Distributed Agent Method for User Based IP Accounting

Size: px
Start display at page:

Download "Distributed Agent Method for User Based IP Accounting"

Transcription

1 Distributed gent Method for User Based IP ccounting e Zhang Bernd Reuther Paul Mueller Department of Computer Science, University of Kaiserslautern Postfach 3049, Kaiserslautern, ermany gezhang@informatik.uni-kl.de reuther@informatik.uni-kl.de pmueller@rhrk.uni-kl.de 1 Introduction Rapid development of the Internet results in more and more IP traffic. Beside other reasons the motivation of reasonable network usage plays an important role for utilization accounting even in L. In traditional IP accounting an IP address is considered to identify the producer of IP traffic flows, and the IP accounting required producer information and other accounting information of the IP traffic can be extracted directly from the IP packages. n accounting meter usually can be placed in a key position of an accounting areas, e.g. in a router [1272], where all the IP traffic flows can be captured. But in multi-user system an IP address cannot uniquely identify the producer of the IP traffic flows, the traditional IP accounting cannot meet the finer granularity requirement in this situation. But if accounting is used in a L to motivate reasonable network usage, then it is important to be able to assign costs to users and not only to device. Here we introduce a user based accounting model, which is able to distinguish users even on multi-user computers. Since the distinction of users can be done within the hosts only, distributed agents are used to obtain the additional accounting information from multi-user computers. 2 raditional IP accounting 2.1 IP accounting and IP billing system architecture ccounting is he collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. [RFC2975]. Whereby Billing is the process of utilizing the processed ccounting Records on a per user basis to generate the invoice. n IP Billing system consists of three layers: raffic Meter Layer, Mediation Layer and Billing / OSS / BSS (Operating / Business Support System) Layer. he raffic Meter Layer records the network activities in Raw Data Records (RDR) like an electricity meter. he Mediation Layer collects the Raw Data Records from various meters, and processes the Raw Data Records to produce the Usage Records, stores the Usage Records in database, distributes the Usage Records to different applications in layer 3. he applications (e.g. Billing, Fraud Detection, rend nalysis etc.) in layer 3 respectively process the Usage Records for different application purposes and generate various reports. IP accounting includes the layer 1 and layer 2 in the IP billing system architecture.

2 S Y S M M M Layer3--- Billing/OSS/BSS Layer Layer2---Mediation Layer Layer1---raffic Meter Layer Figure 1 IP Billing System rchitecture R U L S S 2.2 erminology he meaning of the term user depends on the context where the term is used. When talking about traditional IP accounting systems a user is a host that is the source or the sink of IP traffic. Within IP billing systems the term user means the person or institution, which is responsible for some IP traffic, i.e. who has to pay for the IP traffic. In a multi-user system a login name or an identifier represents a so-called user. his user may be one real person or a group of real persons. Because of this ambiguous usage of the term user we will present some definitions of terms, which will be used within this paper: Host-Identifier or HID is a unique identifier for an end-system of the network layer. In the context of IP networks an IP address can be used as a synonym for a Host-Identifier. User-Identifier or UID is a unique identifier for an account on a computer system. his term is commonly used in the context of multi-user systems. raffic-originator ::= <Host-Identifier, [User-Identifier]>. raffic- Originator (O) is responsible for specific outgoing and incoming traffic flows. User::= <raffic-originator1 [, raffic-originator]> is a unique identifier for real person or a group of persons which are associated with one or more Os. ach O is associated with exactly one User. Usually a User identifies one real person who has access to one or more single-user systems or accounts on multi-user systems. When a group of real persons share an account or a single-user system, this group may be described by one User. Purchaser::= <User1 [,, User]> is a unique identifier of a person or an institution who will pay for the traffic that is originated by one or more Users. 2.3 he limitation of traditional IP accounting method he general IP accounting process can be described in two steps: 1) he raffic Meter collects IP traffic information from various etwork lements, and stores these information in the form of Raw Data Records. Usually the raffic Meter locates at a key point of the network (e.g. router, gateway etc.), where all the required IP traffic can be captured. 2) he Mediation layer collects the RDRs, and then processes (Validation, deduplication, filtering, correlation, aggregation and normalizing) the RDRs to produce the Usage Records.

3 During the process of the IP traffic information processing, the traditional IP accounting method will regard the HID, i.e. IP addresses, in the RDRs as the user information, and these IP addresses will be mapped to corresponding users by the Correlation module in the IP mediation layer. he function of the Correlation module is to merge several RDRs, which have some relationships, to create a single record; this can provide a single, complete view of information about an event [Lucent]. In the traditional IP accounting system the Correlation process is based on IP address. he process of correlating IP traffic to the corresponding producer can be described as below: f(hid i )=O i (1) i Hosts in IP accounting area In formula (1) HID i is the IP address of HOS i, O i is the producer of IP traffic that come from HOS i. he above described method works well in single user systems. But in the multiuser systems, several users can share one IP address at the same time, therefore IP traffic with same IP address might be produced by different persons. For example, there are two persons and B, and they have account UID a and UID b respectively in multi-user system HID i. In HID i UID a generates a package and UID b generates a package B. ccording to formula (1), only the HID i will be used to identify the producer of the packages, therefore package and package B are correlated to the same producer O i. From this example we know, the traditional IP accounting method cannot meet the finer granularity requirement in multi-user systems. o solve the above described problem, not only the host information, but also the user information should be provided to identify the producers of IP traffic from the multi-user system. he new correlation process should be described as below: f( HID i, UID j )=O ij (2) i Hosts in IP accounting area, j accounts in one host In formula (2) HID i is the IP address of HOS i. UID j is an identifier of a user of HOS i. O ij is the producer of IP traffic that come from HOS i. With HID and UID the producer of IP traffic can be uniquely identified. We call this new method user based IP accounting, and our IPO (utzer Basiertes IP ccounting) project aims at solving the problem in traditional IP accounting. 3 Principle of user based IP accounting User based IP accounting collects traffic information and processes the RDRs on the basis of Users. he IP address is not the unique parameter to identify the producer of IP traffic. User ID will be used with IP address together to uniquely identify the producer of IP traffic. o obtain the UID information of corresponding IP traffic from the computer system, the traditional centralized key position accounting information collection method should be changed. Because the UID information of one computer system cannot be obtained outside it, a mechanism must be introduced to implement the UID information collection. Here this mechanism is an gent for the purpose of IP

4 accounting. he gents will locate in different computer systems, usually in multiuser systems, since in single user systems the UID information can be ignored in correlating the IP traffic to corresponding O. he distributed gents will collect their located systems UID information of corresponding IP traffic respectively. distributed gent model for user based IP accounting can be illustrated in figure 2: Multi-user system / IP1 User1 User2 Usern IP raffic 1 IP raffic 2 IP raffic n User1 User2 Usern User1 User2 Usern Multi-user system / IP2 IP raffic 1 IP raffic 2 IP raffic n Multi-user system / IPn IP raffic 1 IP raffic 2 IP raffic n D U R D U R W O R K raffic Meter Correlation Module Raw Data Records Per User Usage Records Figure 2 D U R Distributed gent model for user based IP accounting he user based IP accounting architecture is based on the traditional IP accounting architecture. he user based IP accounting process with gent method can be described as below: 1) he gent checks all traffic flows of its located system, and then extracts the corresponding O and other information to identify each flow. ll the generated User-rafficFlow relationship information will be stored in a Dynamic User- rafficflow Relationship able (DUR). 2) raffic Meter collects the IP traffic information to generate the Raw Data Records. 3) In the mediation layer the RDRs will be collected and processed together with DURs to generate the Usage Records. he Dynamic User-rafficFlow Relationship able is used to record the O information of each traffic flow, it is generated by the gent. he Correlation Module uses the DUR to map the RDRs to the corresponding users and adds the user information to the new generated Usage Records. he HID and UID parameters in formula (2) are collected in the DUR. With these information the Correlation Module can accurately identify the producer of IP traffic. n gent can be a standalone software or a part of the multi-user system kernel, which locates in the multi-user system. It checks all IP traffic from its located system. Its main functions are: 1) Capturing IP traffic flows and extracting the traffic flow attribute items from them. 2) Retrieving the corresponding O attribute items of the traffic flow from the system.

5 3) Combining the O attribute and the IP traffic attribute items together to generate a record into the DUR. If the gent collects more detailed traffic information, such as the attributes of received bytes, sent bytes etc., and stores them into the DUR, the records in this table can also be used as RDRs. In this case an gent can be considered as a standalone meter. Considering the performance reason, usually the gent will not be used a standalone meter. fter the collection of the O information by the distributed gents, the legacy accounting protocols [RFC2975] such as Radius, acacs+ and SMP etc. can be used to convey these information. For example, according to the above described user based IP accounting principle, the realization of the gent can be designed as a SMP agent in the multi-user system. t first the collected O information will be stored into MIB database, then the SMP protocol can be used to transport these O information data from the MIB database to the meters. Using this method, a user based IP accounting MIB standard should be defined. he [RFC2722], [RFC2720] described standards can be modified to meet this requirement. 4 Realization of distributed gent method for user based IP accounting ccording to the principle of user based IP accounting, the key of the realization of user based IP accounting is the realization of the gent, which can generate the DUR. In order to collect the corresponding O information of IP traffic flows, the gent must be located within the multi-user system. Because the gent needs to obtain the O information of the IP traffic, usually the realization of the gent is OS dependent, in other words it is OS kernel dependent. Here we consider about two realization methods: 1) Kernel modification. he principle of this method is, directly modifying the tcpip driver, inserting the gent function of the user based IP accounting into the driver. By this means, the build-in user based IP accounting gent can generate the DUR. Because the gent is located in the tcpip driver, it can check all IP traffic and obtain the corresponding O information. his method is based on this precondition: the OS source code can be obtained and modified. It is fit for OS producer to make this modification, or for open source code OS (e.g. Linux). 2) Kernel patch. he principle of this method is, making the network requirements to tcpip driver to be redirected to the gent. his method does not require the modification of the system kernel; the gent will be realized as a kernel patch. In the redirection technique, the request to original network function will be redirected to the new defined network system call, which can capture all the network traffic flows and record the traffic and corresponding O information to generate the DUR. his method is fit for the non-os producers, who cannot modify the OS source code. In our IPO project we have implemented a prototype gent software IPrafficRecorder (IPR) for Solaris and Windows 2000 Server operating systems respectively.

6 Comparing the two above described user based IP accounting realization methods with each other; the kernel modification method is a better solution. Because in this method, the gent works in the tcpip driver, all the IP traffic related operation can be traced and recorded. But for the kernel patch method, since it works outside the tcpip driver, some in the tcpip driver fulfilled IP traffic related operations cannot be recorded. For example, the three-way handshake of the tcp connection is completed in the tcpip driver; the kernel patch method cannot capture the packages related with this process. For the kernel patch method, it can meter most of the IP traffic, and it is a simple method without modifying the kernel code. Our prototype gent software IPrafficRecorder is realized with kernel patch method. 5 Conclusion In this paper we have presented a user based IP accounting technology. It can provide more accurate accounting information than the traditional IP address based accounting technology, and it extends the traditional IP accounting technology. he key of user based IP accounting is the distributed gents, which are located in different computer systems and collect O information of IP traffic from their located systems. hese O information will then be stored in the Dynamic User- rafficflow able, which can be used to correlate the user with the IP traffic. he extended legacy accounting protocol methods can be used to convey the O information. For the realization of the user based IP accounting, two methods, kernel modification method and kernel patch method, have been suggested. In our IPO project we have implemented a user based IP accounting prototype with the kernel patch method in Solaris and Windows 2000 server respectively. In the future we will develop a user based IP accounting system in the computer center of University of Kaiserslautern, and this user based IP accounting system will mainly run in the Solaris, Linux and Windows 2000 Server. nd the kernel patch method will be used to implement this. he kernel modification method maybe a suggestion for the OS producers. o realize the kernel modification method, some standards of the user based IP accounting should be defined. 6 References [Lucent] Lucent echnologies, BILLDS Data Manager, [RFC1272] C. Mills, D. Hirsh,.R. Ruth: Internet ccounting: Background, RFC1272, ovember 1991 [RFC2720]. Brownlee: raffic Flow Measurement: Meter MIB, RFC2720, October 1999 [RFC2722]. Brownlee, C. Mills,. Ruth: raffic Flow Measurement: rchitecture, RFC2722, October 1999 [RFC2975] B.boda,J.rkko, D. Harrington: Introduction to ccounting Management, RFC2975, October 2000

USER ORIENTED IP ACCOUNTING IN MULTI-USER SYSTEMS

USER ORIENTED IP ACCOUNTING IN MULTI-USER SYSTEMS USER ORIENTED IP ACCOUNTING IN MULTI-USER SYSTEMS Department of Computer Science, University of Kaiserslautern Postfach 3049, 67653 Kaiserslautern, Germany Tel: ++49 631 2054520, ++49 631 2052161, ++49

More information

Domain Based Metering

Domain Based Metering Domain Based Metering Róbert Párhonyi 1 Bert-Jan van Beijnum 1 1 Faculty of Computer Science, University of Twente P.O. Box 217, 7500 AE Enschede, The Netherlands E-mail: {parhonyi, beijnum}@cs.utwente.nl

More information

A quota system for fair share of network resources

A quota system for fair share of network resources 19 A quota system for fair share of network resources 9elik C. Computer Center Middle East Technical University Inonu Bulvari, 06531 Ankara, Turkiye can@knidos.cc.metu.edu.tr OzgitA. Dept. of Computer

More information

SUSIE - Charging and Accounting for QoS-enhanced IP Multicast

SUSIE - Charging and Accounting for QoS-enhanced IP Multicast September 1999 SUSIE - Charging and for QoS-enhanced IP Multicast Georg Carle, Felix Hartanto, Michael Smirnov, Tanja Zseby GMD FOKUS Kaiserin-Augusta-Allee 31 D-10589 Berlin, Germany [carle, hartanto,

More information

RADIUS Packet of Disconnect

RADIUS Packet of Disconnect First Published: March 19, 2001 Last Updated: October 2, 2009 The feature is used to terminate a connected voice call. Finding Feature Information Your software release may not support all the features

More information

Experimental Extensions to RSVP Remote Client and One-Pass Signalling

Experimental Extensions to RSVP Remote Client and One-Pass Signalling 1 Experimental Extensions to RSVP Remote Client and One-Pass Signalling Industrial Process and System Communications, Darmstadt University of Technology Merckstr. 25 D-64283 Darmstadt Germany Martin.Karsten@KOM.tu-darmstadt.de

More information

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 inside: SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN & The Advanced Computing Systems Association & The System Administrators

More information

Network Forensics and Covert Channels Analysis in Internet Protocols

Network Forensics and Covert Channels Analysis in Internet Protocols School of Computer Science North Haugh KY16 9SX Scotland, UK Network Forensics and Covert Channels Analysis in Internet Protocols #1 Covert Channels in Internet Protocols PhD Student Email david@dcs.st-andrews.ac.uk

More information

Restrictions for Secure Copy Performance Improvement

Restrictions for Secure Copy Performance Improvement The Protocol (SCP) feature provides a secure and authenticated method for copying router configuration or router image files. SCP relies on Secure Shell (SSH), an application and a protocol that provide

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

FarSync X25 T2Ue. Intelligent X.25 2 port PCIe adapter for Linux and Windows. Key Features. Overview

FarSync X25 T2Ue. Intelligent X.25 2 port PCIe adapter for Linux and Windows. Key Features. Overview FarSync X25 T2Ue Intelligent X.25 2 port PCIe adapter for Linux and Windows Key Features PCI express 2 port X.25 adapter Network interfaces for RS232, X.21, RS530, RS422, RS449 and V.35 Wide speed range

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

FarSync X25 T2U. Intelligent X.25 2 port adapter for Linux and Windows. Key Features. Overview

FarSync X25 T2U. Intelligent X.25 2 port adapter for Linux and Windows. Key Features. Overview FarSync X25 T2U Intelligent X.25 2 port adapter for Linux and Windows Key Features PCI / PCI-X (Universal PCI) 2 port X.25 card Network interfaces for RS232C, X.21, RS530, RS422, RS449 and V.35 Wide speed

More information

DHCP Overview. Information About DHCP. DHCP Overview

DHCP Overview. Information About DHCP. DHCP Overview The Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol (BOOTP), which provides the framework for passing configuration information to hosts on a TCP/IP network. DHCP adds the

More information

What this talk is about?

What this talk is about? On the Current State of Remote Active OS Fingerprinting Tools Ofir Arkin CTO ofir.arkin@insightix.com Defcon 13 1 What this talk is about? This talk examines different aspects of remote active operating

More information

User Datagram Protocol UDP

User Datagram Protocol UDP 59 User Datagram Protocol UDP Aleksander Malinowski Bradley University Bogdan M. Wilamowski Auburn University 59.1 Introduction... 59-1 59.2 Protocol Operation... 59-1 UDP Datagram Port Number Assignments

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical

More information

Application Presence Fingerprinting for NAT-Aware Router

Application Presence Fingerprinting for NAT-Aware Router Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware

More information

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:

More information

Cisco Service Control Overview

Cisco Service Control Overview CHAPTER 1 This chapter provides a general overview of the Cisco Service Control solution. It introduces the Cisco service control concept and capabilities. It also briefly describes the hardware capabilities

More information

ToMaTo. Topology Management Tool

ToMaTo. Topology Management Tool ToMaTo Topology Management Tool Dennis Schwerdel University of Kaiserslautern, Germany Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Introduction ToMaTo is a topology-oriented

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

IP Differentiated Services

IP Differentiated Services Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. 7. IP Diffserv introduction Pag. 1 IP Differentiated Services Providing differentiated services in IP networks

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

IKR EmuLib. A Library for Seamless Integration of Simulation and Emulation. Marc Necker, Christoph Gauger [necker

IKR EmuLib. A Library for Seamless Integration of Simulation and Emulation. Marc Necker, Christoph Gauger [necker Universität Stuttgart INSTITUT FÜR NACHRICHTENVERMITTLUNG UND DATENVERARBEITUNG Prof. Dr.-Ing. Dr. h. c. mult. P. J. Kühn INSTITUT FÜR KOMMUNIKATIONSNETZE UND RECHNERSYSTEME Prof. Dr.-Ing. Dr. h. c. mult.

More information

Link-Layer Layer Broadcast Protocol for SpaceWire

Link-Layer Layer Broadcast Protocol for SpaceWire Link-Layer Layer Broadcast Protocol for SpaceWire SpaceWire Working Group Meeting Sandra G. Dykes Southwest Research Institute Overview Motivation & Value Protocol Features Protocol Description Performance

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

How to open ports in the DSL router firmware version 2.xx and above

How to open ports in the DSL router firmware version 2.xx and above How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or

More information

WCCPv2 and WCCP Enhancements

WCCPv2 and WCCP Enhancements WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the

More information

TBIT: TCP Behavior Inference Tool

TBIT: TCP Behavior Inference Tool TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results

More information

Communication Protocol Decomposition and Component-based Protocol Submodule

Communication Protocol Decomposition and Component-based Protocol Submodule Communication Protocol Decomposition and Component-based Protocol Submodule Tianzhou Chen 1, Quan Gan 2, Zhaohui Wu 1 College of Computer Science, Zhejiang University, Hangzhou, P.R.CHINA, 310027 1 {tzchen,

More information

FarSync Flex X25. X.25 USB adapter for Linux and Windows. Key Features. Overview

FarSync Flex X25. X.25 USB adapter for Linux and Windows. Key Features. Overview FarSync Flex X25 X.25 USB adapter for Linux and Windows Key Features USB 2.0 X.25 and ISO Transport adapter Network interfaces for RS232C, X.21, RS530, RS422, RS449 and V.35 Wide speed range - 150 baud

More information

FarSync Flex X25. X.25 USB adapter for Linux and Windows. Key Features. Overview. Typical Applications

FarSync Flex X25. X.25 USB adapter for Linux and Windows. Key Features. Overview. Typical Applications FarSync Flex X25 X.25 USB adapter for Linux and Windows Key Features USB X.25 and ISO Transport rugged designed adapter Network interfaces for RS232, X.21, RS530, RS422, RS449 and V.35 line speeds to over

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing

More information

RESOURCE MANAGEMENT MICHAEL ROITZSCH

RESOURCE MANAGEMENT MICHAEL ROITZSCH Department of Computer Science Institute for System Architecture, Operating Systems Group RESOURCE MANAGEMENT MICHAEL ROITZSCH AGENDA done: time, drivers today: misc. resources architectures for resource

More information

FarSync X25 T2Ee. Intelligent X.25 2 port low profile PCIe adapter for Linux & Windows. Key Features. Overview

FarSync X25 T2Ee. Intelligent X.25 2 port low profile PCIe adapter for Linux & Windows. Key Features. Overview FarSync X25 T2Ee Intelligent X.25 2 port low profile PCIe adapter for Linux & Key Features 2 port low profile PCIe X.25 adapter Network interfaces for RS232, X.21, RS530, RS422, RS449 and V.35 Wide speed

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

CSE/EE 461 HTTP and the Web

CSE/EE 461 HTTP and the Web CSE/EE 461 HTTP and the Web Last Time The Transport Layer Focus How does TCP share bandwidth? Topics AIMD Slow Start Application Presentation Session Transport Network Data Link Fast Retransmit / Fast

More information

Raw Data Formatting: The RDR Formatter and NetFlow Exporting

Raw Data Formatting: The RDR Formatter and NetFlow Exporting CHAPTER 9 Raw Data Formatting: The RDR Formatter and NetFlow Exporting Revised: September 27, 2012, Introduction Cisco Service Control is able to deliver gathered reporting data to an external application

More information

RADIUS - QUICK GUIDE AAA AND NAS?

RADIUS - QUICK GUIDE AAA AND NAS? RADIUS - QUICK GUIDE http://www.tutorialspoint.com/radius/radius_quick_guide.htm Copyright tutorialspoint.com AAA AND NAS? Before you start learning about Radius, it is important that you understand: What

More information

A Technical Overview of the Lucent Managed Firewall

A Technical Overview of the Lucent Managed Firewall Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Network Services, Cloud Computing and Virtualization

Network Services, Cloud Computing and Virtualization Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor

More information

Unified Performance Management Solution. User Guide

Unified Performance Management Solution. User Guide Unified Performance Management Solution User Guide Copyright 2016 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Applications/Design. Example. Locating Resource. End-to-end. Connection UCB. Applications EECS 122

Applications/Design. Example. Locating Resource. End-to-end. Connection UCB. Applications EECS 122 /Design Web Browsing Web Browsing Telephone Call Multiplexing Protocols IETF Summary Example Locating Resource: DNS Connection End-to-end Packets Bits Points to remember TOC TOC Web Browsing Example Click

More information

IPv6 Ephemeral Addresses <draft-kitamura-ipv6-ephemeral-address-00.txt>

IPv6 Ephemeral Addresses <draft-kitamura-ipv6-ephemeral-address-00.txt> IPv6 Ephemeral Addresses Harmless IPv6 Address State Extension (Uncertain State) Hiroshi KITAMURA NEC

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

Accounting management system enhancement supporting automated monitoring and storing facilities

Accounting management system enhancement supporting automated monitoring and storing facilities Accounting management system enhancement supporting automated monitoring and storing facilities Abstract C. Bouras S. Kastaniotis 1 Computer Engineering and Informatics Department University of Patras,

More information

Addressing and Routing

Addressing and Routing Addressing and Routing Andrew Scott a.scott@lancaster.ac.uk Physical/ Hardware Addresses Aka MAC* or link(-layer) address Can only talk to things on same link Unique ID given to every network interface

More information

Managing CORBA Interfaces

Managing CORBA Interfaces CHAPTER 12 This chapter contains the following information: 12.1 What is Cisco MGM GateWay/CORBA? 12.2 Using a Static CORBA Listener Port on the Cisco MGM Server 12.3 Configuring the CORBA Timeout Cisco

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Identifying Operating System Using Flow-based Traffic Fingerprinting

Identifying Operating System Using Flow-based Traffic Fingerprinting Identifying Operating System Using Flow-based Traffic Fingerprinting Tomáš Jirsík, Pavel Čeleda {jirsik celeda}@ics.muni.cz Institute of Computer Science, Masaryk University EUNICE 2014 September, 1. 5.,

More information

Sun Storage Common Array Manager

Sun Storage Common Array Manager Sun Storage Common Array Manager Quick Start Guide This guide can help you with the basic steps of installing Oracle s Sun Storage Common Array Manager software. If you are upgrading from a previous version

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Customer IPv6 Delivery

Customer IPv6 Delivery Customer IPv6 Delivery The Nextgen Experience Chris Chaundy, Nextgen Networks October 2011 Agenda Nextgen Network s strategy Just get a prefix and turn it on!?!? Scope of the project Hardware considerations

More information

Port Forwarding Setup (RTA1025W)

Port Forwarding Setup (RTA1025W) Port Forwarding Setup (RTA1025W) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Linux-based 6LoWPAN border router

Linux-based 6LoWPAN border router Linux-based 6LoWPAN border router David Hauweele University of Mons 7 August 2013 Table of Contents 1 Internet of Things 2 Problem and state of the art 3 Implementation 4 Validation 5 Conclusion David

More information

Using NetFlow Sampling to Select the Network Traffic to Track

Using NetFlow Sampling to Select the Network Traffic to Track Using NetFlow Sampling to Select the Network Traffic to Track This module contains information about and instructions for selecting the network traffic to track through the use of NetFlow sampling. The

More information

Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison

Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison Virtualization Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison I. Introduction to Virtualization II. Virtual liances III. Benefits to Virtualization IV. Example

More information

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation

More information

Final Implemented QoS architecture for the IST Project VIRTUOUS Demonstrator

Final Implemented QoS architecture for the IST Project VIRTUOUS Demonstrator Final Implemented QoS architecture for the IST Project VIRTUOUS Demonstrator Filomena Del Sorbo, Giuseppe Lombardi, Fabio Ventrone Computer Science Department University of Rome La Sapienza, Via F. Buonarroti,

More information

KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT. Quick Deployment Guide.

KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT. Quick Deployment Guide. KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT www.kaspersky.com CONTENTS About This Guide 4 Notation Used 4 Product Components and Their Interaction 5 General Product Installation Procedure 8 Installing

More information

Open Systems Interconnection (OSI) Routing Protocol

Open Systems Interconnection (OSI) Routing Protocol CHAPTER 41 Open Systems Interconnection (OSI) Protocol Background The International Organization for Standardization (O) developed a complete suite of routing protocols for use in the Open Systems Interconnection

More information

CRM Connector for Salesforce

CRM Connector for Salesforce CRM Connector for Salesforce Administrator Guide Version 1.1 October, 2016 Page 1 Table of contents INTRODUCTION AND GETTING STARTED OPERATING SYSTEM, HARDWARE AND SOFTWARE REQUIREMENTS Supported Browsers

More information

Configuring Transports

Configuring Transports This module provides information about Nonstop Routing (NSR), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP) transports on Cisco ASR 9000 Series Aggregation Services Routers. If

More information

Multi-requirement Extensions for DHCPv6 (draft-ren-dhc-mredhcpv6-00)

Multi-requirement Extensions for DHCPv6 (draft-ren-dhc-mredhcpv6-00) Multi-requirement Extensions for DHCPv6 (draft-ren-dhc-mredhcpv6-00) Gang Ren, Lin He, Ying Liu rengang@cernet.edu.cn he-l14@mails.tsinghua.edu.cn liuying@cernet.edu.cn DHC, ietf98, Mar 2017 1 Motivations

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 11: SNMP and AAA Forouzan, chapter 21 Diameter next generation's AAA protocol by Håkan Ventura, sections 2-3.3.6 RFC2881 (optional extra material) Outline:

More information

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2 Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000 Network Working Group Y. Bernet Request for Comments: 2996 Microsoft Category: Standards Track November 2000 Status of this Memo Format of the RSVP DCLASS Object This document specifies an Internet standards

More information

Configuring ISG Support for Prepaid Billing

Configuring ISG Support for Prepaid Billing Intelligent Services Gateway (ISG) is a software feature set that provides a structured framework in which edge devices can deliver flexible and scalable services to subscribers. ISG prepaid billing support

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

Connecting Buildxact with MYOB

Connecting Buildxact with MYOB Connecting Buildxact with MYOB USER HELP GUIDE - 2018 CONTENTS Introduction... 3 Connecting... 3 Help selecting the right MYOB accounts... 6 Expense account (purchasing)... 6 Income account (client invoicing)...

More information

nbox User s Guide ntop Software Web Management Version 2.7 Dec

nbox User s Guide ntop Software Web Management Version 2.7 Dec nbox User s Guide ntop Software Web Management Version 2.7 Dec 2017 2002-18 nbox 2.7 User s Guide Table of Contents 1. Introduction 3 2. The nbox web interface 5 2.1 Usage Guidelines 5 2.2 System 8 2.3

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Detecting and Quantifying Abusive IPv6 SMTP!

Detecting and Quantifying Abusive IPv6 SMTP! Detecting and Quantifying Abusive IPv6 SMTP Casey Deccio Verisign Labs Internet2 2014 Technical Exchange October 30, 2014 Spam, IPv4 Reputation and DNSBL Spam is pervasive Annoying (pharmaceuticals) Dangerous

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Information About the Cisco Service Control Concept

Information About the Cisco Service Control Concept CHAPTER 1 General Overview Revised: April 19, 2010, Introduction This chapter provides a general overview of the Cisco Service Control solution. It introduces the Cisco Service Control concept and the

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

Firewall & Service Tickets FAST

Firewall & Service Tickets FAST Firewall & Service Tickets FAST draft-herbert-fast-01 Tom Herbert Goal A method to allow applications to signal the network for services it wants applied to packets that is secure,

More information

Network Monitoring, Visualization. Topics

Network Monitoring, Visualization. Topics Monitoring, Visualization Gigabit Kits Workshop (January 10, 2001) Ken Wong, Eileen Kraemer*, Jon Turner Washington University and University of Georgia* NSF ANI-9714698 http://www.arl.wustl.edu/arl/projects/nmvc

More information

N E T W O R K M A N A G E M E N T P R I N C I P L E S R E V I E W

N E T W O R K M A N A G E M E N T P R I N C I P L E S R E V I E W CS7012 N E T W O R K M A N A G E M E N T P R I N C I P L E S R E V I E W THE MANAGED OBJECT MANAGER / AGENT RELATIONSHIP Standard Interface Local (proprietary) Interface Manager Management Operations Agent

More information

How to gain access to your BeoLink Smart Home when you are not at home

How to gain access to your BeoLink Smart Home when you are not at home How to gain access to your BeoLink Smart Home when you are not at home Home monitoring and control from the palm of your hand Remote access for the BeoLink App will typically require a portforwarding on

More information

Software. Linux. Squid Windows

Software. Linux. Squid Windows Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the

More information

IEC Embedded Client/Server Development Toolkit

IEC Embedded Client/Server Development Toolkit IEC 61850 Embedded Client/Server Development Toolkit The Xelas Energy product portfolio enables: Embedded IEC 61850 development: significant time and cost savings when porting to embedded operating systems

More information

Building a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster

Building a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster 1 Network Virtualization Network virtualization enables many virtual networks to share the same physical network

More information

Extensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang

Extensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang Extensible Network Security Services on Software Programmable Router OS David Yau, Prem Gopalan, Seung Chul Han, Feng Liang System Software and Architecture Lab Department of Computer Sciences Purdue University

More information

Network Data Management Usage (NDM-U) For IP-Based Services Service Specification Wholesale

Network Data Management Usage (NDM-U) For IP-Based Services Service Specification Wholesale Network Data Management Usage (NDM-U) For IP-Based Services Service Specification Wholesale April 13, 2001 1999-2001 IPDR, Inc. Service Specification - Wholesale Preface Contacts For general questions

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Transparent TCP Recovery

Transparent TCP Recovery Transparent Recovery with Chain Replication Robert Burgess Ken Birman Robert Broberg Rick Payne Robbert van Renesse October 26, 2009 Motivation Us: Motivation Them: Client Motivation There is a connection...

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

HP Network Node Manager 9: Getting Started. Manage your network effectively with NNMi. Marius Vilemaitis. J enterprise PUBLISHING MUMBAI BIRMINGHAM

HP Network Node Manager 9: Getting Started. Manage your network effectively with NNMi. Marius Vilemaitis. J enterprise PUBLISHING MUMBAI BIRMINGHAM HP Network Node Manager 9: Getting Started Manage your network effectively with NNMi Marius Vilemaitis r PUBLISHING J enterprise BIRMINGHAM - MUMBAI Preface 1 Chapter 1: Before we Manage with NNMi 7 What

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information