kccvoip.com basic voip training NAT/PAT extract 2008

Size: px
Start display at page:

Download "kccvoip.com basic voip training NAT/PAT extract 2008"

Transcription

1 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of telephone/devce and call setup nformaton we want to send to the other VoIP user TO: 555-7@ FROM: @ use: G72 port: 188 The envelope s addressed to the other user TO: kccvop.net basc vop tranng extract 28

2 74 74 servces serv c es d rector es set t ngs d rectores set tngs AB C PQR S 74 servces drectores settngs 74 servces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 and the return address s on the envelope FROM: and sent va the routng to the address on the envelope. constructed wth the SIP or H2 content the same way an IP packet s All works fne as long as the return address on the envelope are the same as the addresses nsde the envelope. Both telephones can route traffc to each other. In more detal, for example n SIP the call setup would use port 5 (at default) so each end knows to open the 5 envelope and read the contents to setup the audo stream ; caller sends the envelope to the remote TO FROM: USE: G72 PORT: : :5 kccvop.net basc vop tranng extract 28

3 DE F WX YZ CISCO IP P HONE 74 servces MN O drectores settngs CI SCO IP PH ON E 74 servces drectores settngs GHI JK L TU V CISCO IP PHO NE 74 me ss ag es servces d re ct or e s sett ngs GHI JK L TU V 74 servc es CISCO IP PH ONE 74 drectores s ettngs servces drectores settngs AB C 74 servces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 (SIP would send as call setup usng port 5 as default) (H22 would send as call setup usng port 172 as default) remote responds to the caller wth ts requrements n a 5 envelope TO FROM:555-7 USE: G72 PORT: : :5 Then the audo stream can begn and the conversaton start G72 audo G72 audo : : : : G72 audo G72 audo : : : :1422 kccvop.net basc vop tranng extract 28

4 CISCO I P P HONE 74 CISCO IP PH ONE 7 4 m ess age s dr ecto re s se rvce s settngs me ss ag es d re cto res se rvc es se ttn gs WX YZ 74 m ess age s dre ctor es se rvce s se ttng s WX Y Z CIS CO I P P HON E 74 mes sag es se rv ces d re ct or es se ttn gs kccvop.com basc vop tranng NAT/PAT extract 28 Even for more complex calls wth several addresses and optons n the envelope. All works fne, because all the addresses are vald and routable TO: @ FROM:555-@ TRANSFER: @ USE: G72, G711 PORT: : : : :5 TO: @ FROM:555-@ TRANSFER: @ USE: G72, G711 PORT:144 Addresses nsde the SIP packets are real routable addresses and real port numbers allocated by the telephone systems to carry the audo streams. Now n the real-world - we have NAT and PAT If we are not usng IPv, we have the problem of lmted IPv4 address space and securty. so NAT s used to translate a publc address nto a prvate address ; NAT TO: @ FROM: 555-@ USE: G72 PORT: : : : :1422 TO: @ FROM 555-@ USE: G72 PORT: 1844 NOTICE that the address on the envelope no longer matches the address nsde. NAT has changed the prvate address nto the outsde publc address as t forwards the envelope to the remote ste. The remote ste can not respond to ths request because t does not know where s. Call setup fals. Smply put ; the address on the envelope s the publc address, but the address nsde the envelope s the prvate address. The prvate address has no meanng outsde of the orgnatng ste. kccvop.net basc vop tranng extract 28

5 GH I JK L TU V MN O CI SCO IP PH ONE 7 4 me ss ag es d re cto res se rvc es se ttn gs 74 servces drectores sett ngs WX Y Z CIS CO I P P HON E 74 mes sag es se rv ces d re ct or es se ttn gs CI SCO I P PH ON E 74 serv ces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 When the envelope s opened at the remote end. The requested call setup addresses are prvate addresses, can not be routed and therefore can not be used. call setup fals. To fx ths - there are varous methods avalable, but all result n the publc address from the outsde of the envelope beng coped to the packets nsde the envelope NAT TO: @ FROM: 555-@ USE: G72 PORT: 1844 ADDRESS CORRECTION DONE IN SOFTWARE TO: @ FROM 555-@18..1 USE: G72 PORT: 1844 TO: @ FROM: 555-@ USE: G72 PORT: : : : :1422 Software runnng n the router, SBC, proxy, gateway or end devce uses STUN, ICE or TURN technques to read the outsde envelope address and re-wrte the nternal packet contents replacng the prvate address wth the publc address as t s sent out through NAT. Ths ensures the remote end receves the envelope wth the correctly addressed contents and the call setup can then proceed to the correct addresses. The same technque has to be appled to the audo stream addresses and port numbers (n each drecton) to mantan a translaton table and ensure the NAT publc to prvate addresses are re-wrtten n the SIP and RTP audo packets NAT G72 audo SRC = :1888 DST = :1844 ADDRESS CORRECTION DONE IN SOFTWARE G72 audo SRC = :1888 DST = :1844 G72 audo SRC = :1888 DST = :1844 kccvop.net basc vop tranng extract 28

6 PQR S PQR S 74 m ess age s dr ect ore s settngs se rvc es 74 m ess age s dr ect ore s se rvc es settngs 74 m es sag es dr ect ore s servces sett n gs kccvop.com basc vop tranng NAT/PAT extract 28 NOW magne NAT at both ends of the crcut.. twce as many translatons, but stll an easy soluton to handle the problems caused by these one-to-one NAT address translatons. All s workng agan through the NAT translaton.. but usng NAT on ts own only provdes a one-to-one mappng of publc to prvate addressng = we stll would need a publc address for every devce nsde our networks. not scalable not real-world. Hence PAT = port address translaton enables the enterprse to share a publc address among the hundreds of prvate addressed devces n the nternal network. So all the external packets have the same publc address but use a dfferent port number to correlate them wth ther orgnal prvate address and orgnal port number. PROBLEM for SIP/H2 etc.. once agan - the address on the envelope wll no longer match the address nsde the envelope.. but now a much more complex problem to fx... We now need to keep a database of NAT and PAT and how they relate to each SIP/H2 call, each voce stream and each control flow (and each vdeo stream) NAT & PAT ADDRESS CORRECTION DONE IN SOFTWARE telephone1 SIP call setup :5 becomes :142 RTP audo stream :188 becomes 18..1:1422 RTP audo control :187 becomes telephone2 SIP call setup becomes :142 RTP audo stream :1888 becomes :1424 RTP audo control :1887 becomes :1425 CALL SETUP SEEN FROM :142 and 142 AUDIO SENT BACK TO :1422 and 1424 AUDIO CONTROL SENT ON :1421 and 1425 the software has to keep track of whch port belongs to whch devce. and whch audo stream was requested by whch end devce and make all the necessary changes to the addresses and port numbers nsde each envelope. not too bad untl you factor n the features requred by the modern telephony systems = transfer, hold, re-drect, conference and three way callng etc. The software has to keep track of every stream n every flow. qute complex. not really we are just begnnng Next - let us factor nto the path a frewall or two kccvop.net basc vop tranng extract 28

7 7 4 messag es servces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 One of the jobs of the frewall s to block traffc from the outsde that was not orgnated from the nsde. Here s another problem for our SIP or H2 traffc In ths example our telephone requested RT audo stream to be sent to t on port 144, the remote telephone requested port aud stream SRC: :1888 DST: :144 FIREWALL BLOCKS TRAFFIC AS IT DID NOT ORIGINATE INSIDE So call setup functoned correctly, but the audo stream faled because the frewall was not mult-meda aware or confgured for the audo streams. The frewall does ts job and blocks that audo stream from the remote telephone, because port 144 was ntated from the outsde. Drty fx would be to allow the RTP port range through the frewall. Ths would be an un-secure soluton as t opens all the RTP ports to the outsde world. A better soluton s to have the ntellgence n the frewalls to look nto the call setup packets and be SIP and/or H2 aware = For example n SIP - usng the SDP packet nformaton to read the requred audo ports and open the frewall to those port when the call s made. Put these scenaros all together an you have a very basc understandng of SIP/H2 NAT/PAT and Frewall handlng problems you may encounter. Next we wll revew the call setup and packet structure of SIP and H2 to understand the call flow setup, redrect, transfer and other features and see how NAT/PAT and frewalls can really screw you up. kccvop.net basc vop tranng extract 28

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Thomson Gateways and Multiple IP Adresses

Thomson Gateways and Multiple IP Adresses Thomson Gateways and Multple IP Adresses Date: June 2007 Verson: v1.0 Abstract: Applcablty: Ths applcaton note provdes techncal nformaton on how the Thomson Gateway DSL routers can be ntegrated n varous

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

IP Training Programme

IP Training Programme IP Tranng Programme Module 1: IP Generc Sesson 4: Applcatons and protocols ROUTING PROTOCOLS 1 Route table creaton The route table n routers can be created and mantaned n two ways 1: Statc route table

More information

Setup and Use. Version 3.7 2/1/2014

Setup and Use. Version 3.7 2/1/2014 Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng

More information

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013 Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com

More information

RESISTIVE CIRCUITS MULTI NODE/LOOP CIRCUIT ANALYSIS

RESISTIVE CIRCUITS MULTI NODE/LOOP CIRCUIT ANALYSIS RESSTE CRCUTS MULT NODE/LOOP CRCUT ANALYSS DEFNNG THE REFERENCE NODE S TAL 4 THESTATEMENT 4 S MEANNGLES UNTL THE REFERENCE PONT S DEFNED BY CONENTON THE GROUND SYMBOL SPECFES THE REFERENCE PONT. ALL NODE

More information

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory.

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory. wth Optc6 and Optc Cameras Quck Start Gude FOR OUTDOOR TRACKING ONLY unless used n conjuncton wth the Indoor Trackng Accessory. CONGRATULATIONS ON SCORING YOUR SOLOSHOT Our category-creatng lne of personal

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Cisco TelePresence MCU 4200 Series

Cisco TelePresence MCU 4200 Series Csco TelePresence MCU 4200 Seres Gettng started 61-0002-08 Contents General nformaton... 3 About the Csco TelePresence MCU 4200 Seres... 3 Package contents... 3 Port and LED locaton... 3 LED behavor...

More information

Avaya Scopia XT Meeting Center

Avaya Scopia XT Meeting Center Avaya Scopa XT Meetng Center Quck Setup Gude Sngle Montor Dual Montor Package Content: Cart Components 3x/4x IEC320 Power Cords Internatonal (4xIEC) Outlet Strp Avaya Scopa XT Meetng Center Quck Setup

More information

Codian MCU MCU 4200 Series

Codian MCU MCU 4200 Series Codan MCU MCU 4200 Seres Gettng started Codan MCU MCU 4200 Seres Gettng started Copyrght Codan 2008. All rghts reserved. Ths Gettng Started Gude may not be coped, photocoped, translated, reproduced, or

More information

Avaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide

Avaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide Avaya T3 Telephones connected to Integral 5 Settng up and usng conference brdge Appendx to user s gude Issue 1 Integral 5 Software Release 2.6 September 2009 Use conference room Use conference room Your

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

If you miss a key. Chapter 6: Demand Paging Source:

If you miss a key. Chapter 6: Demand Paging Source: ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday

More information

ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Page Table Structures Page table structures Page table structures Problem: smple lnear table s too bg Problem:

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz

#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz ADRIAN PERRIG & TORSTEN HOEFLER Networks and Operatng Systems (-6-) Chapter 6: Demand Pagng http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor () # Inverted table One system-wde table

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Loop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation

Loop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation Loop Transformatons for Parallelsm & Localty Last week Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Scalar expanson for removng false dependences Loop nterchange Loop

More information

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

Nachos Project 3. Speaker: Sheng-Wei Cheng 2010/12/16

Nachos Project 3. Speaker: Sheng-Wei Cheng 2010/12/16 Nachos Project Speaker: Sheng-We Cheng //6 Agenda Motvaton User Programs n Nachos Related Nachos Code for User Programs Project Assgnment Bonus Submsson Agenda Motvaton User Programs n Nachos Related Nachos

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

Computer Animation and Visualisation. Lecture 4. Rigging / Skinning

Computer Animation and Visualisation. Lecture 4. Rigging / Skinning Computer Anmaton and Vsualsaton Lecture 4. Rggng / Sknnng Taku Komura Overvew Sknnng / Rggng Background knowledge Lnear Blendng How to decde weghts? Example-based Method Anatomcal models Sknnng Assume

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005 Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed

More information

CTS2134 Introduction to Networking. Module Network Implementation

CTS2134 Introduction to Networking. Module Network Implementation CTS2134 Introduction to Networking Module 05.5 05.8 Network Implementation NAT Facts NAT (Network Address Translation) allows you to connect a private network to the Internet without obtaining registered

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Service Provider PAT Port Allocation Enhancement for RTP and RTCP

Service Provider PAT Port Allocation Enhancement for RTP and RTCP Service Provider PAT Port Allocation Enhancement for RTP and RTCP Problem Overview With the increase in the use of multimedia and real-time traffic over the Internet, private network administrators face

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Configuring Hosted NAT Traversal for Session Border Controller

Configuring Hosted NAT Traversal for Session Border Controller Configuring Hosted NAT Traversal for Session Border Controller The Cisco IOS Hosted NAT Traversal for Session Border Controller Phase-1 feature enables a Cisco IOS Network Address Translation (NAT) Session

More information

Operator's Manual EU4 / EU6 / EU8. External Unwinder. Made in Germany

Operator's Manual EU4 / EU6 / EU8. External Unwinder. Made in Germany Operator's Manual External Unwnder EU4 / EU6 / EU8 Made n Germany 2 Operator's Manual 2 for the followng products Part.-No. Descrpton Type 5946091 External Unwnder EU4 5946421 External Unwnder EU6 5945806

More information

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV SMART PHOTO PRINTER MODEL SmartD90-EV USER'S GUIDE Verson V1.5.2.0 1 TABLE OF CONTENTS Introducton Introducton 3 Bascs 4 Constructon of compostons 5 Operaton Easy Prnt Servce 8 Fun Prnt Servce 10 Sharng

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

Technical White Paper for NAT Traversal

Technical White Paper for NAT Traversal V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Configuration manual. Grandstream Type: Analog Telephone Adapter. Configuration manual Grandstream Version 1.2

Configuration manual. Grandstream Type: Analog Telephone Adapter. Configuration manual Grandstream Version 1.2 Configuration manual Grandstream Type: Analog Telephone Adapter Configuration manual Grandstream Version 1.2 Contents 1 Introduction 1 2 Key terms and abbreviations 1 3 Logging on to the web interface

More information

Common Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL

Common Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL The following components of the Cisco Unified Border Element are common to all of the configuration profile examples in this document. Secure Media Adjacencies Call Policies CAC Policies SIP Profiles 5

More information

The example below contains two doors and no floor level obstacles. Your panel calculator should now look something like this: 2,400

The example below contains two doors and no floor level obstacles. Your panel calculator should now look something like this: 2,400 Step 1: A r c h t e c t u r a l H e a t n g o begn wth you must prepare a smple drawng for each room n whch you wsh to nstall our Heat Profle Skrtng Heatng System. You certanly don't need to be Pcasso,

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze yourself wth your telephone Important

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton;

More information

T3 Classic connected to IP Office

T3 Classic connected to IP Office elephony IP T Contact Centers Moblty Servces T3 Classc connected to IP Offce Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarse

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Some Tutorial about the Project. Computer Graphics

Some Tutorial about the Project. Computer Graphics Some Tutoral about the Project Lecture 6 Rastersaton, Antalasng, Texture Mappng, I have already covered all the topcs needed to fnsh the 1 st practcal Today, I wll brefly explan how to start workng on

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals Agenda & Readng COMPSCI 8 SC Applcatons Programmng Programmng Fundamentals Control Flow Agenda: Decsonmakng statements: Smple If, Ifelse, nested felse, Select Case s Whle, DoWhle/Untl, For, For Each, Nested

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Cisco IP Phone Configuration Guide

Cisco IP Phone Configuration Guide Version 1.0 Date: 2016.09.21 Yeastar Information Technology Co. Ltd. Introduction This guide introduces how to configure Cisco IP phones with Yeastar S-Series VoIP PBX. You have multiple ways to configure

More information

Product documentation. Issue:

Product documentation. Issue: Product documentaton Issue: 02.05.2017 Table of Contents Product documentaton 1 enet SMART HOME system... 5 1.1 System requrements... 5 1.2 Commssonng va... 5 1.3 Operaton va enet SMART HOME app... 7 2

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

LOOP ANALYSIS. determine all currents and Voltages in IT IS DUAL TO NODE ANALYSIS - IT FIRST DETERMINES ALL CURRENTS IN A CIRCUIT

LOOP ANALYSIS. determine all currents and Voltages in IT IS DUAL TO NODE ANALYSIS - IT FIRST DETERMINES ALL CURRENTS IN A CIRCUIT LOOP ANALYSS The second systematic technique to determine all currents and oltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE NECESSARY

More information

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

T3 (IP) Classic connected to Integral 5

T3 (IP) Classic connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

Scaling IP Addresses DHCP CCNA 4

Scaling IP Addresses DHCP CCNA 4 Scaling IP Addresses DHCP CCNA 4 Note to instructors If you have downloaded this presentation from the Cisco Networking Academy Community FTP Center, this may not be my latest version of this PowerPoint.

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

T3 (IP) Comfort connected to Integral 5

T3 (IP) Comfort connected to Integral 5 IP Telephony Contact Centers Moblty Servces T3 (IP) Comfort connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze

More information

Elements of a wireless network

Elements of a wireless network Chapter 6 Wreless Elements of a wreless network network nfrastructure nfrastructure mode base staton connects mobles nto wred network handoff: moble changes base staton provdng connecton nto wred network

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

Implementing SBC Firewall Traversal and NAT

Implementing SBC Firewall Traversal and NAT CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the

More information

Midterms Save the Dates!

Midterms Save the Dates! Unversty of Brtsh Columba CPSC, Intro to Computaton Alan J. Hu Readngs Ths Week: Ch 6 (Ch 7 n old 2 nd ed). (Remnder: Readngs are absolutely vtal for learnng ths stuff!) Thnkng About Loops Lecture 9 Some

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

T3 Comfort connected to IP Office

T3 Comfort connected to IP Office T3 Comfort connected to IP Offce Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarse yourself wth your telephone Important notes...

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Informaton Assurance Certfcaton Paper Copyrght SANS Insttute Author Retans Full Rghts Ths paper s taken from the GIAC drectory of certfed professonals. Repostng s not permted wthout express wrtten

More information

Post Operative: Six week follow-up

Post Operative: Six week follow-up Post Operatve Sx Week Follow-up - Knee Dated 9/5/ Post Operatve: Sx week follow-up Uncompartmental Knee Replacement (UKR) / Total Knee Replacement (TKR) Please complete ths booklet as soon as possble and

More information

Programming Assignment Six. Semester Calendar. 1D Excel Worksheet Arrays. Review VBA Arrays from Excel. Programming Assignment Six May 2, 2017

Programming Assignment Six. Semester Calendar. 1D Excel Worksheet Arrays. Review VBA Arrays from Excel. Programming Assignment Six May 2, 2017 Programmng Assgnment Sx, 07 Programmng Assgnment Sx Larry Caretto Mechancal Engneerng 09 Computer Programmng for Mechancal Engneers Outlne Practce quz for actual quz on Thursday Revew approach dscussed

More information

Security. Workplace Manager

Security. Workplace Manager User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Loop Permutation. Loop Transformations for Parallelism & Locality. Legality of Loop Interchange. Loop Interchange (cont)

Loop Permutation. Loop Transformations for Parallelism & Locality. Legality of Loop Interchange. Loop Interchange (cont) Loop Transformatons for Parallelsm & Localty Prevously Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Loop nterchange Loop transformatons and transformaton frameworks

More information

5.0 Quality Assurance

5.0 Quality Assurance 5.0 Dr. Fred Omega Garces Analytcal Chemstry 25 Natural Scence, Mramar College Bascs of s what we do to get the rght answer for our purpose QA s planned and refers to planned and systematc producton processes

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information