Network+ LAB Name. Lab 1a: MS Win 2000/2003/2008 Server Installation

Size: px
Start display at page:

Download "Network+ LAB Name. Lab 1a: MS Win 2000/2003/2008 Server Installation"

Transcription

1 Network+ LAB Name 1a: MS Win 2000/2003/2008 Server Installation This Win Server lab exercise shows students how to install a Win server host. Students (in pairs) install the Server NOS (from a CD) onto a removable hard disk. The learning outcomes include: (1) prepare Win Server installation (2) partition the removable hard disk for (3) configure the network (4) set up the Administrator password (5) add a user account (6) configure password authentication (7) Install various software packages. (8) After successful installation, students must reboot the machine to verify that the host is up and running as expected. 1b: Linux Installation This Linux lab exercise shows students how to install a Linux host. Students (in pairs) install the Linux 8 (from a CD) onto a removable hard disk (see section 4 for more about removable hard (disk). The learning outcomes include: (1) prepare Linux installation boot disk; (2) partition the removable hard disk for Linux installation; (3) configure the network; (4) set up the root password; (5) add a user account; (6) configure password authentication (7) Install various software packages. (8) After successful installation, students must reboot the machine to verify that the host is up and running as expected. Note: All Equipment and Software can be check out through LAB Instructor.

2 2a: ping This lab should extend your knowledge of connectivity testing and bandwidth measurement. Ping is a basic and ubiquitous utility for checking connectivity. It derives its name from the sound sonar makes. It is also the basis for a number of variants and advanced tools and is available in a number of forms. Its basic operation is quite simple. It sends an ICMP echo request packet to a remote host. If properly configured, the remote host will send back an ICMP echo reply packet. Reception of the reply indicates basic connectivity between the source host and the destination. Consequently, ping is often the first tool that a network administrator or savvy user will turn to when confronted with a network problem. ping and ping-like tools can be used to estimate the transmission rate of a connection. To understand how this works, we need to be very clear on what the terms we are using mean. Whenever a packet is sent across a network, there are three timing-components (or delays) that determine how long it takes for the packet to arrive the propagation delay, the transmission delay, and the queuing delay. For a link along the path, the propagation delay depends on the length of the link and the propagation speed (usually expressed as a percentage of the speed of light). This is unaffected by packet size. The transmission delay is the product of the speed at which the bits can be placed on the media (the transmission rate usually measured in bits per second) and the number of bits that must be transmitted. While technically inaccurate, the transmission rate is often described as the bandwidth of a connection. The final delay is the queuing delay the amount of time a packet spends in routers waiting to be transmitted. This depends on the number and size of the other packets in the queue before it as well as the transmission rate of the interface. The total propagation time in simply the sum of these three delays for each link along the path. Since only the transmission delay depends on size of the packet, it is possible to vary the packet size and use the difference in delays to estimate the amount of time to estimate the transmission rate of an interface. A privileged user can specify the packet size used by ping with the -s option. Unfortunately, ping has been implicated in a number of security threats in recent years. For example, in the ping-of-death attack, an ill-formed ping packet may cause an older system to crash. (Actually any ill-formed packet would cause this problem. It is just easier to create the problem with ping packets.) ping has been used for denial-of-service attacks such as the Smurf Attacks where a host is flooded with ping packets. ping has also been used to probe systems. While the real problem in each of these cases has been misconfigured systems or firewalls, some system administrators have naively configured their systems not to respond to ping. As a result, they and their users have lost a valuable tool. For each of the following steps describe your results, give the syntax of the command you used, and, where appropriate, the output produced. Include screen captures as needed in your output. Be sure to label your results carefully and organize your results in the order of steps as given here and to answer each question in your report. Ping google.com Ping google.com t (Use control and C to stop) TTL

3 2b: traceroute This lab should extend your knowledge of connectivity testing and the operation of some TCP/IP basics. traceroute is a utility that will discover the devices on a path from one machine to another. It does this through a clever use of the time-to-live (TTL) field in an IP packet s header. The TTL field is used to limit the lifetime of a packet. As a packet passes through a router, the field is decremented. When it reaches zero, a router should discard the packet and send a time exceeded error message back to the packet s source. Of course, this error message will have the router s address as its source address. traceroute works by sending a series of packets with TTL fields of 1, 2, 3, etc. to the destination. Thus each router along the path will send back an error message saying it discarded a packet. traceroute is able to build a list of all the routers on a path to a remote machine by collecting the source addresses from these error messages. traceroute uses an unlikely port number for the destination port so that when the packet finally arrives at its destination, the destination will typically send back an ICMP port unreachable error message. Receipt of this message alerts traceroute that it has reached the end of the path. Actually, traceroute sends packets in sets of threes, each with a different port number, just in case one of the randomly selected ports is actually being used. For each of the following steps describe your results, give the syntax of the command you used, and, where appropriate, the output produced. Include screen captures as needed in your output. Be sure to label your results carefully and organize your results in the order of steps as given here and to answer each question in your report. Looking glasses are web sites that allow you to run simple network analysis programs like ping and traceroute from their sites. The site maintains a list of such sites. Visit one of these sites and do a traceroute.

4 2c: ARP In this lab we will look at the relationship between Ethernet and TCP/IP. This lab should extend your knowledge of both the Address Resolution Protocol and Ethernet. All TCP/IP implementations are built on top of and rely on a data-link protocol such as Ethernet or token ring. While TCP/IP is responsible for end-to-end communications, the data link level manages the point-to-point communications. That is, all IP networks operate by sending packets to the next computer using a data-link protocol. Whenever IP forwards a packet, it must be to a machine on a directly connected subnet. Since routers are connected to multiple subnets, the packet can make its way across a network one subnet at a time. Since the network layer knows only the IP address of the next hop, this IP address must be mapped into the data-link address or MAC address. This is the role of ARP. Each Ethernet device uses a 48-bit address. Like IP, each Ethernet address should be globally unique. (There is one major exception to this. Some devices will use the same Ethernet address on every interface in that device. As you can imagine, this may create nasty problems for other devices and should be discouraged.) Each address can be divided into two parts, a 24-bit Organization Unique Identifier (OUI) and a 24-bit assigned address. Each Ethernet manufacturer applies for and is assigned a different OUI by the IEEE. It uses these as the first 24 bits of the address of every interface it manufactures. The manufacturer is free to assign the remaining bits of the address as it sees fit, provided all devices it manufactures have unique addresses. You can look up an OUI at the site For example, the Ethernet address of the machine this document is being written on is B-CA-D4-25 in HEX. The OUI is B. This OUI is assigned to Dell. Sometimes, interpreting the results returned by this site can be a little tricky since when one company acquires another, they also acquire the OUI. Thus, the system may return the original company name rather than the name of the new parent company. You should also keep in mind that a number of Ethernet addresses are reserved for special purposes. For example, the address FF-FF-FF-FF-FF-FF is a broadcast address. Obviously, you won t get anywhere searching the OUI FF-FF-FF. ARP is a somewhat overloaded term. ARP (uppercase) is the protocol while arp (lowercase) is the program that implements the protocol. arp constructs an arp table (or arp cache) that contains the IP to Ethernet address mappings. That is, the arp program, using the ARP protocol, maintains the arp table, a table of IP to MAC address mappings. There will be one entry in the table for each directly connected device that your computer currently knows how to contact. There won t be any entries for devices on remote subnets since you can t use Ethernet to connect directly to those devices. Rather, you may see an entry corresponding to the device that is the next hop on the path. There are two ways that an address may be added to an arp table. It may be added statically, either directly by a user or by a script (typically at startup). Static addresses usually remain in the table until the machine reboots or they are explicitly removed. The ARP protocol also provides a mechanism to dynamically discover the address mappings for devices. If the address mapping is unknown, an ARP request packet containing the IP address of the desired destination will be sent to every device on the subnet, i.e., an ARP request is sent as an Ethernet broadcast packet. Each device on the subnet should be listening for these packets. Each will examine the packet. If the desired destination s IP address is a listening device s IP address, that device will respond to the ARP request with an ARP reply. There is usually a timeout for dynamically discovered addresses. If not used, these mappings will usually disappear from the arp table within a few minutes. Arp Arp -a

5 2d: Name Resolution (nslookup) A key element in a computer network is a mechanism to map between the numeric addresses used by computers and the more descriptive names used by people. This laboratory investigates the mechanism TCP/IP networks use. Other network protocols provide similar mechanisms. When a user enters a computer name such as the name is converted into an IP address ( in this case), which is what is actually used by the communications protocol. With IP networks, several different mechanisms may be used. The simplest mechanism is host tables. Host tables are nothing more than tables giving IP addresses and the names that correspond to the IP address, one entry per line. On most Unix systems, the host table is the file /etc/hosts. Microsoft Windows also uses host files but their locations vary depending on the software version. Most systems will check the host file before attempting to use other mechanisms. But while the host file is a simple and efficient mechanism, it doesn t scale since every system you want to communicate with must be entered into the table. So, apart from small isolated static networks, a more scalable mechanism is needed to extend this mechanism. DNS (domain name services) is the most commonly used mechanism. DNS uses a hierarchical system of name servers reflected in the structure of host names. Consider the name If your system does not know the IP address of this site already, it will contact the server for the gov domain. This site knows the address of the name server for the domain whitehouse.gov. This server will know the address of the web server, When the whitehouse.gov domain was created, the creators registered the domain name and the IP address of its name server was entered into the DNS server for the gov domain. The administrators for the whitehouse.gov domain are responsible for supplying the server for their domain. In turn, they may create additional subdomains under their domain. Setting up a DNS server requires installing the appropriate software on a sever and entering the DNS information for the domain. The most commonly used software in the Unix world is bind. There are several tools that can be used to query domain name servers. The most common is nslookup. This is available on Windows as well as Unix systems. nslookup can be used as both an interactive or command-line tool. If you enter nslookup without an argument, you will enter interactive mode. You can type a? for a brief list of commands options. Unfortunately, most system administrators now view the information returned by tools like nslookup as a security leak and limit what is available through nslookup queries. A number of other similar tools exist, most notably dig. There are alternatives to DNS. NIS and NIS+ is used on many systems, particularly systems from SUN Microsystems. DDNS is an extension to DNS that does dynamic address mapping. You might use DDNS if you are using a DHCP server to lease IP addresses. With traditional DNS, the name server would not know which machines has which address since the addresses would be changing. DDNS works with the DHCP server to solve this problem. One last word about DNS DNS breaks at times. The usual way to test DNS is to ping the same site by name and by IP number. If the later works and the former doesn t, you probably have a DNS problem. Of course, if you know every IP address you ll ever need, you can always bypass name resolution. Examine the host table on your computer. Explain the structure of the table. Immediately after pinging a site requiring name resolution, ping the site a second time. Do you see the same name resolution packets? Why or why not?

6 2e: File Transfer Protocol This lab introduces the FTP protocol and command set. The File Transfer Protocol or FTP (RFC 959) is used to move files from one machine to another. Like protocols, the protocol provides a simple command set that is used by FTP software. But in several ways, FTP can be more complex. Here are a few FTP commands Command USER user s name PASS password SYST STAT HELP QUIT Description Log into host Supply user s password Get a description of the remote system Find out the status of the connection List commands or get information about a specific command End the session Here is a slightly edited sample session using several FTP commands. This session was created by using TELNET to connect to the destination server at port nobody.nowhere.org FTP server (Version 6.00LS) ready. user joe 331 Password required for joe. pass hushhush 230 User joe logged in. syst 215 UNIX Type: L8 Version: BSD stat 211- nobody.nowhere.org FTP server status: Version 6.00LS Connected to joe ( ) Logged in as joe TYPE: ASCII, FORM: Nonprint; STRUcture: File; transfer MODE: Stream No data connection This example shows an FTP login to nohow.nowhere.org. At first glance, this looks a lot like the sessions. But if you try some of the other commands such as LIST, you ll discover that most don t work. The reason is that FTP opens separate connections to transfer information, something that a TELNET client can t cope with. This means that we are going to have to turn to other tools to see how FTP works, specifically packet capture. (Still, using TELNET can be helpful. For example, it can be used to confirm that the FTP server is operational or to investigate which modes it will support.) FTP Microsoft.com

7 For more information on a specific command, type HELP command-name ASSOC Displays or modifies file extension associations. AT Schedules commands and programs to run on a computer. ATTRIB Displays or changes file attributes. BREAK Sets or clears extended CTRL+C checking. CACLS Displays or modifies access control lists (ACLs) of files. CALL Calls one batch program from another. CD Displays the name of or changes the current directory. CHCP Displays or sets the active code page number. CHDIR Displays the name of or changes the current directory. CHKDSK Checks a disk and displays a status report. CHKNTFS Displays or modifies the checking of disk at boot time. CLS Clears the screen. CMD Starts a new instance of the Windows command interpreter. COLOR Sets the default console foreground and background colors. COMP Compares the contents of two files or sets of files. COMPACT Displays or alters the compression of files on NTFS partitions. CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive. COPY Copies one or more files to another location. DATE Displays or sets the date. DEL Deletes one or more files. DIR Displays a list of files and subdirectories in a directory. DISKCOMP Compares the contents of two floppy disks. DISKCOPY Copies the contents of one floppy disk to another. DOSKEY Edits command lines, recalls Windows commands, and creates macros. ECHO Displays messages, or turns command echoing on or off. ENDLOCAL Ends localization of environment changes in a batch file. ERASE Deletes one or more files. EXIT Quits the CMD.EXE program (command interpreter). FC Compares two files or sets of files, and displays the differences between them. FIND Searches for a text string in a file or files. FINDSTR Searches for strings in files. FOR Runs a specified command for each file in a set of files. FORMAT Formats a disk for use with Windows. FTYPE Displays or modifies file types used in file extension associations. GOTO Directs the Windows command interpreter to a labeled line in a batch program. GRAFTABL Enables Windows to display an extended character set in graphics mode. HELP Provides Help information for Windows commands. IF Performs conditional processing in batch programs. LABEL Creates, changes, or deletes the volume label of a disk. MD Creates a directory. MKDIR Creates a directory. MODE Configures a system device. MORE Displays output one screen at a time. MOVE Moves one or more files from one directory to another directory. PATH Displays or sets a search path for executable files. PAUSE Suspends processing of a batch file and displays a message. POPD Restores the previous value of the current directory saved by PUSHD.

8 PRINT Prints a text file. PROMPT Changes the Windows command prompt. PUSHD Saves the current directory then changes it. RD Removes a directory. RECOVER Recovers readable information from a bad or defective disk. REM Records comments (remarks) in batch files or CONFIG.SYS. REN Renames a file or files. RENAME Renames a file or files. REPLACE Replaces files. RMDIR Removes a directory. SET Displays, sets, or removes Windows environment variables. SETLOCAL Begins localization of environment changes in a batch file. SHIFT Shifts the position of replaceable parameters in batch files. SORT Sorts input. START Starts a separate window to run a specified program or command. SUBST Associates a path with a drive letter. TIME Displays or sets the system time. TITLE Sets the window title for a CMD.EXE session. TREE Graphically displays the directory structure of a drive or path. TYPE Displays the contents of a text file. VER Displays the Windows version. VERIFY Tells Windows whether to verify that your files are written correctly to a disk. VOL Displays a disk volume label and serial number. XCOPY Copies files and directory trees.

All Microsoft Dos Commands

All Microsoft Dos Commands 1 All Microsoft Dos Commands (Microsoft Disk Operating System) 2 All Microsoft Dos Commands: ADDUSERS ARP ASSOC ASSOCIAT AT ATTRIB BOOTCFG BROWSTAT CACLS CALL CD CHANGE CHKDSK CHKNTFS CHOICE CIPHER CleanMgr

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Chgport The chgport command can be used to display or change COM port mappings for DOS compatibility.. Chgusr The chgusr command is used to change the

Chgport The chgport command can be used to display or change COM port mappings for DOS compatibility.. Chgusr The chgusr command is used to change the Windows 7 Command Prompt Commands Append The append command can be used by programs to open files in another directory as if they were located in the current directory. Arp The arp command is used to display

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

INDEX OF COMMANDS. ATTRIB [+r] [x:]{file} [-r] 92, 180. BACKUP x:[{file}] y:[/d][/m][/s] BASIC [[x:]{file}] BASICA [[x:]{file}] CD [[x:]\{name}]

INDEX OF COMMANDS. ATTRIB [+r] [x:]{file} [-r] 92, 180. BACKUP x:[{file}] y:[/d][/m][/s] BASIC [[x:]{file}] BASICA [[x:]{file}] CD [[x:]\{name}] INDEX OF COMMANDS In this index of commands, anything between square brackets indicates an alternative or a facultative addition to the command in question; "x:" and "y:" mean the designation of a drive;

More information

Configuring IP Services

Configuring IP Services This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To

More information

Configuring IPv4 Broadcast Packet Handling

Configuring IPv4 Broadcast Packet Handling Configuring IPv4 Broadcast Packet Handling Finding Feature Information Configuring IPv4 Broadcast Packet Handling Last Updated: April 12, 2011 This module explains what IPv4 broadcast packets are, when

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols. Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you

More information

Configuring IPv4 Broadcast Packet Handling

Configuring IPv4 Broadcast Packet Handling Configuring IPv4 Broadcast Packet Handling This module explains what IPv4 broadcast packets are, when they are used, and how to customize your router s configuration for situations when the default behavior

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

Basic DOS Commands MCQ

Basic DOS Commands MCQ 1. An entire path name, consisting of several sub-directory names can contain upto A) 13 character B) 36 character C) 63 character D) 53 character 2. In which year the first operating system was developed

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

COMS3200/7201 Computer Networks 1 (Version 1.0)

COMS3200/7201 Computer Networks 1 (Version 1.0) COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

HELP Use the help command to list all the following supported commands:

HELP Use the help command to list all the following supported commands: Available commands within Windows Recovery Console The following commands are available within the Windows Recovery Console. The commands are not case-sensitive. HELP Use the help command to list all the

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Table of Contents 1 System Maintaining and Debugging Commands 1-1 Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining

More information

5. Write a capture filter for question 4.

5. Write a capture filter for question 4. Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.

More information

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and

More information

Using Cisco IOS Software

Using Cisco IOS Software APPENDIX A This appendix describes the basics about using the Cisco IOS software that is installed on every Cisco ubr905 and Cisco ubr925 cable access routers: Accessing the Command-Line Interface, page

More information

Lab Two Using Wireshark to Discover IP NAME:

Lab Two Using Wireshark to Discover IP NAME: Lab Two Using Wireshark to Discover IP NAME: In this lab, we ll investigate the IP protocol, focusing on the IP datagram. We ll do so by analyzing a trace of IP datagrams sent and received by an execution

More information

IOS and Configuration Basics

IOS and Configuration Basics APPENDIX C This appendix contains basic information about the Cisco Internet Operating System (IOS) software and includes the following sections: Cisco IOS Modes of Operation Getting Context-Sensitive

More information

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated

More information

Lab 3: Basic Device Configuration

Lab 3: Basic Device Configuration Lab 3: Basic Device Configuration University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 2 Lab 3: Basic Device Configuration **Given

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection 21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the

More information

Checking Port Status and Connectivity

Checking Port Status and Connectivity CHAPTER 5 This chapter describes how to check switch port status and connectivity on the Catalyst 4500 series switch. This chapter includes the following major sections: Checking Module Status, page 5-1

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Using AutoInstall and Setup

Using AutoInstall and Setup Using AutoInstall and Setup The Cisco IOS software includes two features that simplify or automate the configuration of Cisco devices AutoInstall allows a network manager to load configuration files onto

More information

TFTP and FTP Basics BUPT/QMUL

TFTP and FTP Basics BUPT/QMUL TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer

More information

Additional laboratory

Additional laboratory Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols SC/CSE 3213 Winter 2013 L9: Control Protocols Sebastian Magierowski York University 1 Outline ICMP ARP DHCP NAT (not a control protocol) 2 1 Control Protocols IP is used to transfer data Network layer

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

Configuring IP Services

Configuring IP Services Configuring IP Services Last Updated: December 16, 2011 This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

INTERNET BASICS / FILE OPERATIONS Defining Information Technology

INTERNET BASICS / FILE OPERATIONS Defining Information Technology L A B 2 INTERNET BASICS / FILE OPERATIONS Defining Information Technology This lab covers fundamental concepts of network organization, focusing on the client-server model for network resources such as

More information

H

H H12-223 Number: H12-223 Passing Score: 600 Time Limit: 120 min Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the administrator take?

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice

More information

Lab Troubleshooting Using traceroute Instructor Version 2500

Lab Troubleshooting Using traceroute Instructor Version 2500 Lab 9.3.4 Troubleshooting Using traceroute Instructor Version 2500 294-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 9.3.4 Copyright 2003, Cisco Systems, Inc. Objective Use the traceroute Cisco IOS

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Packet Tracer - Using Traceroute to Discover the Network (Instructor Version)

Packet Tracer - Using Traceroute to Discover the Network (Instructor Version) (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Scenario The company you work for has acquired a new branch location.

More information

Configuring Basic File Transfer Services

Configuring Basic File Transfer Services Using basic file transfer services, you can configure a router as a Trivial File Transfer Protocol (TFTP) or Reverse Address Resolution Protocol (RARP) server, configure the router to forward extended

More information

Lab I: Using tcpdump and Wireshark

Lab I: Using tcpdump and Wireshark Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html

More information

Table of Contents. Appendix A - More on Windows. M205/M206 Installation and Configuration Guide

Table of Contents. Appendix A - More on Windows. M205/M206 Installation and Configuration Guide Table of Contents Overview......................................... A-1 Key Features......................................... A-1 New Features......................................... A-1 M205/M206 Configuration.....................................

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

H

H H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the

More information

Conventions in this tutorial

Conventions in this tutorial This document provides an exercise using Digi JumpStart for Windows Embedded CE 6.0. This document shows how to develop, run, and debug a simple application on your target hardware platform. This tutorial

More information

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Table of Contents 1 System Maintenance and Debugging Commands 1-1 Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Router Startup and Configuration

Router Startup and Configuration Router Startup and Configuration Router Startup In general, the boot process follows these steps: Test hardware (POST) Load the bootstrap program Locate and load the Cisco IOS Locate and load the router

More information

VERSION Lab 3: Link Layer

VERSION Lab 3: Link Layer Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below. CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Using the Command Line Interface

Using the Command Line Interface CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection Finding Feature Information, page 1 Restrictions for Dynamic ARP Inspection, page 1 Understanding Dynamic ARP Inspection, page 3 Default Dynamic ARP Inspection Configuration, page 6 Relative Priority of

More information

Lab 2.8.1: Basic Static Route Configuration

Lab 2.8.1: Basic Static Route Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 172.16.3.1 255.255.255.0 N/A S0/0/0 172.16.2.1 255.255.255.0 N/A Fa0/0 172.16.1.1 255.255.255.0 N/A R2

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

Configuring IP Addressing

Configuring IP Addressing 8 Configuring IP Addressing Contents Overview..................................................... 8-2.............................................. 8-2 Just Want a Quick Start with IP Addressing?....................

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Lab 4.2.5a Connectivity Tests Ping

Lab 4.2.5a Connectivity Tests Ping Lab 4.2.5a Connectivity Tests Ping Objective Use the ping command to send ICMP datagrams to target host. Verify that the network layer between source and destination is working properly. Retrieve information

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

IPv6 Commands: ipv6 h to ipv6 mi

IPv6 Commands: ipv6 h to ipv6 mi IPv6 Commands: ipv6 h to ipv6 mi ipv6 hello-interval eigrp, page 3 ipv6 hold-time eigrp, page 5 ipv6 hop-limit, page 7 ipv6 host, page 8 ipv6 icmp error-interval, page 10 ipv6 inspect, page 12 ipv6 inspect

More information

Exam E1 Copyright 2010 Thaar AL_Taiey

Exam E1 Copyright 2010 Thaar AL_Taiey Exam E1 2 Exam E1 E1-1. Which of the following statements is true regarding the internetwork shown in Figure E1-1? (Select all that apply) Figure E1-1 A Sample Internetwork A. The link number 15 uses a

More information

ipv6 hello-interval eigrp

ipv6 hello-interval eigrp ipv6 hello-interval eigrp ipv6 hello-interval eigrp To configure the hello interval for the Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv6 routing process designated by an autonomous system

More information

Description of the Windows XP Recovery Console for advanced users

Description of the Windows XP Recovery Console for advanced users Page 1 of 11 Article ID: 314058 - Last Review: September 22, 2008 - Revision: 5.4 Description of the Windows XP Recovery Console for advanced users System Tip This article applies to a different version

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

ICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP

ICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP 112039 Computer Networks Lab - 3 ICMP 1. Lab Course Number: 112039 2. Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP 4. Lab Overview: In this lab, we ll investigate the ICMP protocol; examine

More information

Computer Architecture Lab 1 (Starting with Linux)

Computer Architecture Lab 1 (Starting with Linux) Computer Architecture Lab 1 (Starting with Linux) Linux is a computer operating system. An operating system consists of the software that manages your computer and lets you run applications on it. The

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP Firewall Stateful Inspection of ICMP Last Updated: March 26, 2012 The Firewall Stateful Inspection of ICMP feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

CCNA Explorer 1 Chapter 11 Configuring & Testing Your Network

CCNA Explorer 1 Chapter 11 Configuring & Testing Your Network CCNA Explorer 1 Chapter 11 Configuring & Testing Your Network 11.1.1 What is the system software in Cisco devices? The Cisco IOS provides devices with what network services? How is the IOS generally accessed?

More information

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists Name: In this lab you will learn: PartA Cisco 2600 Router Configuration Static Routing PartB 20 min Dynamic

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Auxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets

Auxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets Internet Layer Auxiliary Protocols aw division into three tasks: Data transfer over a global network oute decision at the sub-nodes Control of the network or transmission status outing Protocols outing

More information