Peer-to-Peer and Overlay Networks
|
|
- Johnathan Shaw
- 5 years ago
- Views:
Transcription
1 The emule 1 ricardo.pereira@inesc-id.pt IST Images from The emule Specification, Yoram Kulbak and Danny Bickson
2 1 High level Granularity 2 3 Queue management Part selection
3 emule High level Granularity emule is the most popular implementation of the edonkey 2000 protocol, which includes a few extensions The network contains a set of independent servers There isn t a single P2P network but a set of them, which may intercept Clients use both TCP and UDP according to the task being executed
4 emule High level Granularity Servers: Are independent, do not communicate among themselves Are the network entry point Supply clients with a list of other servers. This list is defined by the server operators Make available a file search service Supply information about peers connected to the same server sharing the same file Make possible communicating with peers behind firewalls
5 emule High level Granularity Clients: Share files among themselves Maintain a connection to one server using TCP May query other servers using UDP Transfer files using TCP May query other peers using UDP Share information about servers, peers and files among themselves
6 Network example High level Granularity
7 File transmission High level Granularity Files: Are divided into parts (9,28MB) The sharing unit is the full part Peers share file parts, even if they don t yet have the full file Parts are divided into chunks (180KB)
8 TCP connection to server and back! Clients connect to a single server, using TCP Login states GUID, TCP listening port, protocol version, user nick... Server attempts to establish back a new connection, in order to test peer s ability to receive connections If successful, server responds with an High ID (peer IP)
9 Clients unable to receive connections Server responds with low id. Server message contains warning text, stating limitations Servers present two limits, (soft and hard) for the number of supported clients. After reaching the soft limit, no more low ID peers are accepted
10 Session start Client supplies list of shared files, which it may have to update during the session Client requests list of alternative servers Server provides status information (number of clients and servers) Server sends welcome text message
11 Session start Server supplies list of servers Server states name, version and comments Client requests peers sharing the files it wants to download Server supplies partial list of the peers it knows
12 File description For each of the shared files, the client states: ID Name Size Type (audio, video, images,...) (optional) Length (opcional) Bitrate (opcional) Codec (opcional)
13 Other servers - UDP server state Clients communicate with other servers in order to learn their state/existence. UDP messages limited to: 10 mgs/s in total 1 msg each 5s per server Servers which do not respond x times in a row are discarded. Reply returns random value sent in the request
14 File search Client sends search request Server sends reply After finding the intended file, user starts download. Client requests sources Server sends stats (number of clients and files) Server sends set of sources
15 File search When performing a search, the user may state: Search string (with logical operators). Sent using prefix notation File type (optional) Minimum and maximum file size (optional) Availability (minimum number of known sources) (optional) File extension (optional) When it receives a set of sources, the client adds them to its list. Peers are contacted in the order they are learned
16 UDP Enhanced file search Client may extend the file search to several servers, using UDP May search for files or sources Sent simultaneously to several servers Server only answers if it has data to send (UDP) File search decided by user Source search automatic when known sources are inferior to 100 No more than 1 msg/s
17 Connecting to another peer Client identifies itself and indicates to which server it is connected emule extension indicates support for: UDP, secure ID, peer exchange, compression Only one connection between two peers Connection closed after 40s of inactivity
18 Connecting to low ID peers A high ID peer may, using the server, request a low ID peer to connect back. This allows NAT and firewalls to be circumvented.
19 Verifying a file existence Client which started connection indicates the file it wants Other responds whether it has the file and which parts it has May request list of known sources (peer exchange) Files are identified using 16B file hash (MD4) Peer may request root hash (part hashes)
20 Download request After confirming existence of file, peer requests download Uploading peers assigns score to request Request queued If it s not its turn to be served, it will have to wait
21 Download start Download may start when request reaches the top positions of the queue If peer isn t connected, uploader will connect back Client pipelines requests (up to 3 outstanding chunks) If downloader already has the file, it will cancel the request
22 Transmitting file parts Sending part messages carry 5 to 15KB Messages may be compressed Requests to a peer are all for the same part
23 UDP Periodic Download request Sent every 20 minutes Reply may be queue position Reply may be queue full Reply may be file not found
24 Credit system Queue management Part selection Secure identification Client uses a random 16B value as ID. Each has a RSA private/public key. Public keys are exchanged on the first connection between two peers. Secure signatures allow peers to trust each others and remember past file exchanges. Credits are accounted individually between each pair of peers Credit Value from 1 to 10, calculated as the minimum of (units of MB): uploaded total 2 downloaded total uploaded total + 2
25 Upload queue Queue management Part selection Number of upload slots limited to ensure a minimum of 2,4KB/s/slot Slots assigned to the top positions of the queue Clients sorted by score score = (rating queued time seconds)/100 rating = initial rating credit file priority initial rating is 0 for banned users initial rating is for friends initial rating is usually 100 initial rating is 200 during the first 15 minutes after being assigned an upload slot file priority is user defined (from 0.3 to 1.8)
26 Part selection Queue management Part selection The requested part is chosen according to the following criteria (decreasing importance): Part rarity (discrete: very rare, rare and common) Parts which allow previewing the file (first and last) Parts which aren t being downloaded from another source Parts whose download is closer to terminate After downloading a part, its checksum is verified. Should it fail, the peer will attempt to replace chunks sequentially until the checksum becomes valid. Chucksum is a SHA1 hash over each file part. It is called root hash
27 Question Queue management Part selection Any doubts?
The emule Protocol Specification
The emule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il Academic supervisor: Prof. Scott Kirkpatrick DANSS (Distributed Algorithms, Networking and Secure
More informationSQLite Server - About
SQLite Server - About Description: The SQLite Server application allows a SQLite database to be hosted over a network connection, allowing multiple clients to concurrently write & read to the SQLite database.
More informationCisco Unified Operating System Administration Web Interface
Cisco Unified Operating System Administration Web Interface ServerGroup, page 1 Hardware, page 2 Network Configuration, page 3 Software Packages, page 4 System, page 5 IP Preferences, page 6 Ethernet Configuration,
More informationCisco Unified Operating System Administration Web Interface for Cisco Emergency Responder
Cisco Unified Operating System Administration Web Interface for Cisco Emergency Responder These topics describe the Cisco Unified Operating System (OS) Administration web interface for Cisco Emergency
More informationTable of Contents 1 IKE 1-1
Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration
More informationHow to Create a TINA VPN Tunnel between F- Series Firewalls
How to Create a TINA VPN Tunnel between F- Series Firewalls As the TINA protocol offers significant advantages over IPsec, it is the main protocol that is used for VPN connections between F-Series Firewalls.
More informationTransport Level Security
2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,
More informationSample excerpt. Virtual Private Networks. Contents
Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................
More informationVPN Ports and LAN-to-LAN Tunnels
CHAPTER 6 A VPN port is a virtual port which handles tunneled traffic. Tunnels are virtual point-to-point connections through a public network such as the Internet. All packets sent through a VPN tunnel
More informationAN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP
AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationFUNCTIONALITY INTRODUCTION... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 MENU BAR... 6 FILE UPLOAD... 7
3 FUNCTIONALITY INTRODUCTION... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 MENU BAR... 6 FILE UPLOAD... 7 SUBMISSION STATUS... 7 HELP... 7 LOGOUT...10 WELCOME PAGE...10 SUBMITTING OASIS DATA...10
More informationFUNCTIONALITY. 02/2018 v1.01 Outcome and Assessment Information Set (OASIS) FUNCTIONALITY 3-1 Submission User s Guide
3 FUNCTIONALITY INTRODUCTION... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 MENU BAR... 7 FILE UPLOAD... 7 SUBMISSION STATUS... 7 HELP... 8 LOGOUT...11 WELCOME PAGE...11 SUBMITTING OASIS DATA...11
More informationService Managed Gateway TM. Configuring IPSec VPN
Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationIKE. Certificate Group Matching. Policy CHAPTER
CHAPTER 26, also called ISAKMP, is the negotiation protocol that lets two hosts agree on how to build an IPsec security association. To configure the security appliance for virtual private networks, you
More informationLesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network
Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network 20/03/2017 1 IMPLEMENTATION OF KADEMLIA Kademlia is the protocol used by the largest public DHTs. Vuze ( before known as Azureus),
More informationGrandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide
Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN
More informationWireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked
Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Secure Communications Stay-Linked Secure Communications Guide Page 1 Rev. 10.0.0 Dated: 04/26/10 Table
More informationStart Creating SSL Policies
The following topics provide an overview of SSL policy creation, configuration, management, and logging. SSL Policies Overview, on page 1 SSL Policy Default Actions, on page 2 Default Handling Options
More informationNo, the bogus packet will fail the integrity check (which uses a shared MAC key).!
1. High level questions a. Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with
More informationNapster: More Dissected
Napster: More Dissected LECT-03, S-34 Meta Server Normally, when starting up, nap downloads a list of available servers from a meta-server such as http://www.gotnap.com/servers.txt. This list will be stored
More informationFirst and Second Generation Peer to Peer Networks
First and Second Generation Peer to Peer Networks and Department of Computer Science Indian Institute of Technology New Delhi, India Outline 1 2 Overview Details 3 History of The mp3 format was the first
More informationHP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationRef: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on
IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the
More informationHow to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway
How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway To connect to the Google Cloud VPN gateway, create an IPsec IKEv2 site-to-site VPN tunnel on your F-Series Firewall
More informationSIAC Securities Industry Automation Corporation
SIAC Securities Industry Automation Corporation AutoLink-2 User s Manual Revision 1.1.5 06/22/05 National Market Systems Introduction The Securities Industry Automation Corporation (SIAC) provides a retransmission
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationUnofficial IRONTON ITSP Setup Guide
September 13 Unofficial IRONTON ITSP Setup Guide Author: Zultys Technical Support This unofficial configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone System
More informationOverview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste
Overview 15-441 15-441 Computer Networking 15-641 Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Web Consistent hashing Peer-to-peer Motivation
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationViber Encryption Overview
Introduction Terms Preparations for Session Setup Secure Session Setup Exchanging Messages Encrypted Calls Photo, Video and File Sharing Secure Groups Secondary Device Registration Authentication Viber
More informationDefining IPsec Networks and Customers
CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition
More informationZultys Advanced Communicator ZAC 2.0 User Manual
December 16 Zultys Advanced Communicator ZAC 2.0 User Manual Author: Zultys Technical Support Department Z u l t y s, I n c. 7 8 5 L u c e r n e S u n n y v a l e, C a l i f o r n i a, U S A 9 4 0 8 5
More informationCCNA 1 Chapter 10 v5.0 Exam Answers 2013
CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical
More informationNOTE: If you encounter difficulties connecting to CMSNet, contact the CMSNet Help Desk at (888)
3 FUNCTIONALITY INTRODUCTION... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE QIES ASAP SYSTEM FOR IRF-PAI SUBMISSIONS... 4 MENU BAR... 7 HELP... 8 ACCESSIBILITY POLICY... 9 CONTACT US...10
More informationVidyo Server for WebRTC. Administrator Guide
Vidyo Server for WebRTC Administrator Guide Product Version 3.2 Document Version A April, 2016 TABLE OF CONTENTS Overview... 1 Understanding the Configuration Procedure... 1 1. Using Vidyo Server for WebRTC
More informationNOTE: If you encounter difficulties connecting to CMSNet, contact the CMSNet Help Desk at (888)
3 FUNCTIONALITY INTRODUCTION... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE QIES ASAP SYSTEM FOR LTCH CARE DATA SET SUBMISSIONS.. 4 MENU BAR... 7 HELP... 8 ACCESSIBILITY POLICY... 9
More informationWelcome to your LIVE EMS Online Training!
Welcome to your LIVE EMS Online Training! Note: In order to receive credit for each lecture and gain access to the quiz you must attend each lecture for the duration and participate at a minimum every
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationConfiguring SSL. SSL Overview CHAPTER
CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.
More informationInterface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1
More informationLecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:
PP Lecture 1 Peer-to-Peer Model March 16, 005 Overview: centralized database: Napster query flooding: Gnutella intelligent query flooding: KaZaA swarming: BitTorrent unstructured overlay routing: Freenet
More informationHow to Configure a Remote Management Tunnel for an F-Series Firewall
How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.
More informationAmazing Reminders User Guide
Amazing Reminders User Guide Contents Amazing Reminders Overview... 2 Installing Amazing Reminders... 3 Version 9.1 and higher... 3 Version 7.1.3 to Version 9.0... 4 Reminders Settings... 9 Reminders Timeframe
More informationInfodraw MRS Server Web Administration Interface
Infodraw MRS Server Web Administration Interface MRS Server is a TCP and UDP server that serves MRS device and monitor clients. Its most basic functionality and prime reason for its existence is to distribute
More informationViewing Capture ATP Status
Capture ATP Viewing Capture ATP Status Configuring Capture ATP Viewing Capture ATP Status Capture ATP > Status About the Chart About the Log Table Uploading a File for Analysis Viewing Threat Reports Capture
More informationTABLE OF CONTENTS. Author Guide
TABLE OF CONTENTS Introduction... 3 Getting Started... 4 Installing the Java control... 4 Installing the ActiveX component... 5 Setting MetroScript as a Trusted Domain in Internet Explorer... 6 User Login...
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationCisco Unified Communications Operating System Administration Guide for Cisco Unity Connection Release 12.x
Cisco Unified Communications Operating System Administration Guide for Cisco Unity Connection Release 12.x First Published: -- Last Modified: -- Americas Headquarters Cisco Systems, Inc. 170 West Tasman
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationYealink VCS Network Deployment Solution
Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating
More informationInternet Architecture & Performance. What s the Internet: nuts and bolts view
Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,
More informationCS519: Computer Networks
: Computer Networks Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol) More ICMP messages These were added over time RFC1191: Path MTU Discovery Added the size of the limiting MTU to the ICMP Packet
More informationConfiguring SSL. SSL Overview CHAPTER
7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:
More informationDispatch Console Installation & User Guide. Release
Dispatch Console Installation & User Guide Release 3.5.21 Contents Contents... 2 Getting Started... 3 System Requirements... 3 Installation... 3 Network Interface Configuration... 4 Audio Device Configuration...
More informationSonicOS Standard Release Notes SonicWALL, Inc. Software Release: June 4, 2009
Release Notes SonicOS Standard 3.1.6.3 Release Notes SonicWALL, Inc. Software Release: June 4, 2009 CONTENTS Platform Compatibility...1 Software Release Caveats...1 Known Issues...2 Resolved Issues...2
More informationT-TeleSec LineCryptConfig User's Guide
T-TeleSec LineCryptConfig User's Guide Contents Notes...5 The LineCrypt security concept...7 Authentication...7 Access control...7 Encryption...8 IKE...8 System requirements...9 Installation and program
More informationFile submissions to VINN and KRITA
Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationComputer Science 385 Design and Analysis of Algorithms Siena College Spring Lab 8: Greedy Algorithms Due: Start of your next lab session
Computer Science 385 Design and Analysis of Algorithms Siena College Spring 2017 Lab 8: Greedy Algorithms Due: Start of your next lab session You will be assigned groups of size 2 or 3 for this lab. Only
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationVirginia Henderson Global Nursing e-repository ( Henderson repository or the repository ) Revision and Re-Submission Instructions
Virginia Henderson Global Nursing e-repository ( Henderson repository or the repository ) Revision and Re-Submission Instructions If your submission has been rejected by a reviewer for any reason, you
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationUIP1869V User Interface Guide
UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationGrapevine web hosting user manual. 12 August 2005
Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationPunctual Dicom Workstation
DICOM Conformance Statement Punctual Dicom Workstation Company Name Product Name Product Version 2.0 Document number 2008-1001 Date June 1, 2009 Punctual Software Inc. Punctual Dicom Workstation TABLE
More informationNetwork Security CSN11111
Network Security CSN11111 VPN part 2 12/11/2010 r.ludwiniak@napier.ac.uk Five Steps of IPSec Step 1 - Interesting Traffic Host A Router A Router B Host B 10.0.1.3 10.0.2.3 Apply IPSec Discard Bypass IPSec
More informationVirginia Henderson Global Nursing e-repository ( Henderson Repository or the repository ) Eleven-Step Instruction Guide for Submissions
A resource of the Honor Society of Nursing, Sigma Theta Tau International Virginia Henderson Global Nursing e-repository ( Henderson Repository or the repository ) Eleven-Step Instruction Guide for Submissions
More informationManaging Firewall Services
CHAPTER 11 Firewall Services manages firewall-related policies in Security Manager that apply to the Adaptive Security Appliance (ASA), PIX Firewall (PIX), Catalyst Firewall Services Module (FWSM), and
More informationQuestion 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:
Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: (a) Reserving network resources ahead of data being sent: (2pts) In circuit-switching networks,
More informationUser Manual. SSV Remote Access Gateway. Web ConfigTool
SSV Remote Access Gateway Web ConfigTool User Manual SSV Software Systems GmbH Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document Revision:
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationFreeBSD Portsnap. What (it is), Why (it was written), and How (it works) Colin Percival The FreeBSD Project
What (it is), Why (it was written), and How (it works) Colin Percival The FreeBSD Project cperciva@freebsd.org May 19, 2007 A Case Study in Black Magic Colin Percival The FreeBSD Project cperciva@freebsd.org
More informationCSCI 466 Midterm Networks Fall 2013
CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationrat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version 1.1.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo EDR...3 1.1 Purchase
More informationDisplaying SSL Configuration Information and Statistics
CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of
More information-CONTINUE ON NEXT PAGE-
Page 1 How to Send an Email STEP 1- Login to your Participant Center STEP 2- On your Participant Center home page and click Email tab to access the Email functionality. Page 2 STEP 3-Select an email message
More informationECE 435 Network Engineering Lecture 9
ECE 435 Network Engineering Lecture 9 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 2 October 2018 Announcements HW#4 was posted, due Thursday 1 HW#3 Review md5sum/encryption,
More informationWelcome to Client Access Web!
Welcome to Client Access Web! Introduction W elcome to the Express Collections Client Access Portal. This portal has been crafted so that you, our valued client, can have convenient and secure access to
More informationDropping Packets in Ubuntu Linux using tc and iptables
Dropping Packets in Ubuntu Linux using tc and... 1 Dropping Packets in Ubuntu Linux using tc and iptables By Steven Gordon on Tue, 18/01/2011-8:13pm There are two simple ways to randomly drop packets on
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationCSE 473 Introduction to Computer Networks. Midterm Exam Review
CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)
More informationNew Features Guide EventTracker v6.2
New Features Guide EventTracker v6.2 Publication Date: Aug 04, 2008 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com The information contained in this document represents the
More informationBulk Interac e-transfers User Guide. User Guide Bulk Interac e-transfers 1
Bulk Interac e-transfers User Guide User Guide Bulk Interac e-transfers 1 Overview This document provides information and instructions for Bulk Interac e-transfer service. Bulk Interac e-transfer service
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationToday CSCI Coda. Naming: Volumes. Coda GFS PAST. Instructor: Abhishek Chandra. Main Goals: Volume is a subtree in the naming space
Today CSCI 5105 Coda GFS PAST Instructor: Abhishek Chandra 2 Coda Main Goals: Availability: Work in the presence of disconnection Scalability: Support large number of users Successor of Andrew File System
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationINDeX Agent Assist Administration Manual
INDeX Agent Assist Administration Manual 38HBK00001SCS Issue 3 (20/02/2002) Contents INDeX Agent Assist... 3 Introduction... 3 Requirements for Using Agent Assist Administrator... 3 The Components of an
More informationDell License Manager Version 1.2 User s Guide
Dell License Manager Version 1.2 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either
More informationStudent ID: CS457: Computer Networking Date: 5/8/2007 Name:
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement
More information