Networking :: Implementation Of Network Protocols

Apr 10, 2009

How to implement Network Protocols.

View 1 Replies


ADVERTISEMENT

General :: Modify Network Protocols - TCP In Particular

Aug 10, 2009

I m pretty new to Linux..! I've been given a task to modify network protocol(TCP in particular). So now i've to make few changes to the kernel which includes modifying few source files. So i want to know how can i go abt it. Till now i've explored various .c files of kernel(Eg.tcp.c,tcp_input.c etc etc)by referring few books. And now comes the important part of implementing it. So how exactly can i go abt it?? I went thru various threads like installing a kernel,compliling a kernel and other things. But i m not getting the exact sequence in which i should do it. I've installed fedora 10. But i cannot see any source files which i can modify. Where and how can i modify these files?

View 5 Replies View Related

Security :: Implementation Of Distributed Firewall In A Local Area Network?

Apr 6, 2011

I want to know the details about the implementation of distributed firewall in a local area network

View 5 Replies View Related

General :: Windows - Find Out Which Authentication Protocols A WiFi network Uses?

Aug 16, 2011

I want to connect my Debian Squeeze machine to my school wireless network with wpa_supplicant.

I think the network uses 802.1X authentication, because when the other students connects to the network for the first time in Windows they enter their username and password then the connection is established. I have asked the the IT staff but they do not known what 802.1X, PEAP EAP etc. is and just say "Enter the login details in the box!".

If I bring a Windows 7 machine to school and successful connects to the network, is it then possible for me to extract the information [and extract a certificate if used on the network] from Windows somehow so i can setup the wpa_supplicant.conf correctly on Debian?

The information I want to extract is which protocols are used, like PEAP,MSCHAP etc.

View 1 Replies View Related

General :: Monitor Network Performance/usage Based On Protocols?

Sep 6, 2010

I need to monitor network performance/usage based on protocols.

About snort now, is perfstat.c is replaced with some thing else?

View 1 Replies View Related

Security :: OT - Unencrypted Protocols In The Local Subnet - Switched Network

Aug 27, 2009

I was having a discussion with someone who said that telnet, FTP, HTTP plain-text authentication in the local subnet is ok because it's a switched network. Also, that these protocols are not good over the net but in a local subnet they are just fine.

I know that someone can plug a hub in the network port and connect 2 (or more) PCs and see the packets. Also, heard about ettercap but haven't really delved into it. I know dsniff was written to prove the point that unencrypted protocols are bad. Would like to get opinion about unencrypted protocols over a switched networks.

View 1 Replies View Related

Ubuntu Networking :: How To Use IPtables For Different NAT Implementation

May 6, 2010

IPtables, implementing each type of NAT
-Full Cone NAT
-Restricted Cone NAT
-Port Restricted Cone NAT
-Symmetric NAT
using IPTables.

Explanation:
Full Cone: A full cone NAT is one where all requests from the same internal IP address and port are mapped to the same external IP address and port. Furthermore, any external host can send a packet to the internal host, by sending a packet to the mapped external address.

Restricted Cone: A restricted cone NAT is one where all requests from the same internal IP address and port are mapped to the same external IP address and port. Unlike a full cone NAT, an external host (with IP address X) can send a packet to the internal host only if the internal host had previously sent a packet to IP address X.

Port Restricted Cone: A port restricted cone NAT is like a restricted cone NAT, but the restriction includes port numbers. Specifically, an external host can send a packet, with source IP address X and source port P, to the internal host only if the internal host had previously sent a packet to IP address X and port P.

Symmetric: A symmetric NAT is one where all requests from the same internal IP address and port, to a specific destination IP address and port, are mapped to the same external IP address and port. If the same host sends a packet with the same source address and port, but to a different destination, a different mapping is used. Furthermore, only the external host that receives a packet can send a UDP packet back to the internal host.

On the netfilter mailinglist, Pedro Goncalves suggested the following:
192.168.2.170 is "public" address and 10.0.0.1 is "private" address

/-"Full Cone NAT", with the following rules:/

HTML Code:
iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source 192.168.2.170
iptables -t nat -A PREROUTING -i eth0 -j DNAT --to-destination 10.0.0.1

/-"Port Restricted Cone NAT", with just a single rule:/

HTML Code:
iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source 192.168.2.170

View 1 Replies View Related

Networking :: Implementation Of TCP/IP Applications Over SCTP?

Dec 9, 2010

Have any of the below TCP based applications are implemented over SCTP in Linux ?

1. ftp
2. telnet
3. HTTP

Or any other applications ?

View 1 Replies View Related

Networking :: Changing Ad Hoc Protocols ?

Feb 25, 2010

I am a under-graduate student. my prof has implemented an adhoc protocol and simulated it on some network simulation software and it worked out of box. She want to implement it on real world unix/linux systems. i am sure it is possible, but i dont know where to start from.

View 5 Replies View Related

Networking :: Practive For Implementation Of A Failover Server?

Jan 20, 2011

I'm in need of some advise from you guys. I'm currently running a live production serverA, and last week it went down for a couple of hours which was really bad to say the least.

I've been thinking about building a mirror serverB that will rsync my data nightly. Now I don't want to load balance here, I just need to be able to switch to serverB when serverA goes down for any reason.

Would the best solution for this is to change my main nameserver entry when I want to switch ? I'm just curious if it will be a few hours or an instant change.

I thought I'd ask before attempting this live.

View 3 Replies View Related

Ubuntu Networking :: What Ports And Protocols For Ssh?

Aug 12, 2010

I have ssh running on port 22 and that is the only thing I want in/out of this particular box (ssh, scp).But when I use iptables to set the default policies for INPUT, FORWARD, and OUTPUT to DROP and then allow 22:

iptables -I INPUT -p tcp --dport 22 -j ACCEPT
iptables -I OUTPUT -p tcp --dport 22 -j ACCEPT

ssh stops working.

View 2 Replies View Related

Networking :: NTOP Not Displaying Ssh Protocols

Jan 4, 2011

I have setup NTOP on Centos 5.5 and am not seeing traffic that I am supposed to be seeing. We have a product that uses many different services including ssh. I have this system as a target on mirrored ports but am not seeing any ssh connections or activity when I look at the host machine that is connected to the target ssh client and vice versa. When I look under TCP/UDP Service/Port Usage it is not displaying all the services that are being used especially SSH. What could it be?

View 5 Replies View Related

Networking :: Ipv6 Use The Same Routing Protocols As V4?

Jan 24, 2011

Will ipv6 use the same routing protocols as v4?....such as OSPF?

View 2 Replies View Related

Networking :: Started Using Wireshark - Protocols Not Secure

Aug 20, 2011

I am new to using wireshark and I've been browsing around the packets it a bit. I figured I'd try and use it to cut into a protocol that isn't documented, that I can find, but doesn't seem particularly secure. I tried cutting into a protocol and I turned _everything_ off, but wireshark was still picking up packets left right and centre. So I decided to stop the internet daemon and still, packets were being sent over the internet. So I decided to pick some of the IPs and do a reverse look-up. Each and every one of the IPs are of Russian origin or close.

I'm under the impression that these are unwanted packets. I've also noticed that they are sending data from the same port: 32165. Another thing I noticed while doing reverse look-ups is a lot of these IPs are hit in 'Spam & Open Relay Blocking System' and 'Project Honey Pot' which seem to be spam blockers and trackers. What I should do or what I should investigate? The reverse look-ups are only providing me with the ISP which 'owns' the IP block the IP is apart of. They are from various ISPs every time.

View 1 Replies View Related

Networking :: Audio Streaming Protocols On Internet?

Sep 3, 2010

I have project which need to stream audio to multiple remotely connected devices on internet.the best protocol for streaming with minimum or no audio distortion.

View 1 Replies View Related

General :: Wireless Implementation In Ns2?

Feb 5, 2011

not able to solve an error when i try to do a wireless scenario in ns2.

num_nodes is set 3
warning: Please use -channel as shown in tcl/ex/wireless-mitf.tcl
INITIALIZE THE LIST xListHead

View 2 Replies View Related

Programming :: Implementation Of RSA Algorithm In C / C++

Aug 2, 2010

Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.

View 1 Replies View Related

Programming :: MD5 Algorithm Implementation

Apr 27, 2011

I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?

View 3 Replies View Related

OpenSUSE :: Wine Installation And Implementation?

May 11, 2010

i have done everything that all the documentations have said and i still cant get this bloody thing working. some one give me the exact commands that removes all traces of all wine packages. and then can someone give me the exact commands to install.

which user i must be doing this under and exactly what i must configure in the config files. all that i want too accomplish by this is to successfully play games on my pc.

View 5 Replies View Related

General :: Implementation Of IPTables And Netfilters?

Oct 20, 2010

I am trying to understand the implementation of iptables and netfilters. Any good links or docs.

View 1 Replies View Related

General :: Optimize Implementation Of DSR Algo In UBUNTU 9.1 Using NS 2.34 ?

Feb 25, 2010

I need to optimize the implementation of DSR algo using NS-2. Now i need to identify the first of all "the parameters which i can change and which are effective in optimization point of view." I want to get into the c++ code as well as header files which are used to implement DSR algo.

View 4 Replies View Related

General :: Find A Leach Protocol Implementation For Ns2.34?

Aug 11, 2011

I am trying to find a leach protocol implementation for ns2.34 but all links available are dealing with ns2.27 Are the instructions valid for ns2.34?

View 4 Replies View Related

General :: Linear Hashing Implementation In C Language?

Dec 7, 2010

I'm looking for linear hashing implementation in C language. PS: I have to implement this on Ubuntu 10.04 Linux on 64 bit machine.

View 2 Replies View Related

Programming :: Proper Implementation Of POSIX Threads

Apr 6, 2011

I've implemented a program URL... which reads digital IF data from a radio receiver through a named pipe, measures power levels, and sends the result to stdout. The program is interactive; there is a thread that reads from stdin to watch for commands, a thread that constantly either reads data from the named pipe or throws data away, and an array of processing threads. The program uses GTK+extra to plot the signals. The IF data stream bandwidth exists at the limits of today's technology (is very very fast).

Problem Statement:The program works fine with a few bugs. I've learned since I've made it that using global state variables to coordinate threads isn't a good way of doing it. I also only had knowledge of mutexes and polled the state variable instead of using other methods.My reimplementation will use the following:

- One "Stdin Command Monitoring" thread
- One "Get data from named pipe" thread
- One post-processor thread
- N Processing threads

All threads are alive during the life of main()There are N buffers. Data will come in from the named pipe, and the "Get data" thread will write the data to an "available" buffer. When the buffer is full it will be marked as "full". There will be N processing threads, one for each buffer. When a processing threads' buffer is full, it will process the buffer and save the result to a final buffer. At the end of a number of averages, the post-processor thread will perform a final process on the final buffer and send the results to stdout.

View 2 Replies View Related

OpenSUSE :: Remmina Protocols Missing On 11.4?

Mar 14, 2011

On openSUSE 11.3 I was using remmina as a replacement for tsclient. After upgrading to openSUSE 11.4 (Did a complete new install) Remmina only seems to support SSH connections. All other protocols like RDP, NX and VNC are missing. I got FreeRDP and rdesktop etc. Installed and can connect to RDP sessions from the terminal.

View 3 Replies View Related

Programming :: Switch Between Serial Protocols?

Jun 7, 2011

How to switch between serial protocols in c language? for example i need to switch between rs232 and rs422,(according to rs422 pinout)

View 2 Replies View Related

Red Hat / Fedora :: Implementation Of Kernel-based Virtual Machine

Jun 9, 2011

I'm Redhat 5 user, and I want to implement Kernel-based Virtual Machine. I tried too much search in google but I cant find the perfect instruction regarding it.

View 3 Replies View Related

General :: Web Panel To Manage Iptables And Tc / Secure Implementation Of Changes

Mar 19, 2010

Subject of my school work:"Web interface for managing firewall and band on the access server (Linux)"I have a big problem because I do not know how to safely implement the change in the system and show the logs on the Web page.Unfortunately, the number of solutions for today is enormous and it is increasingly difficult to me to decide on the right.They are:

1. Launching a web server with root privileges (the default mode of miniserv'a Webmin)
2. CGI scripts on apache SUID (mode webmin on "foreign" server)
3. suPHP or suexec
4. Cron implements changes to the root
5. Daemon in C "periodically" implement changes in the configuration files created by PHP
6. Daemon in C to implement the changes requested in the configuration files created by PHP
7.Use SSH in PHP and after logging into the root of execution of commands in the configuration files created by PHP (the root password in the DB)
8.Use SSH in PHP and after logging into the root of execution of commands in the configuration files created by PHP (the root password, enter manually)
9. Like the above so that the use of sudo and user rights only to the necessary shell commands
10. Add the user apache in the /etc/sudoers can perform all the necessary applications shell commands
11. Seize the opportunity to command: shell_exec ( `sudo php-f / home /example/script.php`), and /etc/sudoers

View 1 Replies View Related

Programming :: General Implementation SIP Client Software Using C' Language?

Sep 15, 2010

I am new to this forum and to Networking as well. I have chosen to implement:

1) SIP Client using C' language
2) Platform: Windows
3)Its going to be on command line

my problem is that I need some reference like books, material or website where I can learn how to write the code from scratch or port the code according to my requirements. My implementation should serve the purpose like two SIP clients should communicate with each other for exchange of Audio data.

View 4 Replies View Related

General :: Block UDP Protocols In Iptables - Ubuntu ?

Aug 5, 2010

Currently I have 2 Lan card in My System one for communicate client pcs (Lan card Ip 192.168.1.100) and other for Internet (Lan card ip 192.168.0.100.) All client pcs are in 192.168.1.0 Subnet

Here i implement my system as router through iptables all clients are communicate through only 192.168.1.100 (clients default gateway also 192.168.1.100) Now no problem for forward rules when my system is active all clients are get internet.

Now i have problem with blocking UDP protocols i tried lot of things in net iptables -A INPUT -s 192.168.1.0/255.255.255.0 -p UDP -j DROP

But it's not blocking UDP protocols (i change UDP to ICMP Protocols then icmp is blocked every ip address)

View 9 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved