Introduction to PakBus. Janet Albers

Size: px
Start display at page:

Download "Introduction to PakBus. Janet Albers"

Transcription

1

2 Introduction to PakBus Janet Albers

3 The Good Stuff Features you might not know about

4 Settings Editor from Connect Tip in the Connect screen, right-click on your datalogger to access the Settings Editor.

5 Network Backup It is t to backup your working network configuration The *.BKP file makes transferring a network from your computer to your customer's computer simple. Restoring a customer's *.BKP file can save you a lot of troubleshooting time. Restoring a Network Backup will NOT append to an existing network, it will overwrite it.

6 Copying part of a Network Use Shift-Ctrl-C to copy a branch. Paste (Ctrl-V) into a text editor. On the destination computer select the entire contents of the text file and copy it to the clipboard. Then on the LoggerNet network map, select where you want the branch and press Ctrl-V.

7 DevConfig Feature Datalogger Backup

8 DevConfig Off-line Mode

9 PakBus

10 Question What tool does LoggerNet have to help you design a network?

11 Network Planner Network Planner : Communication setup Short Cut : Datalogger programming

12 Question Do you use the Network Planner?

13 Setting up a Network Define network using the Network Planner Configure hardware Setup LoggerNet Use PakBus Graph to verify routing Send datalogger programs Test network in the lab Install and test network in the field

14 Question What step in network design will save you the most time in the field?

15 Using the Network Planner Place stations and peripherals Tip: hold Ctrl key to place multiples Create links Create activities Why is it important to specify activities?

16 No activity specified: Scheduled Collection specified:

17 No activity specified: Hourly Scheduled Collection specified: Verify Interval = 90 seconds Verify Interval = 5400 seconds with a one hour schedule.

18 Using the Network Planner Create activities Configure Devices LoggerNet Review and understand the settings the Network Planner assigned

19 Network Security Tip it is a good idea to set a unique Security Code in all dataloggers in the network. Many PakBus settings are held in the datalogger settings. Setting Security Level 1 secures those.

20 PakBus Rules/Details

21 Question What is the ONE and ONLY way two devices become neighbors?

22 PakBus Rules 1 You must have a successful Hello Exchange for dataloggers to communicate with other dataloggers or software.

23 Question How does a successful Hello Exchange work?

24 PakBus Terms Hello Exchange (A) Hello. From (A) to (B) Response. From (B) to (A) (B)

25 Question What is the term for two devices that have had a successful Hello Exchange?

26 PakBus Terms - Neighbor Neighbors are devices that can communicate directly with each other. All PakBus devices maintain their own Neighbor list

27 Question What are the ways to initiate a Hello Exchange? (there are 4 ways)

28 Initiating a Hello Exchange There are four ways to initiate a Hello exchange: Beacon Program Instructions Allowed neighbor list in conjunction with the Communication Verification Interval Initiate TCP Socket

29 Question True or False? Every node in the network needs a unique PakBus address.

30 PakBus Rules 2 All nodes need a unique PakBus address This includes all LoggerNet servers.

31 Tip if you are able to make a connection then get disconnected then connect again change LoggerNet s PakBus address.

32 Question What is the range of allowable PakBus addresses?

33 PakBus Terms - Address PakBus address the identification number (address) of a node (Tip: don t use address 1)

34 Question What is LoggerNet s default address? 4094 What is the Device Configuration Utility s default address? 4089

35 Question What is special about addresses >= 4000?

36 PakBus Terms - Address Addresses >= 4000 cannot be ignored LoggerNet 4094 PC PC200W 4092 Device Configuration Utility 4089 Network Planner starts with 4000 LoggerLink random ( ) but can be set by user

37 PakBus Rules 3 Neighbors share information about their own addresses and verify intervals

38 Question What is a PakBus router?

39 PakBus Terms - Router Router devices with multiple neighbors. Devices that pass packets to neighbors.

40 PakBus Rules 4 Routers share information about their neighbors with all other routers in the network. This is how the routing system is built.

41 Question How quickly can you expect to see changes to your network?

42 PakBus Rules 5 Be Patient. Changes take time, even in a fast, robust network.

43 Pros and Cons of the Different Ways to Initiate a Hello Exchange

44 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket

45 Beacon Review A beacon is a broadcast message All devices must respond by initiating a hello exchange unless they are already neighbors, or Specifically prohibited. What are some of the pros and cons of beaconing?

46 Beaconing Pros: Simple Beacon packets are small, 12 bytes Dynamic, network changes are made easily Cons: Use network resources, bandwidth Neighborhood is not controlled, may discover unintended neighbors

47 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket

48 Allowed Neighbor List w/ Verify Interval Neighbors Allowed setting in conjunction with a Communication Verification Interval, will initiate discovery. Once the Communication Verification Interval (CVI) expires the datalogger will initiate up to 4 Hello messages. If those fail the neighbor is removed from the known routes. Those 4 Hello messages are sent at a random interval from 2 to 12 seconds. Example: CVI = 25 seconds, within about * 12 = 73 seconds the device will be removed.

49 PakBus Rules 5 Be Patient. Changes take time, even in a fast, robust network.

50 Allowed Neighbor List w/ Verify Interval What are some of the pros and cons?

51 Allowed Neighbor List Pros: Acts as a communication filter. Specific communications paths are determined. Cons: Neighbor lists should be complimentary. Not dynamic. Discovery attempts are continual if communications fail.

52 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket

53 Program Instructions There are about 20 program instructions to initiate PakBus communications

54 Program Instructions What are some of the pros and cons?

55 Program Instructions Pros: Simple datalogger to datalogger communications Most directed Cons: Not dynamic

56 Review There are four ways to initiate a Hello exchange: Beacon Allowed neighbor list in conjunction with the Communication Verification Interval Program Instructions Initiate TCP Socket

57 Initiate TCP Socket Device Configuration Utility Deployment Tab Network Services After the TCP Socket is established a Hello Request is sent

58 Initiate TCP Socket What are some of the pros and cons?

59 Initiate TCP Socket Pros: Simple Cons: Can't control the timing of the setting, use instruction TCPOpen() PakBus packets results in extra IP traffic

60 Discovery True or False? You can only use one method of initiating a Hello Exchange in a network.

61 Network Design The methods of discovery can be used together. Some networks need path constraints, particularly radio networks. Specify certain devices to beacon Assign allowed neighbors

62 Network #1 Leaf Router. Beaconing Leaf Leaf Star topology Only the central node beacons Use this type of design when only one device has more than one radio link Tip RF450/RF451 (Freewave) networks always use this configuration

63 Network #2 Router. Beacon Leaf Allowed Neighbor Leaf. Allowed Neighbor Router. Beacon Leaf. Allowed Neighbor Leaf. Allowed Neighbor Repeater topology Use Allowed Neighbors Use this type of design when more than one device has multiple radio links

64 COMPort Settings Tip: Make sure all settings apply to the correct COM port. For example: all settings are on SDC7. Note: Network Planner does that for you.

65 PakBus Graph

66 PakBus Graph Graphical representation of PakBus network Tip: Can change some device settings Tip: Give meaningful names to devices in the Network Planner or LoggerNet's Setup.

67 PakBus Graph PakBus Address Name from LoggerNet Setup/ Network Planner Static Route Dynamic Route LoggerNet

68 Questions? Janet Albers

INSTRUCTION MANUAL. PakBus Networking Guide for the CR10X, CR510, CR23X, and CR200 Series and LoggerNet 2.1C. Revision: 3/05

INSTRUCTION MANUAL. PakBus Networking Guide for the CR10X, CR510, CR23X, and CR200 Series and LoggerNet 2.1C. Revision: 3/05 INSTRUCTION MANUAL PakBus Networking Guide for the CR10X, CR510, CR23X, and CR200 Series and LoggerNet 2.1C Revision: 3/05 Copyright (c) 2004-2005 Campbell Scientific, Inc. PakBus Networking Table of

More information

LoggerNet 4 Series Datalogger Support Software

LoggerNet 4 Series Datalogger Support Software COMPONENTS LoggerNet 4 Series Datalogger Support Software Datalogger Support Software questions & quotes: 435.227.9120 campbellsci.com/loggernet-packages LoggerNet 4 Series The LoggerNet family of datalogger

More information

Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide

Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 MESH NETWORK ARCHITECTURE... 6 Terminology... 6 Mesh Network Architecture Models...

More information

material. For more information on how to get additional questions, please see a.

material. For more information on how to get additional questions, please see   a. Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Revision: 10/26/2018 Copyright Campbell Scientific

Revision: 10/26/2018 Copyright Campbell Scientific Revision: 10/26/2018 Copyright 2000 2018 Campbell Scientific Table of Contents 1. Get started 1 2. USB or RS-232 communications 2 3. Testing communications and completing EZ Setup 4 4. Connecting the datalogger

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

vrealize Operations Management Pack for NSX for vsphere 3.5.0

vrealize Operations Management Pack for NSX for vsphere 3.5.0 vrealize Operations Management Pack for NSX for vsphere 3.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

NL200/NL201 Network Link Interface Revision: 9/13

NL200/NL201 Network Link Interface Revision: 9/13 NL200/NL201 Network Link Interface Revision: 9/13 Copyright 2011-2013 Campbell Scientific, Inc. Warranty PRODUCTS MANUFACTURED BY CAMPBELL SCIENTIFIC, INC. are warranted by Campbell Scientific, Inc. (

More information

Campbell Based Multi-Channel Data Logger. User Manual. Man /08/2014 Final David Farnham. Chris Rasmussen. Chris Rasmussen. Manual No.

Campbell Based Multi-Channel Data Logger. User Manual. Man /08/2014 Final David Farnham. Chris Rasmussen. Chris Rasmussen. Manual No. Campbell Based Multi-Channel Data Logger Man158 2.1.1. 06/08/2014 Final David Farnham Chris Rasmussen Chris Rasmussen Manual No. Revision Date Status Originator Checked Authorised for Issue 1 Contents

More information

EIGRP Dynamic Metric Calculations

EIGRP Dynamic Metric Calculations The features enables the Enhanced Interior Gateway Routing Protocol (EIGRP) to use dynamic raw radio-link characteristics (current and maximum bandwidth, latency, and resources) to compute a composite

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Getting Started Guide. Complimentary 10/2018. Copyright 2018 Campbell Scientific

Getting Started Guide. Complimentary 10/2018. Copyright 2018 Campbell Scientific Getting Started Guide Complimentary 10/2018 Copyright 2018 Campbell Scientific Guarantee This equipment is guaranteed against defects in materials and workmanship. We will repair or replace products which

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Tofino CMP User's Guide

Tofino CMP User's Guide Tofino CMP User's Guide Configuration Tofino Central Management Platform Version The naming of copyrighted trademarks in this manual, even when not specifically indicated, should not be taken to mean that

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Performance Routing (PfR) Master Controller Redundancy Configuration

Performance Routing (PfR) Master Controller Redundancy Configuration Performance Routing (PfR) Master Controller Redundancy Configuration This application note provides an overview on how to configure a Performance Routing (PfR) master controller in a redundant configuration.

More information

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

Chapter 8 Configuring OSPF

Chapter 8 Configuring OSPF Chapter 8 Configuring OSPF This chapter describes how to configure OSPF on HP routing switches using the CLI and Web management interface. To display OSPF configuration information and statistics, see

More information

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

Marshall Electronics. VS Manager. Software Manual

Marshall Electronics. VS Manager. Software Manual Marshall Electronics VS Manager Software Manual Copyright February 2012, Marshall Electronics, Inc. All Rights Reserved. This document may not be copied. Trademarks Other trademarks used in this document

More information

INSTRUCTION MANUAL. PC400 User s Manual Version 4.4. Revision: 4/16. Copyright Campbell Scientific, Inc.

INSTRUCTION MANUAL. PC400 User s Manual Version 4.4. Revision: 4/16. Copyright Campbell Scientific, Inc. INSTRUCTION MANUAL PC400 User s Manual Version 4.4 Revision: 4/16 Copyright 1999-2016 Campbell Scientific, Inc. Table of Contents PDF viewers: These page numbers refer to the printed version of this

More information

Canlan INSTALLATION MANUAL

Canlan INSTALLATION MANUAL Canlan INSTALLATION MANUAL August 2014 Table of Contents Introduction... 4 Overview... 5 RJ45 Connector and Status LEDs... 5 Power Input... 6 RS232 / RS485 Connectors... 7 Installing the Canlan Software...

More information

Prime Fulfillment Process Diagram - Protection Management. Preconfiguration (incl. Discovery) Check Link Perf. Protection Management

Prime Fulfillment Process Diagram - Protection Management. Preconfiguration (incl. Discovery) Check Link Perf. Protection Management CHAPTER 40 This chapter describes the process of creating and managing the protection of network elements using automated protection tools. See Chapter 38, Basic Tunnel Management for a description of

More information

Lab : OSPF Troubleshooting Lab

Lab : OSPF Troubleshooting Lab Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 10.10.0.1 255.255.252.0 N/A HQ S0/0/0 172.16.7.1 255.255.255.252 N/A S0/0/1 172.16.7.5 255.255.255.252 N/A

More information

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 HQ S0/0/0 S0/0/1 Lo1 10.10.10.1 255.255.255.252 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1

More information

vrealize Operations Management Pack for NSX for vsphere 3.0

vrealize Operations Management Pack for NSX for vsphere 3.0 vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

CheckPoint Software Technologies LTD. How to Configure the Firewall to use Multiple Entry Point (MEP) & Overlapping Encryption Domains

CheckPoint Software Technologies LTD. How to Configure the Firewall to use Multiple Entry Point (MEP) & Overlapping Encryption Domains CheckPoint Software Technologies LTD. How to Configure the Firewall to use Multiple Entry Point (MEP) & Overlapping Encryption Domains Event: Partner Exchange Conference Date: November 16, 1999 Revision

More information

S5 Communications. Rev. 1

S5 Communications. Rev. 1 S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed

More information

INSTRUCTION MANUAL. NL200/NL201 Network Link Interface Revision: 11/17. Copyright Campbell Scientific, Inc.

INSTRUCTION MANUAL. NL200/NL201 Network Link Interface Revision: 11/17. Copyright Campbell Scientific, Inc. INSTRUCTION MANUAL NL200/NL201 Network Link Interface Revision: 11/17 Copyright 2011-2017 Campbell Scientific, Inc. Limited Warranty Products manufactured by CSI are warranted by CSI to be free from defects

More information

INSTRUCTION MANUAL. NL241 Wireless Network Link Interface Revision: 1/18. Copyright Campbell Scientific, Inc.

INSTRUCTION MANUAL. NL241 Wireless Network Link Interface Revision: 1/18. Copyright Campbell Scientific, Inc. INSTRUCTION MANUAL NL241 Wireless Network Link Interface Revision: 1/18 Copyright 2011-2018 Campbell Scientific, Inc. Assistance Products may not be returned without prior authorization. The following

More information

Cisco Interconnecting Cisco Networking Devices Part 2

Cisco Interconnecting Cisco Networking Devices Part 2 Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 R1# show running-config description ***Loopback*** ip address 192.168.1.1 255.255.255.255 Question: 374 description **Connected to R1-LAN**

More information

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3. Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to

More information

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 Chapter 5 RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 RIP Version 1 RIPv1: Distance Vector, Classful Routing Protocol CCNA2-2 Chapter 5 Background and Perspective RIP evolved from the Xerox Network System

More information

Configuring EIGRP. Overview CHAPTER

Configuring EIGRP. Overview CHAPTER CHAPTER 24 This chapter describes how to configure the adaptive security appliance to route data, perform authentication, and redistribute routing information, using the Enhanced Interior Gateway Routing

More information

TCP versus UDP Response Time

TCP versus UDP Response Time Lab 9 TCP versus UDP Response Time Overview TCP provides connection-oriented service at the transport layer, and UDP provides connectionless service. As a result, a data exchange using TCP can take longer

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

ProCurve Switch G ProCurve Switch G

ProCurve Switch G ProCurve Switch G Management and Configuration Guide ProCurve Switch 1800-8G ProCurve Switch 1800-24G www.procurve.com ProCurve Series 1800 Switch Management and Configuration Guide Copyright 2006, 2007 Hewlett-Packard

More information

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP

More information

Cisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ]

Cisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ] s@lm@n Cisco Exam 100-101 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ] Topic 7, Troubleshooting Cisco 100-101 : Practice Test Question No : 1 - (Topic

More information

LDP Configuration Application

LDP Configuration Application CHAPTER 17 The contains the following tabs and subtabs. Interfaces Tab, page 17-244 General Tab, page 17-245 Neighbors Tab, page 17-248 Operations Tab, page 17-250 The LDP Configuration application allows

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies. Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and

More information

About Advanced Access Control Settings for Network Analysis and Intrusion Policies

About Advanced Access Control Settings for Network Analysis and Intrusion Policies Advanced Access Control Settings for Network Analysis and Intrusion Policies The following topics describe how to configure advanced settings for network analysis and intrusion policies: About Advanced

More information

Lab 9.6.2: Challenge EIGRP Configuration Lab

Lab 9.6.2: Challenge EIGRP Configuration Lab Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway HQ BRANCH1 BRANCH2 PC1 PC2 PC3 Fa0/0 S0/0/0 S0/0/1 Lo1 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/0 S0/0/1 NIC NIC NIC All

More information

Routing with a distance vector protocol - EIGRP

Routing with a distance vector protocol - EIGRP Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Oct 2007 Version 1.01

Oct 2007 Version 1.01 Oct 2007 Version 1.01 Table of Contents Introduction...4 System Requirement...4 Getting Started...4 Installing the Smart WLAN Manager...5 Discovering the Switch and AP...9 Understanding the Screen Layout...12

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

EIGRP. About EIGRP. CLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide, 9.7 1

EIGRP. About EIGRP. CLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide, 9.7 1 This chapter describes how to configure the Cisco ASA to route data, perform authentication, and redistribute routing information using the Enhanced Interior Gateway Routing Protocol (). About, page 1

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description vines access-group vines access-group To apply an access list to an interface, use the vines access-group command in interface configuration mode. To remove the access list, use the no form of this command.

More information

Integrated IS-IS Commands

Integrated IS-IS Commands Integrated IS-IS Commands Use the commands in this chapter to configure and monitor the Intermediate System-to-Intermediate System (IS-IS) protocol. For IS-IS configuration information and examples, refer

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

Configuring Transparent Bridging

Configuring Transparent Bridging Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple

More information

Special Loop Address draft-turaga-lmap-special-loop-address. Partha Turaga & Robert Raszuk Bloomberg L.P.

Special Loop Address draft-turaga-lmap-special-loop-address. Partha Turaga & Robert Raszuk Bloomberg L.P. Special Loop Address draft-turaga-lmap-special-loop-address Partha Turaga & Robert Raszuk Bloomberg L.P. Background-I Applications get affected badly when there is a link issue between any two points in

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Table of Contents 1 PIM Configuration 1-1

Table of Contents 1 PIM Configuration 1-1 Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM

More information

BIG-IP TMOS : Implementations. Version 13.0

BIG-IP TMOS : Implementations. Version 13.0 BIG-IP TMOS : Implementations Version 13.0 Table of Contents Table of Contents Customizing the BIG-IP Dashboard... 7 Overview: BIG-IP dashboard customization... 7 Customizing the BIG-IP dashboard...7

More information

Word Found Meaning Innovation

Word Found Meaning Innovation AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information

More information

Advanced Network Training Multicast

Advanced Network Training Multicast Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent

More information

The following topics describe how to configure traffic profiles:

The following topics describe how to configure traffic profiles: The following topics describe how to configure traffic profiles: Introduction to Traffic Profiles, page 1 Managing Traffic Profiles, page 5 Configuring Traffic Profiles, page 6 Introduction to Traffic

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Lab 6: Access Lists. Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/ R1

Lab 6: Access Lists. Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/ R1 Lab 6: Access Lists Network Topology:- Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/0 192.168.0.1 255.255.255.0 ----- R1 Fa 0/1 192.168.10.1 255.255.255.0 ----- Se 0/0/0 10.0.0.1 255.255.255.252

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

INSTRUCTION MANUAL. LoggerNet. Version 3.0. Revision: 11/04. Copyright (c) Campbell Scientific, Inc.

INSTRUCTION MANUAL. LoggerNet. Version 3.0. Revision: 11/04. Copyright (c) Campbell Scientific, Inc. INSTRUCTION MANUAL LoggerNet Version 3.0 Revision: 11/04 Copyright (c) 1999-2004 Campbell Scientific, Inc. License for Use This software is protected by both United States copyright law and international

More information

WX3IN1+ (v1.27) APRS DIGIPEATER APRS I-GATE APRS-IS -> RF MESSAGES FORWARDING WEATHER STATION SERVER

WX3IN1+ (v1.27) APRS DIGIPEATER APRS I-GATE APRS-IS -> RF MESSAGES FORWARDING WEATHER STATION SERVER WX3IN1+ (v1.27) APRS DIGIPEATER APRS I-GATE APRS-IS -> RF MESSAGES FORWARDING WEATHER STATION SERVER WEB INTERFACE FOR ADMINISTRATION TELNET INTERFACE FOR MONITORING NTP SUPPORT FOR TIME SYNCHRONIZATION

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b 11Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

Video Streaming with the Stream Control Transmission Protocol (SCTP)

Video Streaming with the Stream Control Transmission Protocol (SCTP) Chair for Network Architectures and Services Department of Informatics Technische Universität München Video Streaming with the Stream Control Transmission Protocol (SCTP) Lothar Braun, Andreas Müller Internet

More information

Lab 9.6.3: EIGRP Troubleshooting Lab

Lab 9.6.3: EIGRP Troubleshooting Lab Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 172.18.64.1 255.255.192.0 N/A HQ S0/0/0 209.165.202.129 255.255.255.252 N/A S0/0/1 209.165.202.133 255.255.255.252

More information

Configuring EIGRP. 2001, Cisco Systems, Inc.

Configuring EIGRP. 2001, Cisco Systems, Inc. Configuring EIGRP 4-1 EIGRP Overview 4-2 What Is EIGRP? IPX Routing Protocols IP Routing Protocols AppleTalk Routing Protocol Enhanced IGRP IP Routing Protocols AppleTalk Routing Protocol IPX Routing Protocols

More information

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay 6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may

More information

Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact

Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact Notices Carbonite Move for Linux User's Guide Version 8.1.1, Wednesday, January 31, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online

More information

Review problems (for no credit): Transport and Network Layer

Review problems (for no credit): Transport and Network Layer Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets

More information

Configuring IGMP Snooping

Configuring IGMP Snooping This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites

More information

Configuring Routes on the ACE

Configuring Routes on the ACE CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up

More information

Configuring Redundant Routing on the VPN 3000 Concentrator

Configuring Redundant Routing on the VPN 3000 Concentrator Configuring Redundant Routing on the VPN 3000 Concentrator Document ID: 13354 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Router Configurations

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

4A Alcatel-Lucent. Alcatel-Lucent Interior Routing Protocols and High Availability

4A Alcatel-Lucent. Alcatel-Lucent Interior Routing Protocols and High Availability Alcatel-Lucent 4A0-101 Alcatel-Lucent Interior Routing Protocols and High Availability Download Full Version : http://killexams.com/pass4sure/exam-detail/4a0-101 QUESTION: 297 Click on the exhibit. In

More information

ECE 544 Project 3 Content-based Routing

ECE 544 Project 3 Content-based Routing ECE 544 Project 3 Content-based Routing Aishwarya Babu Rakesh Ravuru Sudarshan Kandi Assumptions and Address Scheme Assumptions End hosts can only connect to routers Each host is directly connected to

More information

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

This document provides a sample configuration for X25 Over TCP.

This document provides a sample configuration for X25 Over TCP. X.25 over TCP/IP Document ID: 9363 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot Troubleshooting

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Using NAT in Overlapping Networks

Using NAT in Overlapping Networks Using NAT in Overlapping Networks Document ID: 13774 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Related Information

More information