An Introduction to Computer Networks Release 1.0

Total Page:16

File Type:pdf, Size:1020Kb

An Introduction to Computer Networks Release 1.0 An Introduction to Computer Networks Release 1.0 Peter L Dordal March 16, 2014 CONTENTS 0 Preface 3 0.1 Classroom Use..........................................3 0.2 Progress Notes..........................................5 0.3 Technical considerations.....................................5 1 An Overview of Networks7 1.1 Layers..............................................7 1.2 Bandwidth and Throughput...................................7 1.3 Packets..............................................8 1.4 Datagram Forwarding......................................9 1.5 Topology............................................. 11 1.6 Routing Loops.......................................... 12 1.7 Congestion............................................ 12 1.8 Packets Again.......................................... 13 1.9 LANs and Ethernet....................................... 14 1.10 IP - Internet Protocol...................................... 16 1.11 DNS.............................................. 21 1.12 Transport............................................ 21 1.13 Firewalls............................................ 24 1.14 Network Address Translation................................. 24 1.15 IETF and OSI.......................................... 26 1.16 Berkeley Unix......................................... 28 1.17 Epilog.............................................. 28 1.18 Exercises............................................ 28 2 Ethernet 31 2.1 10-Mbps classic Ethernet.................................... 31 2.2 100 Mbps (Fast) Ethernet.................................... 40 2.3 Gigabit Ethernet......................................... 41 2.4 Ethernet Switches........................................ 42 2.5 Spanning Tree Algorithm.................................... 44 2.6 Virtual LAN (VLAN)...................................... 48 2.7 Epilog.............................................. 49 2.8 Exercises............................................. 49 i 3 Other LANs 53 3.1 Virtual Private Network..................................... 53 3.2 Carrier Ethernet......................................... 54 3.3 Wi-Fi............................................... 55 3.4 WiMAX............................................. 65 3.5 Fixed Wireless.......................................... 67 3.6 Token Ring............................................ 68 3.7 Virtual Circuits.......................................... 69 3.8 Asynchronous Transfer Mode: ATM.............................. 72 3.9 Epilog.............................................. 74 3.10 Exercises............................................ 75 4 Links 79 4.1 Encoding and Framing...................................... 79 4.2 Time-Division Multiplexing................................... 83 4.3 Epilog.............................................. 87 4.4 Exercises............................................. 87 5 Packets 89 5.1 Packet Delay........................................... 89 5.2 Packet Delay Variability..................................... 92 5.3 Packet Size............................................ 93 5.4 Error Detection.......................................... 95 5.5 Epilog.............................................. 99 5.6 Exercises............................................. 100 6 Abstract Sliding Windows 103 6.1 Building Reliable Transport: Stop-and-Wait.......................... 103 6.2 Sliding Windows......................................... 107 6.3 Linear Bottlenecks........................................ 110 6.4 Epilog.............................................. 117 6.5 Exercises............................................. 117 7 IP version 4 121 7.1 The IPv4 Header......................................... 121 7.2 Interfaces............................................. 123 7.3 Special Addresses........................................ 124 7.4 Fragmentation.......................................... 125 7.5 The Classless IP Delivery Algorithm.............................. 127 7.6 IP Subnets............................................ 128 7.7 Address Resolution Protocol: ARP............................... 134 7.8 Dynamic Host Configuration Protocol (DHCP)......................... 137 7.9 Internet Control Message Protocol............................... 139 7.10 Unnumbered Interfaces..................................... 141 7.11 Mobile IP............................................ 142 7.12 Epilog.............................................. 144 7.13 Exercises............................................ 144 ii 8 IP version 6 147 8.1 The IPv6 Header......................................... 147 8.2 Host identifier.......................................... 149 8.3 Link-local addresses....................................... 149 8.4 Anycast addresses........................................ 149 8.5 Hop-by-Hop Options Header.................................. 151 8.6 Destination Options Header................................... 151 8.7 Routing Header......................................... 151 8.8 Fragment Header......................................... 151 8.9 Router Advertisement...................................... 153 8.10 Prefix Discovery........................................ 154 8.11 Neighbor Solicitation...................................... 154 8.12 Duplicate Address Detection.................................. 155 8.13 Stateless Autoconfiguration (SLAAC)............................. 156 8.14 DHCPv6............................................ 157 8.15 Manual Configuration..................................... 158 8.16 ping6.............................................. 159 8.17 TCP connections with link-local addresses.......................... 160 8.18 Manual address configuration................................. 160 8.19 Node Information Messages.................................. 161 9 Routing-Update Algorithms 163 9.1 Distance-Vector Routing-Update Algorithm.......................... 163 9.2 Distance-Vector Slow-Convergence Problem.......................... 168 9.3 Observations on Minimizing Route Cost............................ 170 9.4 Loop-Free Distance Vector Algorithms............................. 172 9.5 Link-State Routing-Update Algorithm............................. 174 9.6 Routing on Other Attributes................................... 177 9.7 Epilog.............................................. 178 9.8 Exercises............................................. 178 10 Large-Scale IP Routing 183 10.1 Classless Internet Domain Routing: CIDR........................... 183 10.2 Hierarchical Routing...................................... 185 10.3 Legacy Routing......................................... 186 10.4 Provider-Based Routing.................................... 186 10.5 Geographical Routing..................................... 190 10.6 Border Gateway Protocol, BGP................................ 191 10.7 Epilog.............................................. 203 10.8 Exercises............................................ 204 11 UDP Transport 209 11.1 User Datagram Protocol – UDP................................ 209 11.2 Fundamental Transport Issues................................. 216 11.3 Trivial File Transport Protocol, TFTP............................. 217 11.4 TFTP Stop-and-Wait...................................... 218 11.5 TFTP scenarios......................................... 221 11.6 TFTP Throughput....................................... 222 iii 11.7 Remote Procedure Call (RPC)................................. 222 11.8 Epilog.............................................. 225 11.9 Exercises............................................ 226 12 TCP Transport 227 12.1 The End-to-End Principle................................... 228 12.2 TCP Header........................................... 228 12.3 TCP Connection Establishment................................ 229 12.4 TCP and WireShark...................................... 233 12.5 TCP simplex-talk........................................ 234 12.6 TCP state diagram....................................... 238 12.7 TCP Old Duplicates...................................... 240 12.8 TIMEWAIT........................................... 241 12.9 The Three-Way Handshake Revisited............................. 242 12.10 Anomalous TCP scenarios.................................. 244 12.11 TCP Faster Opening...................................... 244 12.12 Path MTU Discovery..................................... 245 12.13 TCP Sliding Windows..................................... 245 12.14 TCP Delayed ACKs...................................... 246 12.15 Nagle Algorithm....................................... 246 12.16 TCP Flow Control....................................... 247 12.17 TCP Timeout and Retransmission.............................. 247 12.18 KeepAlive........................................... 248 12.19 TCP timers.......................................... 249 12.20 Epilog............................................. 249 12.21 Exercises........................................... 249 13 TCP Reno and Congestion Management 253 13.1 Basics of TCP Congestion Management............................ 254 13.2 Slow Start............................................ 258 13.3 TCP Tahoe and Fast Retransmit................................ 262 13.4 TCP Reno and Fast Recovery................................. 264 13.5 TCP NewReno......................................... 266 13.6 SACK TCP........................................... 268 13.7 TCP and Bottleneck Link Utilization............................. 269 13.8 Single Packet Losses.....................................
Recommended publications
  • Openflow, in Proceedings of the Interna- Tional Conference on Pervasive Computing and Communication Workshops (Percom Workshops)
    Traffic Control for Multi-homed End-hosts via Software Defined Networking Anees Mohsin Hadi Al-Najjar B.Sc. (Computer Science), M.Sc. (Computer Science) A thesis submitted for the degree of Doctor of Philosophy at The University of Queensland in 2019 School of Information Technology & Electrical Engineering Abstract Software Defined Networking (SDN) is an emerging technology that allows computer networks to be more efficiently managed and controlled by providing a high level of abstraction and network programmability. Having powerful abstractions and pro- grammability via a centralised network controller provides new potential improve- ments to computer networks, such as easier network management, faster innovation and reduced cost. SDN has been successfully applied in wide area and data centre networks, and has achieved a significant improvement in network performance and efficiency. However, using SDN to control network traffic in end-host devices has not been investigated thoroughly. The research presented in this thesis aims to address this gap and inves- tigates the potential benefits of SDN for end-hosts. This thesis explores the feasibility of applying the SDN methodology to control network traffic on multi-homed end de- vices. The objective was to create a control mechanism by changing the network stack on the client in a way that is transparent to the application layer, the network infras- tructure, and other hosts on the network. In contrast to other solutions such as MPTCP, which require a protocol stack upgrade on all the participating nodes, the approach presented in this thesis allows quick and easy client-side-only deployment. This thesis presents an architecture for embedding SDN components, i.e.
    [Show full text]
  • Ipv6 for Helenos
    Charles University in Prague Faculty of Mathematics and Physics MASTER THESIS Mgr. Bc. Anton´ınSteinhauser IPv6 for HelenOS Department of Distributed and Dependable Systems Supervisor of the master thesis: Mgr. Martin Dˇeck´y Study programme: Informatics Specialization: Software Systems Prague 2013 I am much obliged to my thesis supervisor, Mgr. Martin Dˇeck´y,for his advices and hints in this research. I declare that I carried out this master thesis independently, and only with the cited sources, literature and other professional sources. I understand that my work relates to the rights and obligations under the Act No. 121/2000 Coll., the Copyright Act, as amended, in particular the fact that the Charles University in Prague has the right to conclude a license agreement on the use of this work as a school work pursuant to Section 60 paragraph 1 of the Copyright Act. In Prague date 18. 7. 2013 Anton´ınSteinhauser N´azevpr´ace:IPv6 for HelenOS Autor: Anton´ınSteinhauser Katedra: Katedra distribuovan´ych a spolehliv´ych syst´em˚u Vedouc´ıdiplomov´epr´ace: Mgr. Martin Dˇeck´y,Katedra distribuovan´ych a spolehliv´ych syst´em˚u Abstrakt: Tato pr´acerozˇsiˇrujeoperaˇcn´ısyst´emHelenOS o podporu nov´ehoIPv6 protokolu. Implementace protokolu IPv6 je na stejn´e´urovni jako dˇr´ıvˇejˇs´ıimple- mentace IPv4 protokolu. S´ıˇtov´ystack HelenOS nyn´ınab´ız´ıtˇrim´odypr´acese s´ıt´ı: uˇz´ıv´an´ıpouze IPv4 protokolu, uˇz´ıv´an´ıpouze IPv6 protokolu a du´aln´ım´od, kter´y umoˇzˇnujepouˇz´ıvat oba protokoly najednou. Pr´acepopisuje pˇredchoz´ıstav s´ıˇtov´ehostacku HelenOS, analyzuje rozd´ılymezi IPv4 protokolem a IPv6 protokolem a zd˚uvodˇnujejednotliv´astrategick´arozhod- nut´ı.
    [Show full text]
  • Shelf Manager User Guide (May 15, 2018) Page 1 / 321
    User Guide Pigeon Point Shelf Manager Release 3.7.1 May 15, 2018 nVent Schroff GmbH [email protected] www.pigeonpoint.com schroff.nVent.com This document is furnished under license and may be used or copied only in accordance with the terms of such license. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by nVent. nVent assumes no responsibility or liability for any errors or inaccuracies that may appear in this book. Except as permitted by such license, no part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, manual, recording, or otherwise, without the prior written permission of nVent. The Pigeon Point Shelf Manager uses an implementation of the MD5 Message-Digest algorithm that is derived from the RSA Data Security, Inc. MD5 Message-Digest algorithm. All nVent marks and logos are owned or licensed by nVent Services GmbH or its affiliates. All other trademarks are the property of their respective owners. nVent reserves the right to change specifications without notice. Pigeon Point Shelf Manager User Guide (May 15, 2018) Page 1 / 321 Table of contents 1 About this document 9 1.1 Shelf Manager documentation 9 1.1.1 Conventions used in this document 9 1.2 Additional resources 10 2 Introduction 11 2.1 In this section 11 2.2 Intelligent Platform Management: an ATCA overview 11 2.3 Pigeon Point Board Management Reference: hardware and firmware 14 2.4
    [Show full text]
  • Linux Audio Conference 2019
    Proceedings of the Linux Audio Conference 2019 March 23rd – 26th, 2019 Center for Computer Research in Music and Acoustics (CCRMA) Stanford University, USA “In Ping(uins) e trust! Published by CCRMA, Stanford University, California, US March 2019 All copyrights remain with the authors http://lac.linuxaudio.org/2019 ISBN 978-0-359-46387-9 Credits Layout: Frank Neumann and Romain Michon Typesetting: LATEX and pdfLaTeX Logo Design: The Linuxaudio.org logo and its variations copyright Thorsten Wilms c 2006, imported into "LAC 2014" logo by Robin Gareus Thanks to: Martin Monperrus for his webpage "Creating proceedings from PDF files" ii Partners and Sponsors Linuxaudio.org iii iv Foreword Welcome everyone to LAC 2019 at CCRMA! For the second time in its seventeen year history, the Linux Audio Conference (LAC) is hosted in the United Stated of America by the Center for Computer Research in Mu- sic and Acoustics (CCRMA) at Stanford University. With its informal workshop-like at- mosphere, LAC is a blend of scientific and technical papers, tutorials, sound installations, and concerts centered on the free GNU/Linux operating system and open-source free soft- ware for audio, multimedia, and musical applications. LAC is a unique platform during which members of this community gather to exchange ideas, draft new projects, and see old friends. In these times of increasing political tensions and of rising extremism throughout the world, we believe that emphasizing and promoting the universality of this type of event is of the utmost importance. The Linux audio community exists worldwide; we believe it should remain a priority to diversify LAC’s geographical location from year to year for the benefit of those who can’t afford to travel to the other side of the world.
    [Show full text]
  • WM PAN9420 Software Guide.Pdf
    PAN9420 Software Guide Rev. 1.0 Wireless Modules PAN9420 Wi-Fi Module By purchase of any of the products described in this document the customer accepts the document's validity and declares their agreement and understanding of its contents and recommendations. Panasonic Industrial Devices Europe GmbH (Panasonic) reserves the right to make changes as required at any time without notification. © Panasonic Industrial Devices Europe GmbH 2019. This document is copyrighted. Reproduction of this document is permissible only if reproduction is without alteration and is accompanied by all associated warranties, conditions, limitations, and notices. Do not disclose it to a third party. All rights reserved. This Software Guide does not lodge the claim to be complete and free of mistakes. The information contained herein is presented only as guidance for Product use. No responsibility is assumed by Panasonic for any infringement of patents or any other intellectual property rights of third parties that may result from the use of Product. No license to any intellectual property right is granted by this document, whether express or implied, by estoppel or otherwise. Description of hardware, software, and other information in this document is only intended to illustrate the functionality of the referred Panasonic product. It should not be construed as guaranteeing specific functionality of the product as described or suitable for a particular application. Any provided (source) code shall not be used or incorporated into any products or systems whose manufacture, use or sale is prohibited under any applicable laws or regulations. Any outlined or referenced (source) code within this document is provided on an “as is” basis without any right to technical support or updates and without warranty of any kind on a free of charge basis according to § 516 German Civil Law (BGB) including without limitation, any warranties or conditions of title, non-infringement, merchantability, or fitness for a particular purpose.
    [Show full text]
  • All-Type-Of-Attack
    Attack Types Documented by: Mr. Ahmed Khan Mr. Dipak Mr. Kannan Mr. Kiran Mr. Kulkarni Madunix Mr. Mohamed Iqbal Mr. Nitai Mr. Sagar Mr. Shrikanth Draft Copy : 01.03 Attacks • An attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. • Without proper security measures and controls in place, our data might be subjected to an attack. Some attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself. • Attacks can be Insider or via external Attacks Active Attacks: An active attack is a network exploit ation in which a hacker attempts to make changes to data on the target or data en route to the target. Passive Attacks: A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target. Active :Listens Passive : Modifies Man-In-The-Middle AKA MITM • It is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. Countermeasures • Digital signature • Mutual authentication Brute Force • A brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly • The attacker systematically checks all possible passwords and passphrases until the correct one is found. • When password guessing, this method is very fast when used to check all short passwords.
    [Show full text]
  • Prosafe Managed Switch Command Line Interface (CLI) User Manual
    ProSafe Managed Switch Command Line Interface (CLI) User Manual 10.0 GSM7328Sv2 GSM7352Sv2 GSM7228PS GSM7252PS M5300-28G3 M5300-52G3 M5300-28G-POE+ M5300-52G-POE+ M5300-28GF3 M5300-28G M5300-52G 350 East Plumeria Drive San Jose, CA 95134 USA November 2012 202-11054-02 1.0 ProSafe Managed Switch © 2012 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of NETGEAR, Inc. Technical Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, or get support online, visit us at http://support.netgear.com. Phone (US & Canada only): 1-888-NETGEAR Phone (Other Countries): See Support information card. Trademarks NETGEAR, the NETGEAR logo, ReadyNAS, ProSafe, Smart Wizard, Auto Uplink, X-RAID2, and NeoTV are trademarks or registered trademarks of NETGEAR, Inc. Microsoft, Windows, Windows NT, and Vista are registered trademarks of Microsoft Corporation. Other brand and product names are registered trademarks or trademarks of their respective holders. Statement of Conditions To improve internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use, or application of, the product(s) or circuit layout(s) described herein. Revision History Publication Part Version Publish DateComments Number 202-11054-02 1.0 November 2012 Added mixed stacking commands. 202-11054-01 1.0 August 2012 Replaced the private group commands with private VLAN commands, replaced the Auto-Voice over IP Commands chapter, and added iSCSI commands.
    [Show full text]
  • Binding Request in Wireshark
    Binding Request In Wireshark Unassisting and wonderful Richmond still salved his warships temporarily. Lao Lamar relocated no abstractors deciding gelidly after Truman refurnishes tunelessly, quite afflictive. Gail is veloce well-directed after exploitive Si glooms his plunderers plum. One inside of the activity appears as direct peer, in binding wireshark Confidentiality for the application data relayed by TURN is best provided by the application protocol itself, since running TURN over TLS does not protect application data between the server and the peer. DNS works in detail. Each message format specifies the location of the verifier, which always follows any stub data, if applicable. Fi network can see all traffic, purely due to the nature of radio communication. CODE attribute is used in error response messages. Complex networks can consist of thousands of LANs connected through thousands of routers worldwide. When i connect the computer directly to a cable modem, it works. If the snapshot length is not set specifically, the default snapshot length is used if provided. Run wireshark on a list of packets wrpcap Write a list of packets to a pcap file Some of these functions we have used others I will let you play around with yourself. Malware, or MBAM, to scan your computer for any any infections or adware that may be present. Do you have some idea where the problem could come from? Another thought I had was file sharing. SR at any time. We have an issue in our setup. Other usages may use other means to prevent these attacks. SIP Invite spoof capture.
    [Show full text]
  • Microchip TCP/IP Lite Stack
    AN1921 Microchip TCP/IP Lite Stack KB Flash (TCP/IP), while still having a fully functional Authors: Janaki Kuruganti, TCP/IPv4 stack. The stack will allow users to add wired Alin Stoicescu, communication and interoperability with other systems Marius Cristea, to their applications over Ethernet. Microchip Technology Inc. The Microchip TCP/IP Lite Stack is implemented in a configurable and modular way, allowing users to INTRODUCTION include only the intended features or functionalities to their application. The stack is written in C programming This application note describes the structure and the language and it is intended to be compiled with the interface for the Microchip Transmission Control MPLAB® XC8 compiler. Protocol/Internet Protocol (TCP/IP) Lite Stack library, and includes some simple example applications using MPLAB® Code Configurator (MCC). The purpose of TCP/IP STACK ARCHITECTURE the implementation is to provide an optimized (low The TCP/IP Lite library implementation is based on the Flash and RAM footprint) TCP/IP stack for TCP/IP communication model, as shown in Figure 1: microcontrollers with 8 KB Flash (UDP only) and 16 FIGURE 1: MULTILAYER TCP/IP COMMUNICATION MODEL 2015-2017 Microchip Technology Inc. DS00001921D-page 1 AN1921 The TCP/IP stack is divided into multiple layers controller starts dropping the received packets if it does (Figure 1). Each layer in the Microchip TCP/IP Lite not have enough memory left to store the incoming Stack can directly access one or more layers situated packets. above or below it. Ethernet packets to be transmitted are also built and The TCP/IP stack needs a background task called kept in the Ethernet controller’s memory.
    [Show full text]
  • Networking and TCP/IP Stack for Helenos System
    Charles University in Prague Faculty of Mathematics and Physics MASTER THESIS Bc. Luk´aˇsMejdrech Networking and TCP/IP stack for HelenOS system Department of Software Engineering Master thesis supervisor: Mgr. Martin Dˇeck´y Study programme: Computer Science, Software systems 2009 Acknowledgements I wish to thank to my thesis supervisor, Mgr. Martin Dˇeck´y, for his advice and direction in this research. I owe the greatest gratitude to my family, for making this thesis possible and their constant patience and support. I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. I agree with lending and publishing this work. Prohlaˇsuji, ˇze jsem svou diplomovou pr´aci napsal samostatnˇea v´yhradnˇes pouˇzit´ım citovan´ych pramen˚u. Souhlas´ım se zap˚ujˇcov´an´ım pr´ace a jej´ım zveˇrejˇnov´an´ım. In Prague Bc. Luk´aˇsMejdrech 2 N´azev pr´ace: Networking a TCP/IP stack pro syst´em HelenOS Autor: Bc. Luk´aˇsMejdrech Katedra: Katedra softwarov´eho inˇzen´yrstv´ı Vedouc´ıpr´ace: Mgr. Martin Dˇeck´y E-mail vedouc´ıho: [email protected]ff.cuni.cz Abstrakt: V t´eto pr´aci studujeme implementaci TCP/IP subsyst´emu. D˚uraz je kladen na n´avrh a implementaci respektuj´ıc´ıkoncept operaˇcn´ıho syst´emu s mikroj´adrem. Praktickou ˇc´ast´ıpak byl v´yvoj TCP/IP subsyst´emu pro syst´em HelenOS. Nejprve jsou pops´any koncepty s´ıt’ov´earchitektury a TCP/IP subsyst´emu obecnˇe. N´asleduj´ı specifick´easpekty kladen´esyst´emem s mikroj´adrem.
    [Show full text]
  • Investigating Methods for Measuring Network Convergence Times
    Mälardalen University School of Innovation Design and Engineering Västerås, Sweden Thesis for the Degree of Master of Science in Computer Science with Specialization in Embedded Systems 30.0 credits INVESTIGATING METHODS FOR MEASURING NETWORK CONVERGENCE TIMES Jakob Danielsson [email protected] Tobias Andersson [email protected] Examiner: Thomas Nolte Mälardalen University, Västerås, Sweden Supervisor: Mohammad Ashjaei Mälardalen University, Västerås, Sweden Company supervisor: Thomas Sörensen, Westermo, Västerås, Vallby Institutet June 10, 2016 Mälardalen University Master Thesis Table of Contents 1 Introduction 5 1.1 Motivation........................................6 1.2 Thesis outline.......................................6 2 Background 7 2.1 The OSI model......................................7 2.2 Convergence time in layer 2...............................7 2.2.1 FRNT - Fast Reconfiguration of Network Topology..............8 2.2.2 FRNT Ring Coupling..............................8 2.2.3 Multi-Link Dual Homing............................8 2.2.4 Rapid spanning tree protocol - RSTP and STP................8 2.3 Convergence time in layer 3...............................9 2.3.1 RIP - Routing Information Protocol......................9 2.3.2 OSPF - Open Shortest Path First.......................9 2.3.3 VRRP - Virtual router redundancy protocol..................9 2.4 Convergence measurement tools............................. 10 2.5 The Linux operating system............................... 10 3 Related Work 11 4 Problem Formulation
    [Show full text]
  • Citrix-Workspace-App-For-Mac.Pdf
    Citrix Workspace app for Mac Citrix Product Documentation | docs.citrix.com September 29, 2021 Citrix Workspace app for Mac Contents About this release 3 System requirements and compatibility 27 Install, Uninstall, and Upgrade 32 Configure 34 Authenticate 70 Secure communications 72 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Workspace app for Mac About this release September 29, 2021 Important Starting with macOS Catalina, Apple has enforced extra requirements for root CA certificates and intermediate certificates which administrators must configure. For more information, see Apple Support article HT210176. What’s new in 2109 Note: If Service continuity is enabled, and you upgrade to version 2109, the connection lease files are refreshed. All the existing leases are deleted and new leases are fetched as part of functionality enhancements. Citrix Workspace app for Mac on macOS Monterey Beta Citrix Workspace app 2109 for Mac has been tested on macOS Monterey Beta 7. Please use this setup in a test environment and provide your feedback. Caution: Do not use Citrix Workspace app for Mac on macOS Monterey Beta versions in production envi‑ ronments. Email‑based auto‑discovery of store With this release, you can simply provide your email address in Citrix Workspace app for Mac to au‑ tomatically discover the store associated with the email address. If there are multiple stores associ‑ ated with a domain, then by default the first store returned by the Global App Configuration Service is added as the store of choice for logging in and accessing a store. Users can always switch to another store if necessary.
    [Show full text]