Overview of the IP Quality Monitor (IQM) Solution Edition 2018-11-14

Total Page:16

File Type:pdf, Size:1020Kb

Overview of the IP Quality Monitor (IQM) Solution Edition 2018-11-14 Overview of the IP Quality Monitor (IQM) solution Edition 2018-11-14 Overview of the IP Quality Monitor (IQM) solution Purpose of IQM IP Quality Monitor (IQM) is a hardware-software system intended for measurement, monitoring and management of network quality parameters and network performance. Any of network topologies are supported for monitoring. The system also takes into consideration a set of characteristics as technical and abstract. Such as: traffic parameters, network architectural levels, service levels, zonal structure, geography and etc. System supports a lot of standard measurement methods on different network layers of OSI model: from L2 (data channel layer) – up to L7 (application layer). Also system has possibility for receiving data from external sources with wide variety of methods: SNMP, CLI, HTTP, etc. For non-standard methods system provides programmable tests. Any abstract data can be received with programmable test. Thus, the IQM agents can work as adapters for data acquisition for the further analysis, monitoring, alarming and presentation. The functional composition of IQM From the technical point of view, IP Quality Monitor consists of two basic elements: quality measurement agents IQMA (IQM-Agent) and management system IQMM (IQM- Manager). The quality measurement agents (IQMA) are software and hardware systems producing automated measurement of quality parameters using internal or standard protocols. Agents can initiate the test sessions, as well as accept requests from other agents for the quality measurements. The test session consists of traffic exchange between initiating agent and test responder. Traffic delivery parameters are measuring during test session. There are a lot of types of tests available for measuring different network layers. The management system (IQMM) performs the following tasks: • Management of IQM subsystems, • Configuration and agent’s status monitoring, • Data receiving, storing, analysis, • Alarming on critical states, • Data presentation with wide variety of tools: graphs, tables, diagrams, standard and custom reports, LLC “Network Probe” Address: 123557, Moscow, Presnensky Val Street, house 27, structure 11 e-Mail: [email protected] Web: www.net-probe.ru 1 Overview of the IP Quality Monitor (IQM) solution Edition 2018-11-14 • Limited access to data in personal account, • Administration. Approach to measurements The traditional approach is applied to the quality parameters measurement: specialized network devices – quality measurement agents IQMA are placed on the key network nodes. Network quality parameters are measured during emulated test traffic exchange between agents or between agent and network service/host/device. Test traffic is formed and shaped in accordance with configuration. Test configuration is stored on initiating agent and synchronized with IQMM database. Using agents on key network nodes will facilitate further processes of network troubleshooting. Thus, for example, it is possible to carry out quality management on the last miles – one of the most problematic divisions of a network. Last mile parameters Core parameters Last mile parameters Agent Test Agent Test Agent Тест LAN LAN VPN Agent Last mile Last mile DMZ Test Agent End-to-end parameters Moments for test starting can be defined in configuration of scheduler as follows: • With pre-defined periods beginning with some moment, • In specific moments pre-defined in cron-like templates • On demand Before each test session agents create a signaling connection with responder and authorize each other with hand-shake. Signaling connection is used to send test configuration to responder and receive measurements from it. The both agents send and receive test traffic-flows for bi-directional measurements. LLC “Network Probe” Address: 123557, Moscow, Presnensky Val Street, house 27, structure 11 e-Mail: [email protected] Web: www.net-probe.ru 2 Overview of the IP Quality Monitor (IQM) solution Edition 2018-11-14 Parameters Each of agents measures traffic delivery parameters in their directions. Parameters measured on OSI L3/4 are: • Packet loss in each direction (as % to total expected packets, and in pieces), • Round-trip times (Min/Avg/Max), • One-way delays in each direction (Min/Avg/Max), • Packet delay variation (Jitter) in each direction, • Rate (Speed) of packets reception for each direction (as % ratio to expected norm, and as bits per second), • Volume of packets received in each direction, • Percentage of reclassified packages received in each direction, • Out of Order - percentage of packets, received in wrong order Test traffic can be configured with different parameters: packet size, VLAN-interfaces, ports, generation speed, class of service etc. LLC “Network Probe” Address: 123557, Moscow, Presnensky Val Street, house 27, structure 11 e-Mail: [email protected] Web: www.net-probe.ru 3 Overview of the IP Quality Monitor (IQM) solution Edition 2018-11-14 Data filtering All measured data are being gathered on management system IQMM. Generally, agents push data to core-system. After IQMM data is inserted into database and processed by various mechanisms: violation-detection, alarming, aggregation etc. After data are entered in the database, they become available for presentation in the web interface. Web-interface provides wide variety of tools for data presentation: graphs, tables, diagrams, standard and custom reports. Custom reports makes possible preparation of customized table reports based on the data stored in database. All reports are exported in excel- compatible format. Filters are used for generation of any type of report. Filters provide the ability to filter the data requested by various features: customers, providers, services, network architectural levels, zonal structure, agents, tests, classes of service, measured parameters. Regular expressions could be used for selections. All features in filters are grouped in accordion. Control policies Policies act for arbitrary group of parameters. Policies use thresholds to divide parameter state into some number of critical zones. Violation takes place when number of threshold excesses more or equal to the number specified in policy. Each violation of threshold could be binded with specific alarming model. Available thresholds are: • Green: limit of normal value. LLC “Network Probe” Address: 123557, Moscow, Presnensky Val Street, house 27, structure 11 e-Mail: [email protected] Web: www.net-probe.ru 4 Overview of the IP Quality Monitor (IQM) solution Edition 2018-11-14 • Yellow: limit of high value. • Red: maximum limit. • Blue: minimum limit. On transition of parameter's state from one critical zone to another it is possible to execute series of alarming: • Notification in special forms of WEB-interface: alarm dashboards, alarm flows, GIS • e-Mail, • SNMP-trap, • syslog, • external procedure call allows to employ any desirable way of notification: HTTP, SQL etc. Support of third-party agents IQM system provides ability for working with agents of other vendors. • Cisco: IP SLA agent built in IOS • Juniper: RPM agent built in JUNOS • Accedian Networks. EtherNID, MetroNID etc. • Rad: via TWAMP-Light Rad MiNID. • Any network devices with support of TWAMP (RFC5357) In case of absence any of supported agents is possible to use any network host with support of UDP/ICMP-echo services. Tests with UDP/ICMP-echo will give only round-trip measurements and one-way will be inaccessible. Anyway in many cases this will be enough. Using programmable test-type it is possible to perform SNMP/CLI-commands on routers, switches, hosts and receive results of command execution for example Cisco SNMP ping, Cisco CLI ping. This approach allows to perform testing in network segments without plugging agents in customer’s addressing plan. LLC “Network Probe” Address: 123557, Moscow, Presnensky Val Street, house 27, structure 11 e-Mail: [email protected] Web: www.net-probe.ru 5 Overview of the IP Quality Monitor (IQM) solution Edition 2018-11-14 Application Layer services On application level (OSI L7) IQMA supports the following built in protocols: FTP, HTTP, IMAP, RTSP, SMTP, TFTP, DNS, +. For application level tests supports the following options: • SSL (Secure Sockets Layer). Thus, secured protocols are available, for example HTTPS, FTPS etc; • Reuse of one TCP session for multiple content downloads. This can be useful for influencing the TCP-window and speeding up the TCP connection; • Class of services; • URL-based authorization; • For HTTP application: cookies, HTTP redirect, HTTP persistent connection (HTTP keep-alive) Programmable test-type allows to develop any kind of application and arbitrary scenario of testing. Bandwidth While investigating bandwidth it is interesting to discover available and used bandwidth. Usually there is no need in regular measurement of available bandwidth. Generally it is one-time task which appears on stage of acceptance the channel in maintenance or in case of customer’s complaints. In this case it is recommended to run stress-load tests in on-demand mode or in nighttime using cron-like scheduler template. Let’s consider the network with support of differentiated serving for different classes of service (CoS). It is worth to support Best-effort traffic without any guarantee that its data is delivered. Best-effort obtains unpredictable delivery service, i.e. unspecified variable bit rate and latency and packet loss, depending on the current traffic load. Best-Effort traffic will be suppressed by any priority traffic. In contrast,
Recommended publications
  • Marvell ARMADA™ 16X Plug Computer Development
    Cover Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Doc. No. MV-S400320-00, Rev. - December 2010 Marvell. Moving Forward Faster Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Document Conventions Note: Provides related information or information of special importance. Caution: Indicates potential damage to hardware or software, or loss of data. Warning: Indicates a risk of personal injury. Document Status Doc Status: Preliminary Technical Publication: x.xx For more information, visit our website at: www.marvell.com Disclaimer No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the information, text, graphics, or other items contained within this document. Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use Marvell products in these types of equipment or applications. With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees: 1) Not to re-export or release any such information consisting of technology, software or source code controlled for national security reasons by the U.S.
    [Show full text]
  • Pen Testing with Pwn Plug
    toolsmith ISSA Journal | March 2012 Pen Testing with Pwn Plug By Russ McRee – ISSA Senior Member, Puget Sound (Seattle), USA Chapter Prerequisites one who owns a Sheevaplug: “Pwn Plug Community Edition does not include the web-based Plug UI, 3G/GSM support, Sheevaplug1 NAC/802.1x bypass.” 4GB SD card (needed for installation) For those of you interested in a review of the remaining fea- tures exclusive to commercial versions, I’ll post it to my blog Dedicated to the memory of Tareq Saade 1983-2012: on the heels of this column’s publishing. Dave provided me with a few insights including the Pwn This flesh and bone Plug’s most common use cases: Is just the way that we are tied in But there’s no one home • Remote, low-cost pen testing: penetration test cus- I grieve for you –Peter Gabriel tomers save on travel expenses; service providers save on travel time. • Penetration tests with a focus on physical security and s you likely know by now given toolsmith’s position social engineering. at the back of the ISSA Journal, March’s theme is • Data leakage/exfiltration testing: using a variety of co- A Advanced Threat Concepts and Cyberwarfare. Well, vert channels, the Pwn Plug is able to tunnel through dear reader, for your pwntastic reading pleasure I have just many IDS/IPS solutions and application-aware fire- the topic for you. The Pwn Plug can be considered an ad- walls undetected. vanced threat and useful in tactics that certainly resemble Information security training: the Pwn Plug touches cyberwarfare methodology.
    [Show full text]
  • Plugcomputer
    Fakultat¨ Informatik Institut f ¨urTechnische Informatik, Professur f ¨urVLSI-Entwurfssysteme, Diagnostik und Architektur PLUGCOMPUTER Alte Idee, Neuer Ansatz Thomas Gartner¨ Dresden, 14.7.2010 Ubersicht¨ Motivation Alte Idee: NSLU2 Neuer Ansatz: PlugComputer Quellen TU Dresden, 14.7.2010 PlugComputer Folie 2 von 24 Motivation Problemstellung Wie kann ich meine personlichen¨ Daten und Dateien moglichst¨ effizient, f ¨urmich und ausgewahlte¨ Personen, ¨uberallund immer verf ¨ugbarmachen? • Soziale Netzwerke • Hostingdienste wie z.B. Flickr, Google Suite, YouTube . • Server anmieten Probleme: • Daten ¨ubergabean Dritte • Dienste wegen ihrer Große¨ f ¨urAngreifer attraktiv TU Dresden, 14.7.2010 PlugComputer Folie 3 von 24 Motivation Losungsansatz¨ Idee: Eigener Server im eigenen, sicheren Netz das inzwischen meistens ohnehin standig¨ mit dem Internet verbunden ist. Vorteile: • Beschrankter¨ physikalischer Zugang f ¨urDritte • Voll anpassbar Nachteile: • Konfigurationsaufwand • Energieverbrauch • Larm¨ • Verantwortung f ¨urdie eigenen Daten TU Dresden, 14.7.2010 PlugComputer Folie 4 von 24 Motivation Losungsansatz¨ TU Dresden, 14.7.2010 PlugComputer Folie 5 von 24 Alte Idee: NSLU2 Allgemein Mit dem Network Storage Link von Linksys konnen¨ Sie die Speicherkapazitat¨ Ihres Netzwerks schnell und einfach um viele Gigabyte erweitern. Dieses kleine Netzwerkgerat¨ verbindet USB2.0-Festplatten direkt mit Ihrem Ethernet- Netzwerk. [Lina] TU Dresden, 14.7.2010 PlugComputer Folie 6 von 24 Alte Idee: NSLU2 Außen • 130 mm x 21 mm x 91 mm • 1x 10/100-RJ-45-Ethernet-Port • 2x USB 2.0-Port • 1x Stromanschluss TU Dresden, 14.7.2010 PlugComputer Folie 7 von 24 Alte Idee: NSLU2 Innen • Intel IXP420 (ARMv5TE) • 133 MHz, spater¨ 266 MHz • 8 MB Flash • 32 MB SDRAM TU Dresden, 14.7.2010 PlugComputer Folie 8 von 24 Alte Idee: NSLU2 Modifikationen • NSLU2 Firmware basiert auf Linux! • Ersetzbar durch Debian, OpenWrt, SlugOS .
    [Show full text]
  • Decentralized Architectures
    PERSONAL DATA JOURNAL Issue Nº3 April, 2012 Personal Data in Decentralized Network Architectures by Markus Sabadello, Technical Editor One of the most fundamental challenges for the PDE to consider will be the design and deployment of suitable underlying architectures for realizing emerging visions around the management and use of personal data. The basic organizational structures, according to which participants of an ecosystem exchange information with each other, influence many of its fundamental properties, such as privacy, security, flexibility, discovery, or the dependencies between different actors. The possible types of architectural Centralized Architectures patterns that can be implemented are highly diverse, with Centralized architectures are based on the idea that all centralized structures on one end of the spectrum, and fully communication passes through a single point in the system, distributed systems on the other end. On the Internet, very which is responsible for managing the flow of information different forms have always existed, depending on the between participants, for coordinating their behavior, and for infrastructural layer and the concrete applications and services one looks at. Contents Such organizational structures can be described and Feature Article: Personal Data in Decentralized Network analyzed using terminology and methods from the Architechures , Page 1 mathematical field of graph theory. They are really trans- disciplinary concepts, which have been applied to many Industry News: Page 3 practical situations and academic theories both in the natural Events: Page 6-7 and social sciences. One often-cited book in this context is Standards: Page 8-9 “Neither Market nor Hierarchy: Network Forms of Organization” by Walter W.
    [Show full text]
  • Rationale and Design for the Peace Box an Electronic Device for Your Home Or Office
    Rationale and Design for the Peace Box An Electronic Device for your Home or Office A thesis submitted by Markus Sabadello, Austria, [email protected] to the European Peace University (EPU) – Private University Stadtschlaining/Burg, Austria in partial fulfillment of the requirements for a Master of Arts Degree in Peace and Conflict Studies 1/23/2012 This thesis offers a summary of different lines of thought on how Information and Communication Technologies (ICTs) can be used for promoting the ideal of peace, for example by helping to manage a crisis, by supporting development and education, by overcoming authoritaran regimes, or by promoting a global civil society and global culture of peace. After introducing these ideas, the concept of a „Peace Box“ is presented, which is a small computer-like device that can be set up in any home or office to provide applications and services for actively supporting the various visions of using ICTs for peace. Contents 1. Introduction .............................................................................................................................................. 1 1.1. ICTs for Peace .................................................................................................................................. 2 1.2. ICTs against Peace ......................................................................................................................... 4 2. Technological Considerations ...........................................................................................................
    [Show full text]
  • Taller De Firmware
    Robótica embebida Embedded Single Board Computers Facultad de Ingeniería Instituto de Computación Contenido • Single Board Computers – Orígenes – Evolución – Algunos ejemplos Embedded Single Board Computers Single-board computers (SBCs) son computadoras completas fabricadas en una única placa de circuito. El diseño es centrado en un microprocesador con RAM, almacenamiento, E/S y otras características necesarias para ser una computadora funcional en una sola placa. Un poco de historia • Las primeras micro computadoras consistían de media docena (o más) placas de circuitos conectadas a un backplane. • Estas placas implementaban el CPU, memoria, controladores de disco y puertos paralelos/seriales Un poco de historia • Estas computadoras se utilizaban entre otras cosas, para adquisición de datos, control de procesos industriales. • Eran muy grandes para utilizarlas embebidas en dispositivos. Un poco de historia • A comienzo de la década del 80 la tecnología de circuitos integrados había llegado a un nivel de integración que permitía integrar funciones que ocupaban toda una placa en un solo chip (large scale integration chips). Un poco de historia • Permitió implementar computadoras completas en una sola placa, sin necesidad de utilizar backplanes. • Las primeras computadoras personales fueron implementadas de esta forma. • La Apple I de Steve Wozniak es un ejemplo. • Hoy día se siguen utilizando backplanes para implementar ciertos sistemas. Apple I Ferguson Big Board Ferguson Big Board • Diseño del 1980. • Basada en el microprocesador Z80, 64KB RAM. • Utilizaba el sistema operativo comercial CP/M. • Segunda versión "Little Board" (Ampro, 1983) • Dado su bajo costo, confiabilidad, simplicidad, y tamaño fue práctica para utilizarla embebida directamente en dispositivos que no eran computadoras.
    [Show full text]
  • SMART SANTANDER Information on 1St Open Call for Experiments
    SMART SANTANDER Information on 1st Open Call for Experiments Dr. Alex Gluhak, University of Surrey Dr. Luis Sanchez, University of Cantabria Open call information day th Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Brussels, 14 of September 2011 Outline • First call overview (AG) – Call procedure and guidelines for proposals – Detailed technical call objectives – Expected impact of proposals • SmartSantander infrastructure (AG, LS) – Testbed architecture – Deployment description at the 4 testbed sites • Experimentation on top of SmartSantander (AG,LS) – Available experimentation tools – Example experiments • Q&A Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Overview of First Call for Experiments Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Open call information • Web: http://www.smartsantander.eu/index.php/open-calls • Contact e-mail: [email protected] Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Key documents • Detailed open call text – Provides an overview of the technical call objectives and expected impact – Overview of the facility • Guide for applicants – Template adapted from EC how to prepare a proposal – Follows FP7 regulations • Regulations for the use of the facility – 7 articles outlining expectations and guidelines for experimentation Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Key call facts Call identifier SmartSantander-1-Open-Call Call opening 1st October 2011 Call closing 16. November 2011, 17.00 Brussels time (last received version prior deadline counts) Experimentation Jan – December 2012 Timeframe (length may vary based on nature of experiment – typical 9 month) Max funding per 200k Euros experiment Maximum funding for call Up to 600k Euros Number of expected 3+ experiments Number of partners per 1-2 partners experiment Proposal language English Copyright © SmartSantander Project FP7-ICT-2009-5 257992.
    [Show full text]
  • Liemeshko Magistr.Pdf
    НАЦІОНАЛЬНИЙ ТЕХНІЧНИЙ УНІВЕРСИТЕТ УКРАЇНИ «КИЇВСЬКИЙ ПОЛІТЕХНІЧНИЙ ІНСТИТУТ імені ІГОРЯ СІКОРСЬКОГО» Факультет інформатики та обчислювальної техніки Кафедра технічної кібернетики «На правах рукопису» До захисту допущено: УДК 004.453 Завідувач кафедри ________ Ігор ПАРХОМЕЙ «___»_____________2020 р. Магістерська дисертація на здобуття ступеня магістра за освітньо-професійною програмою «Інформаційне забезпечення робототехнічних систем» зі спеціальності 126 «Інформаційні системи та технології» на тему: «Система управління розумним будинком» Виконав (-ла): студент (-ка) ІІ курсу, групи ІК-91мп Артем ЛЄМЕШКО __________ Керівник: доцент, к.т.н., Олег ЛІСОВИЧЕНКО __________ Консультант з нормоконтролю: доцент, к.т.н., доц., Віктор ПАСЬКО __________ Рецензент: проф. каф. ОТ, д.т.н., проф. Сергій СТІРЕНКО __________ Засвідчую, що у цій магістерській дисертації немає запозичень з праць інших авторів без відповідних посилань. Студент _____________ Київ – 2020 року Національний технічний університет України «Київський політехнічний інститут імені Ігоря Сікорського» Факультет інформатики та обчислювальної техніки Кафедра технічної кібернетики Рівень вищої освіти – другий (магістерський) Спеціальність – 126 «Інформаційні системи та технології» Освітньо-професійна програма «Інформаційне забезпечення робототехнічних систем» ЗАТВЕРДЖУЮ Завідувач кафедри _______ Ігор ПАРХОМЕЙ «___»_____________2020 р. ЗАВДАННЯ на магістерську дисертацію студенту Лємешко Артему Дмитровичу 1. Тема дисертації «Система управління розумним будинком», науковий керівник дисертації
    [Show full text]
  • Quick Start Guide for Guruplug Server Standard and Server Plus GTI-2010.05.07
    Quick Start Guide – GuruPlug Server page 1 / 10 Quick Start Guide for GuruPlug Server Standard and Server Plus GTI-2010.05.07 Thank you for purchasing GuruPlug Server Standard / GuruPlug Server Plus - the most sophisticated compact ARM based computer ever built. This is running at 1.2GHz yet using less than 10W power consumption. This little palm-sized powerhouse can handle all your biggest tasks while still saving about 96% on energy costs when compared to the average 175 Watt desktop computer. You can customize your Plug to work in almost any industry - Home Automation, Security/Surveillance, Medical Monitoring, Industrial Automation, Smart Grid Electrical, Mesh and Grid Computing. You can never have enough storage, not to mention fast access to all that data. That's why we have provided Wi-Fi, Bluetooth, Gigabit Ethernet, USB 2.0 and eSATA connection options to the Server line of products. Go ahead give us what you got, we can take it. A. Package contents Please check the package you’ve received with the following contents: Contents GuruPlug Server Standard GuruPlus Server Plus Remark 1 GuruPlug 1 unit 1 unit 2 Detachable AC plug 1 pcs 1 pcs 3 Detachable AC power cord converter 1 pcs 1 pcs 4 AC power cord 1 pcs 1 pcs 5 Ethernet RJ45 cable 1 pcs 1 pcs 6 Warranty sheet Yes Yes 7 CD No No Note 1 8 JTAG debug board No No Note 2 Note 1: All files will be put on the following website for downloading https://www.globalscaletechnologies.com/t-downloads.aspx Note 2: Our JTAG debug board module is sold separately.
    [Show full text]
  • Ported Plan 9
    Recent Plan 9 Work at Bell Labs Geoff Collyer [email protected]−labs.com *All L=>oH=JoHEAI MKHH=O0Ell,NAM JAHIAO%'%" 75) ABSTRACT *All L=>I HA?AnJlO FoHJA@ 2l=n ' Jo nAM IOIJAmI MEJD non-2+ =H?DE­ JA?JKHAI. 6DEI EI = IJ=JKI HAFoHJ on JDoIA FoHJI =n@ = IKmm=HO oB MD=J DAlFA@,MD=J @E@nߣJ =n@MD=J ?oKl@. 1. Introduction 1n mO CHoKF oB 2l=n ' @ALAloFAHI =n@ KIAHI =J *All L=>I En MKHH=O 0Ell @KHEnC JDA l=IJ JMo OA=HI &ߞ oH Io, mK?D oB oKH MoHk D=I >AAn >=IA@ on FoHJI oB 2l=n ' Jo m=?DEnAI oJDAH JD=n JDA 1*M 2+. 6DEI J=lk MEll @AI?HE>A JDA FoHJI, MD=J MA KIA JDAm oHFl=nJoKIA JDAmBoH,=n@MD=J MA lA=HnA@. )I KIK=l, JDA >Klk oB 2l=n ' ?o@A EI IKBBE?EAnJlO FoHJ=>lA JD=J onlO JDA kAHnAl nAA@I Jo >A moLA@ Jo = nAM IOIJAm, =n@ ALAn JD=J onlO EnLolLAI FoFKl=JEnC = IK>@EHA?JoHO oB /sys/src/9 =n@ FoIIE>lO ?HA=JEnC = >ooJIJH=F FHoCH=m En /sys/src/boot.) FoHJ Jo = IOIJAm BoH MDE?D MA D=LA no ?omFElAH =n@ no IEmEl=H kAHnAl MoKl@ HAGKEHA IK>IJ=nJE=llOmoHA MoHk,=I@AI?HE>A@EnHABAHAn?A [$]. 2. Non−PC Ports: Common Problems and Techniques 9A FoHJA@ 2l=n ' Jo 2oMAH2+ "#, "" =n@ "# m=?DEnAI =n@ Jo )4M ' $ =n@ +oHJAN-)&m=?DEnAI. 6DAO=ll ID=HA ?AHJ=En?l=IIAIoB o>IJ=?lAI.
    [Show full text]
  • Fedora Linux Kernels Running on ARM Processors
    Latest Trends in Information Technology Fedora Linux Kernels Running on ARM Processors PETER KOTVAN, PETER FODREK Institute of Control and Industrial Informatics Faculty of Electrical Engineering and Information Technology Slovak University of Technology Ilkovicovaˇ 3, 812 19 Bratislava SLOVAK REPUBLIC [email protected], [email protected] Abstract: This paper will report our experience with installing and using the Fedora Linux distribution on a dedi- cated ARM processor based device. At first we will deal with ARM processors and its specifics. In the next section ARM based devices Dreamplug will be described. We will describe installation of Fedora Linux distribution on Dreamplug and compilation of the Linux kernel. The original Fedora kernel package was altered to support ARM based devices which incorporates different approaches especially to bootstrapping. Key–Words: Fedora, Linux Kernel, ARM processors 1 Introduction 2 ARM architecture and devices There are two main processor architectures used over the course of last years. Usually, a personal computer ARM is a reduced instruction set computer processor contains one of x86 or x86-64, however the most pop- architecture. It is the most widely used 32-bit instruc- ular 32-bit architecture is ARM (Advanced RISC Ma- tion set architecture. The combination of high perfor- chine). As the name says ARM is reduced instruction mance, low power consumption and low heat emis- set computer (RISC). Currently ARM processors are sion resulted in application of this architecture in mo- used primarily in smart phones, tablets and embedded bile phones, PDAs, tablets and cameras. With imple- devices. In the future, it is likely that the computers mentation of multi-cored ARM processors, it is possi- will be, too, powered by these processors.
    [Show full text]
  • Guruplug Server Plus First Steps
    GuruPlug Server Plus First steps Initial Setup and first login 1. Plug network cord in (eth0, the upper network plug) and connect jtag board with GuruPlug and PC 2. configure minicom on your PC to have access to the GuruPlug via jtag board a) install minicom (sudo apt-get install minicom) b) start minicom settings (sudo minicom -s) c) choose „settings for serial port...“ and select with ENTER d) press E to modify Bps/Par/Bits e) press E to set Bps to 115200, V for 8 databits, L for no parity and W for 1 stopbit. Confirm with ENTER f) press ENTER again g) „Save settings as...“ marvell 3. start minicom with “minicom -o marvell” a) it will show something like • Willkommen zu minicom 2.4 • • Optionen: I18n • Übersetzt am Jan 25 2010, 06:49:09. • Port /dev/ttyUSB0 • • Drücken Sie CTRL-A Z für Hilfe zu speziellen Tasten 4. plug your GuruPlug in. In minicom, you should see the boot-process a) it will show something like • U-Boot 2009.11-rc1-00602-g28a9c08-dirty (Feb 09 2010 - 18:15:21) • Marvell-Plug2L • • SoC: Kirkwood 88F6281_A0 • DRAM: 512 MB • NAND: 512 MiB • In: serial • Out: serial • Err: serial • Net: egiga0, egiga1 • 88E1121 Initialized on egiga0 • 88E1121 Initialized on egiga1 • etc. 5. when booting is done, you are asked to enter password and username a) sheevaplug-debian login: root b) Password: nosoup4u 6. After successful login, it shows • sheevaplug-debian:~# • from now on, I will put a # in front of all commands on the GuruPlug to make it mor clear Configure network 1.
    [Show full text]