ECEN 689 Special Topics in Data Science for Communications Networks
|
|
- Valentine Lester
- 5 years ago
- Views:
Transcription
1 ECEN 689 Special Topics in Data Science for Communications Networks Nick Duffield Department of Electrical & Computer Engineering Texas A&M University
2 Organization Instructor: Nick Duffield Contact: duffieldng AT tamu DOT edu ; (979) Class notes: Class times: Mon/Wed 03:00-04:15pm, CHEN 108 Office hours: WEB 332D, Mon/Wed 11:00am-12:00pm Prerequisites: graduate standing; instructor approval; working background in networking, probability, statistics Grading: Homework 50%; Project 15%; Presentation 15%; Final Exam 20%; Discussion of homework assignments is encouraged, but copying is not allowed. Assignments must be handed in on time to receive full credit
3 Course Materials: All available online Background references Baron: Probability and Statistics for Computer Scientists (2 nd Edition) Peterson & Davie: Computer Networks (5th Edition) Detailed references: selections from Leskovec, Rajaraman & Ullman: Mining of Massive Data Sets Kolaczyk: Statistical Analysis of Network Data: Methods and Models. Review articles and tutorials Duffield: Sampling for Passive Internet Measurement: A Review Cormode, Duffield: Sampling for Big Data Research literature references: Will be communicated in class notes
4 Objectives of the course Broad description: Statistical and algorithmic methods for acquiring and analysing massive, complex, and incomplete datasets. Applications to measurement and analysis of operational data in ISP communication networks, routers and protocols. Understanding of design decisions and trade-offs between statistical and computational goals Topics on the course Sampling, sketching, frequent itemset mining, network probing, network tomography, graph sampling. Relevant background in probability, statistics, and networking recapped as needed, with references for further reading Topics NOT on this course Machine learning Hadoop, MapReduce
5 About me Joined TAMU August 2014 from Rutgers University Worked for 18 years in AT&T Labs Research in New Jersey Previously Asst. Professor in Europe Undergrad/PhD in Physics and Mathematical Physics
6 Data Science for Communications Networks
7 Data Science and Big Data Big Data arises in many forms: Physical Measurements: from science (physics, astronomy) Medical data: genetic sequences, detailed time series Activity data: GPS location, social network activity Business data: customer behavior tracking at fine detail Why is Big Data is trending up? Availability of data in new fields Technological advances Hardware Computation Algorithms Anticipated value of analysis
8 Data Science in Communications Networks Motivating application: Internet Service Providers (ISPs) Many reasons to study data science from ISP viewpoint Expertise: instructor s experience from ISP world Demand: data science methods developed in response to ISP needs Practice: methods widely used in ISP monitoring, built into routers Prescience: ISPs were first to hit many big data problems Variety: many different places where data science is needed
9 Data Science Disciplines Transferable Methods Algorithms and Data Structures Probability and Statistics Inference and Machine Learning Applications domain This course: communications networking
10 Data Science in Communications Networks Internet Service Providers had big data before Big Data Operational metadata concerning network usage and state 1. Telephony call detail records Originating and receiving telephone number, duration, 2. IP traffic flow records generated by routers Source and destination IP address of packet flows, #packets, #bytes, 3. Protocol transitions Handovers of mobile device between wireless basestations Generated continuously, 100s of Terabytes per day Many other operational datasets Used in network management over a range of timescales From months (network planning) to seconds (network attack detection)
11 Structure of Large ISP Networks City- level Router Centers Peering with other ISPs Access Networks: Wireless, DSL, IPTV Backbone Links Downstream ISP and business customers Network Management & AdministraHon Service and Datacenters
12 Measuring the ISP Network: Data Sources Router Centers Peering Access Backbone One- way Packet Loss & Latency AcHve probing between Measurement devices Business Management Datacenters
13 Measuring the ISP Network: Data Sources Router Centers Peering Access Backbone Roundtrip Packet Loss & Latency Monitoring both direchons of traffic between two hosts Business Management Datacenters
14 Measuring the ISP Network: Data Sources Router Centers Status Reports: Device failures and transihons Peering Access Backbone Business Management Datacenters
15 Measuring the ISP Network: Data Sources Peering Router Centers Access Backbone Customer Care Logs Business Management Datacenters
16 Measuring the ISP Network: Data Sources Router Centers Peering Protocol Monitoring: e.g. Wireless Handovers Backbone Active set: (A,B) B D Active set: (C,D) A C Business Management Datacenters
17 Measuring the ISP Network: Data Sources Router Centers Peering Access Backbone Link Traffic Rates Timeseries of traffic per router interface, 5 minute granularity 0:00 0:05 0:10 0:15 0:20 0:25 0:30 0:35 Management Datacenters
18 Measuring the ISP Network: Data Sources Router Centers Peering Access Backbone Business Management IP Traffic Flow Records Generated by routers Datacenters
19 Three challenges for ISP data analysis Scale: some datasets are enormous IP Traffic Flow Records, Mobile device handovers, Incompleteness: Not all quantities can be directly measured Would like to know packet loss and latency per link Typically only measure these on a path comprising multiple links? Complexity Complex statistical properties difficult to model Noisy data, skewed distributions, laws, correlations The methods in this course tackle these challenges
20 1. Traffic Flow Measurement IP Protocol layers & packet headers Router based traffic measurement Measurement design decisions Traffic flows, NetFlow
21 Protocol layers in the Internet application packet transport header payload IP header payload link header payload Network packet
22 IP packet header IP version 4 (IPv4) Main focus here: Routers: use DstIP for packet forwarding Determine router egress interface for the packet 32 bit Source IP address (SrcIP) 32 bit Destination IP address (DstIP) Usually written in dot decimal notation, e.g., Also: IP Protocol (Proto) signifies which IP protocol is used in the remainder of the packet How? Routers can t store (DstIP, egress) for each possible DstIP (2 32 ~ 4G)
23 IP Prefixes Prefix = first m bits of IP address for some m 32 Represents a block of addresses First m bits in common; remaining 32 m bits take any value CIDR notation for address block dot_decimal_address / prefix length e.g / 22 Comprises = 2 10 addresses from to In binary notation = First 22 bits common =
24 IP Routing and Prefixes Routers maintain a routing table Routing table = lists of (DstIP_Prefix, egress) pairs; currently ~500k How? Routers communicate by protocols to announce and update tables Forwarding Packets Find longest prefix (DstIP_Prefix, egress) in table that matches packet Forward packet to egress interface More detail: Petersen & Davie, Chap 3.2 & 3.3
25 IP Header and Information for ISPs Have seen that IP header information is used to forward packets in routers in the ISP infrastructure How could an ISP use this information for network management if it could be monitored, recorded and analysed? Two example uses: Network planning: identify potential new customers based on volumes of traffic to or from their IP addresses Attack detection: detect an anomalous burst of traffic destined to a customer Many other ISP network management tasks used IP header information over range of timescales: from months to seconds
26 Protocol layers in the Internet application packet transport header payload IP header payload link header payload Network packet
27 Transport and Other Protocols Most data transmission accomplished by one of two IP transport protocols that provide the appearance of a communications channel between hosts TCP: Transmission Control Protocol (Proto = 6) connection oriented protocol providing three-way handshake to setup connection reliable ordered transmission congestion-avoidance UDP: User Datagram Protocol (Proto = 17) connectionless, no reliability, no congestion avoidance Other (non-transmission) IP protocols in common use ICMP: Internet Contol Message Protocol (Proto = 1) used to communicate error conditions; leveraged for probing & debugging
28 Transport Layer Header UDP Header Source port UDP Length Destination port UDP checksum 16 bit source port (SrcPrt) and destination ports (DstPrt) Used in both TCP and UDP Associate packets with applications at hosts (see: binding) Ports : well known, assigned by IANA (mostly) E.g. HTTP server listens in port 80 ; DNS uses port 53 Ports : registered ports E.g. minecraft Ports : dynamic ports More detail: Petersen & Davie, Chap. 5.1, 5.2
29 TCP/UDP Header and Information for ISPs Have seen that UDP/TCP header information (port numbers) is used at hosts to associate packets to applications Many of these associations are registered by IANA The identify of the application that generated a packet can be inferred (to some degree) from transport header port numbers How could an ISP use this info for network management? Two example uses: Network planning: detecting growth of new applications E.g. various P2P applications, but some ports dynamic or unofficial Attack detection: e.g. signature of exploit of application vulnerability E.g. Slammer Worm: UDP port 1434 (MS SQL Server), 376 byte packets
30 Measuring Network Traffic ISPs: useful to record packet SrcIP, DstIP, SrcPrt, DstPrt How can routers do this? Finest conceivable granularity? Routers record (SrcIP, ) for each packet, export result to a collector Constraints: router cycles, network bandwidth for collection Possible with special purpose measurement devices for limited time Coarse time granularity? Maintain counters of packet/bytes for each (SrcIP, ) seen Report at fixed time interval (e.g. every hour), then reset counters to 0. Constraints: storage: how many distinct combinations (SrcIP ) seen in each interval? staleness: information may lose usefulness with reporting delay
31 Network Traffic Flows Better: Exploit inherent timescale of packets generated by a user application Intuition: packets group into sessions e.g. web download, VOIP call, Abstractly, define an IP Flow: Set of packets with a shared property observed over some time period Shared property is called the key Typically a tuple of fields from the IP and transport headers No unique definition of key; depends on purpose 5-tuple key: (SrcIP, DstIP, SrcPrt, DstPrt, Proto) Application-to-application flow 2-tuple key: (SrcIP, DstIP) Host-to-host flow 7-tuple key: (SrcIP, DstIP, SrcPrt, DstPrt, Proto, ToS, Ingress Intf) Used for flow measurement in some routers
32 Flow measurement in routers Hme key 1 key 2 key 3 key 4 Routers maintain statistics on flows in a flow table Each flow: key, #packets, #bytes, first & last packet times, Packet key, bytes, timestamp, key 4 stats 4 hash(key) key 1 stats 1 Flow table Each packet If no entry for packet key in flow table, instantiate new entry #packets(key) = #bytes(key) = 0; first_packet_time(key) = timestamp, Update flow entry key 3 stats 3 key 2 stats 2 #packets(key)++ ; #bytes(key) += bytes; last_packet_time(key) = timestamp,
33 Flow termination No precise definition behind intuition of flow as a session Routers use several criteria to terminate flows (configurable) Protocol signals: packets TCP FIN flag is set, ending TCP connection Inactive timeout: time since last observed flow packet > T inactive Active timeout: time since first observed flow packet > T active Flow table occupancy: terminate some flows if table occupancy > p%
34 Flow records: realization & collection Statistics of terminated flow exported in flow record release flow table memory for new flow statistics Realization Cisco NetFlow dominates Current version 9; flow definition, export format highly configurable Most other router vendors offer (some version of) NetFlow Embodied in Internet Engineering Task Force Standards IP Flow Information export Working Group Flow record collectors Network management software vendors offer collector/analysers Some public domain tools, e.g. cflowd Related approaches e.g. sflow The future Dynamically configurable measurement in software defined networking
35 Background Reading NetFlow and IETF Standards Cisco NetFlow White Paper: IETF IPFIX Working Group WG Charter: Applying IPFIX Tutorial:
Introduction to Netflow
Introduction to Netflow Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationThis chapter provides information to configure Cflowd.
Cflowd In This Chapter This chapter provides information to configure Cflowd. Topics in this chapter include: Cflowd Overview on page 564 Operation on page 565 Cflowd Filter Matching on page 569 Cflowd
More informationFall 2017 ECEN Special Topics in Data Mining and Analysis
Fall 2017 ECEN 689-600 Special Topics in Data Mining and Analysis Nick Duffield Department of Electrical & Computer Engineering Teas A&M University Organization Organization Instructor: Nick Duffield,
More informationNetwork Management and Monitoring
Network Management and Monitoring Introduction to Netflow These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
More informationConfiguring Application Visibility and Control for Cisco Flexible Netflow
Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also
More informationCH. 3 IP FORWARDING AND ROUTING
1 2012, Morgan-Kaufmann Pub. Co., Prof. Larry Peterson and Bruce Davie Some marked texts and figures from textbook Conceptual Computer Networks & José María Foces Vivancos CH. 3 IP FORWARDING AND ROUTING
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationConfiguring Data Export for Flexible NetFlow with Flow Exporters
Configuring Data Export for Flexible NetFlow with Flow Exporters Last Updated: November 29, 2012 This document contains information about and instructions for configuring flow exporters to export Flexible
More informationFlexible NetFlow IPv6 Unicast Flows
The feature enables Flexible NetFlow to monitor IPv6 traffic. Finding Feature Information, page 1 Information About Flexible NetFlow IPv6 Unicast Flows, page 1 How to Configure Flexible NetFlow IPv6 Unicast
More informationConfiguring NetFlow and NetFlow Data Export
This module contains information about and instructions for configuring NetFlow to capture and export network traffic data. NetFlow capture and export are performed independently on each internetworking
More informationTraffic Flow Measurements within IP Networks: Requirements, Technologies and Standardization
Traffic Flow Measurements within IP Networks: Requirements, Technologies and Standardization Jürgen Quittek NEC Europe Ltd., Network Laboratories, Heidelberg, Germany Tanya Szeby, Georg Carle, Sebastian
More informationFlexible NetFlow IPv6 Unicast Flows
The feature enables Flexible NetFlow to monitor IPv6 traffic. Finding Feature Information, page 1 Information About Flexible NetFlow IPv6 Unicast Flows, page 1 How to Configure Flexible NetFlow IPv6 Unicast
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationConfiguring Data Export for Flexible NetFlow with Flow Exporters
Configuring Data Export for Flexible NetFlow with Flow Exporters Last Updated: September 4, 2012 This document contains information about and instructions for configuring flow exporters to export Flexible
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer Dmitri Loguinov Texas A&M University March 29, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Homework #3
More informationFundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security
Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services
More informationFlexible Netflow Configuration Guide, Cisco IOS Release 15S
Flexible Netflow Configuration Guide, Cisco IOS Release 15S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationFrom NetFlow to IPFIX the evolution of IP flow information export
From NetFlow to IPFIX the evolution of IP flow information export Brian Trammell - CERT/NetSA - Pittsburgh, PA, US Elisa Boschi - Hitachi Europe - Zurich, CH NANOG 41 - Albuquerque, NM, US - October 15,
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationWhere we are in the Course
Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer
More informationECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ECPE / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Application Layer Transport Layer Network Layer Link Layer Physical Layer 2 Application Layer HTTP DNS IMAP
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationFlowMonitor for WhatsUp Gold v16.3 User Guide
FlowMonitor for WhatsUp Gold v16.3 User Guide Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 Flow Monitor System requirements...
More informationAdvanced Registry Operations Curriculum NetFlow
Advanced Registry Operations Curriculum NetFlow These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) as
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationRIPE75 - Network monitoring at scale. Louis Poinsignon
RIPE75 - Network monitoring at scale Louis Poinsignon Why monitoring and what to monitor? Why do we monitor? Billing Reducing costs Traffic engineering Where should we peer? Where should we set-up a new
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationFlexible NetFlow - Top N Talkers Support
This document contains information about and instructions for using the Flexible NetFlow - Top N Talkers Support feature. The feature helps you analyze the large amount of data that Flexible NetFlow captures
More informationZone-Based Firewall Logging Export Using NetFlow
Zone-Based Firewall Logging Export Using NetFlow Zone-based firewalls support the logging of messages to an external collector using NetFlow Version 9 export format. NetFlow Version 9 export format uses
More informationThe following topics describe how to configure correlation policies and rules.
The following topics describe how to configure correlation policies and rules. Introduction to and Rules, page 1 Configuring, page 2 Configuring Correlation Rules, page 5 Configuring Correlation Response
More informationCS 4390 Computer Networks. Transport Services and Protocols
CS 4390 Computer Networks UT D data Session 07 Transport Layer Overview and UDP Adapted from Computer Networking a Top-Down Approach 1996-2012 by J.F Kurose and K.W. Ross, All Rights Reserved Transport
More informationNetwork Layer: Control/data plane, addressing, routers
Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)
More informationK2289: Using advanced tcpdump filters
K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer Overview, Router Design, IP Sec 4.1. 4.2 and 4.3 Prof. Lina Battestilli Fall 2017 Chapter 4: Network Layer, Data Plane chapter goals: understand
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationASA Access Control. Section 3
[ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationNetwork Configuration Example
Network Configuration Example Configuring Active Flow Monitoring Version 9 Modified: 2017-01-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationSignificance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak
Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet
More informationETSF10 Part 3 Lect 1
ETSF10 Part 3 Lect 1 IPv4 and IPv6, ICMP, RTP/RTCP, VoIP Jens A Andersson Electrical and Information Technology IPv4 Recap Some header fields MTU Fragmentation Figure 20.2 2 Nt Network klayer in an internetwork
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationNETWORK PACKET ANALYSIS PROGRAM
NETWORK PACKET ANALYSIS PROGRAM Duration: 3 days (21 hours) Mode: 1. Instructor Led Class room Training and Labs 2. Online In this hands-on course, you will receive in-depth training on Protocol analysis
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationChapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach
Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationDHCP and DDNS Services
This chapter describes how to configure the DHCP server or DHCP relay as well as dynamic DNS (DDNS) update methods. About, page 1 Guidelines for, page 3 Configure the DHCP Server, page 4 Configure the
More informationConfiguring AVC to Monitor MACE Metrics
This feature is designed to analyze and measure network traffic for WAAS Express. Application Visibility and Control (AVC) provides visibility for various applications and the network to central network
More informationPage 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011
More informationRIPE76 - Rebuilding a network data pipeline. Louis Poinsignon
RIPE76 - Rebuilding a network data pipeline Louis Poinsignon Who am I Louis Poinsignon Network Engineer @ Cloudflare. Building tools for data analysis and traffic engineering. What is Cloudflare? Content
More informationExperiences with IPFIX-based Traffic Measurement for IPv6 Networks. Nakjung Choi, Hyeongu Son*, Youngseok Lee* and Yanghee Choi
Experiences with IPFIX-based Traffic Measurement for IPv6 Networks Nakjung Choi, Hyeongu Son*, Youngseok Lee* and Yanghee Choi Seoul National Univ *Chungnam National Univ 27. 8. 31 (Fri) SIGCOMM 27 IPv6
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationDetecting IPv6 Tunnels in an Enterprise Network
Detecting IPv6 Tunnels in an Enterprise Network Introduction The ongoing depletion of unique and global IPv4 addresses is creating an increased focus on IPv6 technology. The regional registries run ongoing
More informationUniversity of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.
University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.
More informationcs144 Midterm Review Fall 2010
cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)
More informationFlexible NetFlow IPFIX Export Format
The feature enables sending export packets using the IPFIX export protocol. The export of extracted fields from NBAR is only supported over IPFIX. Finding Feature Information, page 1 Information About,
More informationCSCI-1680 Network Layer:
CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can
More informationAMP-Based Flow Collection. Greg Virgin - RedJack
AMP-Based Flow Collection Greg Virgin - RedJack AMP- Based Flow Collection AMP - Analytic Metadata Producer : Patented US Government flow / metadata producer AMP generates data including Flows Host metadata
More informationConfiguring NetFlow and NetFlow Data Export
Configuring NetFlow and NetFlow Data Export This module contains information about and instructions for configuring NetFlow to capture and export network traffic data. NetFlow capture and export are performed
More informationIntroduction COURSE BACKGROUND. Lecture Notes. Today s Lecture. Your Instructor. Syllabus and Calendar Are Online
Lecture Notes Introduction Will be online by noon of the preceding day (today was an exception) Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today
More informationUsing NetFlow Sampling to Select the Network Traffic to Track
Using NetFlow Sampling to Select the Network Traffic to Track This module contains information about and instructions for selecting the network traffic to track through the use of NetFlow sampling. The
More informationInternet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses
Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationUsing Flexible NetFlow Flow Sampling
This document contains information about and instructions for configuring sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow. NetFlow is a Cisco technology that provides statistics
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2010 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable calculators are permitted
More informationUsing Flexible NetFlow Flow Sampling
This document contains information about and instructions for configuring sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow. NetFlow is a Cisco technology that provides statistics
More informationECE 435 Network Engineering Lecture 15
ECE 435 Network Engineering Lecture 15 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 October 2016 Announcements HW#5 due HW#6 posted Broadcasts on the MBONE 1 The Transport
More informationFlexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
Flexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationNetwork Layer/IP Protocols
Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationCS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018
CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing
More informationTransport Layer. Chapter 3: Transport Layer
Transport Layer EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 3: Transport Layer our goals: understand principles behind layer services: multiplexing,
More informationIP - The Internet Protocol
IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:
More informationIPv6 Sampled NetFlow feature was introduced. Destination-based Netflow Accounting feature was introduced.
A NetFlow flow is a unidirectional sequence of packets that arrive on a single interface (or subinterface), and have the same values for key fields. NetFlow is useful for the following: Accounting/Billing
More informationConnection Logging. Introduction to Connection Logging
The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: Introduction to, page 1 Strategies, page 2 Logging Decryptable Connections
More informationData Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer
Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science
More informationConfiguring NetFlow. Information About NetFlow. Send document comments to CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, traffic destination, timing, and application information, giving visibility into traffic transiting the
More informationShim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI
Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan
More informationFlexible NetFlow IPv6 Unicast Flows
The feature enables Flexible NetFlow to monitor IPv6 traffic. Finding Feature Information, on page 1 Information About Flexible NetFlow IPv6 Unicast Flows, on page 1 How to Configure Flexible NetFlow IPv6
More informationIP Address Assignment
IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections
More informationIPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management
IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall
More information