Avaya ExpertNet Lite Assessment Tool

Size: px
Start display at page:

Download "Avaya ExpertNet Lite Assessment Tool"

Transcription

1 IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005

2 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation... 2 Delay Measurements... 3 Router Monitoring... 5 Installation Planning... 5 Reports... 6 ExpertNet Lite Assessment Tool and the ExpertNet VoIP Assessment Tool... 6 Glossary & Acronyms... 6

3 avaya.com 1 Overview This document is for customers who purchase implementation services for an IP Telephony solution requiring an IP Network Readiness Assessment Basic deliverable. The tool used to deliver the basic Readiness Assessment is the ExpertNet Lite Assessment Tool. This document explains what the purpose of the ExpertNet Lite Assessment Tool software is and an overview of its operation. This is a technical document; hence some specialized knowledge is assumed. Specifically, the reader should have a sound knowledge of basic TCP/IP networking theory and practice, IP packet routing, routing protocols and related technologies. The ExpertNet Lite Assessment Tool is a software application designed to perform an IP Network Readiness Assessment. To accomplish this, the tool gathers quality of service (QoS) information from an IP network. The data gathered is then analyzed by Avaya engineers to produce an ExpertNet Lite Assessment Tool report. It is designed to run for an extended period of time, typically five to seven days (note that five days is the recommended minimum), in order to see trends in network performance. These trends are often visible when the data is summarized graphically, and such graphs are typically included in an ExpertNet Lite Assessment Tool report. The IP Network Readiness Assessment Basic deliverable is intended to assess the suitability of a given network for Voice over IP (VoIP) applications. Hence the data gathered by the ExpertNet Lite Assessment Tool is tailored towards such applications. This is a key differentiator between the ExpertNet Lite Assessment Tool and other network performance measurement tools. The ExpertNet Lite Assessment Tool provides a network discovery operation and relies on a network topology discovery tool called the Avaya ExpertNet Discovery Tool. The operation of this tool is not discussed in this document, but further information can be obtained from Avaya. The network topology discovered by this tool is read by the ExpertNet Lite Assessment Tool, and used to determine the extent of the network to be monitored. Automatic network discovery is optional in the ExpertNet Lite Assessment Tool. It is performed only when the user selects the Discover Paths menu option. Users may also enter network paths manually. When entering paths manually, the user has the choice of entering proper paths or target-type paths. When entering a proper path, the agent, using an enhanced, patented trace-route with an ability to discover load-balanced links, discovers intermediate routers. When entering a target-type path, no intermediate routers are discovered. The ExpertNet Lite Assessment Tool is comprised of two parts: an Agent, which gathers measurements data, and the Server, which resides in a secure environment within Avaya infrastructure that interprets the measurements data. The Agent is available for download on external Avaya servers. When the Agent concludes measurements gathering, it compresses the data and then encrypts it utilizing 1024 bit encryption. If the Agent PC resides on a network directly connected to the Internet, the Agent can automatically upload the encrypted dataset onto Avaya servers. The uploaded dataset is not accessible to anyone external to Avaya. The dataset is then moved to a secure server and removed from the intermediate server. The Avaya technician involved in the Network Readiness Assessment is notified once the dataset has been stored. Use of the ExpertNet Lite Assessment Tool requires a valid license for up to 30 days from the date of generation. Please contact your Avaya representative for information about obtaining a license. Documentation, release notes and context-sensitive on-line help describe the procedure for running the ExpertNet Lite Assessment Tool.

4 COMMUNICATIONS AT THE HEART OF BUSINESS 2 Network Impact The ExpertNet Lite Assessment Tool is designed to have a low impact on the network under test. This means it injects a minimal amount of traffic into the network, and has built-in safeguards to ensure that the traffic does not exceed set limits. These traffic throttling limits can be increased or decreased as required, however the defaults should be sufficient for most customer network environments. Broadly speaking, there are two types of traffic that the ExpertNet Lite Assessment Tool uses to perform its measurements. These are delay (or ping ) packets and SNMP get queries, discussed further in the Delay Measurements and Router Monitoring sections below. The traffic throttling can be adjusted independently for each of these two types of measurements. The ExpertNet Lite Assessment Tool has been designed carefully and tested extensively, to ensure that it does not alter the configuration of, or otherwise affect adversely, any device in the network. For example, all of the SNMP traffic is get requests and responses. In addition, the ExpertNet Lite Assessment Tool produces extensive logging of all of its activities. Network Paths One of the key concepts in the ExpertNet Lite Assessment Tool is that of a network path. When a packet is sent from a host, it may pass through many different links and routers before arriving at its destination. This set of hosts, routers and links is known as the network path. The network path is significant because the overall performance of the path can be affected by the performance of the individual components of the path. For example, excessive packet loss on a network path can be due to congestion on one of the intermediate routers between source and destination. Hence the concept of network path allows data from different sources to be correlated and analyzed together. One of the key assumptions of the ExpertNet Lite Assessment Tool is that measurement of network performance to and from a single point can lead to meaningful inferences about the performance of the network as a whole. This means that all paths in the ExpertNet Lite Assessment Tool originate at a single point, the PC that runs the ExpertNet Lite Assessment Tool software. All paths terminate at network edges, and the process of generating paths is described in the section Path Generation below. The ExpertNet Lite Assessment Tool is designed such that no other additional special software is needed to run in the network. Instead, the tool measures network performance by relying on the default behavior of IP implementations for each device in the path. This is discussed further below. For the ExpertNet Lite Assessment Tool purposes the concept of path applies to the Internet Protocol (IP) layer. The tool does not monitor directly any network performance or topology for network link or physical layers (terminology as defined by the ISO network stack). For example, the ExpertNet Lite Assessment Tool does not attempt to discover Ethernet topology or monitor directly Ethernet performance. It is anticipated that performance problems for layer 2 links will be indirectly apparent at the IP layer. For example, if a problematic Ethernet segment is resulting in 1% of frames being lost, this will generally be apparent at the IP layer as 1% packet loss. Path Generation In order to make meaningful interpretation of packet delay measurements, the ExpertNet Lite Assessment Tool needs to ensure that the path taken by each packet is known. Determining this path is also necessary in order

5 avaya.com 3 to monitor the correct router interfaces. This path generation process is conducted when the user executes either Discover Paths or Add Path Manually. The set of paths is generated from the topology file produced by the ExpertNet Discovery Tool or manually entered by the user. Each path starts at the agent host and ends with a host in the edge subnet. Between the Assessment Tool and the edge host/router are intermediate routers. When generating paths, the ExpertNet Lite Assessment Tool uses a patented technique of enhanced traceroute. For each edge device, packets are sent with successively incrementing TTL values. The TTL-expired message returned is used to enumerate the path taken from the Agent host to each edge subnet. At the same time, sequences of pings are sent to determine load-balanced links. It is important to note that the process used to generate paths is similar to that used when making the delay measurements. This has the benefit that the paths are verified throughout the monitoring period. Concurrently with path generation, the ExpertNet Lite Assessment Tool also attempts to detect the presence of load-balanced links. Modern routing protocols such as OSPF allow for the presence of multiple equal-cost paths between two points in the network. Routers for load balancing purposes typically utilize these links. The ExpertNet Lite Assessment Tool attempts to determine which of the multiple routes in a load-balanced link is to be used for any given packet. Generally routers implement load balancing on either a per-packet or per-destination basis. Where per-packet load balancing is used, two successive packets to the same destination can take different paths through the network. This has the potential to negatively impact VoIP applications. Per-destination load balancing provides a stable route for successive packets, however the ExpertNet Lite Assessment Tool must still determine which of the possible routes is being used for the delay measurement packets. The Agent s GUI provides Ping Status information at the path and hop level which shows whether packets are Off Path at any given time. Delay Measurements One of the main functions of the ExpertNet Lite Assessment Tool is to take periodic measurements of packet roundtrip time (referred to here as pinging ). This is conceptually similar to the output of the ping utility supplied with most operating systems, in that a timer is started when sending a packet and the value of the timer recorded when a response packet is received. Packets may be lost in transit, and this fact is recorded. From the recorded values of delay, we can calculate the statistical variance in these values, sometimes known as jitter. Thus, the ExpertNet Lite Assessment Tool makes measurements in order to calculate the most important factors that affect the quality of VoIP applications: Mean Opinion Score (MOS), delay, loss rate, and jitter. Most implementations of the ping utility use the Internet Control Message Protocol (ICMP) echo request/ reply facility. However, ICMP echo packets are not always treated by the network in a similar fashion to voice packets. Routers may be configured to forward ICMP echo packets at a lower priority than others, or drop them altogether. Hence delay measurements made with ICMP echo are not necessarily indicative of VoIP performance. A similar limitation exists when Transmission Control Protocol (TCP) is chosen for performance measurement. In order to address this limitation of ICMP echo, the ExpertNet Lite Assessment Tool uses a combination of User Datagram Protocol (UDP) request, with an ICMP reply. To measure packet round-trip time to a host, the ExpertNet Lite Assessment Tool will send a UDP packet to a closed port on that host. The host will respond with an ICMP port unreachable message. The round trip time is calculated as the elapsed time between sending the UDP request and receiving the ICMP reply.

6 COMMUNICATIONS AT THE HEART OF BUSINESS 4 Some routers disable UDP ping packets to stop malicious software (viruses, worms) from spreading. In this situation the ExpertNet Lite Assessment Tool can be directed to use ICMP pings. As noted above ICMP pings will not be as accurate as UDP, and the resulting data may not be as accurate had UDP ping been used. The ExpertNet Lite Assessment Tool also attempts to measure round-trip time (RTT) to intermediate routers along the path. A slight variation on the above technique is used for these intermediate routers. For example, let R be an intermediate router between the ELAT Agent PC and host H. Now we cannot ping R directly, because of the potential presence of per-destination load-balancing which may result in packets addressed to R directly taking a different path from the Tool to R than they would if they were addressed to host H (see Figure 1). Hence when pinging R, the UDP packets are actually addressed to H, but the time-to-live (TTL) field in the IP header of these packets are set such that a response is elicited from R, rather than the destination host H. This TTL method is similar to that used by the trace-route utility. In summary, the ExpertNet Lite Assessment Tool measures delay for each component of a path through the network from the Agent PC to a host. For intermediate routers, the TTL is set in order to elicit a TTL-expired ICMP message. For the target host, a closed UDP port is chosen in order to elicit a port-unreachable ICMP message. In each case the ICMP reply is used to make the delay measurement. UDP Packet Source: Agent Dest: Host TTL: 1 ELAT Agent (A) ICMP Packet (TTL-expired) Source: Router R Dest: Agent A Router (R) UDP Packet Source: Agent Dest: Host H Port: (high numbered) Host (H) ELAT Agent (A) Router (R) ICMP Packet (port not reachable) Source: Host H Dest: Agent A Host (H) Figure 1. The ExpertNet Lite Assessment Tool is installed and runs on a Microsoft Windows -based PC, the exact specifications of which are given in the release notes. It is important to understand that, given the highly time-sensitive nature of the delay measurements, this PC should be configured to minimize the possibility of other software affecting the measurements. Software such as virus scanners, screen savers, and other background processors can prevent the ExpertNet Lite Assessment Tool from being notified immediately when a packet is received. This introduces delay as measured by the ExpertNet Lite Assessment Tool, and hence must be disabled.

7 avaya.com 5 Router Monitoring The second major type of measurement made by the ExpertNetLite Assessment Tool uses the Simple Network Management Protocol (SNMP) to obtain performance data from routers. As mentioned above, only SNMP get queries are used, and hence should have no discernable impact on the network. The ExpertNet Lite Assessment Tool queries for interface information using standard Management Information Bases (MIBs). 3Com, Avaya, Cisco, Extreme, and Xylogics devices are also queried for CPU usage information using the manufacturer private MIBs. Other MIB variables may be added in subsequent ExpertNet Lite Assessment Tool releases. At startup, the ExpertNet Lite Assessment Tool determines what SNMP variables are supported by each device to be monitored. This ensures that only supported variables are queried for the remainder of the ExpertNet Lite Assessment Tool run time. If SNMP is not supported by, or the community string not known for a given router, then it is removed from the set of devices to be monitored. The ExpertNet Lite Assessment Tool currently supports SNMP v1 and v2c only. Installation Planning An important prerequisite for running the ExpertNet Lite Assessment Tool is that the network topology must be known and understood. Some care needs to be taken when installing the ExpertNet Lite Assessment Tool to ensure that it produces results that are most meaningful. By design, the ExpertNet Lite Assessment Tool is deployed on a single PC, measuring network performance between this PC and the network edges. The performance of other paths through the network is not measured. Hence the location of the ExpertNet Lite Assessment Tool in the network is important. While not strictly required, some preliminary plans for the deployment of VoIP applications are highly beneficial. These plans should include information such as the location of media servers, media gateways, and endpoints (both IP and traditional). Similarly traffic paths should be considered, including the possibility of endpoint-to-endpoint, endpoint-to-gateway, gateway-to-gateway, and other more complex call topologies. Also the possible location for PSTN interfaces should be considered. These plans do not have to be complete (or even vendor-specific), but should be derived from the business requirements for VoIP telephony, and an understanding of existing traffic patterns. From these preliminary plans, it should be possible to determine where to deploy the ExpertNet Lite Assessment Tool. As a general rule it is suggested that the ExpertNet Lite Assessment Tool be deployed into a network subnet, which might be considered for use by a media server. In addition, it is recommended that SNMP v1/v2c be enabled on all routers. If IP-address-based access control is in use, the IP address of the Agent PC must be added to allow access to all routers. SNMP is also required for execution of the ExpertNet Discovery Tool. The community strings used by the ExpertNet Discovery Tool are reused by the ExpertNet Lite Assessment Tool as needed. As described above, the ExpertNet Lite Assessment Tool uses UDP packets to make delay measurements. Hence it is desired for correct use of the tool that devices support these packets; in the event that UDP ping cannot be supported, the user may configure the tool to use ICMP ping. Intermediate routers must support trace-route. The network must not filter the UDP ping packets or the ICMP replies; if filtering does occur, ICMP ping must be used.

8 COMMUNICATIONS AT THE HEART OF BUSINESS 6 Reports The ExpertNet Lite Assessment Tool has the ability to generate a detailed report from the measurements data of the network. The report, which is typically customized by an Avaya engineer for the specific customer, contains an overview of the entire network, in addition to details about each path or target-type path if path discovery was not chosen. The path, or target-type path, will have annotation detailing whether the path is within specifications or not and a summary graph containing MOS, delay, jitter, and loss. For layer 3 devices that SNMP manageable and a proper SNMP read community string was given, CPU usage and interface utilization will be included. ExpertNet Lite Assessment Tool and the ExpertNet VoIP Assessment Tool There are two suites of tools that support the Network Readiness Assessment, The ExpertNet Lite Assessment Tool, which has been discussed thus far, and the ExpertNet VoIP Assessment Tool. The ExpertNet VoIP Assessment Tool has additional capabilities to support a much larger enterprise network. An overview of the capabilities that the ExpertNet VoIP Assessment Tool has is described below. 1. The set of paths measured by the ExpertNet VoIP Assessment Tool does not originate/terminate at a single point in the network. Thus, edge-to-edge network performance can be measured directly, rather than inferred from the performance characteristics to and from a single point. 2. The ExpertNet VoIP Assessment Tool discovers Ethernet topology. 3. The ExpertNet VoIP Assessment Tool performs measurements using Real Time Protocol (RTP) streams emulating real VoIP calls. 4. The ExpertNet VoIP Assessment Tool reports estimated bandwidth. For more information about the ExpertNet VoIP Assessment Tool, please contact your Avaya Client Executive or visit us at Glossary & Acronyms ExpertNet Lite Assessment Tool ExpertNet Discovery Tool ExpertNet VoIP Assessment Tool ExpertNet SM Consulting Practice ICMP IP MIBs OSPF PSTN A tool designed to gather information from Internet Protocol (IP) networks Internet Protocol discovery, visualization, analysis and display tool Detailed Internet Protocol troubleshooting and sectionalization tool The Avaya Network Consulting Practice s Services for LAN/WAN, IP Telephony, Enterprise Security planning and communications infrastructures Internet Control Message Protocol Internet Protocol Management Information Bases Open Shortest Path First (routing protocol) Public Switched Telephone Network

9 avaya.com 7 Glossary & Acronyms QoS RTP RTT SNMP TCP TTL UDP VoIP Quality of Service Real-Time Transport Protocol Round-trip time Simple Network Management Protocol Transmission Control Protocol Time-to-live User Datagram Protocol Voice over Internet Protocol

10 About Avaya Avaya enables businesses to achieve superior results by designing, building and managing their communications infrastructure and solutions. For over one million businesses worldwide, including more than 90 percent of the FORTUNE 500, Avaya s embedded solutions help businesses enhance value, improve productivity and create competitive advantage by allowing people to be more productive and create more intelligent processes that satisfy customers. For businesses large and small, Avaya is a world leader in secure, reliable IP telephony systems, communications applications and full life-cycle services. Driving the convergence of embedded voice and data communications with business applications, Avaya is distinguished by its combination of comprehensive, world-class products and services. Avaya helps customers across the globe leverage existing and new networks to achieve superior business results. COMMUNICATIONS AT THE HEART OF BUSINESS avaya.com 2005 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. and may be registered in certain jurisdictions. All trademarks identified by the, SM or TM are registered trademarks, service marks or trademarks, respectively, of Avaya Inc., with the exception of FORTUNE 500 which is a registered trademark of Time Inc. All other trademarks are the property of their respective owners. Printed in the U.S.A. 04/05 EF-SVC

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

PfR Voice Traffic Optimization Using Active Probes

PfR Voice Traffic Optimization Using Active Probes PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and

More information

set active-probe (PfR)

set active-probe (PfR) set active-probe (PfR) set active-probe (PfR) To configure a Performance Routing (PfR) active probe with a forced target assignment within a PfR map, use the set active-probe command in PfR map configuration

More information

AT&T Collaborate TM. Network Assessment Tool

AT&T Collaborate TM. Network Assessment Tool AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP Firewall Stateful Inspection of ICMP Last Updated: March 26, 2012 The Firewall Stateful Inspection of ICMP feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages

More information

Overview of IPM. What Is IPM? CHAPTER

Overview of IPM. What Is IPM? CHAPTER CHAPTER 1 Overview of IPM This chapter provides an overview of Cisco s Internetwork Performance Monitor (IPM) application. It contains the following sections: What Is IPM? Key Terms and Concepts How Does

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Voice, Video and Data Convergence:

Voice, Video and Data Convergence: : A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Routing with a distance vector protocol - EIGRP

Routing with a distance vector protocol - EIGRP Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License

More information

ExpertNet Lite Assessment Tool

ExpertNet Lite Assessment Tool 1 2 3 ExpertNet Lite Assessment Tool A Guide for Users 4 5 6 May 2013 Version 2.0 7 8 9 10 11 12 13 14 15 2013 Avaya Inc. All rights reserved. Notice While reasonable efforts were made to ensure that the

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

AT&T Collaborate TM. Network Assessment Tool

AT&T Collaborate TM. Network Assessment Tool AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

Network Layer: ICMP and Network Management

Network Layer: ICMP and Network Management Network Layer: ICMP and Network Management EECS3214 18-03-15 4-1 Chapter 5: outline 5.1 introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet: OSPF 5.4 routing

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated

More information

Tracking Packet Flow Using Path Analysis

Tracking Packet Flow Using Path Analysis CHAPTER 5 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network, including the physical

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Implementing Cisco IP Routing

Implementing Cisco IP Routing ROUTE Implementing Cisco IP Routing Volume 3 Version 1.0 Student Guide Text Part Number: 97-2816-02 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO MAKES AND YOU RECEIVE NO WARRANTIES

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

CTS2134 Introduction to Networking. Module 09: Network Management

CTS2134 Introduction to Networking. Module 09: Network Management CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems

More information

Whitepaper IP SLA: Jitter. plixer. International

Whitepaper IP SLA: Jitter. plixer. International Whitepaper IP SLA: Jitter 1 plixer Table of Contents Table of Contents Introduction IP SLA VoIP Measurement Tools Jitter Latency Packet Loss MOS ICPIF Score IOS Version Warning Steps to Configure the IP

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright

More information

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Transforming the Cisco WAN with Network Intelligence

Transforming the Cisco WAN with Network Intelligence Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using

More information

Introduction to Quality of Service

Introduction to Quality of Service Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies

More information

UC Assessor A cloud-based UC network assessment solution. Getting Started Guide

UC Assessor A cloud-based UC network assessment solution. Getting Started Guide UC Assessor A cloud-based UC network assessment solution Getting Started Guide December 2018 Copyright Copyright 2000-2018 Integrated Research Limited (ABN 76 003 588 449). All rights reserved. This guide

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Table of Contents 1 System Maintaining and Debugging 1-1

Table of Contents 1 System Maintaining and Debugging 1-1 Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

VoIP and Network Quality Manager

VoIP and Network Quality Manager GETTING STARTED GUIDE VoIP and Network Quality Manager Version 4.4.1 Last Updated: Wednesday, August 9, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/voip_network_quality_manager_(vnqm)/vnqm_documentation

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Cisco Performance Routing

Cisco Performance Routing Cisco Performance Routing As enterprise organizations grow their businesses, the demand for real-time application performance and a better application experience for users increases. For example, voice

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

A NETWORK GUIDE FOR VIDEOCONFERENCING ROLLOUT

A NETWORK GUIDE FOR VIDEOCONFERENCING ROLLOUT A NETWORK GUIDE FOR VIDEOCONFERENCING ROLLOUT THE BIGGEST VIDEOCONFERENCING CHALLENGE? REAL-TIME PERFORMANCE MANAGEMENT Did you know that according to Enterprise Management Associates EMA analysts, 95

More information

Network Layer: DHCP, ICMP, NAT, IPv6

Network Layer: DHCP, ICMP, NAT, IPv6 Network Layer:, ICMP, NAT, IPv6 CS 352, Lecture 11 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors) 1 IP addresses:

More information

PSTN Fallback. Finding Feature Information

PSTN Fallback. Finding Feature Information The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

Expert Reference Series of White Papers. Voice Architectures and Deployment Models COURSES.

Expert Reference Series of White Papers. Voice Architectures and Deployment Models COURSES. Expert Reference Series of White Papers Voice Architectures and Deployment Models 1-800-COURSES www.globalknowledge.com Voice Architectures and Deployment Models Bernie Gardiner, Global Knowledge Certified

More information

Redeeming the P Word. Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER

Redeeming the P Word. Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER Redeeming the P Word Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER With the growth of Unified Communications, there is an increasing need to effectively identify, diagnose,

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

PSTN Fallback. Finding Feature Information

PSTN Fallback. Finding Feature Information The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

Hands-On Troubleshooting IPTV with WireShark

Hands-On Troubleshooting IPTV with WireShark Hands-On Course Description This Hands-On course will enable attendees to upgrade their knowledge about how Video and Television is carried over IP in state-of-the art systems. At the end of the course

More information

IxChariot. Predict Device and System Performance Under Realistic Load Conditions

IxChariot. Predict Device and System Performance Under Realistic Load Conditions 0:00:02.0 0:00:00.3 0:00:00.6 0:00:01.8 Throughput 90.50 60.50 30.50 0.50 0:00:00 0:00:20 0:00:40 0:01:00 Predict Device and System Performance Under Realistic Load Conditions Test Triple Play Performance

More information

Bandwidth, Latency, and QoS for Core Components

Bandwidth, Latency, and QoS for Core Components Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page

More information

Application Notes. Introduction. Performance Management & Cable Telephony. Contents

Application Notes. Introduction. Performance Management & Cable Telephony. Contents Title Managing Cable Telephony Services Series VoIP Performance Management Date June 2004 Overview This application note describes the typical performance issues that cable operators encounter when deploying

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Configuring IP SLAs UDP Jitter Operations

Configuring IP SLAs UDP Jitter Operations This document describes how to configure an IP Service Level Agreements (SLAs) UDP jitter operation to analyze round-trip delay, one-way delay, one-way jitter, one-way packet loss, and connectivity in

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring the Expand Networks Accelerator 4820 with Avaya IP Telephony through Avaya SG203 and SG208 Security Gateways - Issue 1.0 Abstract

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

Cisco NAC Profiler Architecture Overview

Cisco NAC Profiler Architecture Overview CHAPTER 2 Topics in this chapter include: Overview, page 2-1 Cisco NAC Profiler System Deployment Model, page 2-3 Cisco NAC Profiler Usage: Port Provisioning and Endpoint Directory, page 2-4 Overview Cisco

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER 40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

Configuring Auto IP SLAs in IP SLAs Engine 3.0

Configuring Auto IP SLAs in IP SLAs Engine 3.0 This document describes the auto IP Service Level Agreements (SLAs) function in IP SLAs Engine 3.0, including the following: Auto-measure groups--each template, endpoint list, and scheduler can be configured

More information

Configuring IP SLAs LSP Health Monitor Operations

Configuring IP SLAs LSP Health Monitor Operations Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007

Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007 Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

HP 6125G & 6125G/XG Blade Switches

HP 6125G & 6125G/XG Blade Switches HP 6125G & 6125G/XG Blade Switches Network Management and Monitoring Configuration Guide Part number: 5998-3162b Software version: Release 2103 and later Document version: 6W103-20151020 Legal and notice

More information

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦 KillTest Exam : 100-101 Title : CCNA Interconnecting Cisco Networking Devices 1 (ICND1) Version : Demo 1 / 15 1.Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

More information