CSCD 443/533 Advanced Networks

Size: px
Start display at page:

Download "CSCD 443/533 Advanced Networks"

Transcription

1 CSCD 443/533 Advanced Networks Lecture 10 Usage and Network Measurement Winter 2017 Reading: See References at end 1

2 Topics Internet Usage Measurement overview Why measure? What to measure? Where to measure? Challenges of Measurement Measurement tools and Devolopers Active: ping, traceroute Passive: packet, and flow monitoring Useful Web Sites

3 Internet Use Over Time Mentioned before... Internet has changed over time last 40 years Began with evolved towards pretty much everything... entertainment, commerce, education, life Internet architects and network engineers have tried to quantify this change in usage Capture what changes mean to network management

4 Internet Use is Important How people use Internet Important for predicting potential performance issues ISP's and other providers must plan to satisfy demand Trends indicate that more and more traffic appears to have real-time characteristics Gaming, video, Skype and other VOIP technologies

5 Application Preferences Change Over Time

6 Another Graph of Applications

7 Itunes up to August 2008

8 Mobile App Revenue Billions $ Six Year Growth Rate is 850%

9 Video Explodes

10 Online Gaming Explodes

11 On-line Social Network Games Games played on Social Network sites Like Facebook Facebook most popular destination for online games, with 83% of respondents saying they have played games there 28% have purchased in-game currency with real-world money One hundred million people are playing these games and about $1 billion in revenue is expected this year

12 Some Interesting Statistics YouTube Statistics

13 YouTube Statistics YouTube Statistics Since its inception

14 Change in Internet Use 2008 to 2009

15 Internet Measurement

16 Why Measure the Internet The Internet is a man-made system, so why do we need to measure it?

17 Why Measure the Internet The Internet is a man-made system, so why do we need to measure it? Because we still don t really understand it Because sometimes things go wrong Measurement for network operations Detecting and diagnosing problems What-if analysis of future changes Measurement for scientific discovery Characterizing a complex system as organism Creating accurate models that represent reality Identifying new features and phenomena

18 Why Measure the Internet - Continued Measurement of Internet Will Help us to better understand why it works Help us to diagnose known problems Help us to design new features that the Internet should provide to enable next-generation application requirements Internet Measurements is key to the design of the next-generation Internet

19 What to Measure Take a few minutes to jot down How would you measure the Internet? What types of things would you measure? Where would you take measurements?

20 What Can be Measured Traffic Load statistics Packet or flow traces Performance of paths Application performance, e.g,. Web download time Transport performance, e.g., TCP bulk throughput Network performance, e.g., packet delay and loss Network structure Topology, and paths on the topology Dynamics of the routing protocols

21 Where to Measure Short answer Anywhere you can! End hosts Application logs, e.g., Web server logs Sending active probes to measure performance Individual links/routers Load statistics, packet traces, flow traces Configuration state Routing-protocol messages or table dumps Alarms

22 Challenges of Internet Measurement Given list of AS's, is there a built-in tool/function, which outputs the topology of the Internet? AS = Autonomous System Given a path from source to destination, is there built-in a tool/function, which can determine how long a packet will take to travel to the destination? Given a set of routers along the path of a packet, is there a built-in tool/function, which can determine the delays introduced by each of the routers? The answer to all of these questions is NO!!!

23 Why don t we have such functions? Main reason, not designed for measurement Result of this is Poor Observability Reasons for this Core Simplicity Layered architecture Hidden Pieces Administrative Barriers

24 Core Simplicity Keep It Simple Stupid (KISS) Design Principle Stateless nature - connections/flows End-to-End argument Network elements do not track packets individually Interaction of traffic with network is hard to observe

25 Layered Architecture IP hourglass model hides details of lower level layers While this improves interoperability, it impedes detailed visibility of lower layers Detailed measurements such as packet capture cannot detect differences between two types of links

26 Hidden Pieces - Middleboxes Firewalls provide security Traffic Shapers assist in traffic management Proxies improve performance NAT boxes utilize IP address space efficiently Each of these impedes visibility of network components. E.g.: Firewalls may block active probing requests Proxies hide real servers, shapers direct traffic behind scene NATs hide real number of hosts and structure of the network on the other side

27 Administrative Barriers Competition-sensitive nature of data, (topology, traffic etc.), ISPs actively seek to hide these details from outside discovery Information that they do provide often simplified E.g.: Instead of publishing router-level topologies, ISPs often publish PoP-level topologies

28 Measurement Tools

29 Measurement Tools Classification Active Measurement Passive Measurement Fused/Combined Measurement Bandwidth Measurement Latency Measurement Geolocation Others

30 Active Measurement - Ping Adding traffic for purposes of measurement Trade-offs between accuracy and overhead Need careful methods to avoid introducing bias Ping Host sends an ICMP ECHO packet to a target and captures the ICMP ECHO REPLY Useful for checking connectivity, and RTT Only requires control of one of the two end-points

31 Active Measurement - Ping Issues Many routers filter out ICMP packets RTT includes end system processing time Not accurate for network performance Was not designed for performance ICMP 31

32 Active Measurement - Traceroute Used to find forward path to a host via routers Algorithm Send an IP datagram with TTL=1 First router sends back ICMP time exceeded Then send a datagram with TTL=2 Continue till destination is reached/ttl expired 32

33 Active Measurement - Traceroute Time-To-Live field in IP packet header Source sends a packet with a TTL of n Each router along the path decrements the TTL TTL exceeded sent when TTL reaches 0 Traceroute tool exploits this TTL behavior TTL=1 source TTL=2 Time exceeded destination Send packets with TTL=1, 2, 3, and record source of time exceeded message

34 Active Measurement Challenges of Traceroute Non-participating network elements Some routers and firewalls don t reply Inaccurate delay information Includes processing delays on the router CPU Round-trip vs. one-way measurements Paths may have asymmetric properties

35 Active Measurement - Challenges of Traceroute Measuring multiple paths Successive probes may traverse different paths Inferred path: A -> B -> Y Y: time exceeded Dest = D TTL = 2 A X Y D B: time exceeded Dest = D TTL = 1 B C

36 More Active Measurement Other Tools iperf netperf bing ttcp 36

37 Passive Measurement Passive Measurement Monitoring uses equipment that taps into a network and does not interfere with flow of network traffic, just captures and observes it Hardware Example: Network Tap Software Example: Traffic sniffer 37

38 Passive Measurement - Packets Traffic Sniffer Older program, tcpdump, for Unix-based hosts Wireshark freely available for most OS's Dedicated measurement systems DAGMON - old 38

39 Passive Measurement - Packets Filter for subset of packets IP addresses/prefixes (e.g., to/from specific Web sites, client machines, DNS servers, mail servers) Protocol (e.g., TCP, UDP, or ICMP) Port numbers (e.g., HTTP, DNS, BGP, Napster) Collect first n bytes of packet (snap length) IP header (typically 20 bytes) IP+UDP header (typically 28 bytes) IP+TCP header (typically 40 bytes) Application-layer message (entire packet)

40 Passive Measurement - IP Flows Aggregate Traffic into IP Flows For larger levels of network not enough to monitor individual packets, too many... Defined traffic as flows All industrial routers support flow data 40

41 Passive Measurement - IP Flow An IP flow is a unidirectional series of IP packets Given protocol (and port where applicable), Travelling between a source and destination Within a certain period of time

42 Aggregating Packets into IP Flows flow 1 flow 2 flow 3 flow 4 Set of packets that belong together Source/destination IP addresses and port numbers Same protocol Same input/output interfaces at a router (if known) Packets that are close together in time Maximum spacing between packets (e.g., 15 sec, 30 sec) Example: flows 2 and 4 are different flows due to time

43 Passive Measurement - IP Flow Look at Cisco's Netflow NetFlow creates a NetFlow cache entry contains information for all active flows NetFlow cache is built by processing first packet of flow through standard switching path A flow record is maintained within NetFlow cache for each active flow

44 Passive Measurement - IP Flow - Each flow record has packets with similar flow characteristics and counts or tracks packets and bytes per flow - Flow details or cache information is exported to flow collector server(s) periodically based upon flow timers - The collector contains a history of flow information that was switched within Cisco device

45 CISCO Netflow Collector

46 NetFlow Data Characteristics What can you measure? Source and Destination addresses Input and Output interface numbers Source and Destination port numbers Layer 4 protocol Number of packets in the flow Total Bytes in the flow Time stamp in the flow

47 What can you do with Flow Data Aggregates traffic for monitoring Historical Traffic Flow Graphs of network utilization Graphs by protocol Graphs by IP address Tools have been developed around Netflow concept

48 Free Tools for Netflow Number of tools created to analyze Netflow data Many are free Most allow you to visualize traffic over time or by traffic type

49 FlowScan from U. Wisconsin FlowScan Developed by Dave Plonka University of Wisconsin Freely-available network traffic reporting and visualization tool Its development began in December 1998, and it was first released in March 2000 There are hundreds of users today, many campuses and ISPs FlowScan analyzes data exported by IP based routers

50 What does FlowScan do? FlowScan counts IP flows by protocol, application, user population, or Internet connection Protocols include TCP and UDP Applications include (SMTP), file sharing (P2P) User populations are subnets such as schools or departments. Internet connections are transit and peering links between Autonomous Systems

51 Interpreting Graphs Horizontal axis is time, current time to the right. Vertical axis indicates magnitude of measurement, usually in bits, packets, or flows per second Outbound traffic is upwards, Inbound traffic is downwards Colored bars show traffic classification and are stacked (not overlayed) to show the total

52 Interpreting FlowScan Graphs

53 Ethernet Flow Probe Workstation A Flow probe connected to switch port in traffic mirror mode Workstation B Campus Diagram by Mark Fullmer (author of flow-tools), 2002

54 Flow Data Useful for Anomalies Flow data useful in spotting traffic events Used heavily for mapping security incidents in addition to normal network events DoS events Popular software release

55 Outbound Distributed DoS flood from 30+ Campus Hosts ICMP DoS Traffic

56 The Same ICMP DDoS flood was also observed by FlowScan at another campus...

57 The Knight IRC Robot Coordinated via Internet Relay Chat (IRC) using "robots". Independent observations reported aggregates over 500Mbs The Same DDoS flood was also observed by FlowScan at other campuses...

58 Linux Release Events

59 Measurement Resources There are groups of academics/government trying to measure the Internet Have made data sets available to the public One notable group is CAIDA Center for Applied Internet Data Analysis Mission Center for Applied Internet Data Analysis (CAIDA) is a collaborative undertaking among organizations in commercial, government, and research sectors aimed at promoting greater cooperation in engineering and maintenance of robust, scalable global Internet infrastructure

60 What is CAIDA? Goals include measuring and understanding the global Internet. Develop measurement and analysis tools Collect and provide Internet data: Topology, header traces, routing, network security, DNS Visualization of the network Projects CAIDA deploys and maintains a globally distributed measurement platform we call Archipelago (Ark) Archipelago consists of distributed hardware measurement nodes

61 CAIDA Arc Based Projects Internet Topology Discovery: Using multiple teams of geographically distributed Ark monitors, dynamically and strategically divide probing work among teams to conduct coordinated, large-scale traceroute-based topology measurements. Congestion: Connectivity and Congestion, running measurements to detect congestion on interdomain links of the networks hosting the Ark monitors. These measurements will inform analysis of traffic congestion dynamics induced by evolving interconnection and traffic management practices of CDNs and ISPs.

62 CAIDA Visualization Research Plotting the positions of Autonomous System (AS) nodes in polar coordinates allows a visualization of the dimensions of peering richness and geographic information, revealing the most highly connected Autonomous Systems Walrus tool uses 3D hyperbolic geometry to display graphs under a fisheye-like distortion, providing an interactive visualization of large directed graps in threedimensional space.

63 Walrus 63

64 Regional Internet Registry for Europe RIPE NCC Regional Internet Registry for Europe, Middle East and parts of Central Asia. As such, allocate and register blocks of Internet number resources to Internet service providers (ISPs) and other organizations. Performs a great deal of statistics gathering and has created tools and visualizations that assist their users and the Internet community in general. One major Internet mapping effort is Atlas.

65 Regional Internet Registry for Europe RIPE NCC RIPE Atlas is global network of probes that measure Internet connectivity and reachability, providing an unprecedented understanding of the state of Internet in real time Thousands of active probes in RIPE Atlas network... Atlas probes are small, USBpowered hardware devices that hosts attach to an Ethernet port on their router Go to url below to see kinds of things RIPE researchers are looking at

66 Measurement Lab (M-Lab) M-Lab is a consortium of research, industry and publicinterest partners dedicated to: Providing an open, verifiable measurement platform for global network performance Hosting largest open Internet performance dataset on the planet Creating visualizations and tools to help people make sense of Internet performance Measurement Lab (M-Lab) is the largest open source Internet measurement effort in the world. M-Lab provides performance tests that help consumers develop an accurate picture of their Internet service by offering a state-of-the-art server platform that supports many measurement needs.

67 Stanford List of Network Tools SLAC List of tools used for Network (both LAN and WAN) Monitoring Audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. Network Monitoring Tools grew out of a list that were reported to be in use at 11 ESnet sites in a survey made by the ESnet Network Monitoring Task Force (NMTF) and completed in October 1995

68 Internet Measurement Workshops and Conferences AIMS workshops are held to discuss the current and future state of active Internet measurement and analysis. An evolution of the Internet Statistics and Metrics Analysis (ISMA) workshop series, the intent of these workshops are to facilitate discussion among communities of academia, equipment vendors, and service providers, who share an interest in and incentive to understand one another's interests and concerns with Internet statistics and analysis. Network Traffic Measurement and Analysis Conference Network Traffic Measurement and Analysis Conference (TMA) highly selective venue for the presentation of both early-stage and mature research as well as controversial works on all the aspects of network measurements. The focus is on improving the practice or application of measurements, across the entire network stack up to the application layer htttp://tma.ifip.org/

69 More Resources FlowScan: Argus: flow-tools: CAIDA Tools Internet Fact Book (Really nice resource)

70 Network Measurement is anything but straightforward Internet Measurement is key to designing the next generation communication network Fundamental design principles of the current internet make it harder for measuring various aspects of it Preliminary research has resulted in a set of basic tools and methods to measure aspects like topology, traffic etc. Accuracy of such methods is still an open question There is long way to go to have solid Internet measurement!!!

71 Next time Discuss papers in class 71

72 1

73

74

75

76

77

78

79 Mobile App Revenue Billions $ Six Year Growth Rate is 850% 8

80

81

82

83

84

85

86 Internet Measurement 15

87

88

89

90 What to Measure Take a few minutes to jot down How would you measure the Internet? What types of things would you measure? Where would you take measurements? 19

91

92

93

94

95

96

97

98

99 Measurement Tools 28

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116 CISCO Netflow Collector 45

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132 CAIDA Arc Based Projects Internet Topology Discovery: Using multiple teams of geographically distributed Ark monitors, dynamically and strategically divide probing work among teams to conduct coordinated, large-scale traceroute-based topology measurements. Congestion: Connectivity and Congestion, running measurements to detect congestion on interdomain links of the networks hosting the Ark monitors. These measurements will inform analysis of traffic congestion dynamics induced by evolving interconnection and traffic management practices of CDNs and ISPs. 61

133 CAIDA Visualization Research Plotting the positions of Autonomous System (AS) nodes in polar coordinates allows a visualization of the dimensions of peering richness and geographic information, revealing the most highly connected Autonomous Systems Walrus tool uses 3D hyperbolic geometry to display graphs under a fisheye-like distortion, providing an interactive visualization of large directed graps in threedimensional space. 62

134

135 Regional Internet Registry for Europe RIPE NCC Regional Internet Registry for Europe, Middle East and parts of Central Asia. As such, allocate and register blocks of Internet number resources to Internet service providers (ISPs) and other organizations. Performs a great deal of statistics gathering and has created tools and visualizations that assist their users and the Internet community in general. One major Internet mapping effort is Atlas. 64

136 Regional Internet Registry for Europe RIPE NCC RIPE Atlas is global network of probes that measure Internet connectivity and reachability, providing an unprecedented understanding of the state of Internet in real time Thousands of active probes in RIPE Atlas network... Atlas probes are small, USBpowered hardware devices that hosts attach to an Ethernet port on their router Go to url below to see kinds of things RIPE researchers are looking at 65

137 Measurement Lab (M-Lab) M-Lab is a consortium of research, industry and publicinterest partners dedicated to: Providing an open, verifiable measurement platform for global network performance Hosting largest open Internet performance dataset on the planet Creating visualizations and tools to help people make sense of Internet performance Measurement Lab (M-Lab) is the largest open source Internet measurement effort in the world. M-Lab provides performance tests that help consumers develop an accurate picture of their Internet service by offering a state-of-the-art server platform that supports many measurement needs. 66

138 Stanford List of Network Tools SLAC List of tools used for Network (both LAN and WAN) Monitoring Audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. Network Monitoring Tools grew out of a list that were reported to be in use at 11 ESnet sites in a survey made by the ESnet Network Monitoring Task Force (NMTF) and completed in October

139 Internet Measurement Workshops and Conferences AIMS workshops are held to discuss the current and future state of active Internet measurement and analysis. An evolution of the Internet Statistics and Metrics Analysis (ISMA) workshop series, the intent of these workshops are to facilitate discussion among communities of academia, equipment vendors, and service providers, who share an interest in and incentive to understand one another's interests and concerns with Internet statistics and analysis. Network Traffic Measurement and Analysis Conference Network Traffic Measurement and Analysis Conference (TMA) highly selective venue for the presentation of both early-stage and mature research as well as controversial works on all the aspects of network measurements. The focus is on improving the practice or application of measurements, across the entire network stack up to the application layer htttp://tma.ifip.org/ 68

140

141

142

CSCD 443/533 Advanced Networks

CSCD 443/533 Advanced Networks CSCD 443/533 Advanced Networks Lecture 10 Usage and Network Measurement Spring 2016 Reading: See References at end 1 Topics Internet Usage Measurement overview Why measure? What to measure? Where to measure?

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Computer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014.

Computer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014. Course Reference Model Computer Networks 7 lication Provides functions needed by users Zhang, Xinyu Fall 2014 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

Introduction to Networking and Systems Measurements

Introduction to Networking and Systems Measurements Introduction to Networking and Systems Measurements Lecture 2: Basic Network Measurements Dr Noa Zilberman noa.zilberman@cl.cam.ac.uk Networking and Systems Measurements(L50) 1 Terminology Matters! in

More information

COSC4377. TCP vs UDP Example Statistics

COSC4377. TCP vs UDP Example Statistics Lecture 16 TCP vs UDP Example Statistics Trace Sample UDP/TCP Ratio Total IP Traffic (pkts/bytes/flows) pkts bytes flows CAIDA OC48 08 2002 0.11 0.03 0.11 (1371M/838GB/79M) 01 2003 0.12 0.05 0.27 (463M/267GB/26M)

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13 CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

Strategies, approaches and ethical considerations

Strategies, approaches and ethical considerations Strategies, approaches and ethical considerations q Internet design principles and measurements q Strategies and standards q Experimental approaches q Ethical considerations Design principles of the Internet

More information

Network Layer: DHCP, ICMP, NAT, IPv6

Network Layer: DHCP, ICMP, NAT, IPv6 Network Layer:, ICMP, NAT, IPv6 CS 352, Lecture 11 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors) 1 IP addresses:

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Advanced Application Reporting USER GUIDE

Advanced Application Reporting USER GUIDE Advanced Application Reporting USER GUIDE CONTENTS 1.0 Preface: About This Document 5 2.0 Conventions 5 3.0 Chapter 1: Introducing Advanced Application Reporting 6 4.0 Features and Benefits 7 5.0 Product

More information

Achieving scale: Large scale active measurements from PlanetLab

Achieving scale: Large scale active measurements from PlanetLab Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

Introduction to Netflow

Introduction to Netflow Introduction to Netflow Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11 1 Midterm exam Midterm this Thursday Close book but one-side 8.5"x11" note is allowed (must

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

Internet Architecture and Experimentation

Internet Architecture and Experimentation Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

RSC Part II: Network Layer 3. IP addressing (2nd part)

RSC Part II: Network Layer 3. IP addressing (2nd part) RSC Part II: Network Layer 3. IP addressing (2nd part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking:

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

ThousandEyes for. Application Delivery White Paper

ThousandEyes for. Application Delivery White Paper ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2017 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

Network Test and Monitoring Tools

Network Test and Monitoring Tools ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4

More information

Flooding Attacks by Exploiting Persistent Forwarding Loops

Flooding Attacks by Exploiting Persistent Forwarding Loops Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Computer Networks 2012/2013. Introduction part 1 (01) Dr. Tanir Ozcelebi. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S.

Computer Networks 2012/2013. Introduction part 1 (01) Dr. Tanir Ozcelebi. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S. Computer Networks 2012/20 Introduction part 1 (01) Dr. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S. Tanenbaum System Architecture and Networking Group Outline What is the Internet? Why

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

BGP Case Studies. ISP Workshops

BGP Case Studies. ISP Workshops BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

Page 2 Skype Connect Requirements Guide

Page 2 Skype Connect Requirements Guide Thinking about implementing Skype Connect? Read this guide first. Skype Connect provides connectivity between your business and the Skype community. By adding Skype Connect to your existing SIP-enabled

More information

PfR Voice Traffic Optimization Using Active Probes

PfR Voice Traffic Optimization Using Active Probes PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and

More information

Network Management and Monitoring

Network Management and Monitoring Network Management and Monitoring Introduction to Netflow These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Using Diagnostic Tools

Using Diagnostic Tools Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support

More information

CS459 Internet Measurements

CS459 Internet Measurements CS459 Internet Measurements Introduction to Traceroute and iplane Spring 2015 Traceroute Tool used to trace the path from source to destination host. TCP/IP not designed for traceroute, so it is sometimes

More information

COMPUTER NETWORKING LAB EXERCISES (TP) 4

COMPUTER NETWORKING LAB EXERCISES (TP) 4 Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 4 IPV6 December 14, 2009 Abstract In this TP you will revisit some of the basic networking tools that were introduced in TP1, only this

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Outline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits

Outline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits Lecture 2 Outline Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits TCP/IP protocol suite Good name for our book! User application, e.g., http with Mozilla Communication

More information

Measurement: Techniques, Strategies, and Pitfalls. David Andersen CMU

Measurement: Techniques, Strategies, and Pitfalls. David Andersen CMU Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that

More information

ICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message.

ICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message. Ethereal Lab: ICMP Version: 1.0 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. In this lab, we ll explore several aspects

More information

IPv6 in Campus Networks

IPv6 in Campus Networks IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6

More information

Internet Technology 3/23/2016

Internet Technology 3/23/2016 Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul

More information

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network

More information

Lecture 17: Network Layer Addressing, Control Plane, and Routing

Lecture 17: Network Layer Addressing, Control Plane, and Routing Lecture 17: Network Layer Addressing, Control Plane, and Routing COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition:

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Cisco IOS Optimized Edge Routing Command Reference

Cisco IOS Optimized Edge Routing Command Reference First Published: 2007-01-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

GLOSSARY. See ACL. access control list.

GLOSSARY. See ACL. access control list. GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs

More information