the network specific functionality of the tools. FrameVis seems to be the best tool in the field of visualization, but in the section of networking aspects all the other tools implement quite more functionality. FrameVis was not designed for comparing to commercial applications in the field of network management. It was rather a investigation about possibilities in visualizing network data. The last section of this table just depicts license information and price. 8

9 Netcrunch Network Monitor Etherpeek Visualization Aspects What s up Gold FrameVis Space 2D 2D 2D 2D 3D Data acquisition Network Scanning Sniffing Sniffing Network Scanning Router Data Primary Technique Icon-Based Technique Bar Charts, Pie Charts Bar Charts, Pie Charts Icon-Based Technique Hierarchical Technique Interaction Selection, Detail-on-demand, Editable Maps None None Selection, Detail-on-demand, Editable Maps Selection, Linking + Brushing, Desirable Interaction Focus + Context Any Any Focus + Context Filtering Networking Aspects Data Source Packet Flow Packet Analysis Packet Analysis Packet Flow Packet Size Protocols TCP/IP None TCP/IP, UDP TCP/IP None Services Most Internet None Most Internet Most Internet None Protocols Protocols Protocols Update Time User-Defined Immediately Immediately User-Defined Router-Dependent Design Availability Availability Availability Availability Traffic Detection Motivation Monitoring Type Service Crash Top Talkers Error Rate Service Crash Top Talkers General License Commercial Commercial Commercial Commercial Freeware Price $ 795 $ 895 On Demand $ 795 Free (1 workstation) (standard version) (standard version) Table 1: Comparison of the presented tools 7. Visualizing Networks possible Solutions As we can see now the bulk of network management tools has to cover a wide range of functionality: packet analysis, server crash protection, traffic detection, etc. But, the aim of this report is to find out how specially how common visualization is used in the field of network management. The main question is: What shall visualization do for me?. From this point of view there are two main approaches: Firstly, visualization is only an utility that should in some cases help the user to easily perceive the relevant information. On the other hand, there are applications that map the whole network with only the relevant information to an appropriate visual representation. In section 4 and 5 the authors give examples with no warranty of completeness for each of these two approaches. Some of them do not want to visualize a complete network and therefore, the used visualization techniques are not that sophisticated. But what we can see clearly is, which problems can arise from using the wrong or improper visualization techniques. To know which visualization technique (see section 1) is the most suitable, we overview the encountered problems. As we can see in Table 1 it is favoured to use a 2D-visualization, because it s easy to implement and only some aspects of the network should be displayed. However, NetCrunsh, What s up Gold and FrameVis try to visualize a complete network, these applications use a sort of icon-based encoding of the hosts and try to represent the relation between hosts, but the serious difference is that NetCrunsh and What s Up Gold provide a 2D-visualization (or a Pseudo- 3D visualization), whereas FrameVis utilize all 3D space. The problem of the 2D-display is obvious: in 2D we are more likely to run out of space than in 3D. Also in terms of focus and context, the 3D-visualization is preferable, because you can better utilize the available space. To make use of the power of glyphs is a very good solution to accomplish the huge amount of information to visualize. In combination with a 3D hierarchical method an application provides information about the data (encoded 9

10 in the glyphs), information about the structure (encoded in the layout) and effectively uses the available space. Beneath the additional dimension in 3D space FrameVis uses size and colouring to visualize traffic. Most analysed applications only use colour to show that something has happened or something goes wrong. However, the result produced by What s up Gold and Netcrunch are in most cases acceptable. The user is able to perceive immediately computers that are not reachable anymore. What s up gold backs critical cases with an additional acoustical warning mechanism and a notification-system via SMS. Another important point to consider depicts the visualization of the progress of time. Nearly all tools discussed in this paper implement the visualization of time dependent data. This information might be of interest for an network administrator when he analyses the problems, failures and malfunctions. FrameVis has been designed to view all important information in one view. The other tools use different views for visualizing time dependent data and the current status of the network. An advantage of What s up Gold, Netcrunch, Etherpeek and NetworkMonitor represents the filtering of data. In most cases the user can filter for specific protocols or hosts. This might support the user in finding problems fast and omit nonessential information. The last point which has not been discussed in detail until now depicts the use of distortion. FrameVis implements a kind of distortion technique. The distance between the nodes in the rear of the Cone-Tree is narrower than the distance in the front. With this technique the user can achieves overview about the nodes in the front and the big red ones without loosing essential information. All other tools mentioned in this paper do not implement any of the currently available distortion technique. Maybe in future designers of network management tools have to consider the advantages that distortion techniques like Fish Eye View, Perspective Walls and so on. In general we can assume that information visualization in the field of network management needs quite more investigation and scientific work. The tools available right now are well-implemented in their functionality of networking, but lack of details and up to date techniques in visualization. 8. Summary The authors have gained the impression that the current visualization mechanisms in network management applications just support the presentation of information in form of text, tables and reports and is not the primary data presentation. In most cases visualization in the field of network management places specific problems: Network Topology Data acquisition Desired Visualization Desired Interaction Desired level of detail Due to this most companies, which have a need for visualizing networks, must develop an appropriate application on their own. Maybe FrameVis has been one step into the right direction. The main question we can pose is: Is it really necessary that a network administrator knows exactly how much traffic has been consumed by one network node or if it is more important for him to immediately perceive where problems arise? 10

11 9. Appendix 9.1 Tables of figures Figure 1: View with Texture and Icons Figure 2: Pie chart with additional information in text form Figure 3: Pie chart showing packet size distribution of one computer Figure 4: History Bar Chart Figure 5: Default Icons in WUG Figure 6: Map-View in WUG Figure 7: FrameVis Application in action Figure 8: FrameVis colouring scheme Figure 9: Subnet (terminator) with its hosts Figure 10: distorting ring 9.2 Links [L1] Adrem Netcrunch 2.2: [L2] Distinct Network Monitor: [L3] Wildpackets Etherpeek: [L4] Ipswitch What s up gold: [L5] Institute of Computer Graphics and Algorithm: References [1] Information Visualization Prinzipien und Techniken, W. Meyer 1997 [2] Metaphor-Aware 3D Navigation, C. Russo Dos Santos, P. Gros, P. Abel, D. Loisel, N Trichaud, J.P. Paris; Proceedings Information Visualization 2000 [3] FlowScan: A Network Traffic Flow Reporting and Visualization Tool, Dave Plonka; LISA2000 [4] Visual Behavior Characterization for Intrusion and Misuse Detection, Robert F. Erbacher, Deborah Frincke 2001 [5] Designing the User Interface, B. Shneiderman

Dynamic Information Visualization Using 3D Metaphoric Worlds

Dynamic Information Visualization Using 3D Metaphoric Worlds Dynamic Information Visualization Using 3D Metaphoric Worlds C. Russo Dos Santos, P. Gros, and P. Abel Multimedia Dept. Eurécom Institute 2229, Route des Crêtes 06904 Sophia-Antipolis, France email: {cristina.russo,pascal.gros,pierre.abel}@eurecom.fr

More information

Information Visualization. Overview. What is Information Visualization? SMD157 Human-Computer Interaction Fall 2003

Information Visualization. Overview. What is Information Visualization? SMD157 Human-Computer Interaction Fall 2003 INSTITUTIONEN FÖR SYSTEMTEKNIK LULEÅ TEKNISKA UNIVERSITET Information Visualization SMD157 Human-Computer Interaction Fall 2003 Dec-1-03 SMD157, Information Visualization 1 L Overview What is information

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture

More information

Stager. A Web Based Application for Presenting Network Statistics. Arne Øslebø

Stager. A Web Based Application for Presenting Network Statistics. Arne Øslebø Stager A Web Based Application for Presenting Network Statistics Arne Øslebø Keywords: Network monitoring, web application, NetFlow, network statistics Abstract Stager is a web based

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

2 A little on Spreadsheets

2 A little on Spreadsheets 2 A little on Spreadsheets Spreadsheets are computer versions of an accounts ledger. They are used frequently in business, but have wider uses. In particular they are often used to manipulate experimental

More information

WhatsUp Gold v16.0 Wireless User Guide

WhatsUp Gold v16.0 Wireless User Guide WhatsUp Gold v16.0 Wireless User Guide Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 1 Wireless licensing and accessibility... 3 Using WhatsUp Gold Wireless Discovering wireless devices...

More information

Multiple variables data sets visualization in ROOT

Multiple variables data sets visualization in ROOT Journal of Physics: Conference Series Multiple variables data sets visualization in ROOT To cite this article: O Couet 2008 J. Phys.: Conf. Ser. 119 042007 View the article online for updates and enhancements.

More information

Chapter 10 Working with Graphs and Charts

Chapter 10 Working with Graphs and Charts Chapter 10: Working with Graphs and Charts 163 Chapter 10 Working with Graphs and Charts Most people understand information better when presented as a graph or chart than when they look at the raw data.

More information

Glyphs. Presentation Overview. What is a Glyph!? Cont. What is a Glyph!? Glyph Fundamentals. Goal of Paper. Presented by Bertrand Low

Glyphs. Presentation Overview. What is a Glyph!? Cont. What is a Glyph!? Glyph Fundamentals. Goal of Paper. Presented by Bertrand Low Presentation Overview Glyphs Presented by Bertrand Low A Taxonomy of Glyph Placement Strategies for Multidimensional Data Visualization Matthew O. Ward, Information Visualization Journal, Palmgrave,, Volume

More information

The first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below.

The first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below. Graphing in Excel featuring Excel 2007 1 A spreadsheet can be a powerful tool for analyzing and graphing data, but it works completely differently from the graphing calculator that you re used to. If you

More information

Outlook is easier to use than you might think; it also does a lot more than. Fundamental Features: How Did You Ever Do without Outlook?

Outlook is easier to use than you might think; it also does a lot more than. Fundamental Features: How Did You Ever Do without Outlook? 04 537598 Ch01.qxd 9/2/03 9:46 AM Page 11 Chapter 1 Fundamental Features: How Did You Ever Do without Outlook? In This Chapter Reading e-mail Answering e-mail Creating new e-mail Entering an appointment

More information

Interface Transformation from Ruling to Obedience

Interface Transformation from Ruling to Obedience Interface Transformation from Ruling to Obedience 1(5) Sergey Andreyev Interface Transformation from Ruling to Obedience Abstract. This article is about one feature which was partly introduced 30 years

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

WhatsUp Gold Wireless v16.4

WhatsUp Gold Wireless v16.4 WhatsUp Gold Wireless v16.4 Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 1 Wireless accessibility... 3 Using WhatsUp Gold Wireless Discovering wireless devices... 4 Modifying wireless

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

UKNova s Getting Connectable Guide

UKNova s Getting Connectable Guide UKNova s Getting Connectable Guide Version 1.2 2010/03/22 1. WHAT IS "BEING CONNECTABLE" AND WHY DO I NEED IT? Being connectable means being able to give back to others it is the fundamental principle

More information

Could you make the XNA functions yourself?

Could you make the XNA functions yourself? 1 Could you make the XNA functions yourself? For the second and especially the third assignment, you need to globally understand what s going on inside the graphics hardware. You will write shaders, which

More information

WB-Analysis of the Nakula & Antareja Incident

WB-Analysis of the Nakula & Antareja Incident WB-Analysis of the Nakula & Antareja Incident A WB-Analysis of a system security-related incident 5.5th Bieleschweig Workshop Bielefeld, June 6-7 2005 Overview Introduction The WB-Analysis Conclusion Discussion

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Network Visualization

Network Visualization Network Visualization Presented by Shahed Introduction Introduction Basic building blocks Node Links (relationship between nodes) Spatial information Network data 3 Introduction http://zeeb.library.cmu.edu:7850/joss/article.html

More information

Network Visualization. Introduction. Introduction. Introduction. Paper List. Paper List. Shahed. Basic building blocks

Network Visualization. Introduction. Introduction. Introduction. Paper List. Paper List. Shahed. Basic building blocks Network Visualization Presented by Shahed Basic building blocks Node Links (relationship between nodes) Spatial information Network data 3 http://zeeb.library.cmu.edu:7850/joss/article.html 4 Paper List

More information

Visualisation of ATM network connectivity and topology

Visualisation of ATM network connectivity and topology Visualisation of ATM network connectivity and topology Oliver Saal and Edwin Blake CS00-13-00 Collaborative Visual Computing Laboratory Department of Computer Science University of Cape Town Private Bag,

More information

MAKING TABLES WITH WORD BASIC INSTRUCTIONS. Setting the Page Orientation. Inserting the Basic Table. Daily Schedule

MAKING TABLES WITH WORD BASIC INSTRUCTIONS. Setting the Page Orientation. Inserting the Basic Table. Daily Schedule MAKING TABLES WITH WORD BASIC INSTRUCTIONS Setting the Page Orientation Once in word, decide if you want your paper to print vertically (the normal way, called portrait) or horizontally (called landscape)

More information

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins Monitoring Tool Made to Measure for SharePoint Admins By Stacy Simpkins Contents About the Author... 3 Introduction... 4 Who s it for and what all can it do?... 4 SysKit Insights Features... 6 Drillable

More information

BIG-IP Local Traffic Management: Basics. Version 12.1

BIG-IP Local Traffic Management: Basics. Version 12.1 BIG-IP Local Traffic Management: Basics Version 12.1 Table of Contents Table of Contents Introduction to Local Traffic Management...7 About local traffic management...7 About the network map...7 Viewing

More information

DecisionPoint For Excel

DecisionPoint For Excel DecisionPoint For Excel Getting Started Guide 2015 Antivia Group Ltd Notation used in this workbook Indicates where you need to click with your mouse Indicates a drag and drop path State >= N Indicates

More information

Scrutinizer Flow Analytics

Scrutinizer Flow Analytics Scrutinizer Flow Analytics TM Scrutinizer Flow Analytics Scrutinizer Flow Analytics is an expert system that highlights characteristics about the network. It uses flow data across dozens or several hundred

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Planar Graphs and Surfaces. Graphs 2 1/58

Planar Graphs and Surfaces. Graphs 2 1/58 Planar Graphs and Surfaces Graphs 2 1/58 Last time we discussed the Four Color Theorem, which says that any map can be colored with at most 4 colors and not have two regions that share a border having

More information

Excel 2013 Intermediate

Excel 2013 Intermediate Instructor s Excel 2013 Tutorial 2 - Charts Excel 2013 Intermediate 103-124 Unit 2 - Charts Quick Links Chart Concepts Page EX197 EX199 EX200 Selecting Source Data Pages EX198 EX234 EX237 Creating a Chart

More information

User Guide. For version 0.5, January Download the latest version from jnetmap.sourceforge.net

User Guide. For version 0.5, January Download the latest version from jnetmap.sourceforge.net User Guide For version 0.5, January 2011 Download the latest version from jnetmap.sourceforge.net Table of Contents Introduction...1 Quick Start...1 Opening and saving files...1 Passwords...1 Editing a

More information

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic;

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic; NetVizura NetFlow Analyzer enables you to collect, store and analyze network traffic data by utilizing Cisco NetFlow, IPFIX, NSEL, sflow and compatible netflow-like protocols. It allows you to visualize

More information

THE 18 POINT CHECKLIST TO BUILDING THE PERFECT LANDING PAGE

THE 18 POINT CHECKLIST TO BUILDING THE PERFECT LANDING PAGE THE 18 POINT CHECKLIST TO BUILDING THE PERFECT LANDING PAGE The 18 point checklist to building the Perfect landing page Landing pages come in all shapes and sizes. They re your metaphorical shop front

More information

Introduction to MS Office Somy Kuriakose Principal Scientist, FRAD, CMFRI

Introduction to MS Office Somy Kuriakose Principal Scientist, FRAD, CMFRI Introduction to MS Office Somy Kuriakose Principal Scientist, FRAD, CMFRI Email: somycmfri@gmail.com 29 Word, Excel and Power Point Microsoft Office is a productivity suite which integrates office tools

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 13 THE Internet Protocol Spring 2018 Rachit Agarwal 2 Reflection The events in last few days have left me sad! Such events must be condemned

More information

ENV Laboratory 2: Graphing

ENV Laboratory 2: Graphing Name: Date: Introduction It is often said that a picture is worth 1,000 words, or for scientists we might rephrase it to say that a graph is worth 1,000 words. Graphs are most often used to express data

More information

Understanding Device Level Connection Topologies

Understanding Device Level Connection Topologies Sept. 2013 Understanding Device Level Connection Topologies Author: Advantech E-mail: eainfo@advantech.com Sept. 2013 Even ten years ago, most factory floor sensors were connected directly to a PLC or

More information

FACULTY AND STAFF COMPUTER FOOTHILL-DE ANZA. Office Graphics

FACULTY AND STAFF COMPUTER FOOTHILL-DE ANZA. Office Graphics FACULTY AND STAFF COMPUTER TRAINING @ FOOTHILL-DE ANZA Office 2001 Graphics Microsoft Clip Art Introduction Office 2001 wants to be the application that does everything, including Windows! When it comes

More information

Finding Feature Information

Finding Feature Information This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Grundlagen methodischen Arbeitens Informationsvisualisierung [WS ] Monika Lanzenberger

Grundlagen methodischen Arbeitens Informationsvisualisierung [WS ] Monika Lanzenberger Grundlagen methodischen Arbeitens Informationsvisualisierung [WS0708 01 ] Monika Lanzenberger lanzenberger@ifs.tuwien.ac.at 17. 10. 2007 Current InfoVis Research Activities: AlViz 2 [Lanzenberger et al.,

More information

Unit 2.

Unit 2. Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

The Dude usage notes v0.2

The Dude usage notes v0.2 Table of Contents The Dude usage notes v0.2 What is the Dude...1 Getting Started...1 Graphical Interface...2 Network Maps...3 Device Monitoring...4 Configuration...4 Global Settings...4 Tools...5 Files...5

More information

First the Basics Binary Arithmetic

First the Basics Binary Arithmetic www.preplogic.com -00-4-679 First the Basics Binary Arithmetic If you understand how binary numbers work, you can skip this section and go to the next. But, if you don t, you need to spend a bit of time

More information

Welcome To Autotrak Alert + Help Menu

Welcome To Autotrak Alert + Help Menu Welcome To Autotrak Alert + Help Menu Dear Valued Customer welcome to Alert+. In this document you will find an easy to follow break down of the Alert+ website and examples to help you along the way. Please

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Weekly Tasks Week 5 Rich Macfarlane 2013 Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Aim: The aim of these labs are to further investigate the Snort, network IDS, and methods

More information

Large scale SPVC ATM network

Large scale SPVC ATM network Written by Paul Holland and Don Wells Large scale SPVC ATM network Introduction: Asynchronous Transfer Mode (ATM) Data Networks differ from Internet Protocol (IP) Data Networks in many ways, but one of

More information

Excel Tips for Compensation Practitioners Weeks Data Validation and Protection

Excel Tips for Compensation Practitioners Weeks Data Validation and Protection Excel Tips for Compensation Practitioners Weeks 29-38 Data Validation and Protection Week 29 Data Validation and Protection One of the essential roles we need to perform as compensation practitioners is

More information

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS Cristina Hava & Liam Murphy 1 Abstract The World Wide Web (WWW, or Web) is one of the most important Internet services, and has been largely responsible

More information

Microsoft Excel XP. Intermediate

Microsoft Excel XP. Intermediate Microsoft Excel XP Intermediate Jonathan Thomas March 2006 Contents Lesson 1: Headers and Footers...1 Lesson 2: Inserting, Viewing and Deleting Cell Comments...2 Options...2 Lesson 3: Printing Comments...3

More information

SOFTWARE ENGINEERING Prof.N.L.Sarda Computer Science & Engineering IIT Bombay. Lecture #10 Process Modelling DFD, Function Decomp (Part 2)

SOFTWARE ENGINEERING Prof.N.L.Sarda Computer Science & Engineering IIT Bombay. Lecture #10 Process Modelling DFD, Function Decomp (Part 2) SOFTWARE ENGINEERING Prof.N.L.Sarda Computer Science & Engineering IIT Bombay Lecture #10 Process Modelling DFD, Function Decomp (Part 2) Let us continue with the data modeling topic. So far we have seen

More information

Cognitive Walkthrough. Francesca Rizzo 24 novembre 2004

Cognitive Walkthrough. Francesca Rizzo 24 novembre 2004 Cognitive Walkthrough Francesca Rizzo 24 novembre 2004 The cognitive walkthrough It is a task-based inspection method widely adopted in evaluating user interfaces It requires: A low-fi prototype of the

More information

Topic C. Communicating the Precision of Measured Numbers

Topic C. Communicating the Precision of Measured Numbers Topic C. Communicating the Precision of Measured Numbers C. page 1 of 14 Topic C. Communicating the Precision of Measured Numbers This topic includes Section 1. Reporting measurements Section 2. Rounding

More information

Creating Charts in Office 2007 Table of Contents

Creating Charts in Office 2007 Table of Contents Table of Contents Microsoft Charts... 1 Inserting a Chart in Excel... 1 Tip Shortcut Key to Create a Default Chart in Excel... 2 Activating Your Chart... 2 Resizing an Embedded Chart... 2 Moving a Chart...

More information

chapter 3 the interaction

chapter 3 the interaction chapter 3 the interaction ergonomics physical aspects of interfaces industrial interfaces Ergonomics Study of the physical characteristics of interaction Also known as human factors but this can also be

More information

Security Device Roles

Security Device Roles Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

1 GSW Bridging and Switching

1 GSW Bridging and Switching 1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges

More information

12 Advanced IP Addressing

12 Advanced IP Addressing 12 Advanced IP Addressing CERTIFICATION OBJECTIVES 12.01 Variable-Length Subnet Masking 12.02 Route Summarization Q&A Two-Minute Drill Self Test 2 Chapter 12: Advanced IP Addressing In Chapter 11, you

More information

Text and Lists Use Styles. What Are Styles?

Text and Lists Use Styles. What Are Styles? Creating Accessible Word Documents Using Microsoft Word 2003 Cassandra Tex, MBA Assistive Technology Specialist Student Disability Resource Center Humboldt State University Word documents are inherently

More information

Quick Start Guide to using Light Converse along with Pangolin LD2000 and BEYOND

Quick Start Guide to using Light Converse along with Pangolin LD2000 and BEYOND Quick Start Guide to using Light Converse along with Pangolin LD2000 and BEYOND First Steps Regardless of when or from whom you purchased Light Converse, we recommend you do the following steps before

More information

Gloucester County Library System EXCEL 2007

Gloucester County Library System EXCEL 2007 Gloucester County Library System EXCEL 2007 Introduction What is Excel? Microsoft E x c e l is an electronic s preadsheet program. I t is capable o f performing many diff e r e n t t y p e s o f c a l

More information

TNM093 Tillämpad visualisering och virtuell verklighet. Jimmy Johansson C-Research, Linköping University

TNM093 Tillämpad visualisering och virtuell verklighet. Jimmy Johansson C-Research, Linköping University TNM093 Tillämpad visualisering och virtuell verklighet Jimmy Johansson C-Research, Linköping University Introduction to Visualization New Oxford Dictionary of English, 1999 visualize - verb [with obj.]

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Using Excel This is only a brief overview that highlights some of the useful points in a spreadsheet program.

Using Excel This is only a brief overview that highlights some of the useful points in a spreadsheet program. Using Excel 2007 This is only a brief overview that highlights some of the useful points in a spreadsheet program. 1. Input of data - Generally you should attempt to put the independent variable on the

More information

coding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight

coding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight Three-Dimensional Object Reconstruction from Layered Spatial Data Michael Dangl and Robert Sablatnig Vienna University of Technology, Institute of Computer Aided Automation, Pattern Recognition and Image

More information

Become strong in Excel (2.0) - 5 Tips To Rock A Spreadsheet!

Become strong in Excel (2.0) - 5 Tips To Rock A Spreadsheet! Become strong in Excel (2.0) - 5 Tips To Rock A Spreadsheet! Hi folks! Before beginning the article, I just wanted to thank Brian Allan for starting an interesting discussion on what Strong at Excel means

More information

How & Why We Subnet Lab Workbook

How & Why We Subnet Lab Workbook i How & Why We Subnet Lab Workbook ii CertificationKits.com How & Why We Subnet Workbook Copyright 2013 CertificationKits LLC All rights reserved. No part of this book maybe be reproduced or transmitted

More information

We aren t getting enough orders on our Web site, storms the CEO.

We aren t getting enough orders on our Web site, storms the CEO. In This Chapter Introducing how Ajax works Chapter 1 Ajax 101 Seeing Ajax at work in live searches, chat, shopping carts, and more We aren t getting enough orders on our Web site, storms the CEO. People

More information

Using surface markings to enhance accuracy and stability of object perception in graphic displays

Using surface markings to enhance accuracy and stability of object perception in graphic displays Using surface markings to enhance accuracy and stability of object perception in graphic displays Roger A. Browse a,b, James C. Rodger a, and Robert A. Adderley a a Department of Computing and Information

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

There we are; that's got the 3D screen and mouse sorted out.

There we are; that's got the 3D screen and mouse sorted out. Introduction to 3D To all intents and purposes, the world we live in is three dimensional. Therefore, if we want to construct a realistic computer model of it, the model should be three dimensional as

More information

Resource Guide Implementing QoS for WX/WXC Application Acceleration Platforms

Resource Guide Implementing QoS for WX/WXC Application Acceleration Platforms Resource Guide Implementing QoS for WX/WXC Application Acceleration Platforms Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Table

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

FUZZY INFERENCE SYSTEMS

FUZZY INFERENCE SYSTEMS CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can

More information

Healthcare IT A Monitoring Primer

Healthcare IT A Monitoring Primer Healthcare IT A Monitoring Primer Published: February 2019 PAGE 1 OF 13 Contents Introduction... 3 The Healthcare IT Environment.... 4 Traditional IT... 4 Healthcare Systems.... 4 Healthcare Data Format

More information

Tips and Techniques for Designing the Perfect Layout with SAS Visual Analytics

Tips and Techniques for Designing the Perfect Layout with SAS Visual Analytics SAS2166-2018 Tips and Techniques for Designing the Perfect Layout with SAS Visual Analytics Ryan Norris and Brian Young, SAS Institute Inc., Cary, NC ABSTRACT Do you want to create better reports but find

More information

Creating a new form with check boxes, drop-down list boxes, and text box fill-ins. Customizing each of the three form fields.

Creating a new form with check boxes, drop-down list boxes, and text box fill-ins. Customizing each of the three form fields. In This Chapter Creating a new form with check boxes, drop-down list boxes, and text box fill-ins. Customizing each of the three form fields. Adding help text to any field to assist users as they fill

More information

Running Minitab for the first time on your PC

Running Minitab for the first time on your PC Running Minitab for the first time on your PC Screen Appearance When you select the MINITAB option from the MINITAB 14 program group, or click on MINITAB 14 under RAS you will see the following screen.

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Direct Variations DIRECT AND INVERSE VARIATIONS 19. Name

Direct Variations DIRECT AND INVERSE VARIATIONS 19. Name DIRECT AND INVERSE VARIATIONS 19 Direct Variations Name Of the many relationships that two variables can have, one category is called a direct variation. Use the description and example of direct variation

More information

Tracking Packet Flow Using Path Analysis

Tracking Packet Flow Using Path Analysis CHAPTER 4 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network and the physical and

More information

OX Documents Release v Feature Overview

OX Documents Release v Feature Overview OX Documents Release v7.8.4 Feature Overview 1 Objective of this Document... 3 1.1 The Purpose of this Document... 3 2 General Improvements... 4 2.1 Security First: Working with Encrypted Files (OX Guard)...

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Excel Core Certification

Excel Core Certification Microsoft Office Specialist 2010 Microsoft Excel Core Certification 2010 Lesson 6: Working with Charts Lesson Objectives This lesson introduces you to working with charts. You will look at how to create

More information

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:

More information

Chapter 5. Projections and Rendering

Chapter 5. Projections and Rendering Chapter 5 Projections and Rendering Topics: Perspective Projections The rendering pipeline In order to view manipulate and view a graphics object we must find ways of storing it a computer-compatible way.

More information

Testing is a very big and important topic when it comes to software development. Testing has a number of aspects that need to be considered.

Testing is a very big and important topic when it comes to software development. Testing has a number of aspects that need to be considered. Testing Testing is a very big and important topic when it comes to software development. Testing has a number of aspects that need to be considered. System stability is the system going to crash or not?

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Introduction to 3D Concepts

Introduction to 3D Concepts PART I Introduction to 3D Concepts Chapter 1 Scene... 3 Chapter 2 Rendering: OpenGL (OGL) and Adobe Ray Tracer (ART)...19 1 CHAPTER 1 Scene s0010 1.1. The 3D Scene p0010 A typical 3D scene has several

More information

Tracking Packet Flow Using Path Analysis

Tracking Packet Flow Using Path Analysis CHAPTER 5 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network, including the physical

More information

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 inside: SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN & The Advanced Computing Systems Association & The System Administrators

More information

Creating a Basic Chart in Excel 2007

Creating a Basic Chart in Excel 2007 Creating a Basic Chart in Excel 2007 A chart is a pictorial representation of the data you enter in a worksheet. Often, a chart can be a more descriptive way of representing your data. As a result, those

More information