КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
Analysis of the encapsulated traffic
Appendix A REQUIREMENTS TO THE PROTOCOL CONTENT 7.6.1 The name of laboratory work. 7.6.2 Purpose of the work. 7.6.3 Results of home assignments. 7.6.4 Short description of the work done. 7.6.5 Conclusions about the work done. 7.6.6 Date, the signature of a student, the remark of a teacher.
In the trace of Frame Relay messages and encapsulated traffic of higher levels protocols two approaches got spread in forming of the route. The first approach assumes the presence of a specialist working with the route, complete knowledge about the structure of the protocol, structure of all elements of information, etc. In this case, tracing protocol is executed up to bit. Usually, the values of bits are represented in a form suitable not only for the analysis, but for the location in the information field. This approach provides routes with a maximum detailisation. These routes can be successfully used both in the development of data transmission equipment, and at the operational dimensions. Negative factor here is the need for deep knowledge about the structure of the protocol for operating personnel and a large redundancy of information in the route, which often makes it difficult to understand. As an example, such routes will be presented below by Sniffer Expert protocol analyzer developed by Company Network General Corp. The second approach focuses on the making of operational measurements. Routes that are generated in this case, reflect only the most essential messages and information elements for signal exchange. As a result, information redundancy, which occurs in the first approach, is reduced. In addition, the requirements for speed of analyzers is decreased and, consequently, their cost. As a negative factor here is the inability to use such analyzers for measuring during the development of data transmission equipment, as well as in the case of incorrect implementation of the protocol (route identifies the incorrect implementation of the protocol, but does not specify exactly, which bits are incorrect values; in practice such cases aren’t usually met). As an example such operational routes will be presented below the route analyzer ParaScope2000 produced by Frederick Engineering Inc. As an example of the analysis of the encapsulated traffic, let’s consider the analysis of a hypothetical data network linking two or more local area networks (Figure 1).
Figure 1 -Scheme of high-levels protocol encapsulations (NetWare)
At combining of local networks, measuring physical channel can include virtual connections, which transmit the encapsulated information of the various protocols (in general, in the PD networks there are used about 100... 150 or more of different protocols and modifications). As a result, multi-protocol exchange, route of the Frame Relay protocol will contain encapsulated message of various protocols (route 1). Route 1 An example of simple route of multi-protocol-traffic in the Frame Relay network (Sniffer Expert analyzer)
As can be seen from the route, among messages, which are sent through the point of measurement, there are a variety of high-level protocols, including routing protocol RIP (Routing Information Protocol), which is used for Xerox Network Systems (XNS) network, the main NetWare networks protocol (NCP - NetWare Core Protocol), the diagnostics protocol of NetWare networks (NDIAG), the RIP protocol, which is used for exchanging in TCP / IP protocol, the SNAP protocol, which is used to encapsulate data traffic from the LAN. In addition, the route contains control information LMI (posts 44, 45), which was seen in the lab number 5. It should be noted that in order to preserve the confidentiality of the IP, address in the route is replaced by X and Y.
Дата добавления: 2014-12-27; Просмотров: 507; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |