Filtering of Peer-to-peer traffic. Martin Gejke

Size: px
Start display at page:

Download "Filtering of Peer-to-peer traffic. Martin Gejke"

Transcription

1 Filtering of Peer-to-peer traffic Martin Gejke

2 Table of Contents Filtering of Peer-to-peer traffic... 3 Peer-to-peer basics...3 Filtering...3 Position of the filter... 4 Methods of filtering... 4 Traffic analysis...4 Content filtering... 5

3 Filtering of Peer-to-peer traffic Peer-to-peer basics Peer-to-peer(P2P) technology can be used for lots of different applications. When using a P2Pnetwork communications are based on the fact that all the connected participants are treated as equals instead of relying on a relative small number of servers. This has the advantage that the computing power and bandwidth isn't limited by a server, each peer that connects brings it's own. Because of this P2P-networks are very suitable for file sharing and distribution of different kinds of data. There are two types of P2P-networks, Pure P2P and Hybrid P2P, the first requires no central server for managing the network, the second uses just that and the peers are responsible for keeping it up to date with their information. Of course this comes with some drawbacks, there's more overhead for keeping track of the topology of the network and data that is wanted could be many hops away. When using P2P to download files a connected peer(node) can download from and upload to lots of different nodes, when increasing the number of simultaneous nodes this gives the effect that the bandwidth can be maxed out. For a private home user this is for the most of the time a good thing but for an ISP or when the user is an employee at a company this is not a good thing. The effect could be that important applications could have their traffic reduced and important data might not get through. Other types of P2P protocols are for example Skype, MSN and ICQ. These kind of programs can open up a company network to viruses and other sorts of malicious code and even if they're used in a safe way they can lower the productivity of the employees. A video conference via MSN could also steal lots of valuable bandwidth. Even if you're not running a Skype conversation, Skype traffic could be passing through your network since Skype uses connected peers as relays. To solve these and some other problems there is a need for P2P-filtering. Filtering P2P-filtering is obviously an fast growing market, a search for p2p filtering on google gives millions of hits. Estimates are that the market might be as big as $2.4 billion in Examples of programs/devices used for this are: ipoque PRX P2P Edge XL IM Lock CopySense Appliance These differ quite a bit in how the try to solve the problem, I will try to mention a few of them.

4 Position of the filter For a company a filter can be placed in a couple of different places. 1 2 INTERNET Figure 1: Different positions of filters Position 1 in Figure 1 is when the filter is placed in the user computer, this is then in a form of a software. The easiest way would of course be to not allow the user to start any P2P-programs, but that is easier said than done. Other methods involve identifying and blocking network traffic that might be generated by P2P and making sure that it doesn't reach the network. Position 2 is where the Internet access point for the company is located. Here some kind of hardware filter is best used, this can either be built into a router or some hardware specially designed for filtering. Since P2P doesn't rely on Client/Server solutions the possible positioning is the same on either a sender or reciever. Methods of filtering Traffic analysis Every P2P application using a network sends different packets, these packets can be monitored, examined and categorized. These data can be summarized in signature, a unique description of what that particular programs network traffic looks like. If you consider the OSI-model this monitoring has to be done in layer 7, the application layer. Companies like Verso Technologies offer hardware solutions for tracking this, they keep a database of know P2P(and other malicious softwares) network signatures. With this their device can log the data, from where and to whom, or simply block the data. Of course there might be legit uses of P2P-programs so you could have to allow them by checking for example lower OSI-layers for IP or MAC-adresses.

5 Content filtering Some filtering applications like CopySense goes one step further. By first identifying the traffic as P2P-data and then reading the data and calculating a digital fingerprint of the music/video it can be compared to a database of known copyrighted material. If there's a match, it's probably illegal. This is useful for companies to stop employees from distributing copyrighted music. There's also easier methods for doing this and that it simply trying to extract meta-data(filenames etc) from the sent data and check against know copyrighted material.

Peer-To-Peer Network!

Peer-To-Peer Network! Computer Networks! Introduction. I've been asked to create a PowerPoint on two different kinds of computer networks to be able to discuss the strengths and weaknesses of both. In this PowerPoint I will

More information

Client Server and Peer to Peer Networks

Client Server and Peer to Peer Networks Client Server and Peer to Peer Networks Client Server Network With a client server network the files will not be stored on the hard drive of each workstation. Instead they will be stored on a computer

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER Network Layer Network layer manages options pertaining to host and network addressing, managing subnetworks, and internetworking.

More information

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware

More information

1(11) Peer to peer networking

1(11) Peer to peer networking 1(11) Peer to peer networking Carl Berg calle.berg@gmail.com Chalmers 2005 2(11) Table of contents Introduction Abstract 3 History 4 Technical overview 5 Comparison to the client/server approach 6 Requirements

More information

Fundamentals of Networking Network Terminologies

Fundamentals of Networking Network Terminologies Fundamentals of Networking Network Terminologies Kuldeep Sonar 1 Performance Measurements Kuldeep Sonar 2 Latency Refers to the amount of time (usually measured in milliseconds) it takes for data to travel

More information

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

VoIP/SIP: Economy and Mobility

VoIP/SIP: Economy and Mobility Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Applied Information and Communication Technology Assessment Unit A2 13

Applied Information and Communication Technology Assessment Unit A2 13 71 Centre Number Candidate Number ADVANCED General Certificate of Education January 2012 Applied Information and Communication Technology Assessment Unit A2 13 assessing Unit 13 : Networking and Communications

More information

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the I'm Andy Glover and this is the Java Technical Series of the developerworks podcasts. My guest is Brian Jakovich. He is the director of Elastic Operations for Stelligent. He and I are going to talk about

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Brief Notes on Networks

Brief Notes on Networks IP ADDRESS "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate

More information

CtrlS Datacenters Placement Questions And Answers

CtrlS Datacenters Placement Questions And Answers DATA CENTER Q1. What is Data Center? Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the companys information

More information

Configuration Example

Configuration Example Configuration Example Use a Branch Office VPN for Failover From a Private Network Link Example configuration files created with WSM v11.10.1 Revised 7/22/2015 Use Case In this configuration example, an

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 5 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Group project: 2 or 3 students

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

IP subnetting made easy

IP subnetting made easy Version 1.0 June 28, 2006 By George Ou Introduction IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time

More information

Big Compute, Big Net & Big Data: How to be big

Big Compute, Big Net & Big Data: How to be big > 2014 HPC Advisory Council Brazil Conference Big Compute, Big Net & Big Data: How to be big Luiz Monnerat PETROBRAS 26/05/2014 > Agenda Big Compute (HPC) Commodity HW, free software, parallel processing,

More information

This presentation provides a high level overview of Gen Z unicast and multicast operations.

This presentation provides a high level overview of Gen Z unicast and multicast operations. This presentation provides a high level overview of Gen Z unicast and multicast operations. 1 2 Gen Z specifies two packet types: Link local packets that are exchanged between two interfaces across a single

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Managing Network Bandwidth to Maximize Performance

Managing Network Bandwidth to Maximize Performance Managing Network Bandwidth to Maximize Performance With increasing bandwidth demands, network professionals are constantly looking to optimize network resources, ensure adequate bandwidth, and deliver

More information

Introduction To Routers

Introduction To Routers Introduction To Routers Introduction Welcome to the Routers section. Here we will analyse routers quite some depth; what they do and how they work. I point out to you that you should have some knowlege

More information

UKNova s Getting Connectable Guide

UKNova s Getting Connectable Guide UKNova s Getting Connectable Guide Version 1.2 2010/03/22 1. WHAT IS "BEING CONNECTABLE" AND WHY DO I NEED IT? Being connectable means being able to give back to others it is the fundamental principle

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview

More information

PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between

PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between MITOCW Lecture 10A [MUSIC PLAYING] PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between all these high-level languages like Lisp and the query

More information

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall Agenda of today s lecture Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall Firewalls in General S-38.153 Security of Communication Protocols Antti Lehtonen 29.4.2003 firewalls

More information

Understanding the Internet

Understanding the Internet Announcements U.S. National Cybersecurity Understanding the Internet Axess Forum Bios/Photos Law School Event William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Spring 2004 Stanford University

More information

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges

More information

Fast Traffic Tactics

Fast Traffic Tactics TRAFFIC TACTICS VOLUME #2: Fast Traffic Tactics Special Report (F): Peer-to-Peer Network Tactics Legal Notice: The Publisher has strived to be as accurate and complete as possible in the creation of this

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek Seite 1 von 5 Issue Date: FoxTalk July 2000 It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek This month, Paul Maskens and Andy Kramek discuss the problems of validating data entry.

More information

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range

More information

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS CSE 47 Introduction to Computer Networks Roch Guérin Final Exam Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS 1. [10 points] Bob has been provided with the following pair of

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Advanced option settings on the command line. Set the interface and ports for the OpenVPN daemons

Advanced option settings on the command line. Set the interface and ports for the OpenVPN daemons Advanced option settings on the command line docs.openvpn.net/command-line/advanced-option-settings-on-the-command-line Set the interface and ports for the OpenVPN daemons In the Admin UI under Server

More information

Routing Basics. ISP Workshops

Routing Basics. ISP Workshops Routing Basics ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 26

More information

IPv6 at Google. Lorenzo Colitti

IPv6 at Google. Lorenzo Colitti IPv6 at Google Lorenzo Colitti lorenzo@google.com Why IPv6? IPv4 address space predictions (G. Huston) Why IPv6? Cost Buying addresses will be expensive Carrier-grade NAT may be expensive Lots of session

More information

Voice over IP. What You Don t Know Can Hurt You. by Darren Bilby

Voice over IP. What You Don t Know Can Hurt You. by Darren Bilby Voice over IP What You Don t Know Can Hurt You by Darren Bilby What is VoIP? Voice over Internet Protocol A method for taking analog audio signals, like the kind you hear when you talk on the phone, and

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Routing Basics. Campus Network Design & Operations Workshop

Routing Basics. Campus Network Design & Operations Workshop Routing Basics Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

IPv6 at Google. Lorenzo Colitti

IPv6 at Google. Lorenzo Colitti IPv6 at Google Lorenzo Colitti lorenzo@google.com Why? IPv4 address space predictions (G. Huston) To put it into perspective... Iljitsch van Beijnum, Ars Technica Why IPv6? Cost Buying addresses will be

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 10: IP Routing and Addressing Extensions

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 10: IP Routing and Addressing Extensions CS 5520/ECE 5590NA: Network Architecture I Spring 2009 Lecture 10: IP Routing and Addressing Extensions This lecture provides discussion of the mechanisms used to route IP datagrams (Chapter 7). It also

More information

61A Lecture 31. November 14th 2011

61A Lecture 31. November 14th 2011 61A Lecture 31 November 14th 2011 Parallel and Distributed Computing Coordinating groups of computers So far functions data structures objects abstraction interpretation evaluation 3 So far functions data

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

BUSINESS DATA COMMUNICATIONS & NETWORKING

BUSINESS DATA COMMUNICATIONS & NETWORKING BUSINESS DATA COMMUNICATIONS & NETWORKING Chapter 1 Introduction to Data Communications FitzGerald Dennis Durcikova Prepared by Taylor M. Wells: College of Business Administration, California State University,

More information

The Internet, Intranets, and Extranets Chapter 7

The Internet, Intranets, and Extranets Chapter 7 The Internet, Intranets, and Extranets Chapter 7 MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan 1 Principles and Learning Objectives The Internet is like many other technologies it provides

More information

! Purpose of Multicasting Routing is to reduce cost for applications that send same data to Multiple recipients.

! Purpose of Multicasting Routing is to reduce cost for applications that send same data to Multiple recipients. PAPER OVERVIEW:! Evaluation of two Multicasting protocols namely CBT and PIM.! Comparison of protocols in terms of End-to-end delay, Network resource usage, Join time, Size of the tables containing multicast

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

How the web works - 1

How the web works - 1 How the web works - 1 Transmission Control Protocol / Internet protocol Domain Name System An understanding of these two is required to understand the limitations of Web based systems TCP/IP Provides an

More information

Instant Keyword Riches

Instant Keyword Riches Instant Keyword Riches Instant Keyword Riches Table of Contents Introduction... 3 Preliminary Keyword Research... 4 Keyword Assessment... 6 Keywords in SEO... 10 Domain Names... 10 URLs... 11 Heading Tags...

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices White Paper UCaaS Connectivity Options in the New Age: Best Practices 1 Today s IT stacks are cloud-first, taking advantage of the many benefits of SaaS applications, while answering the increasing needs

More information

BSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS)

BSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS) BSCI Section 5 Intermediate System-to- Intermediate System () Intermediate System-to-Intermediate System () is a routing protocol developed by the ISO. It is a link-state protocol and behaves much like

More information

Software troubleshooting

Software troubleshooting N E W S L E T T E R IT Computer Technical Support Newsletter Software troubleshooting November 9, 2015 Vol.2, No.4 TABLE OF CONTENTS Software troubleshooting...1 Unexplained software crashes and error

More information

Capturing Network Traffic With Wireshark 2

Capturing Network Traffic With Wireshark 2 Capturing Network Traffic With Wireshark 2 A White Paper From For more information, see our web site at Capturing Network Traffic with Wireshark 2 Last Updated: 08/06/2018 In some cases, the easiest way

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Edge Datacenter Placement BY ABHISHEK GUPTA FRIDAY GROUP MEETING JUNE 10, 2016

Edge Datacenter Placement BY ABHISHEK GUPTA FRIDAY GROUP MEETING JUNE 10, 2016 Edge Datacenter Placement BY ABHISHEK GUPTA FRIDAY GROUP MEETING JUNE 10, 2016 Why the need for a Edge Datacenter? For cloud services, performance at the user end is very important. In recent years, the

More information

Mapping Mechanism to Enhance QoS in IP Networks

Mapping Mechanism to Enhance QoS in IP Networks Mapping Mechanism to Enhance QoS in IP Networks by Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru in The 32nd International Conference on Information Networking (ICOIN 2018)

More information

Cisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ]

Cisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ] s@lm@n Cisco Exam 100-101 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ] Topic 7, Troubleshooting Cisco 100-101 : Practice Test Question No : 1 - (Topic

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

How To Make 3-50 Times The Profits From Your Traffic

How To Make 3-50 Times The Profits From Your Traffic 1 How To Make 3-50 Times The Profits From Your Traffic by Chris Munch of Munchweb.com Copyright Munchweb.com. All Right Reserved. This work cannot be copied, re-published, or re-distributed. No re-sell

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Experimental Study of Skype. Skype Peer-to-Peer VoIP System An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion

More information

and the Forensic Science CC Spring 2007 Prof. Nehru

and the Forensic Science CC Spring 2007 Prof. Nehru and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.

More information

Batch Lazy Loader Pattern

Batch Lazy Loader Pattern Batch Lazy Loader Pattern Ryan Senior Intent Retrieve many related, Lazy Loaded objects simultaneously, overcoming the performance degradation that can be associated with the Lazy Load pattern (called

More information

Informal Quiz #01: SOLUTIONS

Informal Quiz #01: SOLUTIONS ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS : GOOGLE: Shiv RPI shivkuma@ecse.rpi.edu 1 Review of Networking Concepts (I): Informal Quiz SOLUTIONS For each T/F question: Replace the appropriate

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief Innovative. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Technology Brief Comparison of SD WAN SD-WAN Overview By the end of 2019, 30% of enterprises will use SD-WAN products in

More information

5. Providing a narrower address space is the primary design goal for IPv6.

5. Providing a narrower address space is the primary design goal for IPv6. Chapter 2: IP Addressing and Related Topics TRUE/FALSE 1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. T PTS: 1 REF: 59 2.

More information

Internet. In this section: Links: Video: Did You Know - The power of the internet. Concepts > Internet

Internet. In this section: Links: Video: Did You Know - The power of the internet. Concepts > Internet Internet is the world s largest public computer network, a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world. In this section: Internet

More information

Multihoming with BGP and NAT

Multihoming with BGP and NAT Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2

More information

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using

More information

Chapter 6 Addressing the Network- IPv4

Chapter 6 Addressing the Network- IPv4 Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

CS 416: Operating Systems Design April 22, 2015

CS 416: Operating Systems Design April 22, 2015 Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review

More information

The SD-WAN security guide

The SD-WAN security guide The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are

More information

Fig (1) client and Server network

Fig (1) client and Server network 2.2 How Does the Internet Work? The international network known as the internet consists of hundreds of thousands of smaller networks linking educational, commercial, nonprofit, and military organizations,

More information

ECE 158A: Data Networks I. Fall 2015 Massimo Franceschetti

ECE 158A: Data Networks I. Fall 2015 Massimo Franceschetti ECE 158A: Data Networks I Fall 2015 Massimo Franceschetti What is a Network? A system of links that interconnect nodes in order to exchange information A B We will focus on the INTERNET Where nodes are

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Making Sense of Home Wi-Fi Coverage Solutions

Making Sense of Home Wi-Fi Coverage Solutions Making Sense of Home Wi-Fi Coverage Solutions www.xcellair.com Phone: +1 858.412.0186 Email: sales@xcellair.com 6540 Lusk Blvd, Suite C102, San Diego, CA 92121 Introduction Wireless connectivity is so

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information