Spanning Tree Protocol (STP)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
15-744: Computer Networking Multicast Routing Example Applications Overview
Multicast Routing • Unicast: one source to one destination • Multicast: one source to many destinations 15-744: Computer Networking • Two main functions: • Efficient data distribution • Logical naming of a group L-20 Multicast 2 Example Applications Overview • Broadcast audio/video • IP Multicast Service Basics • Push-based systems • Software distribution • Multicast Routing Basics • Web-cache updates • Teleconferencing (audio, video, shared • Overlay Multicast whiteboard, text editor) • Multi-player games • Reliability • Server/service location • Other distributed applications • Congestion Control 3 4 1 IP Multicast Architecture Multicast – Efficient Data Distribution Src Src Service model Hosts Host-to-router protocol (IGMP) Routers Multicast routing protocols (various) 5 6 Multicast Router Responsibilities IP Multicast Service Model (rfc1112) • Learn of the existence of multicast groups • Each group identified by a single IP address (through advertisement) • Groups may be of any size • Identify links with group members • Members of groups may be located anywhere in the Internet • Establish state to route packets • Members of groups can join and leave at will • Replicate packets on appropriate interfaces • Senders need not be members • Routing entry: • Group membership not known explicitly • Analogy: Src, incoming interface List of outgoing interfaces • Each multicast address is like a radio frequency, on which anyone can transmit, and to which anyone can tune-in. 7 8 2 IP Multicast Addresses Multicast Scope Control – Small TTLs • Class -
Impact Analysis of System and Network Attacks
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DigitalCommons@USU Utah State University DigitalCommons@USU All Graduate Theses and Dissertations Graduate Studies 12-2008 Impact Analysis of System and Network Attacks Anupama Biswas Utah State University Follow this and additional works at: https://digitalcommons.usu.edu/etd Part of the Computer Sciences Commons Recommended Citation Biswas, Anupama, "Impact Analysis of System and Network Attacks" (2008). All Graduate Theses and Dissertations. 199. https://digitalcommons.usu.edu/etd/199 This Thesis is brought to you for free and open access by the Graduate Studies at DigitalCommons@USU. It has been accepted for inclusion in All Graduate Theses and Dissertations by an authorized administrator of DigitalCommons@USU. For more information, please contact [email protected]. i IMPACT ANALYSIS OF SYSTEM AND NETWORK ATTACKS by Anupama Biswas A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE in Computer Science Approved: _______________________ _______________________ Dr. Robert F. Erbacher Dr. Chad Mano Major Professor Committee Member _______________________ _______________________ Dr. Stephen W. Clyde Dr. Byron R. Burnham Committee Member Dean of Graduate Studies UTAH STATE UNIVERSITY Logan, Utah 2008 ii Copyright © Anupama Biswas 2008 All Rights Reserved iii ABSTRACT Impact Analysis of System and Network Attacks by Anupama Biswas, Master of Science Utah State University, 2008 Major Professor: Dr. Robert F. Erbacher Department: Computer Science Systems and networks have been under attack from the time the Internet first came into existence. There is always some uncertainty associated with the impact of the new attacks. -
Transparent LAN Service Over Cable
Transparent LAN Service over Cable This document describes the Transparent LAN Service (TLS) over Cable feature, which enhances existing Wide Area Network (WAN) support to provide more flexible Managed Access for multiple Internet service provider (ISP) support over a hybrid fiber-coaxial (HFC) cable network. This feature allows service providers to create a Layer 2 tunnel by mapping an upstream service identifier (SID) to an IEEE 802.1Q Virtual Local Area Network (VLAN). Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://tools.cisco.com/ITDIT/CFN/. An account on http:// www.cisco.com/ is not required. Contents • Hardware Compatibility Matrix for Cisco cBR Series Routers, page 2 • Prerequisites for Transparent LAN Service over Cable, page 2 • Restrictions for Transparent LAN Service over Cable, page 3 • Information About Transparent LAN Service over Cable, page 3 • How to Configure the Transparent LAN Service over Cable, page 6 • Configuration Examples for Transparent LAN Service over Cable, page 8 • Verifying the Transparent LAN Service over Cable Configuration, page 10 • Additional References, page 11 • Feature Information for Transparent LAN Service over Cable, page 12 Cisco Converged Broadband Routers Software Configuration Guide For DOCSIS 1 Transparent LAN Service over Cable Hardware Compatibility Matrix for Cisco cBR Series Routers Hardware Compatibility Matrix for Cisco cBR Series Routers Note The hardware components introduced in a given Cisco IOS-XE Release are supported in all subsequent releases unless otherwise specified. -
Strongly Connected Component
Graph IV Ian Things that we would talk about ● DFS ● Tree ● Connectivity Useful website http://codeforces.com/blog/entry/16221 Recommended Practice Sites ● HKOJ ● Codeforces ● Topcoder ● Csacademy ● Atcoder ● USACO ● COCI Term in Directed Tree ● Consider node 4 – Node 2 is its parent – Node 1, 2 is its ancestors – Node 5 is its sibling – Node 6 is its child – Node 6, 7, 8 is its descendants ● Node 1 is the root DFS Forest ● When we do DFS on a graph, we would obtain a DFS forest. Noted that the graph is not necessarily a tree. ● Some of the information we get through the DFS is actually very useful, such as – Starting time of a node – Finishing time of a node – Parent of the node Some Tricks Using DFS Order ● Suppose vertex v is ancestor(not only parent) of u – Starting time of v < starting time of u – Finishing time of v > starting time of u ● st[v] < st[u] <= ft[u] < ft[v] ● O(1) to check if ancestor or not ● Flatten the tree to store subtree information(maybe using segment tree or other data structure to maintain) ● Super useful !!!!!!!!!! Partial Sum on Tree ● Given queries, each time increase all node from node v to node u by 1 ● Assume node v is ancestor of node u ● sum[u]++, sum[par[v]]-- ● Run dfs in root dfs(v) for all child u dfs(u) d[v] = d[v] + d[u] Types of Edges ● Tree edges – Edges that forms a tree ● Forward edges – Edges that go from a node to its descendants but itself is not a tree edge. -
Ieee 802.1 for Homenet
IEEE802.org/1 IEEE 802.1 FOR HOMENET March 14, 2013 IEEE 802.1 for Homenet 2 Authors IEEE 802.1 for Homenet 3 IEEE 802.1 Task Groups • Interworking (IWK, Stephen Haddock) • Internetworking among 802 LANs, MANs and other wide area networks • Time Sensitive Networks (TSN, Michael David Johas Teener) • Formerly called Audio Video Bridging (AVB) Task Group • Time-synchronized low latency streaming services through IEEE 802 networks • Data Center Bridging (DCB, Pat Thaler) • Enhancements to existing 802.1 bridge specifications to satisfy the requirements of protocols and applications in the data center, e.g. • Security (Mick Seaman) • Maintenance (Glenn Parsons) IEEE 802.1 for Homenet 4 Basic Principles • MAC addresses are “identifier” addresses, not “location” addresses • This is a major Layer 2 value, not a defect! • Bridge forwarding is based on • Destination MAC • VLAN ID (VID) • Frame filtering for only forwarding to proper outbound ports(s) • Frame is forwarded to every port (except for reception port) within the frame's VLAN if it is not known where to send it • Filter (unnecessary) ports if it is known where to send the frame (e.g. frame is only forwarded towards the destination) • Quality of Service (QoS) is implemented after the forwarding decision based on • Priority • Drop Eligibility • Time IEEE 802.1 for Homenet 5 Data Plane Today • 802.1Q today is 802.Q-2011 (Revision 2013 is ongoing) • Note that if the year is not given in the name of the standard, then it refers to the latest revision, e.g. today 802.1Q = 802.1Q-2011 and 802.1D -
Network Design Reference for Avaya Virtual Services Platform 4000 Series
Network Design Reference for Avaya Virtual Services Platform 4000 Series Release 4.1 NN46251-200 Issue 05.01 January 2015 © 2015 Avaya Inc. applicable number of licenses and units of capacity for which the license is granted will be one (1), unless a different number of All Rights Reserved. licenses or units of capacity is specified in the documentation or other Notice materials available to You. “Software” means computer programs in object code, provided by Avaya or an Avaya Channel Partner, While reasonable efforts have been made to ensure that the whether as stand-alone products, pre-installed on hardware products, information in this document is complete and accurate at the time of and any upgrades, updates, patches, bug fixes, or modified versions printing, Avaya assumes no liability for any errors. Avaya reserves thereto. “Designated Processor” means a single stand-alone the right to make changes and corrections to the information in this computing device. “Server” means a Designated Processor that document without the obligation to notify any person or organization hosts a software application to be accessed by multiple users. of such changes. “Instance” means a single copy of the Software executing at a Documentation disclaimer particular time: (i) on one physical machine; or (ii) on one deployed software virtual machine (“VM”) or similar deployment. “Documentation” means information published by Avaya in varying mediums which may include product information, operating Licence types instructions and performance specifications that Avaya may generally Designated System(s) License (DS). End User may install and use make available to users of its products and Hosted Services. -
CLRS B.4 Graph Theory Definitions Unit 1: DFS Informally, a Graph
CLRS B.4 Graph Theory Definitions Unit 1: DFS informally, a graph consists of “vertices” joined together by “edges,” e.g.,: example graph G0: 1 ···················•······························· ····························· ····························· ························· ···· ···· ························· ························· ···· ···· ························· ························· ···· ···· ························· ························· ···· ···· ························· ············· ···· ···· ·············· 2•···· ···· ···· ··· •· 3 ···· ···· ···· ···· ···· ··· ···· ···· ···· ···· ···· ···· ···· ···· ···· ···· ······· ······· ······· ······· ···· ···· ···· ··· ···· ···· ···· ···· ···· ··· ···· ···· ···· ···· ···· ···· ···· ···· ···· ···· ··············· ···· ···· ··············· 4•························· ···· ···· ························· • 5 ························· ···· ···· ························· ························· ···· ···· ························· ························· ···· ···· ························· ····························· ····························· ···················•································ 6 formally a graph is a pair (V, E) where V is a finite set of elements, called vertices E is a finite set of pairs of vertices, called edges if H is a graph, we can denote its vertex & edge sets as V (H) & E(H) respectively if the pairs of E are unordered, the graph is undirected if the pairs of E are ordered the graph is directed, or a digraph two vertices joined by an edge -
Linear Algebraic Techniques for Spanning Tree Enumeration
LINEAR ALGEBRAIC TECHNIQUES FOR SPANNING TREE ENUMERATION STEVEN KLEE AND MATTHEW T. STAMPS Abstract. Kirchhoff's Matrix-Tree Theorem asserts that the number of spanning trees in a finite graph can be computed from the determinant of any of its reduced Laplacian matrices. In many cases, even for well-studied families of graphs, this can be computationally or algebraically taxing. We show how two well-known results from linear algebra, the Matrix Determinant Lemma and the Schur complement, can be used to elegantly count the spanning trees in several significant families of graphs. 1. Introduction A graph G consists of a finite set of vertices and a set of edges that connect some pairs of vertices. For the purposes of this paper, we will assume that all graphs are simple, meaning they do not contain loops (an edge connecting a vertex to itself) or multiple edges between a given pair of vertices. We will use V (G) and E(G) to denote the vertex set and edge set of G respectively. For example, the graph G with V (G) = f1; 2; 3; 4g and E(G) = ff1; 2g; f2; 3g; f3; 4g; f1; 4g; f1; 3gg is shown in Figure 1. A spanning tree in a graph G is a subgraph T ⊆ G, meaning T is a graph with V (T ) ⊆ V (G) and E(T ) ⊆ E(G), that satisfies three conditions: (1) every vertex in G is a vertex in T , (2) T is connected, meaning it is possible to walk between any two vertices in G using only edges in T , and (3) T does not contain any cycles. -
Networking Packet Broadcast Storms
Lesson Learned Networking Packet Broadcast Storms Primary Interest Groups Balancing Authorities (BAs) Generator Operators (GOPs) Reliability Coordinators (RCs) Transmission Operators (TOPs) Transmission Owners (TOs) that own and operate an Energy Management System (EMS) Problem Statement When a second network cable was connected from a voice over internet protocol (VOIP) phone to a network switch lacking proper settings, a packet broadcast storm prevented network communications from functioning, and supervisory control and data acquisition (SCADA) was lost for several hours. Broadcast storm events have also arisen from substation local area network (LAN) issues. Details A conference room was set up for a training class that needed to accommodate multiple PCs. The bridge protocol data unit (BPDU) packet propagation prevention setting was disabled on a port in the conference room in order to place a network switch off of that port. Upon completion of the training, the network switch was removed; however, the BPDU packet propagation setting was inadvertently not restored. As part of a telephone upgrade project, the traditional phone in this conference room was recently replaced by a VOIP phone. Later, an additional network cable was connected to the output port of this VOIP phone into a secondary network jack within the conference room. When the second network cable was connected from a VOIP phone to a network switch lacking proper settings, a switching loop resulted. Spanning tree protocol is normally used to prevent switching loops from propagating broadcast packets continuously until the network capacity is overwhelmed. A broadcast packet storm from the switching loop prevented network communications from functioning and SCADA was lost for several hours. -
Graph Theory
1 Graph Theory “Begin at the beginning,” the King said, gravely, “and go on till you come to the end; then stop.” — Lewis Carroll, Alice in Wonderland The Pregolya River passes through a city once known as K¨onigsberg. In the 1700s seven bridges were situated across this river in a manner similar to what you see in Figure 1.1. The city’s residents enjoyed strolling on these bridges, but, as hard as they tried, no residentof the city was ever able to walk a route that crossed each of these bridges exactly once. The Swiss mathematician Leonhard Euler learned of this frustrating phenomenon, and in 1736 he wrote an article [98] about it. His work on the “K¨onigsberg Bridge Problem” is considered by many to be the beginning of the field of graph theory. FIGURE 1.1. The bridges in K¨onigsberg. J.M. Harris et al., Combinatorics and Graph Theory , DOI: 10.1007/978-0-387-79711-3 1, °c Springer Science+Business Media, LLC 2008 2 1. Graph Theory At first, the usefulness of Euler’s ideas and of “graph theory” itself was found only in solving puzzles and in analyzing games and other recreations. In the mid 1800s, however, people began to realize that graphs could be used to model many things that were of interest in society. For instance, the “Four Color Map Conjec- ture,” introduced by DeMorgan in 1852, was a famous problem that was seem- ingly unrelated to graph theory. The conjecture stated that four is the maximum number of colors required to color any map where bordering regions are colored differently. -
IEEE 1588 Frequency and Time & Phase Profiles at ITU-T
IEEE 1588 Frequency and Time & phase profiles at ITU-T Silvana Rodrigues, System Engineering, IDT , [email protected] WSTS - 2013, San Jose ©2009 Integrated Device Technology, Inc. Agenda ● IEEE-1588TM Profile ● ITU-T G.8265.1 – Frequency Profile ● ITU-T G.8275.1 – Time and Phase Profile ● ITU-T G.8275.2 – Time and Phase Profile with partial support from the network IEEE 1588TM is a trademark of its respective owner www.IDT.com PAGE 2 CONFIDENTIAL IEEE-1588 Profiles ● IEEE-1588 defines profile as “The set of allowed Precision Time Protocol (PTP) features applicable to a device” ● “The purpose of a PTP profile is to allow organizations to specify specific selections of attribute values and optional features of PTP that, when using the same transport protocol, inter-work and achieve a performance that meets the requirements of a particular application.” ● A PTP profile should define ● Best master clock algorithm options ● Configuration management options ● Path delay mechanisms (peer delay or delay request-response) ● The range and default values of all PTP configurable attributes and data set members ● The transport mechanisms required, permitted, or prohibited ● The node types required, permitted, or prohibited ● The options required, permitted, or prohibited * IEEE Std 1588-2008 IEEE Standard for a Precision Clock Synchronization Protocol, copyright 2008 IEEE. All right reserved. www.IDT.com PAGE 3 CONFIDENTIAL ITU-T FREQUENCY PROFILE www.IDT.com PAGE 4 CONFIDENTIAL ITU-T G.8265.1 Frequency Profile IEEE-1588 without support from -
Vizing's Theorem and Edge-Chromatic Graph
VIZING'S THEOREM AND EDGE-CHROMATIC GRAPH THEORY ROBERT GREEN Abstract. This paper is an expository piece on edge-chromatic graph theory. The central theorem in this subject is that of Vizing. We shall then explore the properties of graphs where Vizing's upper bound on the chromatic index is tight, and graphs where the lower bound is tight. Finally, we will look at a few generalizations of Vizing's Theorem, as well as some related conjectures. Contents 1. Introduction & Some Basic Definitions 1 2. Vizing's Theorem 2 3. General Properties of Class One and Class Two Graphs 3 4. The Petersen Graph and Other Snarks 4 5. Generalizations and Conjectures Regarding Vizing's Theorem 6 Acknowledgments 8 References 8 1. Introduction & Some Basic Definitions Definition 1.1. An edge colouring of a graph G = (V; E) is a map C : E ! S, where S is a set of colours, such that for all e; f 2 E, if e and f share a vertex, then C(e) 6= C(f). Definition 1.2. The chromatic index of a graph χ0(G) is the minimum number of colours needed for a proper colouring of G. Definition 1.3. The degree of a vertex v, denoted by d(v), is the number of edges of G which have v as a vertex. The maximum degree of a graph is denoted by ∆(G) and the minimum degree of a graph is denoted by δ(G). Vizing's Theorem is the central theorem of edge-chromatic graph theory, since it provides an upper and lower bound for the chromatic index χ0(G) of any graph G.