IP Training Programme

Size: px
Start display at page:

Download "IP Training Programme"

Transcription

1 IP Tranng Programme Module 1: IP Generc Sesson 4: Applcatons and protocols ROUTING PROTOCOLS 1

2 Route table creaton The route table n routers can be created and mantaned n two ways 1: Statc route table entry Entres are entered manually 2: Dynamc route table entry Entres are sent between routers automatcally Requre the use of a Routng protocol such as RIP, OSPF, IS-IS or BGP RIP RIP wll transmt ts Routng table to ts neghbor routers every. seconds. The neghbors wll learn the transmttng routers logcal networks. The neghbors wll transmt ther routng tables so the local router learns ther logcal networks. 2

3 Convergence! Everybody knows everybody Route table R2 NETWORK SEND TO HOP / / / / / / / Route table R NETWORK SEND TO HOP / / / / / / / Route table R1 NETWORK SEND TO HOP / / / / / / / Route table R4 NETWORK SEND TO HOP / / / / / / / NAT translaton prvate IP addresses NAT: Network Address Translaton -one to one IP address translaton Translates IP addresses from nsde to outsde network Prvate IP adresses allocated to be used behnd NAT -1.../ to / to / to NAT hdes the nsde network (LAN) from the outsde

4 NAT tabel NAT and PAT TCP and UDP uses port numbers. NAT/PAT software keeps track on connectons usng: - Protocol ( eg. TCP) - Insde from IP ( eg ) - Insde from port ( eg. Port 1152) - Outsde to IP ( eg ) - Outsde to port ( eg. port 8) The fve parameters descrbe a unque connecton Always unque ports Data From port 8 To port 115 T C P From IP Insde net: /24 1 To IP SOHO Router wth NAT and PAT WAN address Outsde net: /2 Data From To port port T C P From IP To IP Internet Protocol TCP Insde Indre network NAT NAT tabel table Outsde Ydre network From To Protocol From : :8 TCP :1152 To :8 TCP : :8 TCP : :8 TCP : :8 TCP : :8 4

5 Wndows DNS Server Wndows server verson 2, 28 and 212 has ntutve DNS server management tools. mal.mydoman.com A record ponts to A record ponts to mal.mydoman.com MX record (preference=1) mal.myotherdoman.dk MX record (preference=2) MX Mal exchange DNS zone records Shows Mal servers for the doman. The ascom.se doman has two mal servers Mal.ascom.se and mal.ascom.nl The malserver wth lowest preference has hghest prorty and wll be used frst. If unreachable the next lowest preference s tred. The IP address of the mal server(s) s found usng a A- record lookup 5

6 DHCP Clent DHCP Clent DHCP example DHCP lease pool on server: IP address range: Subnet mask: DNS server: Default gateway: Net: /24 ROUTER Internet DHCP Server Statc IP address DHCP Clent 1. DHCP-Dscover 2. DHCP-Offer DHCP Server(s). DHCP-Request DNS server DHCP-Ack Network DHCP Relay one server many logcal networks Server 1 DNS DHCP Server 2 FIL PRINT Clent Prnter Clent Clent Clent DHCP 254 DHCP DHCP 2 SW1 DHCP SW2 SW 1 Buldng / /24 1 R / 2 R2 DHCP Buldng / R Buldng Internet DHCP relay confgured s on on router Router nterfaces facng the DHCP clents to forward ncomng. DHCP packets to

7 DHCP optons Wndows DHCP server optons confguraton example TFTP servers are often used to store IP phones confguraton fles. Subnettng Classfull IP addresses Network part Host part For example: /1 Network part Host part: 4.5 Classless IP addresses Network part Subnet part Host part For example /24 Network part: Host part: 5 7

8 Classless IP addresses Subnettet class B network as /24 One class B net subnettet to 25 subnets Network Subnet mask Max hosts Exponentaton Mathematcal operaton Called potens n Swedsh, Norwegan and Dansh. 2 5 = 2 ^ 5 = = = 7 ^ 2 = 7 7 = = 2 ^ 4 = Often used when dealng wth numerc systems. 8

9 Numerc systems II ^ = 71 = 7 1^1 = 1 = 1^2 = 1 = 81^ = 81 = 8 Decmal sum = ^ = 11 = 1 2^1 = 2 = 12^2 = 14 = 4 12^ = 18 = 8 Decmal sum = 1 The bnary byte ^ = 11 = 1 12^1 = 12 = 2 12^2 = 14 = 4 12^ = 18 = 8 12^4 = 11 = 1 12^5 = 12 = 2 12^ = 14 = 4 12^7 = 1128 = 128 Decmal sum = 255

10 The bnary byte ^ = 11 = 2^1 = 12 = 2^2 = 14 = 12^ = 18 = 8 12^4 = 11 = 1 12^5 = 12 = 2 12^ = 14 = 4 12^7 = 1128 = 128 Decmal sum = 248 Classless IP addresses A bnary 1 n the subnet mask means the bt belongs to the logcal network or subnet A bnary n the subnet mask means the bt belongs to the host part of the IP address Prefx Subnet mask - decmal Subnet mask - bnary / / / / / / /

11 Classless IP addresses To adapt the sze of a logcal network to customer networks the classes were abandoned. Subnets s logcal networks prefx Subnet mask Subnets Max hosts / / / / / / / Network and broadcast Two IP addresses of each logcal network s reserved for specal purposes. They are llegal as host IP addresses All host bts s the logcal network name All host bts 1 s the local broadcast IP address For example the /24 network s the network name s the broadcast address Usable IP address ranges from to A total of 254 usable addresses 11

12 A /24 network Net part Host part = = = All. host 54.2 bts = zero Ths. s a Illegal IP 54. address = 1111 and s used as the.4 network = 1111 name = = = = All 181. host bts = one Ths s a Illegal IP. address and s used as.. 15 the. 181 broadcast = address 1111 of. the = network = = = = /24 Two /25 networks Net part - subnet part blue Host part = = All seven host bts one. Ths s a = Illegal. IP address and s. used as the.2 broadcast = 1111 address of the = Network / = = = = = = All. 181 seven host = bts 1111 zero. Ths s a Illegal IP. address 11 = 1111 and s. used as = the network name / = = = / /25 12

13 Four /2 networks Net part - subnet part blue Host part = = = = = = = = = = = = = = = = = / / / /2 Subnettng The centerrouter wll example route traffc to the branches based on the subnet bts = Vborg 1 = Oslo 1 = Stockholm 11 = Copenhagen WS WS 48 WS WS WS WS 44 WS WS /2 DG: Usable IP s: 2 Vborg /2 DG: Usable IP s: 2 Oslo Stockholm /2 DG: Usable IP s: Copenhagen /2 DG: Usable IP s: 2 WS WS 58 WS WS... The nternet provder wll route All trafc to /24 To the center router WS WS 5 WS WS... 1

14 PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs Subnettng example WS WS 48 WS WS WS WS 44 WS WS /2 DG: Usable IP s: 2 Vborg /2 DG: Usable IP s: 2 Oslo Stockholm /2 DG: Usable IP s: Copenhagen /2 DG: Usable IP s: 2 WS WS 58 WS WS... The nternet provder wll route All trafc to /24 To the center router WS WS 5 WS WS IP TELEPHONY AND VOICE VLAN 14

15 PQRS TUV 7 messages servces drectores settngs PQRS TUV PQRS TUV 7 messages servces drectores settngs 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs IP Telephony In a normal DHCP voce Server call 5 Call packets Manager per second s sent n each drecton. One packet each.2 second Router VPN wth QoS Voce Gateway The VPN connects the companes branches The Call Manager s a nto voce one call bg Processng IP network. system The allowng voce QoS gateway IP (Qualty phones connects of to Servce) call each the needed prvate other to ensure Voce IP and phone drect good system calls voce to to and qualty the from global n PSTN conversatons PSTN (Publc Swtched Telephone Network) PSTN Router QoS Qualty of Servce VPN Vrtuel Prvate Network. (MPLS) PSTN Publc Swtched Telephone Network IP Telephony IP telephony s an nstant servce Voce packet stream between phones Normaly 5 packets per second To ensure good voce qualty, voce packets should be transferred between phones Wth low delay ( < 15mS) Wth lttle jtter (< ms) Jtter s varable delay between packets n Wth lttle packet loss (< 1%) 15

16 IP Telephony VoIP best practce s separatng voce and data traffc n the network Enhancng securty not mxng VoIP and data Troubleshootng smplfed Easer to deploy Qualty of Servce Two ways of separatng data and voce Two physcal networks One physcal network wth separate VLAN s for voce and data IP Telephony Two physcal networks Expensve 2 x Devces, 2 x cablng and 2 x VPN s Easy to ensure good voce qualty One physcal network Two logcal networks one for voce one for data Usng a data-vlan and a voce-vlan Cheaper More dffcult to ensure voce qualty Need end-to-end qualty of servce confgured 1

17 PQRS TUV 7 messages drectores servces settngs PQRS TUV 7 messages drectores servces settngs PQRS TUV 7 messages drectores servces settngs PQRS TUV 7 messages drectores servces settngs PQRS TUV 7 messages drectores servces settngs PQRS TUV 7 messages drectores servces settngs VLAN Revew Vrtual Local Area Network Swtch ports belong to a VLAN Devces on same VLAN can communcate Swtch ports confgured as trunks can exchange VLAN traffc between swtches VLAN 1 VLAN 2 TRUNK VLAN capable swtch 82.1Q Trunk 82.1Q Trunk VLAN capable swtch VLAN 1 VLAN 1 VLAN 2 VLAN 2 Voce VLAN opton 1 Traffc separated physcally between swtch and users desk One cable and one swtch port for users PC One cable and one swtch port for users IP Phone Expensve n cablng and swtches VLAN 1 VLAN 2 Data Voce TRUNK VLAN capable swtch 82.1Q Trunk 82.1Q Trunk VLAN capable swtch VLAN 1 VLAN 1 VLAN 2 VLAN 2 17

18 PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs Voce VLAN opton 2 Traffc IP phone ethernet separated port connects logcally to between swtch and Swtch users n rack desk closet typcally through RJ45 wall plug. Use IP phones wth bult-n trunk capablty Buld n three-port swtch n the IP Phone One phone swtch port n used as trunk One phone swtch port used by the IP phone t self One phone swtch port used to connect the PC IP phone ethernet port connects to Users PC Voce VLAN opton 2 Data traffc carred n VLAN 1 Voce traffc carred n VLAN 2 VLAN 1 VLAN 2 Data Voce TRUNK VLAN capable swtch Trunk Trunk VLAN capable swtch VLAN 1 VLAN 1 VLAN 2 VLAN 2 Trunk Trunk Trunk Trunk Trunk Trunk 18

19 PoE Power over Ethernet Most IP phones are powered by 48 Vdc Many IP phones can get power from External power supply connected to mans From swtches capable of delverng power PoE or Power over Ethernet Pcture below s a partal prntout from a PoE capable swtch NETWORK SECURITY BEST PRACTICE 1

20 Encrypton/Decrypton Transmtter ORANGE RUDQJH Insecure network RUDQJH Recever ORANGE Encrypton algortm Decrypton algortm Encrypton algorthm: Caesar cpher (Very nsecure) Encrypton key : (Shft cpher letters) Plan alfabet : GHIJKLPQRSTUV Cpher alfabet : GHIJKLPQRSTUV Plan text : ORANGE Cpher text : RUDQJH Breakng a cpher text To break an encrypted message the code breaker must know: Encrypton algorthm Encrypton key The most common encrypton algorthm are publc we all use them Payng over the nternet Usng secure WEB-pages ( The code breaker knows the encrypton algorthm but not the secret key 2

21 Brute force code breakng Test all possble keys Compare clear text wth database wth common words Codebreaker fnd key n four attempts! Key : RUDQJH Key 1: QTCPIG Key 2: PSBOHF Key : ORANGE Key 4: NQMFD Key 5: MP8LEC Key : LO7KDB Key 7: KNJCA Key 8: JM5IB Key : IL4HA8 Key 1: HKG7 Key 11: GJ2F8 Key 12: FI1E75 Key 1: EHD4 Key 14: DGZC5 Key 15: CFYB42 Key 1: BEXA1 Key 17: ADW2 Key 18: CV81Z Key 1: 8BU7Y Key 2: 7ATZX Key 21: S5YW Key 22: 58R4XV Key 2: 47QWU Key 24: P2VT Key 25: 25O1US Key 2: 14NTR Key 27: MZSQ Key 28: Z2LYRP Key 2: Y1KXQO Key : XJWPN Key 1: WZIVOM Key 2: VYHUNL Key : UXGTMK Key 4: TWFSLJ Key 5: SVERKI Strong keys necessary Encrypton standards Standard Key sze Status Tme requred to break Caesar (less than bt) Very nsecure,...72 second DES 5 bt Insecure 4 days Trple DES 5, 112 or 18 bt (In)secure 112 bt key: 8 days AES 128, 12 or 25 bt Secure 128 bt key: 5 x 1^21 year Tme requred to check all possble keys at 5... keys per second. (reference DES = Data Encrypton Standard AES = Advanced Encrypton Standard Theoretcal number of keys: 5 bt = 2^5 = BIT = 2^25 =

22 Network securty Network desgners protect the network nfrastructure and servers by Establshng trust boundares Frewalls Network desgners protect network from Intruson from unwanted sources Non-authorzed equpment User authentcaton and user rghts Physcal locked server rooms and wrng closets Eavesdroppng by encryptng data MAC address floodng A swtch sorts traffc based on MAC addresses. A swtch has lmted memory 22

23 MAC address floodng Symptom: An attacker sends thousands of ethernet frames to a swtch wth random source MAC addresses The swtchs lmted memory wll be consumed and the swtch wll flood traffc to all ports for ethernet frames wth unknown destnatons. The attacker can snff packets and gan access to senstve data MAC address floodng Counter measures: A port securty feature whch lmts the number of MAC addresses on a per port bass Often programmable per port number Often the port wll shut down for a perod of tme f maxmum number exceeded Impact When addng equpment n exstng customer networks port securty may shut down the port unntentonally 2

24 Hash functon A hash s a mathematcal functon Maps varable length data to fxed length data Used to protect passwords Password not stored on server Hash stored on server Notce small change n password e to LDAP Lghtweght Drectory Access Protocol 24

25 LDAP Lghtweght Drectory Access Protocol Lke an electronc telephone drectory LDAP server The drectory LDAP clent The user The LDAP server for example holds Logn credentals (username, password) User nformaton (name, offce) Extenson numbers for IP-Phones Authorzaton nformaton The LDAP server s used for centralzed logn LDAP Lghtweght Drectory Access Protocol Dfferent knd of systems use the same source for nformaton (The drectory) IP Phones Servers Clent computers One drectory for all systems Needs redundancy (No sngle pont of falure) LDAP s a common protocol used by hosts to access the drectory and ts entres. LDAP s a TCP/IP based protocol 25

26 PQRS TUV 7 messages servces drectores settngs PQRS TUV 7 messages servces drectores settngs LDAP example PC1 IP phone 1 Server 1 LDAP Server Server 2 Fle server Server VoIP server PC2 IP phone 2 The LDAP server holds nformaton about all Server users 5 and IP Server 4 Prnt server phones Applcaton server For example SW2 Name: Henrk When Thomsen loggng n on Name: PC2 the Jens pc wll Broberg connect to the LDAP Logn name: R heth server and check Logn logn name: name jebr and password. Password: Buldng 112kj12e87 Password: k12kje1 Buldng 2 Phone extenson: 45 Phone extenson: 457 PSTN VG FW Internet Server room ACTIVE DIRECTORY 2

27 Actve Drectory AD or ADS AD s a Mcrosoft developed drectory servce buld for Mcrosoft Wndows Domans A doman s collecton of resources (servers ) Uses LDAP for communcaton Uses DNS for name resoluton Hostnames to and from IP addresses Uses encrypton and secure logn The AD doman A doman contan at least one DC DC Doman Controller The DC holds the Actve Drectory Doman contoller Member servers Clents ascom.no 27

28 The AD doman There must be a DNS server for the doman Automatcally nstalled when nstallng AD Host regster ther names and IP addresses to the DNS server All hosts n the doman has ts own A-record For example: A record n DNS IP address dc.ascom.no server1.ascom.no server2.ascom.no clent1.ascom.no clent2.ascom.no Doman contoller Member servers Clents ascom.no The AD tree A tree consst of at least one doman Domans n a tree trust each other Doman contoller Member servers Clents ascom.no Doman contoller Doman contoller Member servers Member servers Clents tech.ascom.no Clents adm.ascom.no 28

29 The AD forest A forest consst of at least one tree trees n a forest confgures to trust each other It s possble to buld bg organzatonal networks reflectng the actual organzaton Not organzaton adaptng to technology but technology adaptng to organzaton Doman contoller Doman contoller Doman contoller Member servers Member servers Member servers Clents ascom.se Clents ascom.no Clents ascom.dk Doman contoller Doman contoller Doman contoller Doman contoller Doman contoller Doman contoller Member servers Member servers Member servers Member servers Member servers Member servers Clents tech.ascom.se Clents adm.ascom.se Clents tech.ascom.no Clents adm.ascom.no Clents tech.ascom.dk Clents adm.ascom.dk Buzzword Doman member Some AD buzzwords Explanaton A host server or clent belongng to a doman Doman controller(s) One ore more servers holdng the Actve Drectory Doman Tree Forest Object OU Conssts of at least one DC and zero or more doman members A tree conssts of one or more domans grouped n a herarchy A collecton of one or more trees A collecton of propertes whch together s a resource For example a user s an object consstng of many propertes -username, logn name, password, extenson.. Organzatonal Unt A contaner holdng objects for easy admnstraton. For example: If a OU s holdng 1 user objects You can confgure a polcy on the OU to a new background mage on the desktop. Then all the users PC s wll show that mage. 2

30 AD screenshot SERVER TECHNOLOGIES

31 Clent/Server Bascally a clent s a program that ask a queston usng a specfc protocol Bascally a server s a program that can answer a queston usng the same specfc protocol. For example A web browser (clent) requestng to see a web page usng the http protocol. (request) The web server sendng the web-page to the clent usng the http protocol. (response) Server operatng systems Dfferent knd of server operatng systems exst For example Wndows 28 server Wndows 212 server Redhat enterprse server Lnux verson Ubuntu Lnux server verson 12.1 IBM AIX Unx verson 7.1 Apple Mac OS server IBM (Prevously OS/4). 1

32 Whch server goes where? Bascally all server OS solves the same tasks Runnng server programs A specfc OS s chosen from Preference (What the admnstrator lkes) Prce and performance Some server programs can only run on some server OS s For example Mcrosoft Exchange Server Busness Crtcal server programs such as bg bankng server runnng on a huge IBM manframe Thank you for lstenng 2

IP Training Programme. Module 1: IP Generic Session 3: IP Services

IP Training Programme. Module 1: IP Generic Session 3: IP Services IP Training Programme Module 1: IP Generic Session 3: IP Services Subjects Review The IP Address continued Routing protocols (Concept) Firewalll and NAT DNS server and DNS operation concept DHCP server

More information

kccvoip.com basic voip training NAT/PAT extract 2008

kccvoip.com basic voip training NAT/PAT extract 2008 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

Product documentation. Issue:

Product documentation. Issue: Product documentaton Issue: 02.05.2017 Table of Contents Product documentaton 1 enet SMART HOME system... 5 1.1 System requrements... 5 1.2 Commssonng va... 5 1.3 Operaton va enet SMART HOME app... 7 2

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Security. Workplace Manager

Security. Workplace Manager User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

Cisco TelePresence MCU 4200 Series

Cisco TelePresence MCU 4200 Series Csco TelePresence MCU 4200 Seres Gettng started 61-0002-08 Contents General nformaton... 3 About the Csco TelePresence MCU 4200 Seres... 3 Package contents... 3 Port and LED locaton... 3 LED behavor...

More information

Codian MCU MCU 4200 Series

Codian MCU MCU 4200 Series Codan MCU MCU 4200 Seres Gettng started Codan MCU MCU 4200 Seres Gettng started Copyrght Codan 2008. All rghts reserved. Ths Gettng Started Gude may not be coped, photocoped, translated, reproduced, or

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013 Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Setup and Use. Version 3.7 2/1/2014

Setup and Use. Version 3.7 2/1/2014 Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng

More information

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

User Manual SAPERION Rich Client 7.1

User Manual SAPERION Rich Client 7.1 User Manual SAPERION Rch Clent 7.1 Copyrght 2016 Lexmark. All rghts reserved. Lexmark s a trademark of Lexmark Internatonal, Inc., regstered n the U.S. and/or other countres. All other trademarks are the

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Informaton Assurance Certfcaton Paper Copyrght SANS Insttute Author Retans Full Rghts Ths paper s taken from the GIAC drectory of certfed professonals. Repostng s not permted wthout express wrtten

More information

TRAINING LEVEL II. RECIPIENTS Installation companies with the MD training lv1 Distributors with MD training lv1

TRAINING LEVEL II. RECIPIENTS Installation companies with the MD training lv1 Distributors with MD training lv1 TRAINING LEVEL II RECIPIENTS Installaton companes wth the MD tranng lv1 Dstrbutors wth MD tranng lv1 - Z-WAVE - APPs - LP283WD - LP15 - PSB - OCT41 - OC66 - DI32 - OF88 - AC88 - LD88 - METEO - LED88 -

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

User Manual SAPERION Web Client 7.1

User Manual SAPERION Web Client 7.1 User Manual SAPERION Web Clent 7.1 Copyrght 2016 Lexmark. All rghts reserved. Lexmark s a trademark of Lexmark Internatonal, Inc., regstered n the U.S. and/or other countres. All other trademarks are the

More information

Thomson Gateways and Multiple IP Adresses

Thomson Gateways and Multiple IP Adresses Thomson Gateways and Multple IP Adresses Date: June 2007 Verson: v1.0 Abstract: Applcablty: Ths applcaton note provdes techncal nformaton on how the Thomson Gateway DSL routers can be ntegrated n varous

More information

Reclaiming the Brain: Useful OpenFlow Functions in the Data Plane

Reclaiming the Brain: Useful OpenFlow Functions in the Data Plane Reclamng the Bran: Useful OpenFlow Functons n the Data Plane Lron chff (Tel Avv Un, Israel) Mchael Borokhovch (UT Austn, Unted tates) tefan chmd (TU Berln & T-Labs, Germany) My Talk n One lde eparaton

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Informaton Assurance Certfcaton Paper Copyrght SANS Insttute Author Retans Full Rghts Ths paper s taken from the GIAC drectory of certfed professonals. Repostng s not permted wthout express wrtten

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

VideoJet X10 SN Network Video Server. Installation and Operating Manual

VideoJet X10 SN Network Video Server. Installation and Operating Manual VdeoJet X10 SN Network Vdeo Server en Installaton and Operatng Manual VdeoJet X10 SN VdeoJet X10 SN Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual

More information

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization What s a Computer Program? Descrpton of algorthms and data structures to acheve a specfc ojectve Could e done n any language, even a natural language lke Englsh Programmng language: A Standard notaton

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization Annales Informatca AI 1 (2003) 277-284 Annales Informatca Lubln-Polona Secto AI http://www.annales.umcs.lubln.pl/ Desgnng of multchannel optcal communcaton systems topologes crtera optmzaton Mrosław Hajder,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV SMART PHOTO PRINTER MODEL SmartD90-EV USER'S GUIDE Verson V1.5.2.0 1 TABLE OF CONTENTS Introducton Introducton 3 Bascs 4 Constructon of compostons 5 Operaton Easy Prnt Servce 8 Fun Prnt Servce 10 Sharng

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

THE HEAT CONTROLLER RADIATOR THERMOSTAT FGT-001

THE HEAT CONTROLLER RADIATOR THERMOSTAT FGT-001 OPERATING MANUAL EN THE HEAT CONTROLLER RADIATOR THERMOSTAT FGT-001 CONTENTS #1: Descrpton and features 3 #2: Basc actvaton 4 #3: Addng to Z-Wave network 5 #4: Removng the devce 6 #5: Controllng the temperature

More information

INSTALL AND REGISTER PASTEL EVOLUTION

INSTALL AND REGISTER PASTEL EVOLUTION INSTALL AND REGISTER PASTEL EVOLUTION LESSON 1 LEARNING OUTCOME The purpose of ths lesson s to successfully nstall and regster Pastel Evoluton. LEARNING OBJECTIVES On completon of ths lesson, you wll be

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Memory and I/O Organization

Memory and I/O Organization Memory and I/O Organzaton 8-1 Prncple of Localty Localty small proporton of memory accounts for most run tme Rule of thumb For 9% of run tme next nstructon/data wll come from 1% of program/data closest

More information

If you miss a key. Chapter 6: Demand Paging Source:

If you miss a key. Chapter 6: Demand Paging Source: ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Filling level and Temperature Sensor HFT C4 / R / MD

Filling level and Temperature Sensor HFT C4 / R / MD Fllng level and Temperature Sensor HFT C4 / R / MD Level measurng range 0.25-5.0 m Pressure measurng range 0-0.5 bar Temperature measurng range -10 100 C Voltage supply 18 30 V DC Features Fllng level

More information

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

F-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727)

F-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727) ONICON Flow and Energy Measurement F-5000 Vew Software Installaton and Operaton Gude 11451 Belcher Road South, Largo, FL 33773 USA Tel +1 (727) 447-6140 Fax +1 (727)442-5699 2032-1 / 107050 Rev B www.oncon.com

More information

National CyberWatch Center Information Security Curricula

National CyberWatch Center Information Security Curricula Natonal CyberWatch Center Informaton Securty Currcula A Complete Soluton for Hgher Educaton Insttutons NATIONALCYBERWATCH.ORG About Natonal CyberWatch Table of contents In October 2016, the Natonal Scence

More information

Operating Manual CELVIN NAS

Operating Manual CELVIN NAS Operatng Manual System CELVIN NAS Congratulatons on your purchase of an nnovatve product from Fujtsu. Latest nformaton about our products, tps, updates etc. can be found on the Internet at: http://www.fujtsu.com/fts/

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Alufix Expert D Design Software #85344

Alufix Expert D Design Software #85344 238 ALUFIX SOFTWARE Alufx Expert 2014 3D Desgn Software #85344 Alufx Expert software makes automatc desgns for fxtures wth correspondng partlsts. You choose the system and defne clampng ponts. The software

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Operating Manual CELVIN NAS

Operating Manual CELVIN NAS Operatng Manual System CELVIN NAS Congratulatons on your purchase of an nnovatve product from Fujtsu. Latest nformaton about our products, tps, updates etc. can be found on the Internet at: http://www.fujtsu.com/fts/

More information

Guidelines for Developing Effective Slide Presentations

Guidelines for Developing Effective Slide Presentations Gudelnes for Developng Effectve Slde Presentatons Most presentatons consst of three man components: Content Vsuals Delvery Content Know your materal. No matter how great your presentaton looks, nothng

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

2Wire IG 2700 ADSL Router. RJ45 connecting cable

2Wire IG 2700 ADSL Router. RJ45 connecting cable Technical Support Information Case 6. BT 2Wire 2700 ADSL Router (BT Business Hub) configuration to allow a BT Versatility Broadband Module (BBM) IP Gateway connection for VoIP (IP Trunks and IP Extensions)

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Configuration guide. PlantWatchPRO. supervisor for small-medium installations LEGGI E CONSERVA QUESTE ISTRUZIONI READ AND SAVE THESE INSTRUCTIONS.

Configuration guide. PlantWatchPRO. supervisor for small-medium installations LEGGI E CONSERVA QUESTE ISTRUZIONI READ AND SAVE THESE INSTRUCTIONS. 30/06/2006 30/06/2006 30/06/2006 30/06/2006 16:36:16 16:36:16 16:36:16 16:36:16 X X X 30/06/2006 30/06/2006 30/06/2006 30/06/2006 16:36:16 16:36:16 16:36:16 16:36:16 X X 30/06/2006 16:36:16 16:36:16 16:36:16

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Elements of a wireless network

Elements of a wireless network Chapter 6 Wreless Elements of a wreless network network nfrastructure nfrastructure mode base staton connects mobles nto wred network handoff: moble changes base staton provdng connecton nto wred network

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze yourself wth your telephone Important

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

T3 (IP) Comfort connected to Integral 5

T3 (IP) Comfort connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Comfort connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze

More information

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011 9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz

#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz ADRIAN PERRIG & TORSTEN HOEFLER Networks and Operatng Systems (-6-) Chapter 6: Demand Pagng http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor () # Inverted table One system-wde table

More information

ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Page Table Structures Page table structures Page table structures Problem: smple lnear table s too bg Problem:

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Mellanox CloudX, Mirantis Fuel Solution Guide

Mellanox CloudX, Mirantis Fuel Solution Guide Mellanox CloudX, Mrants Fuel Soluton Gude Rev.0 www.mellanox.com NOTE: THIS HARDWARE, SOFTWARE OR TEST SUITE PRODUCT ( PRODUCT(S) ) AND ITS RELATED DOCUMENTATION ARE PROVIDED BY MELLANOX TECHNOLOGIES AS-IS

More information

Configuration Manual. Label Printer EOS

Configuration Manual. Label Printer EOS Confguraton Manual Label Prnter EOS 2 Confguraton Manual 2 for the followng products Famly EOS Type EOS1 EOS4 Edton: 01/2013 - Part No. 9009272 Copyrght Ths documentaton as well as translaton hereof are

More information

CISCO SYSTEM ADMINISTRATION (41)

CISCO SYSTEM ADMINISTRATION (41) CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:

More information

User s Guide for Express and Select Class Printers

User s Guide for Express and Select Class Printers User s Gude for Express and Select Class Prnters ImageCard and UltraGrafx Seres June 2000 Part No. 526945-001 Lablty statement Regulatory complance Trademark acknowledgments Propretary Notce Please note

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks Securng Qualty-of-Servce Route Dscovery n On-Demand Routng for Ad Hoc Networks Yh-Chun Hu UC Berkeley yhchun@cs.cmu.edu Davd B. Johnson Rce Unversty dbj@cs.rce.edu ABSTRACT An ad hoc network s a collecton

More information

MRKOMNO. kéï=~ë=çñw= pfabufp=ud. aáöáí~ä=o~çáçöê~éüó. nìáåâ=êéñéêéååé=öìáçé==== båöäáëü

MRKOMNO. kéï=~ë=çñw= pfabufp=ud. aáöáí~ä=o~çáçöê~éüó. nìáåâ=êéñéêéååé=öìáçé==== båöäáëü kéï=~ë=çñw= MRKOMNO pfabufp=ud aáöáí~ä=o~çáçöê~éüó nìáåâ=êéñéêéååé=öìáçé==== båöäáëü 0123 Ths product bears the CE markng n accordance wth the provsons of the Councl Drectve 93/42/EEC of June 14, 1993

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS Adran Andronache 1 ), Matthas R. Brust 2 ), Steffen Rothkugel 3 ) Abstract The concept of self-organzaton already exsts

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents...

More information

Computer models of motion: Iterative calculations

Computer models of motion: Iterative calculations Computer models o moton: Iteratve calculatons OBJECTIVES In ths actvty you wll learn how to: Create 3D box objects Update the poston o an object teratvely (repeatedly) to anmate ts moton Update the momentum

More information

Installation Instructions. METRAwin Version 8/ Calibration Software

Installation Instructions. METRAwin Version 8/ Calibration Software Installaton Instructons METRAwn 90 Calbraton Software 3-349-717-15 Verson 8/05.13 Copyrght Copyrght 2003-2013 GMC-I Messtechnk GmbH. All rghts reserved. These nstallaton nstructons, as well as the software

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

AVL. Mobile Data, AVL & Mapping. Track with Confidence

AVL. Mobile Data, AVL & Mapping. Track with Confidence Moble Data, & Mappng Track wth Confdence 3012 MDT MILEAGE REPORTING 5 GENERAL PURPOSE INPUTS CARD READER & PRINTER CAPABILITIES TEXT MESSAGING MOTOTRBO TM & NEXEDGE TM COMPATIBLE Desgned for Two-Way rado

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information