Protocol Analysis: Onsite Case Studies

Size: px
Start display at page:

Download "Protocol Analysis: Onsite Case Studies"

Transcription

1 Protocol Analysis: Onsite Case Studies Laura Chappell Sr. Protocol Analyst, Founder Protocol Analysis Institute

2 The Case Studies Case Study #1: The Network is Slow Case Study #2: The Network is Slow Case Study #3: Internet Access is Slow

3 The Top 10 reasons to analyze your network traffic

4 Top 10 reasons to analyze your network traffic: 6. Justify buying the most expensive damned laptop available. 7. Find out if the CEO actually uses the network. 8. See who s breaking into your Windows XP systems today. 9. Figure out how that big fat packet fits through that little tiny cable. 10. Learn what the really hot porno sites are.

5 Top 10 reasons to analyze your network traffic: 1. Look for a Microsoft product that actually works! 2. Call yourself a sniffer without getting a sexual harassment writeup. 3. Alter stock quote packets to control the company mood. 4. Intimidate your boss with hex code Have a sociallyacceptable reason to ping someone.

6 The Onsite Process Prerequisites 4 Prime directive 4 Network map 4 Tap-in point information Process 4 The Laying On Of Hands 4 Latency tests 4 The client bootup/login analysis process 4 The application analysis process

7 Typical Network Map

8 Case Study #1: The Network Is Slow Define slow? Slow for whom? Application-specific? Network segment-specific? Intermittent? Constant? Can you replicate the problem? Lousy stinky Everyone All Nope Constant Yes

9 Slow Is Relative What do we expect on a LAN? What do we expect on a WAN? What does the CEO expect? HH:MM:SS.mmm.yyy 4 Where HH = hours MM = minutes SS = seconds Switch IP Router mmm = milliseconds (thousandths of a second) yyy = microseconds (millionths of a second) Switch IP Router Switch

10 Test Your Own Latency 4 Perform local latency tests 4 Perform remote latency tests NetDoppler (WildPackets)

11 Ok A Better Network Diagram All Users Off Switches Fourth Floor All Users Off Switches Third Floor All Users Off Switches Second Floor All Users Off Switches First Floor Switch Router Servers Is latency due to Client configurations Switch overload Router buffering Server delays Media faults Other? Hub Firewall/ Router Internet Internet T1 Links

12 Laying On Of Hands Broadcast/multicast storms? Excessive ICMP traffic? Rogue traffic? General network conditions? Server delay packets (spanning required)? Retransmissions-media faults (spanning required)?

13 Performing The Client Analysis Bootup slow? Login slow? Application slow? IP Router Switch IP Router Switch Switch

14 The Application Analysis Form On Laura s Lab Kit Simple format DON T TOUCH THE KEYBOARD!

15 Elsie s Login Sequence Look for time irregularities. Delta/interpacket: Time from end of one packet to end of next packet. Relative: Relative to first or marked packet.

16 Look for Consistencies First look for other time problems Then look for the surrounding packets 18 second delay every 90 seconds (approx.) - all users -

17 Work Backwards To ID Process In this case, a UDP transmission was triggered by a local application looking for a remote service that did not exist at the destination IP address. SAP for service DNS name resolution Lab server answers Client babbles away

18 Keep Those Traces! Great evidence! Fun reading! Good jokes at bars!

19 Case 2: The Network Is Slow Again! Define slow? Slow for whom? Application-specific? Network segment-specific? Intermittent? Constant? Can you replicate the problem? Irritating Scattered users All Nope Intermittent Probably

20 Laying On Of Hands Broadcast/multicast storms? Excessive ICMP traffic? Rogue traffic? General network conditions? Server delay packets (spanning required)? Retransmissions-media faults (spanning required)?

21 Check Out The Broadcasts How effective are broadcast attacks?

22 Watching The Client At Idle Yipes is the NetWare client the killer app? Server hit 100% This problem moved around

23 Compare to Other Clients Configuration? OS? Applications? Is this client unique? If so, why? Checks out Several Variety Somewhat NFS client piece old and unnecessary

24 Keep That Trace! More laughs at the bar Some tears

25 Case Study #3: Internet Access Is Slow Define slow? Slow for whom? Application-specific? HTTP v. FTP Network segment-specific? Intermittent? Constant? Can you replicate the problem? Unusable Everyone All Nope Constant Yes, damn it now fix it!

26 Laying On Of Hands Broadcast/multicast storms? Excessive ICMP traffic? Rogue traffic? General network conditions? DNS faults? TCP faults? Retransmissions-media faults (spanning required)?

27 Proxy Firewall Configuration Private-side of network switch Proxy/ Firewall Public-side of network Hub Router Hub Analyzer #2 Client Analyzer #1

28 Checking The Client Side

29 Outside Proxy Firewall

30 Correlating The Traffic

31 Identifying The Area Of Fault The moral 4 You can t always pinpoint the exact cause 4 You can usually pinpoint the area of fault

32 In Summary Document your network behavior now Get the analyzer out Learn to perform application analysis Use the time columns to find slow points Know your switch span/mirror commands Learn analysis!

33 Laura Chappell s US/Canada Hands-On Roadshow! Get hands-on experience with many tools and analysis techniques for analysis and security! Washington, DC April 1-2 Chicago April 4-5 Seattle April 8-9 Atlanta April Boston May 2-3 Dallas May Houston May San Jose May San Francisco June 4-5 Minneapolis June Phoenix June San Diego June Toronto July 8-9 Vancouver July St. Louis July Los Angeles July Honolulu July New York City August 5-6 Hands-On Classes! Register NOW!

34

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

Introduction to Troubleshooting TCP/IP Networks with Wireshark

Introduction to Troubleshooting TCP/IP Networks with Wireshark Introduction to Troubleshooting TCP/IP Networks with Wireshark Course WIRE-1B 5 Days Instructor-led, Hands-on Introduction In this hands-on, instructor-led, five-day course, you will receive in-depth training

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

Introduction to internetworking, OSI, TCP/IP and Addressing.

Introduction to internetworking, OSI, TCP/IP and Addressing. Introduction to internetworking, OSI, TCP/IP and Addressing. Network Devices Repeater (Hub) Hubs don t break collision and broadcast domains. So any packet will be forwarded to all ports. Bridge (Switch)

More information

NETWORK PACKET ANALYSIS PROGRAM

NETWORK PACKET ANALYSIS PROGRAM NETWORK PACKET ANALYSIS PROGRAM Duration: 3 days (21 hours) Mode: 1. Instructor Led Class room Training and Labs 2. Online In this hands-on course, you will receive in-depth training on Protocol analysis

More information

Modeling Internet Application Traffic for Network Planning and Provisioning. Takafumi Chujo Fujistu Laboratories of America, Inc.

Modeling Internet Application Traffic for Network Planning and Provisioning. Takafumi Chujo Fujistu Laboratories of America, Inc. Modeling Internet Application Traffic for Network Planning and Provisioning Takafumi Chujo Fujistu Laboratories of America, Inc. Traffic mix on converged IP networks IP TRAFFIC MIX - P2P SCENARIO IP TRAFFIC

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

Diagnosing Path Inflation of Mobile Client Traffic

Diagnosing Path Inflation of Mobile Client Traffic Diagnosing Path Inflation of Mobile Client Traffic Kyriakos Zarifis, Tobias Flach, Srikanth Nori, David Choffnes, Ramesh Govindan, Ethan Katz- Bassett, Z. Morley Mao, Matt Welsh University of Southern

More information

Becoming a Certified Facilitator

Becoming a Certified Facilitator Becoming a Certified Facilitator Is Certification Right for You? Remember to complete the brief survey at the end of the session and you ll receive: A free copy of the The Seven Separators of Facilitation

More information

A First Look at Modern Enterprise Traffic

A First Look at Modern Enterprise Traffic A First Look at Modern Enterprise Traffic Ruoming Pang, Princeton University Mark Allman (ICSI), Mike Bennett (LBNL), Jason Lee (LBNL), Vern Paxson (ICSI/LBNL), and Brian Tierney (LBNL) The Question What

More information

One Planet. One Network. Infinite Possibilities.

One Planet. One Network. Infinite Possibilities. One Planet. One Network. Infinite Possibilities. IPv6 in the Global Crossing IP Network May 26, 2005 Ed Bursk, Vice President Government Global Crossing Overview Global Crossing was founded seven years

More information

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009 Packet Sniffers INFO 404 - Lecture 8 24/03/2009 nfoukia@infoscience.otago.ac.nz Definition Sniffer Capabilities How does it work? When does it work? Preventing Sniffing Detection of Sniffing References

More information

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network 87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

How to open ports in the DSL router firmware version 2.xx and above

How to open ports in the DSL router firmware version 2.xx and above How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or

More information

Chapter 11. High Availability

Chapter 11. High Availability Chapter 11. High Availability This chapter describes the high availability fault-tolerance feature in D-Link Firewalls. Overview, page 289 High Availability Mechanisms, page 291 High Availability Setup,

More information

Wireshark 101 Essential Skills for Network Analysis 2 nd Edition

Wireshark 101 Essential Skills for Network Analysis 2 nd Edition Wireshark 101 Essential Skills for Network Analysis 2 nd Edition Always ensure you have proper authorization before you listen to and capture network traffic. Protocol Analysis Institute, Inc 59 Damonte

More information

What is SD-WAN? Presented by:

What is SD-WAN? Presented by: What is SD-WAN? Presented by: Who is IPM? IT Consulting Firm based in NYC Team of professionals with experience in many verticals including legal, healthcare, finance and more Providing IT solutions for

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

Summary Report. Prepared for: Refresh Date: 28 Oct :02

Summary Report. Prepared for: Refresh Date: 28 Oct :02 Prepared for: Selected Test: Test Type: Test Steps: 8 Dynatrace Mobile Demo Refresh Date: 28 Oct 2016 15:02 Time Period: Summary 259 Key Indicators Response Time (sec) Yesterday (27 Oct 2016 00:00 to 28

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

Distributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks.

Distributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks. Intro to Distributed Systems and Networks Hank Levy Distributed Systems Nearly all systems today are distributed in some way, e.g.: they use email they access files over a network they access printers

More information

Course List. December 2010

Course List. December 2010 Course List December 2010 List of Courses Syllabus for 'AAP-Core 1-Wireshark Functions & TCP/IP'... 1 Syllabus for 'AAP-Core 2-Troubleshoot/Secure Networks'... 2 Syllabus for 'AAP-CS41 Wireshark Jumpstart

More information

Best Practices in Deploying Skype for Business Voice and Video for Office 365

Best Practices in Deploying Skype for Business Voice and Video for Office 365 Best Practices in Deploying Skype for Business Voice and Video for Office 365 Laura Marx Sr. Dir., Microsoft Marketing, Polycom Sherri Pipala Director Field Sales, Polycom Jose Mateo Microsoft Solution

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services

More information

How to Really Secure the Internet

How to Really Secure the Internet How to Really Secure the Internet 1 Disclaimer None of this will actually happen...but it s an amusing thought 2 Copyright(C) 1999, Marcus J. Ranum - all rights reserved 1 What Happened? Network hardware

More information

Network Measurement. COS 461 Recita8on. h:p://

Network Measurement. COS 461 Recita8on. h:p:// Network Measurement COS 461 Recita8on h:p://www.cs.princeton.edu/courses/archive/spr14/cos461/ 2! Why Measure the Network? Scien8fic discovery Characterizing traffic, topology, performance Understanding

More information

Digital forensics Technical Fundamentals. Saurabh Singh

Digital forensics Technical Fundamentals. Saurabh Singh Digital forensics Technical Fundamentals Saurabh Singh 159744151 saurabhgcet1989@gmail.com Topics Source of network based evidence Principles of internetworking Internet protocol Suite conclusion Source

More information

Analyzing FTP Communications

Analyzing FTP Communications Laura Chappell Illustration: Norman Felchle One of the advantages of being a protocol analyst is the ability to look at packet-level communications to see how an application operates. When errors occur,

More information

Goals - to become acquainted with Wireshark, and make some simple packet captures and observations

Goals - to become acquainted with Wireshark, and make some simple packet captures and observations CSCI 395: Networks Lab 2: Introductory Wireshark Lab, Current state of the Internet, and Transmission/ Delay Due: 2/19/16 at the beginning of class 20 Points Part I Goals - to become acquainted with Wireshark,

More information

Chapter 1 Communication

Chapter 1 Communication Chapter 1 Communication Networks and Services Network Architecture and Services Telegraph Networks & Message Switching Telephone Networks and Circuit Switching Computer Networks & Packet Switching Future

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Welcome to PHOENIX CONTACT Routing

Welcome to PHOENIX CONTACT Routing Welcome to PHOENIX CONTACT Routing Kevin Speed Phoenix Contact kspeed@phoenixcon.com Need for Cyber Security in the Industrial World Hacks, attacks, broadcast storms, etc. happen every day. Not just an

More information

ENSC 427: Communication Networks. Spring Final Report Analysis of Applications Through IP VPN.

ENSC 427: Communication Networks. Spring Final Report Analysis of Applications Through IP VPN. ENSC 427: Communication Networks Spring 2014 0 Final Report Analysis of Applications Through IP VPN www.sfu.ca/~leetonyl/ensc427group12.html Group 12 Lee, Tony Nguyen, Anthony Truong, Henson 301111050

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

How To Manually Open Ports In Internet Connection Firewall In Windows 8 >>>CLICK HERE<<<

How To Manually Open Ports In Internet Connection Firewall In Windows 8 >>>CLICK HERE<<< How To Manually Open Ports In Internet Connection Firewall In Windows 8 The Windows Firewall (formerly known as Internet Connection Firewall) Resetting the firewall settings will enable the firewall regardless

More information

Transport Protocols for Networked Games

Transport Protocols for Networked Games Transport Protocols for Networked Games 1 TCP or UDP? 2 Why use TCP? TCP provides reliable, in-order delivery TCP goes through most firewalls, UDP does not TCP manages connection for us 3 Why not to use

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

L6: OSI Reference Model

L6: OSI Reference Model EECS 3213 Fall 2014 L6: OSI Reference Model Sebastian Magierowski York University 1 Outline The OSI Reference Model An organized way of thinking about network design (from low-level to high-level considerations)

More information

Monitoring the Mobility Express Network

Monitoring the Mobility Express Network About the Cisco Mobility Express Monitoring Service, on page 1 Customizing the Network Summary View, on page 2 Viewing the Details of Configured WLANs, on page 5 Customizing Access Points Table View, on

More information

Optical Technologies in Terabit Networks. Dr. John Ryan Principal & Chief Analyst RHK

Optical Technologies in Terabit Networks. Dr. John Ryan Principal & Chief Analyst RHK Optical Technologies in Terabit Networks Dr. John Ryan Principal & Chief Analyst RHK Optical Internetworking Forum, Atlanta, June 5th, 2000 IP Traffic Is Exploding... RHK's Internet Traffic Forecast 18,000,000

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Module 7: Configuring and Supporting TCP/IP

Module 7: Configuring and Supporting TCP/IP Module 7: Configuring and Supporting TCP/IP Contents Overview 1 Introduction to TCP/IP 2 Examining Classful IP Addressing 10 Defining Subnets 17 Using Classless Inter-Domain Routing 29 Configuring IP Addresses

More information

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

BU-2 How Protocols Work 16 June 2009

BU-2 How Protocols Work 16 June 2009 BU-2 How Protocols Work 16 June 2009 Ray Tompkins Founder & CEO SHARKFEST '09 Stanford University June 15-18, 2009 How Protocols Work Presentation Overview The Challenge Understanding How Protocols Work

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Maximizing visibility for your

Maximizing visibility for your Maximizing visibility for your OptiView Series III Integrated Network Analyzer Network management and security departments have different network access requirements from the end user and server groups.

More information

Investigating Transparent Web Proxies in Cellular Networks

Investigating Transparent Web Proxies in Cellular Networks Investigating Transparent Web Proxies in Cellular Networks Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Bassett, David Choffnes, Ramesh Govindan USC & Northeastern University March 20, 2015 Introduction

More information

MULTICAST AND IGMPv3. Announcements. Today s Lecture. Multicast (No Sharing) Unicast. I. HW5 will be online today CIDR, subnets, routing

MULTICAST AND IGMPv3. Announcements. Today s Lecture. Multicast (No Sharing) Unicast. I. HW5 will be online today CIDR, subnets, routing Announcements MULTICAST AND IGMPv3 I. HW5 will be online today CIDR, subnets, routing due in one week Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. Correction to calendar! copyright

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network Hands-on Networking Fundamentals Chapter 12 Maintaining and Troubleshooting Your Network Objectives Use hardware and software methods to monitor a network Perform backups over a network Solve a broad range

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 inside: SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN & The Advanced Computing Systems Association & The System Administrators

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Sybex CCENT Chapter 12: Security. Instructor & Todd Lammle

Sybex CCENT Chapter 12: Security. Instructor & Todd Lammle Sybex CCENT 100-101 Chapter 12: Security Instructor & Todd Lammle Chapter 12 Objectives The CCENT Topics Covered in this chapter include: IP Services Describe the types, features, and applications of ACLs

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island!

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island! CS61C Machine Structures Lecture 37 Networks April 24, 2006 John Wawrzynek Page 1 No Machine is an Island! Computer Processor (active) Control ( brain ) Datapath ( brawn ) Memory (passive) (where programs,

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10 Extending the LAN Info 341 Networking and Distributed Applications Context Building up the network Media NIC Application How to hook things together Transport Internetwork Network Access Physical Internet

More information

How to configure the AT-AR450S Firewall using the Graphical User Interface (GUI)

How to configure the AT-AR450S Firewall using the Graphical User Interface (GUI) How to configure the AT-AR450S Firewall using the Graphical User Interface (GUI) Introduction This document describes the firewall configuration facility available on the AT-AR450S HTTP-based Graphical

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

Rhinoceros. What s New in Zoo 5 Presenter: Dale Fugier Robert McNeel & Associates March 24, design, model, present, analyze, realize...

Rhinoceros. What s New in Zoo 5 Presenter: Dale Fugier Robert McNeel & Associates March 24, design, model, present, analyze, realize... What s New in Zoo 5 Presenter: Dale Fugier Robert McNeel & Associates March 24, 2014 Presenter: Dale Fugier Rhinoceros Development Robert McNeel & Associates, Seattle WA Assistant: Mary Ann Fugier Technical

More information

A New Approach to Fixing Internet Application Performance. Elad Rave, Founder and CEO

A New Approach to Fixing Internet Application Performance. Elad Rave, Founder and CEO A New Approach to Fixing Internet Application Performance Elad Rave, Founder and CEO Agenda What? Today s Internet and Content Why? Impact on performance How? A cloud-based solution The Cloud: Platforms

More information

IT 341: Introduction to System

IT 341: Introduction to System IT 341: Introduction to System Administration Private IP Addresses and the Internet Using IP Addresses to Communicate Over the Internet Network Address Translation Private IP Addresses and the Internet

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: (a) Reserving network resources ahead of data being sent: (2pts) In circuit-switching networks,

More information

SOFTWARE DEFINED NETWORKING/ OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS

SOFTWARE DEFINED NETWORKING/ OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS SOFTWARE DEFINED NETWORKING/ OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 From Past to Future Bringing modularity to network infrastructure Device (Applications) Network Controller Physical

More information

Support for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only.

Support for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only. Support for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only. Transparently Routing Web Traffic to the Barracuda Web Security Gateway This article demonstrates

More information

Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE

Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE #20655 @ecbanks Senior Network Architect, Carenection Co-founder, Packet Pushers Interactive http://ethancbanks.com http://packetpushers.net

More information

Introduction to Computer

Introduction to Computer PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone

More information

DSL/CABLE ROUTER with PRINT SERVER

DSL/CABLE ROUTER with PRINT SERVER USER S MANUAL DSL/CABLE ROUTER with PRINT SERVER MODEL No:SP888BP http://www.micronet.info 1 Content Table CHAPTER 0:INTRODUCTION... 4 FEATURES... 4 MINIMUM REQUIREMENTS... 4 PACKAGE CONTENT... 4 GET TO

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Contents. 2 NB750 Load Balancing Router User Guide YML817 Rev1

Contents. 2 NB750 Load Balancing Router User Guide YML817 Rev1 Contents CHAPTER 1. INTRODUCTION... 4 1.1 Overview... 4 1.2 Hardware... 6 1.2.1 Front Panel View... 6 1.2.2 Rear Panel View... 7 1.2.3 Hardware Load Default... 7 1.3 Features... 8 1.3.1 Software Feature...

More information

A quick theorical introduction to network scanning. 23rd November 2005

A quick theorical introduction to network scanning. 23rd November 2005 A quick theorical introduction to network ASBL CSRRT-LU (Computer Security Research and Response Team Luxembourg) http://www.csrrt.org/ 23rd November 2005 IP protocol ACK Network is not exact science When

More information

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO, Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

LECTURE WK4 NETWORKING

LECTURE WK4 NETWORKING LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 19: Networks and Distributed Systems

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 19: Networks and Distributed Systems S 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2004 Lecture 19: Networks and Distributed Systems 19.0 Main Points Motivation for distributed vs. centralized systems

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information