Network Troubleshooting from End-Hosts. Renata Teixeira Laboratoire LIP6 CNRS and UPMC Sorbonne Universités
|
|
- Patrick Mason
- 6 years ago
- Views:
Transcription
1 Network Troubleshooting from End-Hosts Renata Teixeira Laboratoire LIP6 CNRS and UPMC Sorbonne Universités
2 Internet problems are hard to troubleshoot DNS? NAT? DHCP???? Net1 Stanford network Is my connection ok? Net2 Net3 Is it google? Is the problem in one of the networks in path? 2
3 Nobody has the full picture to diagnose problems Net1 Net2 Stanford network Net3 End-users can t know what happens in network Network operators can t know user experience 3
4 End-to-end measurements to rescue Available data depends on who you are Network operators: Data from their own network End-users: Data from their machine End-to-end measurements compensate for missing data Network operators: Deploy monitoring hosts End-users: Monitor some paths and cooperate with other users Troubleshooting is mostly manual and ad-hoc 4
5 Goal Automatically troubleshoot network faults and performance disruptions Fault identification: where is the problem? Most common: traceroute Assist in pinpointing the location of the problem How to measure to obtain accurate location? Automatic detection: is there a problem? Detect problems before users Fast detection requires continuous monitoring How to monitor with less overhead? 5
6 Overview Identification Paris traceroute Network tomography for fault diagnosis Detection Minimizing active probing cost Performance problems as perceived by users End-host measurement platform Fathom: A browser-based platform 6
7 Paris traceroute B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien (LIP6) D. Veitch (U. Melbourne)
8 Traceroute Actual path TTL exceeded from A.1 TTL exceeded from B.1 m A.1 A.2 B.1 B.2 A B TTL = 1 t Inferred path m TTL = 2 A.1 B.1 t 8
9 Traceroute under load balancing Actual path A C m L TTL = 2 E t B D Inferred path m L A.1 TTL = 3 C.1 False link Missing nodes and links E.2 t B.1 D.1 9
10 Errors happen even under per-flow load balancing A C Flow 1 m L TTL = 2 Port 2 E t B D TTL = 3 Port 3 Traceroute uses the destination port as identifier Needs to match probe to response Response only has the header of the issued probe 10
11 Paris traceroute: Removing false links Solves the problem with per-flow load balancing Probes to a destination belong to same flow Changes the location of the probe identifier Use the UDP checksum m L A TTL = 2 Port 1 Checksum 2 C TTL = 3 Port 1 Checksum 3 E t B D 11
12 Paris traceroute: Tracing all the paths Port Port Port 1 35 A C m L E t B Port Port 2 Port 4 6 D Adaptive probing strategy Vary flow id of probes Send enough probes to enumerate all interfaces with high confidence 12
13 Implications Paris traceroute used for topology mapping More accurate routes Identification with Paris traceroute Forwarding loops and some reachability problems Traceroute identifies the effect, not the cause A C m L E t B D 13
14 Network tomography for fault diagnosis
15 Fault diagnosis in collaborative environments Faults are persistent reachability problems Correlate measurements from multiple end-hosts 15
16 Binary tomography Given Complete network topology Path reachability Find the smallest set of links that explains bad paths If link is bad, all paths that cross the links are bad Given bad links are uncommon bad t1 bad m t2 good [Duffield, 2006] 16
17 Practical issues with tomography Given Complete network topology Path reachability Find the smallest set of links that explains bad paths If link is bad, all paths that cross the links are bad Given bad links are uncommon Often unknown Hard to measure correlated reachability Links can fail for some paths, but not for all 17
18 Measurement methods for tomography Methods to measure path reachability Failure confirmation Failure aggregation Methods to track topology NetDiagnoser: A binary tomography algorithm Handles path-specific failures (e.g., misconfigurations) Takes advantage of routing information 18
19 Predicting and tracking Internet path changes with I. Cunha (UPMC/Technicolor) D. Veitch (U. Melbourne) C. Diot (Technicolor)
20 Challenges of tracking topology with traceroute Cannot measure fast enough to detect all changes Network and system limitations Accurate measurements require extra probes Identify all paths under load balancing 20
21 Frequent vs. accurate High measurements Accuracy Paris traceroute Traceroute Tracetree Doubletree Low Frequency High 21
22 Approach Observation: Internet paths are mostly stable Current techniques waste probes Probe according to path stability Separate tasks Change detection: lightweight probing for speed Path remapping: accuracy with Paris traceroute 22
23 Contributions NN4: Predicting Internet path changes Distinguish between stable and unstable paths DTrack: Tracking Internet path changes Lightweight probing process to detect changes Allocates more probes to unstable paths 23
24 Predicting path changes Prediction goals Time until the next change Number of changes in a time interval Whether a path will change in a time interval Identify features that can help with prediction Features must be computable from traceroutes Characteristics of the current path Characteristics of the last path change Behavior of the path in the recent past 24
25 Feature selection RuleFit to identify feature importance Fraction of time path active in the past (prevalence) Number of changes in the past Number of previous occurrences of the current path Path age Four most important features carry all the predictive information 25
26 NN4 predictor RuleFit is hard to integrate in other systems NN4 is based on the nearest-neighbor scheme Compute neighbors by partitioning the path feature state-space Prediction computed as the average behavior of all neighbors Prevalence 26 Changes in the past
27 NN4: summary NN4 is lightweight, easy to integrate, and as accurate as RuleFit Prediction is not highly accurate It is possible to distinguish unstable/stable paths 27
28 DTrack Goal: Given a probing budget, detect as many changes as possible Allocates probing rates per path using NN4 s predictions Targets probes along each path Reduce redundant probes at shared links Spread probes over time 28
29 Probe rate allocation Allocate rates that minimize number of missed changes Model changes in each path as a Poisson process Estimate the rate of changes using NN4 Compute missed changes as function of probing rate Probing interval Path changes Time 29
30 Probe targeting overview D3 30 D1 D2
31 DTrack summary Detects more changes than optimized traceroute 2.2 times more changes in trace-driven simulations 5 times more changes in PlanetLab High Paris traceroute DTrack Accuracy Traceroute Tracetree Doubletree Low Frequency High 31
32 Summary Focus: Two steps of network troubleshooting Identification of fault location Detection of faults and performance disruptions Contribution: Measurement methods with practical assumptions To obtain accurate measurements To measure efficiently 32
33 Fathom: A browser-based network measurement platform with M. Dhawan (Rutgers), J. Samuel (UCB), M. Allman, C. Kreibich (ICSI) V. Paxson (UCB/ICSI)
34 End-host measurements are challenging Measurement from end-hosts are vital Researchers to understand Internet Practitioners to diagnose user problems Hard to deploy measurements Developers: Portability, safety Users: need to install new software 34
35 A browser-based measurement Why browser? Flexibility, deployability Ubiquity of browser platform Fathom: Firefox extension Measurement API in JavaScript Web page performance System performance Active measurements 35
36 Thank you! HostView: Measure end-host performance with user feedback Mac OS and Linux HomeNet Profiler: One-shot test Home network configuration WiFi performance Internet access performance 36
Measurements close to users
Measurements close to users Anna-Kaisa Pietilainen, Renata Teixeira MUSE Team Inria Paris-Rocquencourt www.usercentricnetworking.eu Network performance disruptions are frustrating For users For ISPs 2
More informationSYSTEMS that detect Internet faults [1], [2] or prefix hijacks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 4, AUGUST 2014 1025 DTRACK: A System to Predict and Track Internet Path Changes Ítalo Cunha, Renata Teixeira, Darryl Veitch, Fellow, IEEE, and Christophe
More informationNetDiagnoser: Troubleshooting network unreachabilities using end-to-end probes and routing data
NetDiagnoser: Troubleshooting network unreachabilities using end-to-end probes and routing data Amogh Dhamdhere, Renata Teixeira, Constantine Dovrolis, Christophe Diot Georgia Institute of Technology CNRS
More informationInternet measurements: topology discovery and dynamics. Renata Teixeira MUSE Team Inria Paris-Rocquencourt
Internet measurements: topology discovery and dynamics Renata Teixeira MUSE Team Inria Paris-Rocquencourt Why measure the Internet topology? Network operators Assist in network management, fault diagnosis
More informationDetection, understanding, and prevention of traceroute measurement artifacts
Available online at www.sciencedirect.com Computer Networks 52 (28) 998 8 www.elsevier.com/locate/comnet Detection, understanding, and prevention of traceroute measurement artifacts Fabien Viger, Brice
More informationDetection, Understanding, and Prevention of Traceroute Measurement Artifacts
Detection, Understanding, and Prevention of Traceroute Measurement Artifacts Fabien Viger, Brice Augustin, Xavier Cuvellier, Clémence Magnien, Matthieu Latapy, Timur Friedman, and Renata Teixeira Abstract
More informationQOE: A MICRO AND MACRO PERSPECTIVE
QOE: A MICRO AND MACRO PERSPECTIVE Henning Schulzrinne (with Kyung-Hwa Kim, Hyunwoo Nam, Vishal Singh, Daniel Song) Columbia University Micro vs. Macro Time & space local (user, HH) Internet-wide short-term
More informationImpact of IP Addresses Localization on the Internet Dynamics Measurement
Vol. 7, No. 4, 216 Impact of IP Addresses ization on the Internet Dynamics Measurement Tounwendyam Frédéric Ouédraogo University of Koudougou UFR-Sciences et Technique Avenue M. Yameogo BP 376 KDG, Burkina
More informationInternet Topology Research
Internet Topology Research Matthew Luckie WAND Network Research Group Department of Computer Science University of Waikato Internet Topology Why should we care? Impacts on the design and operation of routing
More informationRenata Cruz Teixeira
Renata Cruz Teixeira Female, Brazilian and French, Born March 3 rd 1975 Muse Team Inria Paris Home page: https://who.rocq.inria.fr/renata.teixeira/ E-mail: renata.teixeira@inria.fr Education HABILITATION
More informationMeasurement Methods for Fast and Accurate Blackhole Identification with Binary Tomography
Measurement Methods for Fast and Accurate Blackhole Identification with Binary Tomography Ítalo Cunha Thomson / UPMC Paris Universitas italo.cunha@thomson.net Renata Teixeira CNRS / UPMC Paris Universitas
More informationNetwork Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol
Network Basic v0.1 Chapter 3. Internet Protocol 1 Network Basic v0.1 Chapter 3 Internet Protocol 1. The Role of Network Layer 2. IP Protocol Feature 3. IP Packet Routing 5. DHCP 6. NAT 2 1 네트워크 ICONs 3
More informationMultipath tracing with Paris traceroute
Multipath tracing with Paris traceroute Brice Augustin, Timur Friedman, Renata Teixeira To cite this version: Brice Augustin, Timur Friedman, Renata Teixeira. Multipath tracing with Paris traceroute. E2EMON
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationPing, tracert and system debugging commands
Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert
More informationPoP Level Mapping And Peering Deals
PoP Level Mapping And Peering Deals Mapping Internet Methodology Data Collection IP Classification to PoP PoP Geolocation PoP locations on Peering estimations Outline Internet Service Providers ISPs are
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationCorrelating Network Congestion with Video QoE Degradation - a Last-Mile Perspective
Correlating Congestion with Video QoE Degradation - a Last-Mile Perspective Francesco Bronzino, Paul Schmitt, Renata Teixeira, Nick Feamster, Srikanth Sundaresan AIMS 13 March 2018 Last-Mile Measurement:
More informationPERISCOPE: Standardizing and Orchestrating Looking Glass Querying
PERISCOPE: Standardizing and Orchestrating Looking Glass Querying Vasileios Giotsas UCSD/CAIDA vgiotsas@caida.org NANOG 68, October 17-19 2016, Dallas, TX Purpose of this Talk Inform the operational community
More informationValidity of router responses for IP aliases resolution
Validity of router responses for IP aliases resolution Santiago Garcia-Jimenez, Eduardo Magaña, Mikel Izal and Daniel Morató Public University of Navarre, Campus Arrosadia, 31006 Pamplona, Spain santiago.garcia@unavarra.es
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationvrealize Operations Management Pack for NSX for vsphere 2.0
vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationvcenter Operations Management Pack for NSX-vSphere
vcenter Operations Management Pack for NSX-vSphere vcenter Operations Manager 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationRevealing MPLS Tunnels Obscured from Traceroute
Revealing MPLS Tunnels Obscured from Traceroute Benoit Donnet Matthew Luckie Pascal Mérindol, Jean-Jacques Pansiot Université de Liège CAIDA / UC San Diego Université de Strasbourg Belgium USA France benoit.donnet@ulg.ac.be
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More informationLecture 15: Measurement Studies on Internet Routing
Internet Routing Lecture 15: Measurement Studies on Internet Routing Lakshminarayanan Subramanian CS 268 class March 10 th, 2004 Internet organized as a two level hierarchy First level autonomous systems
More informationEP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer
EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing
More informationUnderstanding End-User Perception of Network Problems
Understanding End-User Perception of Network Problems J. Scott Miller Amit Mondal Rahul Potharaju Peter A. Dinda Aleksander Kuzmanovic Empathic Systems Project empathicsystems.org Northwestern University
More informationOverlapping Ring Monitoring Algorithm in TIPC
Overlapping Ring Monitoring Algorithm in TIPC Jon Maloy, Ericsson Canada Inc. Montreal April 7th 2017 PURPOSE When a cluster node becomes unresponsive due to crash, reboot or lost connectivity we want
More informationExperience in Developing Model- Integrated Tools and Technologies for Large-Scale Fault Tolerant Real-Time Embedded Systems
Institute for Software Integrated Systems Vanderbilt University Experience in Developing Model- Integrated Tools and Technologies for Large-Scale Fault Tolerant Real-Time Embedded Systems Presented by
More informationAchieving scale: Large scale active measurements from PlanetLab
Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET
More informationDig into MPLS: Transit Tunnel Diversity
January 2015 Dig into MPLS: Transit Tunnel Diversity Yves VANAUBEL Pascal MÉRINDOL Jean-Jacques PANSIOT Benoit DONNET Summary Motivations MPLS Background Measurement Campaign Label Pattern Recognition
More informationInternet Path Stability: Exploring the Impact of MPLS. Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015
Internet Path Stability: Exploring the Impact of MPLS Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015 1 Outline Introduction Related Work Contribution Methodology Results Conclusions 2 About Myself
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What is the motivation?
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Measurements 1 Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What
More informationSibyl A Practical Internet Route Oracle
Sibyl A Practical Internet Route Oracle Ítalo Cunha1, Pietro Marchetta2, Matt Calder3, Yi-Ching Chiu3 Brandon Schlinker3, Bruno Machado1, Antonio Pescapè2 Vasileios Giotsas4, Harsha Madhyastha5, Ethan
More informationHP Load Balancing Module
HP Load Balancing Module High Availability Configuration Guide Part number: 5998-2687 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company,
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationHP VPN Firewall Appliances
HP VPN Firewall Appliances High Availability Configuration Guide Part number: 5998-4169 Software version: F1000-A-EI/F1000-S-EI (Feature 3726) F1000-E (Release 3177) F5000 (Feature 3211) F5000-S/F5000-C
More informationOn the Diversity, Stability and Symmetry of End-to-End Internet Routes
On the Diversity, Stability and Symmetry of End-to-End Internet Routes Yaron Schwartz School of Electrical Engineering Tel-Aviv University, Israel Yuval Shavitt School of Electrical Engineering Tel-Aviv
More informationAd hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl
Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationGladinet Cloud Enterprise
GLADINET, INC Gladinet Cloud Enterprise Multi-Zone Deployment Guide Gladinet, Inc. 4/5/2015 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2015 Gladinet, Inc. Table
More informationLab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.
Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you
More informationConfiguration of Access Points and Clients. Training materials for wireless trainers
Configuration of Access Points and Clients Training materials for wireless trainers Goals To provide a simple procedure for the basic configuration of WiFi Access Points (and clients) To review the main
More informationCheleby: Subnet-level Internet Mapper
Cheleby: Subnet-level Internet Mapper ISM 2010 IMS-2 Workshop on ctive Internet Measurements Talha Oz, Hakan Kardes, Mehmet Gunes University of Nevada, Reno 02/09/10 San Diego Supercomputer Center, UCSD,
More informationConfiguring IP SLAs LSP Health Monitor Operations
Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Network Layer (IP) 2016 Problems 1. The table below describes the next hop for each destination in the network for all nodes in
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationAvoiding traceroute anomalies with Paris traceroute
voiding traceroute anomalies with Paris traceroute Brice ugustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu atapy, Clémence Magnien, and Renata Teixeira Université Pierre
More information521262S Computer Networks 2 (fall 2007) Laboratory exercise #2: Internetworking
521262S Computer Networks 2 (fall 2007) Laboratory exercise #2: Internetworking Name Student ID Signature In this exercise we will connect our LANs made in first exercise with routers and build an internet.
More informationVenugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04
The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems
More informationTelstra IP Telephony Customer Group Administrator Checklist
Telstra IP Telephony Customer Group Administrator Checklist Version 4.5 Telstra Corporation Limited 2001 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may
More informationCharacterizing ICMP Rate Limitation on Routers
Characterizing ICMP Rate Limitation on Routers Riccardo Ravaioli, Guillaume Urvoy-Keller, Chadi Barakat To cite this version: Riccardo Ravaioli, Guillaume Urvoy-Keller, Chadi Barakat. Characterizing ICMP
More informationWIRELESS sensor networks (WSNs) can be applied
IEEE/ACM TRANSACTIONS ON NETWORKING 1 ipath: Path Inference in Wireless Sensor Networks Yi Gao, Student Member, IEEE, Wei Dong, Member, IEEE, Chun Chen, Member, IEEE, Jiajun Bu, Member, IEEE, ACM, Wenbin
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationNetwork Layer: DHCP, ICMP, NAT, IPv6
Network Layer:, ICMP, NAT, IPv6 CS 352, Lecture 11 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors) 1 IP addresses:
More informationHot Potatoes Heat Up BGP Routing
Hot Potatoes Heat Up BGP Routing Renata Teixeira Laboratoire d Informatique de Paris 6 Université Pierre et Marie Curie Amsterdam Internet Routing Architecture Verio AT&T AOL Web Server UCSD Sprint User
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationWhat Global (non-digital) Communication Network Do You Use Every Day?"
CS162 Operating Systems and Systems Programming Lecture 8 Introduction to Networking, Packet Switching" September 26, 2011! Anthony D. Joseph and Ion Stoica! http://inst.eecs.berkeley.edu/~cs162! Review:
More informationDevice Management Basics
The following topics describe how to manage devices in the Firepower System: The Device Management Page, page 1 Remote Management Configuration, page 2 Adding Devices to the Firepower Management Center,
More informationConfiguration of Access Points and Clients. Training materials for wireless trainers
Configuration of Access Points and Clients Training materials for wireless trainers Goals to provide a simple procedure for the basic configuration of WiFi Access Points (and clients) to review the main
More informationDepartment of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri
Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions
More informationFinding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University of Michigan) Jennifer Rexford (Princeton University)
More informationAnalysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE
More informationLab Two Using Wireshark to Discover IP NAME:
Lab Two Using Wireshark to Discover IP NAME: In this lab, we ll investigate the IP protocol, focusing on the IP datagram. We ll do so by analyzing a trace of IP datagrams sent and received by an execution
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationTable of Contents 1 System Maintaining and Debugging 1-1
Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4
More informationSharkFest 18 US. Hands-on analysis of multi-point captures. Christian Landström. Airbus CyberSecurity
SharkFest 18 US Hands-on analysis of multi-point captures Christian Landström Airbus CyberSecurity About me? Working for Reading trace files for the fun of it Sharkfest addict since Stanford Why Multipoint?
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationIBTrack: An ICMP Black holes Tracker
IBTrack: An ICMP Black holes Tracker Ludovic Jacquin, Vincent Roca, Mohamed Ali Kaafar, Fabrice Schuler, Jean-Louis Roch To cite this version: Ludovic Jacquin, Vincent Roca, Mohamed Ali Kaafar, Fabrice
More informationMeasurement: Techniques, Strategies, and Pitfalls. David Andersen CMU
Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that
More informationPath Optimization in Stream-Based Overlay Networks
Path Optimization in Stream-Based Overlay Networks Peter Pietzuch, prp@eecs.harvard.edu Jeff Shneidman, Jonathan Ledlie, Mema Roussopoulos, Margo Seltzer, Matt Welsh Systems Research Group Harvard University
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationYarrp ing the Internet: Randomized High-Speed Active Topology Discovery
Yarrp ing the Internet: Randomized High-Speed Active Topology Discovery Robert Beverly Naval Postgraduate School rbeverly@nps.edu ABSTRACT Obtaining a snapshot of the Internet topology remains an elusive
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More informationCSEP 561 Internetworking. David Wetherall
CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationOverlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology
CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer
More informationOn the Prevalence and Characteristics of MPLS Deployments in the Open Internet
On the Prevalence and Characteristics of MPLS Deployments in the Open Internet Joel Sommers Colgate University Brian Eriksson Boston University Paul Barford University of Wisconsin The elephant in the
More informationBest Current Operational Practice for operators: choose. Jordi Palet
Best Current Operational Practice for operators: IPv6 Prefix Assignment for endcustomers - persistent vs nonpersistent and what size to choose Jordi Palet jordi.palet@consulintel.es 1 Authors: Andrew Alston
More informationFlooding Attacks by Exploiting Persistent Forwarding Loops
Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding
More informationUsing IIS 8.0 Logging for Troubleshooting Troubleshooting Authentication and Authorization Troubleshooting Communication Troubleshooting
Using IIS 8.0 Logging for Troubleshooting Troubleshooting Authentication and Authorization Troubleshooting Communication Troubleshooting Configuration Why Audit IIS Logs? How the Tracing Infrastructure
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationUDP PING: a dedicated tool for improving measurements of the Internet topology
UDP PING: a dedicated tool for improving measurements of the Internet topology Fabien Tarissan, Elie Rotenberg, Matthieu Latapy, Christophe Crespelle To cite this version: Fabien Tarissan, Elie Rotenberg,
More informationThe following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models
The following topics explain how to get started configuring Firepower Threat Defense. Is This Guide for You?, page 1 Logging Into the System, page 2 Setting Up the System, page 6 Configuration Basics,
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationITdumpsFree. Get free valid exam dumps and pass your exam test with confidence
ITdumpsFree http://www.itdumpsfree.com Get free valid exam dumps and pass your exam test with confidence Exam : 050-649 Title : Tcp/ip for Networking professionals Vendor : Novell Version : DEMO Get Latest
More informationDemocratically Finding The Cause of Packet Drops
Democratically Finding The Cause of Packet Drops Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang (Harry) Liu, Jitu Padhye, Geoff Outhred, Boon Thau Loo 1 Marple- SigComm 2017 Sherlock- SigComm
More informationMeasured Impact of Tracing Straight. Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato
Measured Impact of Tracing Straight Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato 7 February 2010 The Problem Until recently, load balancing
More informationvrealize Operations Management Pack for NSX for vsphere 3.5.0
vrealize Operations Management Pack for NSX for vsphere 3.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More information62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38
Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationvcloud Director Tenant Portal Guide vcloud Director 8.20
vcloud Director Tenant Portal Guide vcloud Director 8.20 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationIPv6 end client measurement. George Michaelson
IPv6 end client measurement George Michaelson ggm@apnic.net Setting the scene Adding IPv6 to your website may have risks Will your clients still be able to see you? What % of clients will experience issues?
More informationCommunication Systems DHCP
Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal
More informationUser-level Internet Path Diagnosis
User-level Internet Path Diagnosis Ratul Mahajan Neil Spring David Wetherall Thomas Anderson University of Washington Diagnosing performance of Internet paths is hard X X Multiple administrative domains
More informationHP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP 5820X & 5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through
More information