sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi

Size: px
Start display at page:

Download "sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi"

Transcription

1 Titolo presentazione Piattaforme Software per la Rete sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17, Alessandro Barenghi

2 Outline 1) Introduction and Netkit-NG 2) Link-Layer Management 3) Network-Layer Management 4) Monitor traffic 2/30

3 Introduction and Netkit-NG

4 Netkit-NG The Netkit-NG tool provides a simple and fast way to emulate one faithfully on a single host It employs User Mode Linux (UML) to run lightweight virtual machines It emulates L2 collision domains You can emulate an entire network on your machine with minimal effort Easy to install, go to and follow the instructions 4/30

5 Netkit-NG Start virtual machines The command vstart starts a VM and sets the network cards on a specific collision domain e.g. vstart my_vm eth0=0 --mem=128 To stop a virtual machine: : gracefully shutdown vhalt vcrash : kill the virtual machine The command vlist lists all running VMs 5/30

6 ISO/OSI vs TCP/IP 7 Application 6 Presentation 5 Session 4 Transport Transport 3 Network Internet 2 Data Link 1 Physical Application Network Access 6/30

7 Linux network management Network management is instrinsically split between userspace and kernelspace (the network stack resides in kernelspace in Linux, your management tools don t) Common old tools: ifconfig route They use the old and limited ioctl system call We will see the new tools of IPROUTE2 suite, that uses the Netlink interface 7/30

8 A few words on Netlink... Special IPC used for transferring information between kernel and userspace processes Based on standard C socket API Custom tools for communication with the kernel facilities can be written simply in C 8/30

9 The `ip` command Syntax: ip [options] object command... We will deal only with Ethernet addresses. IP supports also other technologies (e.g. DSL) 9/30

10 Application 7 6 Presentation 5 Session 4 3 Transport Transport Network Internet 2 Data Link 1 Physical Network Access Link Layer Management Application

11 Device names in Linux Traditional naming scheme: eth0, eth1,, wlan0, The udev subsystem binds each name to a MAC address May cause problems in some situations Recent versions of systemd introduced the predictable network interface device names: PCI devices: [prefix]p[bus]s[slot] [prefix] = en Ethernet, wl Wireless Example: enp2s0 11/30

12 Link-Layer addresses List all devices and show their L2 addresses: Change your current MAC address with something else: ip link set <device> address <MAC address> Enable/Disable the ARP protocol: ip link show ip link set <device> arp [on off] Enable/Disable the network interface: ip link set <device> [up down] 12/30

13 ARP tables Management How to... Add a line to the ARP table: ip neigh add <IP Address> lladdr <MAC address> dev <device> Update a line in the ARP table: ip neigh change <IP Address> lladdr <MAC address> dev <device> Print the ARP table: ip neigh show The NUD (Neighbour Unreachability Detection) can be also set by hand using the nud <nud> parameter 13/30

14 ARP NUDs State permanent noarp reachable Meaning Entry always valid added by the system administrator. Entry valid until the lifetime expiration. No attempts to validate it. Entry valid until the lifetime expiration. Reachable. stale Entry valid but the reachable timer has expired. none Temporary value during initialization. incomplete Entry has never been validated (yet). delay Entry validation was delayed waiting the upper protocol. probe Entry is currently being probed. failed Entry not valid (max number of probing reached). 14/30

15 ARP NUDs State machine none incomplete reachable Response received permanent noarp probe Reachability timeout expires Packet received Delay timeout occurs stale Packet sent delay 15/30

16 Application 7 6 Presentation 5 Session 4 3 Transport Transport Network Internet 2 Data Link 1 Physical Network Access Network Layer Management Application

17 IP addresses (1/2) Probably the most common task you ll be performing How to List the IP addresses: ip addr show Add an IP address*: ip addr add <IP Address>/<netmask> dev <device> Remove an IP address: ip addr del <IP Address>/<netmask> dev <device> * An interface can be bound to more than a single address without the need to create an alias, as it happens in the old `ifconfig` command 17/30

18 IP addresses (2/2) By default, the broadcast address is set to (aka ) To change it, you can use the broadcast <IP address> option Remove a class of addresses from any interface: ip addr flush to <IP address>/<netmask> e.g. ip addr flush to /16 will remove any x.x address 18/30

19 Routing (1/3) Route table management is still performed via the ip tool The IP Routing table perfoms exactly as you have seen in the previous courses: The address with the logest matching prefix is selected If two addresses with the same prefix are matched, the one with the matching TOS is selected If the both address prefix and TOS match, the first route is selected As always, the default route is specified as the /0 address 19/30

20 Routing (2/3) How to... Add a route : ip route add <address>/<netmask> via <gateway> Remove a route: ip route del <address>/<netmask> via <gateway> Enforce packets to go out of a specific interface: dev <interface> Wipe all routes of a specific interface: ip route flush dev <interface> 20/30

21 Routing (3/3) Where my packets are going?! As usual, to show all registered routes: ip route get <address>[/<netmask>] ip route show To create a NAT routes*: ip route add nat <address> via <router> * we will see NAT in next lesson 21/30

22 Application 7 6 Presentation 5 Session 4 3 Transport Transport Network Internet 2 Data Link 1 Physical Network Access Transport Layer Management Application

23 Linux Traffic Control Configurations on trasport layer, basically for traffic control, can be managed via the tc tool Three main components: qdisc: the scheduler of network queues class: used to create an hierarchical tree-structure in qdisc filter: matching rules for classes We won t see in details traffic control 23/30

24 Network Monitoring

25 Network Monitoring Network monitoring means capture network traffic, measure network bandwidth or monitor connection statuses Why network monitoring? Monitor the network usage in terms of bandwidth and connections Debug ill behaved configurations or programs Steal unencrypted information 25/30

26 Host Network Status The Socket Stats tool ss replaces the old netstat Invoking the tool without parameters lists all the open sockets on the platform By default the known ports are listed with the service name instead of the port number Use -n to enforce numbers By default it shows only the connected sockets Use -l to show the listening sockets To restrict by protocol: -4 To print extensive info: -i -6 -t -u 26/30

27 Live traffic analysis Several tools available to analyze traffic Most of them rely on libpcap We will see: A traffic dumper and inspector: tcpdump (wireshark as the corresponding GUI tool) A dissection tool: ngrep 27/30

28 The `tcpdump` tool Provides a way to collect packets from one (or more) interface (not just tcp ) tcpdump The default behaviour of the tool is to print out on screen a description of the packets flowing Some useful options: -i <dev> : restrict the sniffing to one interface -w <file>: -v : show extra info -X : show packet content -XX save packets to file : show ethernet header and content 28/30

29 Wireshark Wireshark is a GUI program that performs the same task of `tcpdump` Just install it and play 29/30

30 Ngrep The idea is similar to grep tool, but it works with network packets Common usage: ngrep -d <dev> <pattern> The option -K kills (i.e. sends a RST packet) to the tcp connections matching the expression. 30/30

sottotitolo A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi

sottotitolo A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi Titolo presentazione Piattaforme Software per la Rete sottotitolo Firewall and NAT Milano, XX mese 20XX A.A. 2016/17, Alessandro Barenghi Outline 1) Packet Filtering 2) Firewall management 3) NAT review

More information

netkit lab IPv6 Neighbor Discovery (NDP)

netkit lab IPv6 Neighbor Discovery (NDP) netkit lab IPv6 Neighbor Discovery (NDP) Version 1.0 Author(s) E-mail Web Description S. Doro based on work ARP by G. Di Battista, M. Patrignani, M. Pizzonia, F. Ricci, M. Rimondini sandro.doro@gmail.com

More information

Network Administration

Network Administration Intro Network stack, brutalized Firewalling S/DNAT Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano barenghi - at - elet.polimi.it April 9, 2013 Intro Network stack, brutalized

More information

Ethernet/IP interac.on emulated with NETKIT. DHCP relay, proxy ARP, Port stealing and ARP poisoning adack.

Ethernet/IP interac.on emulated with NETKIT. DHCP relay, proxy ARP, Port stealing and ARP poisoning adack. Ethernet/IP interac.on emulated with NETKIT. DHCP relay, proxy ARP, Port stealing and ARP poisoning adack. Marco Bonola, Lorenzo Bracciale Corso di Re. di Accesso e Trasporto Tor Vergata Prof. Stefano

More information

Advanced IP Routing. Policy Routing QoS RVSP

Advanced IP Routing. Policy Routing QoS RVSP Advanced IP Routing Policy Routing QoS RVSP Traditional Routing What is traditional routing? Best effort. All routing is a destination driven process. Router cares only about the destination address when

More information

Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni

Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni!"#$%%&'()*+,#-,&.*+/01-.(2 Donato Battaglino donato.battaglino [at] uniroma2.it Lorenzo Bracciale lorenzo.bracciale [at] uniroma2.it

More information

Multimedia Communication. Project 6: Intelligent DiffServ

Multimedia Communication. Project 6: Intelligent DiffServ Multimedia Communication Project 6: Intelligent DiffServ Preliminary Design and interface definition (2003-07-08) Steffen Moser - 1 / 9 - Necessary tasks of a DiffServ aware router: Classifying Marking

More information

Part 3. ARP poisoning

Part 3. ARP poisoning Part 3 ARP poisoning Outline 1. ARP management in Linux 2. NETKIT LAB Setup 3. HTTP connecbon (from L2 to L7) 4. ARP poisoning ahack 5. AHacker configurabon and setup ARP management in Linux The ARP cache

More information

Exercises: Basics of Networking II Experiential Learning Workshop

Exercises: Basics of Networking II Experiential Learning Workshop Exercises: Basics of Networking II Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents

More information

Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni

Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni h"p://netgroup.uniroma2.it Donato Battaglino donato.battaglino [at] uniroma2.it Lorenzo Bracciale lorenzo.bracciale [at] uniroma2.it

More information

Fundamentals of Computer Networking AE6382

Fundamentals of Computer Networking AE6382 Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually

More information

Ch.6 Mapping Internet Addresses to Physical Addresses (ARP)

Ch.6 Mapping Internet Addresses to Physical Addresses (ARP) CSC521 Communication Protocols 網路通訊協定 Ch.6 Mapping Internet Addresses to Physical Addresses (ARP) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1 Introduction

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6 Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between

More information

Esercitazione re- di accesso

Esercitazione re- di accesso Esercitazione re- di accesso 15 05 2008 Outline Linux the Survivor Kit Netkit The poor man's system to experiment computer networking IpRoute2 show / manipulate rou-ng, devices, policy rou-ng and tunnels

More information

sottotitolo System Security Introduction Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani

sottotitolo System Security Introduction Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani Titolo presentazione Piattaforme Software per la Rete sottotitolo System Security Introduction Milano, XX mese 20XX A.A. 2016/17 Outline 1) Introduction to System Security 2) Basic Exploits 3) Network

More information

Rtnetlink dump filtering in the kernel Roopa Prabhu

Rtnetlink dump filtering in the kernel Roopa Prabhu Rtnetlink dump filtering in the kernel Roopa Prabhu Agenda Introduction to kernel rtnetlink dumps Applications using rtnetlink dumps Scalability problems with rtnetlink dumps Better Dump filtering in the

More information

Firewalling. Alessandro Barenghi. May 19, Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.

Firewalling. Alessandro Barenghi. May 19, Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi. Firewalling Alessandro Barenghi Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.it May 19, 2011 Recap By now, you should be familiar with... Programming with

More information

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP.

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Lab Exercise ARP Objective To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Requirements Wireshark: This lab uses the Wireshark

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

containerization: more than the new virtualization

containerization: more than the new virtualization containerization: more than the new virtualization Jérôme Petazzoni (@jpetazzo) Grumpy French DevOps - Go away or I will replace you with a very small shell script Runs everything in containers - Docker-in-Docker

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015 Network Security Introduction to networks Radboud University, The Netherlands Autumn 2015 What is a (computer) network Definition A computer network is two or more computers that are connected, so that

More information

2 nd SEE 6DISS Workshop Plovdiv June Host Configuration (Windows XP) Athanassios Liakopoulos

2 nd SEE 6DISS Workshop Plovdiv June Host Configuration (Windows XP) Athanassios Liakopoulos 2 nd SEE 6DISS Workshop Plovdiv 27-29 June 2007 Host Configuration (Windows XP) Athanassios Liakopoulos aliako@grnet.gr 1. Lab information Network Topology The network topology is shown in Figure 1. PCs

More information

sottotitolo Socket Programming Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani

sottotitolo Socket Programming Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani Titolo presentazione Piattaforme Software per la Rete sottotitolo Socket Programming Milano, XX mese 20XX A.A. 2016/17 Outline 1) Introduction to Sockets 2) UDP communication 3) TCP communication 4) RAW

More information

Address Resolution Protocol (ARP), RFC 826

Address Resolution Protocol (ARP), RFC 826 Address Resolution Protocol (ARP), RFC 826 Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Sept. 2017 ARP & RARP } Note: } The Internet is based on IP addresses } Data link protocols (Ethernet,

More information

Lab I: Using tcpdump and Wireshark

Lab I: Using tcpdump and Wireshark Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html

More information

FiberstoreOS IP Service Configuration Guide

FiberstoreOS IP Service Configuration Guide FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP...4 1.1 Overview...4 1.2 Configuring ARP... 4 1.3 Validation commands...5 2 Configuring Proxy ARP... 7 2.1 Overview...7 2.2 Configuring

More information

Exercises: Basics of Network Layer Experiential Learning Workshop

Exercises: Basics of Network Layer Experiential Learning Workshop Exercises: Basics of Network Layer Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents

More information

Reliable Linux Wireless - Techniques for Debugging Wireless Module Integrations STEVE DEROSIER / CAL-SIERRA CONSULTING

Reliable Linux Wireless - Techniques for Debugging Wireless Module Integrations STEVE DEROSIER / CAL-SIERRA CONSULTING Reliable Linux Wireless - Techniques for Debugging Wireless Module Integrations STEVE DEROSIER / CAL-SIERRA CONSULTING IntroducIon 50 minutes?! How to work with WiFi modules with the Linux kernel - especially

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

NAME ip show / manipulate routing, devices, policy routing and tunnels

NAME ip show / manipulate routing, devices, policy routing and tunnels NAME ip show / manipulate routing, devices, policy routing and tunnels SYNOPSIS ip [ OPTIONS ] OBJECT { COMMAND help } OBJECT := { link addr route rule neigh tunnel maddr mroute monitor } OPTIONS := {

More information

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST Information Network 1 TCP 1/2 Youki Kadobayashi NAIST 1 Transport layer: a birds-eye view Hosts maintain state for each transport-layer endpoint Routers don t maintain per-host state H R R R R H Transport

More information

Configuring IPv6 for Gigabit Ethernet Interfaces

Configuring IPv6 for Gigabit Ethernet Interfaces CHAPTER 46 IP version 6 (IPv6) provides extended addressing capability beyond those provided in IP version 4 (IPv4) in Cisco MDS SAN-OS. The architecture of IPv6 has been designed to allow existing IPv4

More information

Operation Manual DHCP. Table of Contents

Operation Manual DHCP. Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 DHCP Principles... 1-1 1.1.1 BOOTP Relay Agent... 1-3 1.1.2 DHCP and BOOTP Relay Agent... 1-4 1.2 General DHCP Configuration... 1-4

More information

Lecture 20: Link Layer

Lecture 20: Link Layer Lecture 20: Link Layer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross, All Rights

More information

Understanding Linux Internetworking

Understanding Linux Internetworking White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Layer 2 vs. Layer 3 Internetworking... 2 Layer 2 Internetworking on Linux Systems... 3 Bridging... 3 Spanning

More information

VPN-against-Firewall Lab: Bypassing Firewalls using VPN

VPN-against-Firewall Lab: Bypassing Firewalls using VPN SEED Labs 1 VPN-against-Firewall Lab: Bypassing Firewalls using VPN Copyright c 2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

Address Resolution APPLIED SECURITY BASICS. Alberto Caponi

Address Resolution APPLIED SECURITY BASICS. Alberto Caponi Address Resolution APPLIED SECURITY BASICS Alberto Caponi alberto.caponi@uniroma2.it What does it happen really on Internet? Internet Client (your devices) Server (google, facebook, etc.) What a web page

More information

CMPE 151 Routing. Marc Mosko

CMPE 151 Routing. Marc Mosko CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,

More information

NETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*

NETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas* NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.

More information

Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du. TCP Attacks. Chester Rebeiro IIT Madras

Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du. TCP Attacks. Chester Rebeiro IIT Madras Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du TCP Attacks Chester Rebeiro IIT Madras A Typical TCP Client 2 A Typical TCP Server create a IPV4 stream socket

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Packet Sniffing and Spoofing

Packet Sniffing and Spoofing Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du Packet Sniffing and Spoofing Chester Rebeiro IIT Madras Shared Networks Every network packet reaches every

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

For personnal use only

For personnal use only Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.

More information

libcap_utils Documentation

libcap_utils Documentation libcap_utils Documentation Release 0.7 DPMI January 28, 2017 Contents: 1 Overview 3 2 Install instructions 5 3 Consumers 9 4 API 11 5 Tool overview 13 6 capshow 15 7 Use-cases 17 8 Indices and tables

More information

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI

More information

Routing. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP

Routing. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP outing Info 341 Networking and Distributed Applications Context Layer 3 Addresses, fragmentation, reassembly Layer 4 end-to-end communication UDP, TCP outing At layer 3 Often relies on layer 4 Application

More information

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI ISO/OSI Model ISO: International Organization for Standardization OSI: Open Systems Interconnection

More information

SOFTWARE LICENSE

SOFTWARE LICENSE CYBEROAM CONSOLE GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind,

More information

Elmic Systems: From IPv4 to MoonV6. The most fluent way to speak Internet

Elmic Systems: From IPv4 to MoonV6. The most fluent way to speak Internet Elmic Systems: From IPv4 to MoonV6 The most fluent way to speak Internet Agenda Elmic Systems development of IPv6 How Elmic IPv4 became Elmic IPv6 dual stack Lessons learned Elmic Systems and MoonV6 Elmic

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

}w!"#$%&'()+,-./012345<ya

}w!#$%&'()+,-./012345<ya MASARYKOVA UNIVERZITA FAKULTA INFORMATIKY }w!"#$%&'()+,-./012345

More information

FiberstoreOS IPv6 Service Configuration Guide

FiberstoreOS IPv6 Service Configuration Guide FiberstoreOS IPv6 Service Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...5 1.1 Overview...5 1.1.2 Manual Tunnel...6 1.1.3 6to4 Tunnel...6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

Packet Filtering and NAT

Packet Filtering and NAT Packet Filtering and NAT Alessandro Barenghi Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.it May 14, 2014 Lesson contents Overview Netfilter/Iptables Structure

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

CS 378 (Spring 2003)

CS 378 (Spring 2003) Department of Computer Sciences THE UNIVERSITY OF TEXAS AT AUSTIN CS 378 (Spring 2003) Linux Kernel Programming Yongguang Zhang (ygz@cs.utexas.edu) Copyright 2003, Yongguang Zhang This Lecture Linux Networking

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

THE INTERNET PROTOCOL/1

THE INTERNET PROTOCOL/1 THE INTERNET PROTOCOL a (connectionless) network layer protocol designed for use in interconnected systems of packet-switched computer communication networks (store-and-forward paradigm) provides for transmitting

More information

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2015 Networking Laboratory 1/56 An Overview of

More information

IP addressing and routing. Lorenzo Bracciale Donato Battaglino

IP addressing and routing. Lorenzo Bracciale Donato Battaglino IP addressing and routing Lorenzo Bracciale Donato Battaglino IP Address IP Network Hosts Routers IP Address Anatomy Each network interface connected to an IP network MUST have an UNIQUE 32-bit identifier

More information

Addressing and Routing

Addressing and Routing Addressing and Routing Andrew Scott a.scott@lancaster.ac.uk Physical/ Hardware Addresses Aka MAC* or link(-layer) address Can only talk to things on same link Unique ID given to every network interface

More information

Secure Communications Over a Network

Secure Communications Over a Network Secure Communications Over a Network Course: MITS:5400G Proffessor: Dr. Xiaodong Lin By: Geoff Vaughan 100309160 March 20th 2012 Abstract The purpose of this experiment is to transmit an encrypted message

More information

Fundamentals of Networking Network Terminologies

Fundamentals of Networking Network Terminologies Fundamentals of Networking Network Terminologies Kuldeep Sonar 1 Performance Measurements Kuldeep Sonar 2 Latency Refers to the amount of time (usually measured in milliseconds) it takes for data to travel

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

9th Slide Set Computer Networks

9th Slide Set Computer Networks Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Kernel Module Programming

Kernel Module Programming Kernel Module Programming Alessandro Barenghi Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.it June 7, 2012 Recap By now, you should be familiar with... Programming

More information

QBone Scavenger Service Implementation for Linux

QBone Scavenger Service Implementation for Linux QBone Scavenger Service Implementation for Linux Mathieu Goutelle Pascale Primet Overview of the QBSS model The QBSS model has been proposed by the Internet2 QoS Working Group. It is part of the Non-Elevated

More information

19: Networking. Networking Hardware. Mark Handley

19: Networking. Networking Hardware. Mark Handley 19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking

More information

IP addressing and routing. Lorenzo Bracciale Donato Battaglino

IP addressing and routing. Lorenzo Bracciale Donato Battaglino IP addressing and routing Lorenzo Bracciale Donato Battaglino IP Address IP Network Hosts Routers IP Address Anatomy Each network interface connected to an IP network MUST have an UNIQUE 32-bit identifier

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti.

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti. Developing ILNP Saleem Bhatti, University of St Andrews, UK 2010-07-16 FIRE workshop, Chania. (C) Saleem Bhatti. 1 What is ILNP? Identifier Locator Network Protocol: http://ilnp.cs.st-andrews.ac.uk/ ILNP

More information

EAN-Network Configuration

EAN-Network Configuration EAN-Network Configuration PN: EAN-Network-Configuration 1/25/2018 SightLine Applications, Inc. Contact: Web: sightlineapplications.com Sales: sales@sightlineapplications.com Support: support@sightlineapplications.com

More information

CSCD433/533 Advanced Networks Winter 2017 Lecture 13. Raw vs. Cooked Sockets

CSCD433/533 Advanced Networks Winter 2017 Lecture 13. Raw vs. Cooked Sockets CSCD433/533 Advanced Networks Winter 2017 Lecture 13 Raw vs. Cooked Sockets Introduction Better Understand the Protocol Stack Use Raw Sockets So far, sockets in Java either TCP or UDP based In fact, Java

More information

Intro to OpenFlow Tutorial

Intro to OpenFlow Tutorial GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight GENI: geni Intro to OpenFlow Tutorial Overview: This is a simple OpenFlow tutorial that will guide you how to use the Floodlight Controller in conjunction

More information

Network Analyzer :- Introduction to Wireshark

Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Network Analyzer :- Introduction to Wireshark Syed M. Raza s.moh.raza@skku.edu H. Choo choo@skku.edu Copyright 2000-2018 Networking Laboratory Networking Laboratory 1/56 An Overview

More information

Network Administra0on

Network Administra0on Network Administra0on (Introduc0on) Administración en Red 1 Index Introduc0on (TCP/IP) Network Interface Link Layer Network Layer Monitoring/Test Administración en Red 2 Introduc0on (TCP/IP) Protocol Suite,

More information

Addressing protocols. TELE3118 lecture notes Copyright by Tim Moors Aug-09. Copyright Aug-09, Tim Moors

Addressing protocols. TELE3118 lecture notes Copyright by Tim Moors Aug-09. Copyright Aug-09, Tim Moors Addressing protocols TELE3118 lecture notes Copyright by Tim Moors Aug-09 2 Which address(es) to use? How does source determine addresses when sending to www.example.com? o Source has its MAC address o

More information

Command Manual Network Protocol. Table of Contents

Command Manual Network Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Operating Systems Design Exam 3 Review: Spring 2011

Operating Systems Design Exam 3 Review: Spring 2011 Operating Systems Design Exam 3 Review: Spring 2011 Paul Krzyzanowski pxk@cs.rutgers.edu 1 1. Why does an IP driver need to use ARP, the address resolution protocol? IP is a logical network. An IP address

More information

What is an L3 Master Device?

What is an L3 Master Device? What is an L3 Master Device? David Ahern Cumulus Networks Mountain View, CA, USA dsa@cumulusnetworks.com Abstract The L3 Master Device (l3mdev) concept was introduced to the Linux networking stack in v4.4.

More information

Internet protocols: ICMP, ARP, DHCP

Internet protocols: ICMP, ARP, DHCP Internet protocols: ICMP, ARP, DHCP Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

ERSPAN in Linux. A short history and review. Presenters: William Tu and Greg Rose

ERSPAN in Linux. A short history and review. Presenters: William Tu and Greg Rose ERSPAN in Linux A short history and review. Presenters: William Tu and Greg Rose 1 What is Port Mirroring? Port mirroring is one of the most common network troubleshooting techniques. SPAN - Switch Port

More information

Network Traffic Analysis - Course Outline

Network Traffic Analysis - Course Outline Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

Static and source based routing

Static and source based routing Static and source based routing Lab setup For this lab students have to work in teams of two. Two team of two students (that is overall four students) should form a group and perform lab tasks together.

More information

DNS CACHE POISONING LAB

DNS CACHE POISONING LAB University of Trento Network Security - Malware lab 2 th May 2016 DNS CACHE POISONING LAB GROUP #15: MATTEO FIORANZATO MATTEO MATTIVI ANDREA SIMONELLI MICHELA TESTOLINA DON T CLOSE OR MOVE ANY WINDOW Lab

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information