Cheleby: Subnet Level Internet Topology
|
|
- Theodora Ryan
- 6 years ago
- Views:
Transcription
1 Cheleby: Subnet Level Internet Topology Mehmet Hadi Gunes with Hakan Kardes and Mehmet B. Akgun Department of Computer Science and Engineering University of Nevada, Reno
2 Subnet Resolution A B C D genuine topology A B A B C D observed topology C D inferred topology Cheleby: Subnet-Level Internet Topology 2
3 [Observed] Degree vs. [Actual] Interfaces Degree: the number of one hop neighbors Interface: the number of links the system is attached to A B C D A B D C X 8 6 X Y Z Degree Distribution 8 6 Z Y Interface Distribution Cheleby: Subnet-Level Internet Topology 3
4 Hyper Graphs Networks modeled as graphs G=(V,E) Hyper graphs: H= (X,E) can accurately model multi access links also, bipartite (2 mode) graphs Cheleby: Subnet-Level Internet Topology 4
5 Cheleby System Overview PlanetLab Vantage Points Traces x - - L.2 - S.2 - y x - - A.1 - W.1 - -z y - S.1 - L.1 - -x y - S.1 U.1 - -C.1 - -z z - -C x z - -C U.2 - S.3 - y Raw Data Initial Pruner (IP) Structural Graph Indexer (SGI) SubNet Inferrer (SNI) y S U K C N L H A W x z Network Topology Graph Based Induction (GBI) Analytical IP Alias Resolver v2 (APARv2), iffinder Cheleby: Subnet-Level Internet Topology 5
6 Round Trip Time Analysis Hops (Trailing * s filtered) IPs Observed Unresponsive 213,303,135 17,537, % 7.60% CDF of IP addresses Round Trip Time (in msec) Cheleby: Subnet-Level Internet Topology
7 Unresponsive Routers Responsiveness to Direct Probes Responsiveness to Indirect Probes Cheleby: Subnet-Level Internet Topology 7
8 Team Analysis Cheleby: Subnet-Level Internet Topology 8
9 Resolution results Alias Resolution Subnet Inference Cheleby: Subnet-Level Internet Topology 9
10 Degree Distribution Exponents : 2.17, 2.02, 1.92, respectively Cheleby: Subnet-Level Internet Topology 10
11 Interface Distribution Exponents : 2.71, 2.69, 2.74, respectively Cheleby: Subnet-Level Internet Topology 11
12 Subnet Distribution Nodes in Subnets Exponents : 3.42, 3.62, respectively Cheleby: Subnet-Level Internet Topology 12
13 Synthetic Topology Generation Network Size ID SD Generate Nodes Generate Subnets Heterogeneous Swap Calculate Degree Distribution based on DD Satisfies Subnet & Interface Distributions!!! Match? no yes Final Topology Cheleby: Subnet-Level Internet Topology 13
14 Connectivity Analysis Relation between Interface Distribution and Number of Subnets Single connected component is feasible only when connectivity parameter <1 Feasible Region Cheleby: Subnet-Level Internet Topology 14
15 Subnet Distribution: ExploreNET CCDF [10 to 250] Number of Nodes in Subnets Estimating Network Layer Subnet Characteristics via Statistical Sampling, M. Engin Tozal and Kamil Sarac, IFIP/TC6 Networking, Prague, Czech Republic, May 12 Cheleby: Subnet-Level Internet Topology 15
16 TraceNET Destination Traceroute Path Source Destination TraceNET Path Source TraceNET: An Internet Topology Data Collector, M. Engin Tozal and Kamil Sarac, ACM Internet Measurement Conference, Melbourne, Australia, November 2010
17 Work in Progress AS 1 VP VP AS of Interest Alias Resolution AS 4 VP VP Subnet Resolution AS 2 VP VP AS 3 VP Cheleby: Subnet-Level Internet Topology Per Destination load balancers? 17
18 Network Traffic Analysis with Bing Li, Jeff Springer, George Bebis
19 Design Goals Real time network query near real time measurement and analysis Distributed system for data collecting, storing, accessing, measuring and analyzing NetFlow Models of detection and classification based on profiling and behavior Network Traffic Analysis 19
20 Design Components Network Traffic Analysis 20
21 Demonstration Model Host Roles Algorithms: On line Support Vector Machine Decision Tree Ground Truth: Host Information in Active Directory and vulnerability scanner Nessus database Network Traffic Analysis 21
22 Client vs Server Classification Network Traffic Analysis 22
23 Personal System vs Public System Network Traffic Analysis 23
24 Web Server vs Server Network Traffic Analysis 24
25 Classifying Two Different Colleges Network Traffic Analysis 25
26 Anonymizer Usage Anonymity network usage via Pig scripting 205 million packets about 1.44TB data Analyzed Anonymity Networks Network Servers Service Tor 61,798 General I2P 2,267 P2P JAP 11 General R ers 15 Proxies 7,246 General Commercial Anomymizer,Gotrusted General
27 Anonymity Network Geolocation
28 Thanks
Cheleby: Subnet-level Internet Mapper
Cheleby: Subnet-level Internet Mapper ISM 2010 IMS-2 Workshop on ctive Internet Measurements Talha Oz, Hakan Kardes, Mehmet Gunes University of Nevada, Reno 02/09/10 San Diego Supercomputer Center, UCSD,
More informationImpact of Multi-Access Links on the Internet Topology Modeling
Impact of Multi-Access Links on the Internet Topology Modeling Mehmet Burak Akgun, Mehmet Hadi Gunes Department of Computer Science and Engineering University of Nevada, Reno Email: {makgun, mgunes}@cse.unr.edu
More informationAS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies
AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 62 Table of Contents 1 Introduction
More informationImportance of IP Alias Resolution in Sampling Internet Topologies
Importance of IP Alias Resolution in Sampling Internet Topologies Mehmet H. Gunes and Kamil Sarac Global Internet Symposium 007, Anchorage, AK Introduction: Internet Mapping Topology measurement studies
More informationAS Connectedness Based on Multiple Vantage Points and the Resulting Topologies
AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28 Table of Contents 1 Introduction
More informationPoP Level Mapping And Peering Deals
PoP Level Mapping And Peering Deals Mapping Internet Methodology Data Collection IP Classification to PoP PoP Geolocation PoP locations on Peering estimations Outline Internet Service Providers ISPs are
More informationValidity of router responses for IP aliases resolution
Validity of router responses for IP aliases resolution Santiago Garcia-Jimenez, Eduardo Magaña, Mikel Izal and Daniel Morató Public University of Navarre, Campus Arrosadia, 31006 Pamplona, Spain santiago.garcia@unavarra.es
More informationMeasured Impact of Tracing Straight. Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato
Measured Impact of Tracing Straight Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato 7 February 2010 The Problem Until recently, load balancing
More informationLocation Matters: Eliciting Responses to Direct Probes
Location Matters: Eliciting Responses to Direct Probes Ethan Blanton, Mehmet Engin Tozal, Kamil Sarac, Sonia Fahmy Purdue University, Univ. of Louisiana at Lafayette, Univ. of Texas at Dallas E-mail: elb@psg.com,
More informationInternet Topology Research
Internet Topology Research Matthew Luckie WAND Network Research Group Department of Computer Science University of Waikato Internet Topology Why should we care? Impacts on the design and operation of routing
More informationComparative Analysis of Internet Topology Data sets
Comparative Analysis of Internet Topology Data sets M. Abdullah Canbaz, Jay Thom, and Mehmet Hadi Gunes Department of Computer Science, University of Nevada Reno, Reno, Nevada 89431 Email: {mcanbaz, jthom,
More informationAchieving scale: Large scale active measurements from PlanetLab
Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET
More informationInternet Measurements. Motivation
Internet Measurements Arvind Krishnamurthy Fall 2004 Motivation Types of measurements Understand the topology of the Internet Measure performance characteristics Tools: BGP Tables Traceroute measurements
More informationDig into MPLS: Transit Tunnel Diversity
January 2015 Dig into MPLS: Transit Tunnel Diversity Yves VANAUBEL Pascal MÉRINDOL Jean-Jacques PANSIOT Benoit DONNET Summary Motivations MPLS Background Measurement Campaign Label Pattern Recognition
More informationPamplona-traceroute: topology discovery and alias resolution to build router level Internet maps
Pamplona-traceroute: topology discovery and alias resolution to build router level Internet maps Santiago Garcia-Jimenez, Eduardo Magaña, Daniel Morató and Mikel Izal Public University of Navarre, Campus
More informationReverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF
Reverse Traceroute Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI, April 2010 This work partially
More informationPrimitives for Active Internet Topology Mapping: Toward High-Frequency Characterization
Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger, Geoffrey Xie Naval Postgraduate School MIT/Akamai February 9, 2011 CAIDA Workshop
More informationA Study on PoP Level Mapping
A Study on PoP Level Mapping Outline qnetwork Mapping qevaluation of Internet qthe reasons for Mapping Internet qinternet Mapping Levels qrelated Works qconclusion Network Mapping ARPANET 1969 ARPANET
More informationQuantifying Violations of Destination-based Forwarding on the Internet
Quantifying Violations of Destination-based Forwarding on the Internet Tobias Flach, Ethan Katz-Bassett, and Ramesh Govindan University of Southern California November 14, 2012 Destination-based Routing
More informationInternet-Scale IP Alias Resolution Techniques
Internet-Scale IP Alias Resolution Techniques Ken Keys Cooperative Association for Internet Data Analysis (CAIDA) University of California, San Diego kkeys@caida.org This article is an editorial note submitted
More informationIRNC-SP: Sustainable data-handling and analysis methodologies for the IRNC networks
IRNC-SP: Sustainable data-handling and analysis methodologies for the IRNC networks Principle Investigator: kc claffy Presenter: Josh Polterock CAIDA NSF IRNC Workshop Arlington,
More informationMapping PoP-Level Connectivity of Large Content Providers
Mapping PoP-Level Connectivity of Large Content Providers Amir Farzad Reza Rejaie ABSTRACT Large content providers (CPs) are responsible for a large fraction of injected traffic to the Internet. They maintain
More informationPalmtree:An IP Alias Resolution Algorithm with Linear Probing Complexity
Palmtree:An IP Alias esolution Algorithm with Linear Probing Complexity M. Engin Tozal, Kamil Sarac engintozal,ksarac@{utdallas.edu} The University of Texas at Dallas, Dept. of Computer Science ichardson,
More informationDetecting Third-party Addresses in Traceroute Traces with IP Timestamp Option
Detecting Third-party Addresses in Traceroute Traces with IP Timestamp Option Pietro Marchetta, Walter de Donato, and Antonio Pescapé University of Napoli Federico II (Italy) {pietro.marchetta,walter.dedonato,pescape}@unina.it
More informationTreeNET: Discovering and Connecting Subnets
TreeNET: Discovering and Connecting Subnets Jean-Francois Grailet, Fabien Tarissan, Benoit Donnet To cite this version: Jean-Francois Grailet, Fabien Tarissan, Benoit Donnet. TreeNET: Discovering and Connecting
More informationTroubleshooting Cisco Express Forwarding Routing Loops
Troubleshooting Cisco Express Forwarding Routing Loops Document ID: 26083 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Problem Troubleshoot Solution Related
More informationRevealing the load-balancing behavior of YouTube traffic of interdomain links
Revealing the load-balancing behavior of YouTube traffic of interdomain links Ricky K. P. Mok + Vaibhav Bajpai*, Amogh Dhamdhere +, kc claffy + + CAIDA/ University of California San Diego * Technical University
More informationReal-time Blackhole Analysis with Hubble
Real-time Blackhole Analysis with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, Thomas Anderson University of Washington NANOG 40, June 2007 1 Global Reachability
More informationForeScout CounterACT. Configuration Guide. Version 1.4
ForeScout CounterACT Core Extensions Module: Flow Analyzer Plugin Version 1.4 Table of Contents About the Flow Analyzer... 3 How It Works... 3 CounterACT Software Requirements... 4 Configure the Sharing
More informationNetworked systems and their users
Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of
More informationCSCD 443/533 Advanced Networks
CSCD 443/533 Advanced Networks Lecture 10 Usage and Network Measurement Spring 2016 Reading: See References at end 1 Topics Internet Usage Measurement overview Why measure? What to measure? Where to measure?
More informationMeasurement: Techniques, Strategies, and Pitfalls. David Andersen CMU
Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that
More informationTTL Propagate Disable and Site-ID Qualification
The TTL Propagate Disable feature supports disabling of the TTL (Time-To-Live) propagation for implementing the traceroute tool in a LISP network when RLOC and EID belong to different address-family. The
More informationIntroduction. Can we use Google for networking research?
Unconstrained Profiling of Internet Endpoints via Information on the Web ( Googling the Internet) Ionut Trestian1 Soups Ranjan2 Aleksandar Kuzmanovic1 Antonio Nucci2 1 Northwestern 2 Narus University Inc.
More informationRealCiscoLAB.com. Chapter 2 Lab 2-2, EIGRP Load Balancing. Topology. Objectives. Background. CCNPv6 ROUTE
RealCiscoLAB.com CCNPv6 ROUTE Chapter 2 Lab 2-2, EIGRP Load Balancing Topology Objectives Background Review a basic EIGRP configuration. Explore the EIGRP topology table. Identify successors, feasible
More informationLab Troubleshooting Using traceroute Instructor Version 2500
Lab 9.3.4 Troubleshooting Using traceroute Instructor Version 2500 294-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 9.3.4 Copyright 2003, Cisco Systems, Inc. Objective Use the traceroute Cisco IOS
More informationProblem Set 8 Due: Start of Class, November 16
CS242 Computer Networks Handout # 16 Randy Shull November 9, 2017 Wellesley College Problem Set 8 Due: Start of Class, November 16 Reading: Kurose & Ross, Sections 4.1-4.4 Problem 1 [10]: Short answer
More informationRouting Algorithms. CS158a Chris Pollett Apr 4, 2007.
Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing
More informationUpdates and Case Study
Archipelago Measurement Infrastructure Updates and Case Study Young Hyun CAIDA ISMA 2010 AIMS Workshop Feb 9, 2010 2 Outline Introduction Monitor Deployment Measurements & Collaborations Tools Development
More informationForeScout CounterACT. Configuration Guide. Version 1.2
ForeScout CounterACT Core Extensions Module: NetFlow Plugin Version 1.2 Table of Contents About NetFlow Integration... 3 How it Works... 3 Supported NetFlow Versions... 3 What to Do... 3 Requirements...
More informationFlooding Attacks by Exploiting Persistent Forwarding Loops
Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding
More informationThe Impact of Router Outages on the AS-Level Internet
The Impact of Router Outages on the AS-Level Internet Matthew Luckie* - University of Waikato Robert Beverly - Naval Postgraduate School *work started while at CAIDA, UC San Diego SIGCOMM 2017, August
More informationMPLS, THE BASICS CSE 6067, UIU. Multiprotocol Label Switching
MPLS, THE BASICS CSE 6067, UIU Multiprotocol Label Switching Basic Concepts of MPLS 2 Contents Drawbacks of Traditional IP Forwarding Basic MPLS Concepts MPLS versus IP over ATM Traffic Engineering with
More informationSibyl A Practical Internet Route Oracle
Sibyl A Practical Internet Route Oracle Ítalo Cunha1, Pietro Marchetta2, Matt Calder3, Yi-Ching Chiu3 Brandon Schlinker3, Bruno Machado1, Antonio Pescapè2 Vasileios Giotsas4, Harsha Madhyastha5, Ethan
More informationResolving IP Aliases with Prespecified Timestamps
Resolving IP liases with Prespecified Timestamps Justine Sherry Ethan Katz-assett Mary Pimenova Harsha V. Madhyastha Thomas nderson rvind Krishnamurthy University of Washington University of California,
More informationThe term "router" in this document refers to both routers and Layer 3 switches. Step Command Remarks. ipv6 host hostname ipv6-address
Contents Configuring IPv6 DNS 1 Overview 1 Configuring the IPv6 DNS client 1 Configuring static domain name resolution 1 Configuring dynamic domain name resolution 1 Displaying and maintaining IPv6 DNS
More informationAccelerating BFS Shortest Paths Calculations Using CUDA for Internet Topology Measurements
Accelerating BFS Shortest Paths Calculations Using CUDA for Internet Topology Measurements Eric Klukovich, Mehmet Hadi Gunes, Lee Barford, and Frederick C. Harris, Jr. Department of Computer Science and
More informationBIG-IP Global Traffic Manager : Load Balancing. Version 11.6
BIG-IP Global Traffic Manager : Load Balancing Version 11.6 Table of Contents Table of Contents About Global Server Load Balancing...5 Introducing the Global Traffic Manager...5 About global server load
More informationChapter 2 Lab 2-1, EIGRP Configuration, Bandwidth, and Adjacencies
Chapter 2 Lab 2-1, EIGRP Configuration, Bandwidth, and Adjacencies Topology Objectives Background Configure EIGRP on multiple routers. Configure the bandwidth command to modify the EIGRP metric. Verify
More informationConfiguring IPv6 DNS. Introduction to IPv6 DNS. Configuring the IPv6 DNS client. Configuring static domain name resolution
Contents Configuring IPv6 DNS 2 Introduction to IPv6 DNS 2 Configuring the IPv6 DNS client 2 Configuring static domain name resolution 2 Configuring dynamic domain name resolution 2 Displaying and maintaining
More informationRouting Protocols and
Introduction to Dynamic Routing Protocol Routing Protocols and Concepts Chapter 3 1 Objectives Describe the role of dynamic routing protocols and place these protocols in the context of modern network
More informationEfficient solutions for the monitoring of the Internet
Efficient solutions for the monitoring of the Internet Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group HDR defense January 22, 2009 Email: Chadi.Barakat@sophia.inria.fr WEB: http://www.inria.fr/planete/chadi
More informationLow-Cost Traffic Analysis of Tor
Low-Cost Traffic Analysis of Tor Steven J. Murdoch, George Danezis University of Cambridge, Computer Laboratory Review of Tor Support anonymous transport of TCP streams over the Internet Support anonymous
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationV Commands. virtual ip, page 2 virtual ipv6, page 5 vrf, page 8. Cisco Nexus 7000 Series NX-OS Intelligent Traffic Director Command Reference 1
virtual ip, page 2 virtual ipv6, page 5 vrf, page 8 1 virtual ip virtual ip To configure the virtual IPv4 address of an Intelligent Traffic Director (ITD) service, use the virtual ip command. To remove
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u
More informationBIG-IP DNS: Load Balancing. Version 13.1
BIG-IP DNS: Load Balancing Version 13.1 Table of Contents Table of Contents About Global Server Load Balancing... 5 Introducing BIG-IP DNS...5 About global server load balancing...5 Static load balancing
More informationRIPE75 - Network monitoring at scale. Louis Poinsignon
RIPE75 - Network monitoring at scale Louis Poinsignon Why monitoring and what to monitor? Why do we monitor? Billing Reducing costs Traffic engineering Where should we peer? Where should we set-up a new
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationFixing Ally s Growing Pains with Velocity Modeling
Fixing Ally s Growing Pains with Velocity Modeling Adam Bender Dept. of Computer Science University of Maryland College Park, MD, USA bender@cs.umd.edu Rob Sherwood Dept. of Computer Science University
More informationCS459 Internet Measurements
CS459 Internet Measurements Introduction to Traceroute and iplane Spring 2015 Traceroute Tool used to trace the path from source to destination host. TCP/IP not designed for traceroute, so it is sometimes
More informationMille-Feuille: Putting ISP traffic under the scalpel
Mille-Feuille: Putting ISP traffic under the scalpel Olivier Tilmans ULouvain HotNets-XV Nov. 9, 2016 Joint work with T. ühler (ETH Zürich), S. Vissicchio (UL) and L. Vanbever (ETH Zürich) Picture: Georges
More informationBGP Policy Accounting
Border Gateway Protocol (BGP) policy accounting measures and classifies IP traffic that is sent to, or received from, different peers. Policy accounting is enabled on an input interface, and counters based
More informationRAPTOR: Routing Attacks on Privacy in Tor. Yixin Sun. Princeton University. Acknowledgment for Slides. Joint work with
RAPTOR: Routing Attacks on Privacy in Tor Yixin Sun Princeton University Joint work with Annie Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal Acknowledgment for Slides
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga
More informationAdapted from the Synchronization example in g/case/studies/icsbgp4.html
Adapted from the Synchronization example in http://www.cisco.com/en/us/docs/internetworkin g/case/studies/icsbgp4.html When an AS provides transit service to other ASs when there are non-bgp routers in
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : GCFW Title : GIAC Certified Firewall Analyst Vendors : GIAC Version : DEMO Get Latest & Valid GCFW Exam's
More informationBGP Inbound Optimization Using Performance Routing
BGP Inbound Optimization Using Performance Routing The PfR BGP Inbound Optimization feature introduced support for the best entrance selection for traffic that originates from prefixes outside an autonomous
More informationChapter 8. The Routing Table: A Closer Look
Chapter 8 The Routing Table: A Closer Look CCNA2-1 Chapter 8 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More informationPing, tracert and system debugging commands
Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert
More informationCOMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes
More informationCycle 2 / Lecture 4: Network Administration and. CS 498: Systems and Networking Lab Matthew Caesar February 1, 2011
Cycle 2 / Lecture 4: Network Administration and Monitoring CS 498: Systems and Networking Lab Matthew Caesar February 1, 2011 1 Administrivia How s Lab 1 going? Lab 2 released tonight What to do for Lab
More informationTCP/IP Diagnostic Utilities on Windows 2008 Server
TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP
More informationIGMP Proxy. Finding Feature Information. Prerequisites for IGMP Proxy
This module describes how to configure IGMP proxy to enable a device to send an IGMP report to a specified destination IP address. Finding Feature Information, page 1 Prerequisites for, page 1 Information
More informationExercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.
Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24
More informationHP 5120 EI Switch Series
HP 5120 EI Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-1793 Software version: Release 2220 Document version: 6W100-20130810 Legal and notice information Copyright 2013 Hewlett-Packard
More informationOnion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J
Onion Routing Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Motivation Public Network Encryption does not hide Routing Information Traffic Analysis Who is Talking to Whom? by analyzing the traffic
More informationHomework 3 Discussion
Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationIP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment
IP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment Finding Feature Information, page 1 Prerequisites for Optimizing PIM Sparse Mode in a Large IP Multicast Deployment,
More informationLecture 13: Link-state Routing. CSE 123: Computer Networks Alex C. Snoeren
Lecture 3: Link-state Routing CSE 23: Computer Networks Alex C. Snoeren Lecture 3 Overview Routing overview Intra vs. Inter-domain routing Link-state routing protocols 2 Router Tasks Forwarding Move packet
More informationLab 8.4.2: Show IP Route Challenge Lab
Addressing Table Device Interface IP Address Subnet Mask R1 R2 R3 R4 R5 Learning Objectives Upon completion of this lab, you will be able to: Determine network topology based on the outputs from the show
More informationEach ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields.
IP address ICMP Each ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields. The TYPE field identifies the ICMP message, the CODE field
More informationChapter 5 Lab 5-1, Configure and Verify Path Control Using PBR. Topology. Objectives. Background. Required Resources. CCNPv7 ROUTE
hapter 5 Topology Objectives onfigure and verify policy-based routing. Select the required tools and commands to configure policy-based routing operations. Verify the configuration and operation by using
More informationMeasuring and Characterizing IPv6 Router Availability
Measuring and Characterizing IPv6 Router Availability Robert Beverly, Matthew Luckie, Lorenza Mosley, kc claffy Naval Postgraduate School UCSD/CAIDA March 20, 2015 PAM 2015-16th Passive and Active Measurement
More informationWhy we need to divide network?
Content Introduction Layer 3 IP Protocol IP-Header: www.ietf.org and RFC-760 Addressing Schemes Subnetting Routing Layer 3 Solution in Trains Communication Matrix (Information Based Communication) 53 Why
More informationMLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.
Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to
More informationRemote Peering: More Peering without Internet Flattening
Remote Peering: More Peering without Internet Flattening Ignacio Castro Juan Camilo Cardona * Sergey Gorinsky Pierre Francois IMDEA Networks Institute Madrid, Spain Open University of Catalonia Barcelona,
More informationRouting Strategies. Fixed Routing. Fixed Flooding Random Adaptive
Routing Strategies Fixed Flooding Random Adaptive Fixed Routing Single permanent route for each source to destination pair Determine routes using a least cost algorithm Route fixed, at least until a change
More informationTopic: Topology and Backbone Networking DisCarte: A Disjunctive Internet Cartographer
Topic: Topology and Backbone Networking DisCarte: A Disjunctive Internet Cartographer Sebastian Schlunke (schlunki@cs.tu-berlin.de) Seminar Internet Measurement Technische Universität Berlin WS 2008/2009
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationMAPPING INTERNET INTERDOMAIN CONGESTION
MAPPING INTERNET INTERDOMAIN CONGESTION Amogh Dhamdhere, Bradley Huffaker, Young Hyun, Kc Claffy (CAIDA) Matthew Luckie (Univ. of Waikato) Alex Gamero-Garrido, Alex Snoeren (UCSD) Steve Bauer, David Clark
More informationUsing Diagnostic Tools
Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support
More informationF. Configure a distribute-list on router RTA that allows it to advertise all routes to the spoke routers.
Refer to the exhibit. Router RTA is the hub router for routers RTB and RTC. The Frame Relay network is configured with EIGRP, and the entire network is in autonomous system 1. However, router RTB and RTC
More informationIntelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao
Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao Network Management What is going on in the network? Public servers Private servers Wireless Users DMZ Applications
More informationNetFlow-based bandwidth estimation in IP networks
NetFlow-based bandwidth estimation in IP networks Rodrigo Alarcón-Reyes Department of Electrical and Computer Engineering McGill University March 3, 22 Outline. Introduction to NetFlow 2. Definition of
More informationCONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011
CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying
More informationSCRIPT: An Architecture for IPFIX Data Distribution
SCRIPT Public Workshop January 20, 2010, Zurich, Switzerland SCRIPT: An Architecture for IPFIX Data Distribution Peter Racz Communication Systems Group CSG Department of Informatics IFI University of Zürich
More information