Introduction to PakBus. Janet Albers
|
|
- Dorcas Horn
- 6 years ago
- Views:
Transcription
1
2 Introduction to PakBus Janet Albers
3 The Good Stuff Features you might not know about
4 Settings Editor from Connect Tip in the Connect screen, right-click on your datalogger to access the Settings Editor.
5 Network Backup It is t to backup your working network configuration The *.BKP file makes transferring a network from your computer to your customer's computer simple. Restoring a customer's *.BKP file can save you a lot of troubleshooting time. Restoring a Network Backup will NOT append to an existing network, it will overwrite it.
6 Copying part of a Network Use Shift-Ctrl-C to copy a branch. Paste (Ctrl-V) into a text editor. On the destination computer select the entire contents of the text file and copy it to the clipboard. Then on the LoggerNet network map, select where you want the branch and press Ctrl-V.
7 DevConfig Feature Datalogger Backup
8 DevConfig Off-line Mode
9 PakBus
10 Question What tool does LoggerNet have to help you design a network?
11 Network Planner Network Planner : Communication setup Short Cut : Datalogger programming
12 Question Do you use the Network Planner?
13 Setting up a Network Define network using the Network Planner Configure hardware Setup LoggerNet Use PakBus Graph to verify routing Send datalogger programs Test network in the lab Install and test network in the field
14 Question What step in network design will save you the most time in the field?
15 Using the Network Planner Place stations and peripherals Tip: hold Ctrl key to place multiples Create links Create activities Why is it important to specify activities?
16 No activity specified: Scheduled Collection specified:
17 No activity specified: Hourly Scheduled Collection specified: Verify Interval = 90 seconds Verify Interval = 5400 seconds with a one hour schedule.
18 Using the Network Planner Create activities Configure Devices LoggerNet Review and understand the settings the Network Planner assigned
19 Network Security Tip it is a good idea to set a unique Security Code in all dataloggers in the network. Many PakBus settings are held in the datalogger settings. Setting Security Level 1 secures those.
20 PakBus Rules/Details
21 Question What is the ONE and ONLY way two devices become neighbors?
22 PakBus Rules 1 You must have a successful Hello Exchange for dataloggers to communicate with other dataloggers or software.
23 Question How does a successful Hello Exchange work?
24 PakBus Terms Hello Exchange (A) Hello. From (A) to (B) Response. From (B) to (A) (B)
25 Question What is the term for two devices that have had a successful Hello Exchange?
26 PakBus Terms - Neighbor Neighbors are devices that can communicate directly with each other. All PakBus devices maintain their own Neighbor list
27 Question What are the ways to initiate a Hello Exchange? (there are 4 ways)
28 Initiating a Hello Exchange There are four ways to initiate a Hello exchange: Beacon Program Instructions Allowed neighbor list in conjunction with the Communication Verification Interval Initiate TCP Socket
29 Question True or False? Every node in the network needs a unique PakBus address.
30 PakBus Rules 2 All nodes need a unique PakBus address This includes all LoggerNet servers.
31 Tip if you are able to make a connection then get disconnected then connect again change LoggerNet s PakBus address.
32 Question What is the range of allowable PakBus addresses?
33 PakBus Terms - Address PakBus address the identification number (address) of a node (Tip: don t use address 1)
34 Question What is LoggerNet s default address? 4094 What is the Device Configuration Utility s default address? 4089
35 Question What is special about addresses >= 4000?
36 PakBus Terms - Address Addresses >= 4000 cannot be ignored LoggerNet 4094 PC PC200W 4092 Device Configuration Utility 4089 Network Planner starts with 4000 LoggerLink random ( ) but can be set by user
37 PakBus Rules 3 Neighbors share information about their own addresses and verify intervals
38 Question What is a PakBus router?
39 PakBus Terms - Router Router devices with multiple neighbors. Devices that pass packets to neighbors.
40 PakBus Rules 4 Routers share information about their neighbors with all other routers in the network. This is how the routing system is built.
41 Question How quickly can you expect to see changes to your network?
42 PakBus Rules 5 Be Patient. Changes take time, even in a fast, robust network.
43 Pros and Cons of the Different Ways to Initiate a Hello Exchange
44 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket
45 Beacon Review A beacon is a broadcast message All devices must respond by initiating a hello exchange unless they are already neighbors, or Specifically prohibited. What are some of the pros and cons of beaconing?
46 Beaconing Pros: Simple Beacon packets are small, 12 bytes Dynamic, network changes are made easily Cons: Use network resources, bandwidth Neighborhood is not controlled, may discover unintended neighbors
47 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket
48 Allowed Neighbor List w/ Verify Interval Neighbors Allowed setting in conjunction with a Communication Verification Interval, will initiate discovery. Once the Communication Verification Interval (CVI) expires the datalogger will initiate up to 4 Hello messages. If those fail the neighbor is removed from the known routes. Those 4 Hello messages are sent at a random interval from 2 to 12 seconds. Example: CVI = 25 seconds, within about * 12 = 73 seconds the device will be removed.
49 PakBus Rules 5 Be Patient. Changes take time, even in a fast, robust network.
50 Allowed Neighbor List w/ Verify Interval What are some of the pros and cons?
51 Allowed Neighbor List Pros: Acts as a communication filter. Specific communications paths are determined. Cons: Neighbor lists should be complimentary. Not dynamic. Discovery attempts are continual if communications fail.
52 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket
53 Program Instructions There are about 20 program instructions to initiate PakBus communications
54 Program Instructions What are some of the pros and cons?
55 Program Instructions Pros: Simple datalogger to datalogger communications Most directed Cons: Not dynamic
56 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket
57 Initiate TCP Socket Device Configuration Utility Deployment Tab Network Services After the TCP Socket is established a Hello Request is sent
58 Initiate TCP Socket What are some of the pros and cons?
59 Initiate TCP Socket Pros: Simple Cons: Can't control the timing of the setting, use instruction TCPOpen() PakBus packets results in extra IP traffic
60 Discovery True or False? You can only use one method of initiating a Hello Exchange in a network.
61 Network Design The methods of discovery can be used together. Some networks need path constraints, particularly radio networks. Specify certain devices to beacon Assign allowed neighbors
62 Network #1 Leaf Router. Beaconing Leaf Leaf Star topology Only the central node beacons Use this type of design when only one device has more than one radio link Tip RF450/RF451 (Freewave) networks always use this configuration
63 Network #2 Router. Beacon Leaf Allowed Neighbor Leaf. Allowed Neighbor Router. Beacon Leaf. Allowed Neighbor Leaf. Allowed Neighbor Repeater topology Use Allowed Neighbors Use this type of design when more than one device has multiple radio links
64 COMPort Settings Tip: Make sure all settings apply to the correct COM port. For example: all settings are on SDC7. Note: Network Planner does that for you.
65 PakBus Graph
66 PakBus Graph Graphical representation of PakBus network Tip: Can change some device settings Tip: Give meaningful names to devices in the Network Planner or LoggerNet's Setup.
67 PakBus Graph PakBus Address Name from LoggerNet Setup/ Network Planner Static Route Dynamic Route LoggerNet
68 Questions? Janet Albers
INSTRUCTION MANUAL. PakBus Networking Guide for the CR10X, CR510, CR23X, and CR200 Series and LoggerNet 2.1C. Revision: 3/05
INSTRUCTION MANUAL PakBus Networking Guide for the CR10X, CR510, CR23X, and CR200 Series and LoggerNet 2.1C Revision: 3/05 Copyright (c) 2004-2005 Campbell Scientific, Inc. PakBus Networking Table of
More informationLoggerNet 4 Series Datalogger Support Software
COMPONENTS LoggerNet 4 Series Datalogger Support Software Datalogger Support Software questions & quotes: 435.227.9120 campbellsci.com/loggernet-packages LoggerNet 4 Series The LoggerNet family of datalogger
More informationGrandstream Networks, Inc. GWN76XX Series Mesh Network Guide
Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 MESH NETWORK ARCHITECTURE... 6 Terminology... 6 Mesh Network Architecture Models...
More informationmaterial. For more information on how to get additional questions, please see a.
Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationRevision: 10/26/2018 Copyright Campbell Scientific
Revision: 10/26/2018 Copyright 2000 2018 Campbell Scientific Table of Contents 1. Get started 1 2. USB or RS-232 communications 2 3. Testing communications and completing EZ Setup 4 4. Connecting the datalogger
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationvrealize Operations Management Pack for NSX for vsphere 3.5.0
vrealize Operations Management Pack for NSX for vsphere 3.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationCS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector
More informationNL200/NL201 Network Link Interface Revision: 9/13
NL200/NL201 Network Link Interface Revision: 9/13 Copyright 2011-2013 Campbell Scientific, Inc. Warranty PRODUCTS MANUFACTURED BY CAMPBELL SCIENTIFIC, INC. are warranted by Campbell Scientific, Inc. (
More informationCampbell Based Multi-Channel Data Logger. User Manual. Man /08/2014 Final David Farnham. Chris Rasmussen. Chris Rasmussen. Manual No.
Campbell Based Multi-Channel Data Logger Man158 2.1.1. 06/08/2014 Final David Farnham Chris Rasmussen Chris Rasmussen Manual No. Revision Date Status Originator Checked Authorised for Issue 1 Contents
More informationEIGRP Dynamic Metric Calculations
The features enables the Enhanced Interior Gateway Routing Protocol (EIGRP) to use dynamic raw radio-link characteristics (current and maximum bandwidth, latency, and resources) to compute a composite
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationGetting Started Guide. Complimentary 10/2018. Copyright 2018 Campbell Scientific
Getting Started Guide Complimentary 10/2018 Copyright 2018 Campbell Scientific Guarantee This equipment is guaranteed against defects in materials and workmanship. We will repair or replace products which
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationTofino CMP User's Guide
Tofino CMP User's Guide Configuration Tofino Central Management Platform Version The naming of copyrighted trademarks in this manual, even when not specifically indicated, should not be taken to mean that
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationPerformance Routing (PfR) Master Controller Redundancy Configuration
Performance Routing (PfR) Master Controller Redundancy Configuration This application note provides an overview on how to configure a Performance Routing (PfR) master controller in a redundant configuration.
More informationRequest for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009
Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationChapter 8 Configuring OSPF
Chapter 8 Configuring OSPF This chapter describes how to configure OSPF on HP routing switches using the CLI and Web management interface. To display OSPF configuration information and statistics, see
More informationGRE and DM VPNs. Understanding the GRE Modes Page CHAPTER
CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,
More informationNetWare Link-Services Protocol
44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell
More informationMarshall Electronics. VS Manager. Software Manual
Marshall Electronics VS Manager Software Manual Copyright February 2012, Marshall Electronics, Inc. All Rights Reserved. This document may not be copied. Trademarks Other trademarks used in this document
More informationINSTRUCTION MANUAL. PC400 User s Manual Version 4.4. Revision: 4/16. Copyright Campbell Scientific, Inc.
INSTRUCTION MANUAL PC400 User s Manual Version 4.4 Revision: 4/16 Copyright 1999-2016 Campbell Scientific, Inc. Table of Contents PDF viewers: These page numbers refer to the printed version of this
More informationCanlan INSTALLATION MANUAL
Canlan INSTALLATION MANUAL August 2014 Table of Contents Introduction... 4 Overview... 5 RJ45 Connector and Status LEDs... 5 Power Input... 6 RS232 / RS485 Connectors... 7 Installing the Canlan Software...
More informationPrime Fulfillment Process Diagram - Protection Management. Preconfiguration (incl. Discovery) Check Link Perf. Protection Management
CHAPTER 40 This chapter describes the process of creating and managing the protection of network elements using automated protection tools. See Chapter 38, Basic Tunnel Management for a description of
More informationLab : OSPF Troubleshooting Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 10.10.0.1 255.255.252.0 N/A HQ S0/0/0 172.16.7.1 255.255.255.252 N/A S0/0/1 172.16.7.5 255.255.255.252 N/A
More informationLab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 HQ S0/0/0 S0/0/1 Lo1 10.10.10.1 255.255.255.252 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1
More informationvrealize Operations Management Pack for NSX for vsphere 3.0
vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationCheckPoint Software Technologies LTD. How to Configure the Firewall to use Multiple Entry Point (MEP) & Overlapping Encryption Domains
CheckPoint Software Technologies LTD. How to Configure the Firewall to use Multiple Entry Point (MEP) & Overlapping Encryption Domains Event: Partner Exchange Conference Date: November 16, 1999 Revision
More informationS5 Communications. Rev. 1
S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed
More informationINSTRUCTION MANUAL. NL200/NL201 Network Link Interface Revision: 11/17. Copyright Campbell Scientific, Inc.
INSTRUCTION MANUAL NL200/NL201 Network Link Interface Revision: 11/17 Copyright 2011-2017 Campbell Scientific, Inc. Limited Warranty Products manufactured by CSI are warranted by CSI to be free from defects
More informationINSTRUCTION MANUAL. NL241 Wireless Network Link Interface Revision: 1/18. Copyright Campbell Scientific, Inc.
INSTRUCTION MANUAL NL241 Wireless Network Link Interface Revision: 1/18 Copyright 2011-2018 Campbell Scientific, Inc. Assistance Products may not be returned without prior authorization. The following
More informationCisco Interconnecting Cisco Networking Devices Part 2
Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 R1# show running-config description ***Loopback*** ip address 192.168.1.1 255.255.255.255 Question: 374 description **Connected to R1-LAN**
More informationMLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.
Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to
More informationChapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5
Chapter 5 RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 RIP Version 1 RIPv1: Distance Vector, Classful Routing Protocol CCNA2-2 Chapter 5 Background and Perspective RIP evolved from the Xerox Network System
More informationConfiguring EIGRP. Overview CHAPTER
CHAPTER 24 This chapter describes how to configure the adaptive security appliance to route data, perform authentication, and redistribute routing information, using the Enhanced Interior Gateway Routing
More informationTCP versus UDP Response Time
Lab 9 TCP versus UDP Response Time Overview TCP provides connection-oriented service at the transport layer, and UDP provides connectionless service. As a result, a data exchange using TCP can take longer
More informationBroadband Router DC-202. User's Guide
Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...
More informationPerformance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks
Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/
More informationOPC UA Configuration Manager PTC Inc. All Rights Reserved.
2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance
More informationTCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02
TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)
More informationProCurve Switch G ProCurve Switch G
Management and Configuration Guide ProCurve Switch 1800-8G ProCurve Switch 1800-24G www.procurve.com ProCurve Series 1800 Switch Management and Configuration Guide Copyright 2006, 2007 Hewlett-Packard
More informationDeploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
More informationCisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ]
s@lm@n Cisco Exam 100-101 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ] Topic 7, Troubleshooting Cisco 100-101 : Practice Test Question No : 1 - (Topic
More informationLDP Configuration Application
CHAPTER 17 The contains the following tabs and subtabs. Interfaces Tab, page 17-244 General Tab, page 17-245 Neighbors Tab, page 17-248 Operations Tab, page 17-250 The LDP Configuration application allows
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationAbout Advanced Access Control Settings for Network Analysis and Intrusion Policies
Advanced Access Control Settings for Network Analysis and Intrusion Policies The following topics describe how to configure advanced settings for network analysis and intrusion policies: About Advanced
More informationLab 9.6.2: Challenge EIGRP Configuration Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway HQ BRANCH1 BRANCH2 PC1 PC2 PC3 Fa0/0 S0/0/0 S0/0/1 Lo1 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/0 S0/0/1 NIC NIC NIC All
More informationRouting with a distance vector protocol - EIGRP
Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License
More informationA local area network that employs either a full mesh topology or partial mesh topology
and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationChapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
More informationOct 2007 Version 1.01
Oct 2007 Version 1.01 Table of Contents Introduction...4 System Requirement...4 Getting Started...4 Installing the Smart WLAN Manager...5 Discovering the Switch and AP...9 Understanding the Screen Layout...12
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationEIGRP. About EIGRP. CLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide, 9.7 1
This chapter describes how to configure the Cisco ASA to route data, perform authentication, and redistribute routing information using the Enhanced Interior Gateway Routing Protocol (). About, page 1
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationvines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description
vines access-group vines access-group To apply an access list to an interface, use the vines access-group command in interface configuration mode. To remove the access list, use the no form of this command.
More informationIntegrated IS-IS Commands
Integrated IS-IS Commands Use the commands in this chapter to configure and monitor the Intermediate System-to-Intermediate System (IS-IS) protocol. For IS-IS configuration information and examples, refer
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More informationConfiguring Transparent Bridging
Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple
More informationSpecial Loop Address draft-turaga-lmap-special-loop-address. Partha Turaga & Robert Raszuk Bloomberg L.P.
Special Loop Address draft-turaga-lmap-special-loop-address Partha Turaga & Robert Raszuk Bloomberg L.P. Background-I Applications get affected badly when there is a link issue between any two points in
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationTable of Contents 1 PIM Configuration 1-1
Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM
More informationBIG-IP TMOS : Implementations. Version 13.0
BIG-IP TMOS : Implementations Version 13.0 Table of Contents Table of Contents Customizing the BIG-IP Dashboard... 7 Overview: BIG-IP dashboard customization... 7 Customizing the BIG-IP dashboard...7
More informationWord Found Meaning Innovation
AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information
More informationAdvanced Network Training Multicast
Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent
More informationThe following topics describe how to configure traffic profiles:
The following topics describe how to configure traffic profiles: Introduction to Traffic Profiles, page 1 Managing Traffic Profiles, page 5 Configuring Traffic Profiles, page 6 Introduction to Traffic
More informationvrealize Operations Management Pack for NSX for vsphere 2.0
vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationLab 6: Access Lists. Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/ R1
Lab 6: Access Lists Network Topology:- Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/0 192.168.0.1 255.255.255.0 ----- R1 Fa 0/1 192.168.10.1 255.255.255.0 ----- Se 0/0/0 10.0.0.1 255.255.255.252
More informationWhite Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0
White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5
More informationINSTRUCTION MANUAL. LoggerNet. Version 3.0. Revision: 11/04. Copyright (c) Campbell Scientific, Inc.
INSTRUCTION MANUAL LoggerNet Version 3.0 Revision: 11/04 Copyright (c) 1999-2004 Campbell Scientific, Inc. License for Use This software is protected by both United States copyright law and international
More informationWX3IN1+ (v1.27) APRS DIGIPEATER APRS I-GATE APRS-IS -> RF MESSAGES FORWARDING WEATHER STATION SERVER
WX3IN1+ (v1.27) APRS DIGIPEATER APRS I-GATE APRS-IS -> RF MESSAGES FORWARDING WEATHER STATION SERVER WEB INTERFACE FOR ADMINISTRATION TELNET INTERFACE FOR MONITORING NTP SUPPORT FOR TIME SYNCHRONIZATION
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationWireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b 11Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
More informationVideo Streaming with the Stream Control Transmission Protocol (SCTP)
Chair for Network Architectures and Services Department of Informatics Technische Universität München Video Streaming with the Stream Control Transmission Protocol (SCTP) Lothar Braun, Andreas Müller Internet
More informationLab 9.6.3: EIGRP Troubleshooting Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 172.18.64.1 255.255.192.0 N/A HQ S0/0/0 209.165.202.129 255.255.255.252 N/A S0/0/1 209.165.202.133 255.255.255.252
More informationConfiguring EIGRP. 2001, Cisco Systems, Inc.
Configuring EIGRP 4-1 EIGRP Overview 4-2 What Is EIGRP? IPX Routing Protocols IP Routing Protocols AppleTalk Routing Protocol Enhanced IGRP IP Routing Protocols AppleTalk Routing Protocol IPX Routing Protocols
More information6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay
6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may
More informationNotices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact
Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online
More informationReview problems (for no credit): Transport and Network Layer
Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets
More informationConfiguring IGMP Snooping
This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites
More informationConfiguring Routes on the ACE
CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up
More informationConfiguring Redundant Routing on the VPN 3000 Concentrator
Configuring Redundant Routing on the VPN 3000 Concentrator Document ID: 13354 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Router Configurations
More informationHost Identity Sources
The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating
More information4A Alcatel-Lucent. Alcatel-Lucent Interior Routing Protocols and High Availability
Alcatel-Lucent 4A0-101 Alcatel-Lucent Interior Routing Protocols and High Availability Download Full Version : http://killexams.com/pass4sure/exam-detail/4a0-101 QUESTION: 297 Click on the exhibit. In
More informationECE 544 Project 3 Content-based Routing
ECE 544 Project 3 Content-based Routing Aishwarya Babu Rakesh Ravuru Sudarshan Kandi Assumptions and Address Scheme Assumptions End hosts can only connect to routers Each host is directly connected to
More informationTo make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at
To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationConfiguring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns
The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationThis document provides a sample configuration for X25 Over TCP.
X.25 over TCP/IP Document ID: 9363 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot Troubleshooting
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationUsing NAT in Overlapping Networks
Using NAT in Overlapping Networks Document ID: 13774 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Related Information
More information