Network+ LAB Name. Lab 1a: MS Win 2000/2003/2008 Server Installation
|
|
- Geraldine Kelley
- 5 years ago
- Views:
Transcription
1 Network+ LAB Name 1a: MS Win 2000/2003/2008 Server Installation This Win Server lab exercise shows students how to install a Win server host. Students (in pairs) install the Server NOS (from a CD) onto a removable hard disk. The learning outcomes include: (1) prepare Win Server installation (2) partition the removable hard disk for (3) configure the network (4) set up the Administrator password (5) add a user account (6) configure password authentication (7) Install various software packages. (8) After successful installation, students must reboot the machine to verify that the host is up and running as expected. 1b: Linux Installation This Linux lab exercise shows students how to install a Linux host. Students (in pairs) install the Linux 8 (from a CD) onto a removable hard disk (see section 4 for more about removable hard (disk). The learning outcomes include: (1) prepare Linux installation boot disk; (2) partition the removable hard disk for Linux installation; (3) configure the network; (4) set up the root password; (5) add a user account; (6) configure password authentication (7) Install various software packages. (8) After successful installation, students must reboot the machine to verify that the host is up and running as expected. Note: All Equipment and Software can be check out through LAB Instructor.
2 2a: ping This lab should extend your knowledge of connectivity testing and bandwidth measurement. Ping is a basic and ubiquitous utility for checking connectivity. It derives its name from the sound sonar makes. It is also the basis for a number of variants and advanced tools and is available in a number of forms. Its basic operation is quite simple. It sends an ICMP echo request packet to a remote host. If properly configured, the remote host will send back an ICMP echo reply packet. Reception of the reply indicates basic connectivity between the source host and the destination. Consequently, ping is often the first tool that a network administrator or savvy user will turn to when confronted with a network problem. ping and ping-like tools can be used to estimate the transmission rate of a connection. To understand how this works, we need to be very clear on what the terms we are using mean. Whenever a packet is sent across a network, there are three timing-components (or delays) that determine how long it takes for the packet to arrive the propagation delay, the transmission delay, and the queuing delay. For a link along the path, the propagation delay depends on the length of the link and the propagation speed (usually expressed as a percentage of the speed of light). This is unaffected by packet size. The transmission delay is the product of the speed at which the bits can be placed on the media (the transmission rate usually measured in bits per second) and the number of bits that must be transmitted. While technically inaccurate, the transmission rate is often described as the bandwidth of a connection. The final delay is the queuing delay the amount of time a packet spends in routers waiting to be transmitted. This depends on the number and size of the other packets in the queue before it as well as the transmission rate of the interface. The total propagation time in simply the sum of these three delays for each link along the path. Since only the transmission delay depends on size of the packet, it is possible to vary the packet size and use the difference in delays to estimate the amount of time to estimate the transmission rate of an interface. A privileged user can specify the packet size used by ping with the -s option. Unfortunately, ping has been implicated in a number of security threats in recent years. For example, in the ping-of-death attack, an ill-formed ping packet may cause an older system to crash. (Actually any ill-formed packet would cause this problem. It is just easier to create the problem with ping packets.) ping has been used for denial-of-service attacks such as the Smurf Attacks where a host is flooded with ping packets. ping has also been used to probe systems. While the real problem in each of these cases has been misconfigured systems or firewalls, some system administrators have naively configured their systems not to respond to ping. As a result, they and their users have lost a valuable tool. For each of the following steps describe your results, give the syntax of the command you used, and, where appropriate, the output produced. Include screen captures as needed in your output. Be sure to label your results carefully and organize your results in the order of steps as given here and to answer each question in your report. Ping google.com Ping google.com t (Use control and C to stop) TTL
3 2b: traceroute This lab should extend your knowledge of connectivity testing and the operation of some TCP/IP basics. traceroute is a utility that will discover the devices on a path from one machine to another. It does this through a clever use of the time-to-live (TTL) field in an IP packet s header. The TTL field is used to limit the lifetime of a packet. As a packet passes through a router, the field is decremented. When it reaches zero, a router should discard the packet and send a time exceeded error message back to the packet s source. Of course, this error message will have the router s address as its source address. traceroute works by sending a series of packets with TTL fields of 1, 2, 3, etc. to the destination. Thus each router along the path will send back an error message saying it discarded a packet. traceroute is able to build a list of all the routers on a path to a remote machine by collecting the source addresses from these error messages. traceroute uses an unlikely port number for the destination port so that when the packet finally arrives at its destination, the destination will typically send back an ICMP port unreachable error message. Receipt of this message alerts traceroute that it has reached the end of the path. Actually, traceroute sends packets in sets of threes, each with a different port number, just in case one of the randomly selected ports is actually being used. For each of the following steps describe your results, give the syntax of the command you used, and, where appropriate, the output produced. Include screen captures as needed in your output. Be sure to label your results carefully and organize your results in the order of steps as given here and to answer each question in your report. Looking glasses are web sites that allow you to run simple network analysis programs like ping and traceroute from their sites. The site maintains a list of such sites. Visit one of these sites and do a traceroute.
4 2c: ARP In this lab we will look at the relationship between Ethernet and TCP/IP. This lab should extend your knowledge of both the Address Resolution Protocol and Ethernet. All TCP/IP implementations are built on top of and rely on a data-link protocol such as Ethernet or token ring. While TCP/IP is responsible for end-to-end communications, the data link level manages the point-to-point communications. That is, all IP networks operate by sending packets to the next computer using a data-link protocol. Whenever IP forwards a packet, it must be to a machine on a directly connected subnet. Since routers are connected to multiple subnets, the packet can make its way across a network one subnet at a time. Since the network layer knows only the IP address of the next hop, this IP address must be mapped into the data-link address or MAC address. This is the role of ARP. Each Ethernet device uses a 48-bit address. Like IP, each Ethernet address should be globally unique. (There is one major exception to this. Some devices will use the same Ethernet address on every interface in that device. As you can imagine, this may create nasty problems for other devices and should be discouraged.) Each address can be divided into two parts, a 24-bit Organization Unique Identifier (OUI) and a 24-bit assigned address. Each Ethernet manufacturer applies for and is assigned a different OUI by the IEEE. It uses these as the first 24 bits of the address of every interface it manufactures. The manufacturer is free to assign the remaining bits of the address as it sees fit, provided all devices it manufactures have unique addresses. You can look up an OUI at the site For example, the Ethernet address of the machine this document is being written on is B-CA-D4-25 in HEX. The OUI is B. This OUI is assigned to Dell. Sometimes, interpreting the results returned by this site can be a little tricky since when one company acquires another, they also acquire the OUI. Thus, the system may return the original company name rather than the name of the new parent company. You should also keep in mind that a number of Ethernet addresses are reserved for special purposes. For example, the address FF-FF-FF-FF-FF-FF is a broadcast address. Obviously, you won t get anywhere searching the OUI FF-FF-FF. ARP is a somewhat overloaded term. ARP (uppercase) is the protocol while arp (lowercase) is the program that implements the protocol. arp constructs an arp table (or arp cache) that contains the IP to Ethernet address mappings. That is, the arp program, using the ARP protocol, maintains the arp table, a table of IP to MAC address mappings. There will be one entry in the table for each directly connected device that your computer currently knows how to contact. There won t be any entries for devices on remote subnets since you can t use Ethernet to connect directly to those devices. Rather, you may see an entry corresponding to the device that is the next hop on the path. There are two ways that an address may be added to an arp table. It may be added statically, either directly by a user or by a script (typically at startup). Static addresses usually remain in the table until the machine reboots or they are explicitly removed. The ARP protocol also provides a mechanism to dynamically discover the address mappings for devices. If the address mapping is unknown, an ARP request packet containing the IP address of the desired destination will be sent to every device on the subnet, i.e., an ARP request is sent as an Ethernet broadcast packet. Each device on the subnet should be listening for these packets. Each will examine the packet. If the desired destination s IP address is a listening device s IP address, that device will respond to the ARP request with an ARP reply. There is usually a timeout for dynamically discovered addresses. If not used, these mappings will usually disappear from the arp table within a few minutes. Arp Arp -a
5 2d: Name Resolution (nslookup) A key element in a computer network is a mechanism to map between the numeric addresses used by computers and the more descriptive names used by people. This laboratory investigates the mechanism TCP/IP networks use. Other network protocols provide similar mechanisms. When a user enters a computer name such as the name is converted into an IP address ( in this case), which is what is actually used by the communications protocol. With IP networks, several different mechanisms may be used. The simplest mechanism is host tables. Host tables are nothing more than tables giving IP addresses and the names that correspond to the IP address, one entry per line. On most Unix systems, the host table is the file /etc/hosts. Microsoft Windows also uses host files but their locations vary depending on the software version. Most systems will check the host file before attempting to use other mechanisms. But while the host file is a simple and efficient mechanism, it doesn t scale since every system you want to communicate with must be entered into the table. So, apart from small isolated static networks, a more scalable mechanism is needed to extend this mechanism. DNS (domain name services) is the most commonly used mechanism. DNS uses a hierarchical system of name servers reflected in the structure of host names. Consider the name If your system does not know the IP address of this site already, it will contact the server for the gov domain. This site knows the address of the name server for the domain whitehouse.gov. This server will know the address of the web server, When the whitehouse.gov domain was created, the creators registered the domain name and the IP address of its name server was entered into the DNS server for the gov domain. The administrators for the whitehouse.gov domain are responsible for supplying the server for their domain. In turn, they may create additional subdomains under their domain. Setting up a DNS server requires installing the appropriate software on a sever and entering the DNS information for the domain. The most commonly used software in the Unix world is bind. There are several tools that can be used to query domain name servers. The most common is nslookup. This is available on Windows as well as Unix systems. nslookup can be used as both an interactive or command-line tool. If you enter nslookup without an argument, you will enter interactive mode. You can type a? for a brief list of commands options. Unfortunately, most system administrators now view the information returned by tools like nslookup as a security leak and limit what is available through nslookup queries. A number of other similar tools exist, most notably dig. There are alternatives to DNS. NIS and NIS+ is used on many systems, particularly systems from SUN Microsystems. DDNS is an extension to DNS that does dynamic address mapping. You might use DDNS if you are using a DHCP server to lease IP addresses. With traditional DNS, the name server would not know which machines has which address since the addresses would be changing. DDNS works with the DHCP server to solve this problem. One last word about DNS DNS breaks at times. The usual way to test DNS is to ping the same site by name and by IP number. If the later works and the former doesn t, you probably have a DNS problem. Of course, if you know every IP address you ll ever need, you can always bypass name resolution. Examine the host table on your computer. Explain the structure of the table. Immediately after pinging a site requiring name resolution, ping the site a second time. Do you see the same name resolution packets? Why or why not?
6 2e: File Transfer Protocol This lab introduces the FTP protocol and command set. The File Transfer Protocol or FTP (RFC 959) is used to move files from one machine to another. Like protocols, the protocol provides a simple command set that is used by FTP software. But in several ways, FTP can be more complex. Here are a few FTP commands Command USER user s name PASS password SYST STAT HELP QUIT Description Log into host Supply user s password Get a description of the remote system Find out the status of the connection List commands or get information about a specific command End the session Here is a slightly edited sample session using several FTP commands. This session was created by using TELNET to connect to the destination server at port nobody.nowhere.org FTP server (Version 6.00LS) ready. user joe 331 Password required for joe. pass hushhush 230 User joe logged in. syst 215 UNIX Type: L8 Version: BSD stat 211- nobody.nowhere.org FTP server status: Version 6.00LS Connected to joe ( ) Logged in as joe TYPE: ASCII, FORM: Nonprint; STRUcture: File; transfer MODE: Stream No data connection This example shows an FTP login to nohow.nowhere.org. At first glance, this looks a lot like the sessions. But if you try some of the other commands such as LIST, you ll discover that most don t work. The reason is that FTP opens separate connections to transfer information, something that a TELNET client can t cope with. This means that we are going to have to turn to other tools to see how FTP works, specifically packet capture. (Still, using TELNET can be helpful. For example, it can be used to confirm that the FTP server is operational or to investigate which modes it will support.) FTP Microsoft.com
7 For more information on a specific command, type HELP command-name ASSOC Displays or modifies file extension associations. AT Schedules commands and programs to run on a computer. ATTRIB Displays or changes file attributes. BREAK Sets or clears extended CTRL+C checking. CACLS Displays or modifies access control lists (ACLs) of files. CALL Calls one batch program from another. CD Displays the name of or changes the current directory. CHCP Displays or sets the active code page number. CHDIR Displays the name of or changes the current directory. CHKDSK Checks a disk and displays a status report. CHKNTFS Displays or modifies the checking of disk at boot time. CLS Clears the screen. CMD Starts a new instance of the Windows command interpreter. COLOR Sets the default console foreground and background colors. COMP Compares the contents of two files or sets of files. COMPACT Displays or alters the compression of files on NTFS partitions. CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive. COPY Copies one or more files to another location. DATE Displays or sets the date. DEL Deletes one or more files. DIR Displays a list of files and subdirectories in a directory. DISKCOMP Compares the contents of two floppy disks. DISKCOPY Copies the contents of one floppy disk to another. DOSKEY Edits command lines, recalls Windows commands, and creates macros. ECHO Displays messages, or turns command echoing on or off. ENDLOCAL Ends localization of environment changes in a batch file. ERASE Deletes one or more files. EXIT Quits the CMD.EXE program (command interpreter). FC Compares two files or sets of files, and displays the differences between them. FIND Searches for a text string in a file or files. FINDSTR Searches for strings in files. FOR Runs a specified command for each file in a set of files. FORMAT Formats a disk for use with Windows. FTYPE Displays or modifies file types used in file extension associations. GOTO Directs the Windows command interpreter to a labeled line in a batch program. GRAFTABL Enables Windows to display an extended character set in graphics mode. HELP Provides Help information for Windows commands. IF Performs conditional processing in batch programs. LABEL Creates, changes, or deletes the volume label of a disk. MD Creates a directory. MKDIR Creates a directory. MODE Configures a system device. MORE Displays output one screen at a time. MOVE Moves one or more files from one directory to another directory. PATH Displays or sets a search path for executable files. PAUSE Suspends processing of a batch file and displays a message. POPD Restores the previous value of the current directory saved by PUSHD.
8 PRINT Prints a text file. PROMPT Changes the Windows command prompt. PUSHD Saves the current directory then changes it. RD Removes a directory. RECOVER Recovers readable information from a bad or defective disk. REM Records comments (remarks) in batch files or CONFIG.SYS. REN Renames a file or files. RENAME Renames a file or files. REPLACE Replaces files. RMDIR Removes a directory. SET Displays, sets, or removes Windows environment variables. SETLOCAL Begins localization of environment changes in a batch file. SHIFT Shifts the position of replaceable parameters in batch files. SORT Sorts input. START Starts a separate window to run a specified program or command. SUBST Associates a path with a drive letter. TIME Displays or sets the system time. TITLE Sets the window title for a CMD.EXE session. TREE Graphically displays the directory structure of a drive or path. TYPE Displays the contents of a text file. VER Displays the Windows version. VERIFY Tells Windows whether to verify that your files are written correctly to a disk. VOL Displays a disk volume label and serial number. XCOPY Copies files and directory trees.
All Microsoft Dos Commands
1 All Microsoft Dos Commands (Microsoft Disk Operating System) 2 All Microsoft Dos Commands: ADDUSERS ARP ASSOC ASSOCIAT AT ATTRIB BOOTCFG BROWSTAT CACLS CALL CD CHANGE CHKDSK CHKNTFS CHOICE CIPHER CleanMgr
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationChgport The chgport command can be used to display or change COM port mappings for DOS compatibility.. Chgusr The chgusr command is used to change the
Windows 7 Command Prompt Commands Append The append command can be used by programs to open files in another directory as if they were located in the current directory. Arp The arp command is used to display
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationINDEX OF COMMANDS. ATTRIB [+r] [x:]{file} [-r] 92, 180. BACKUP x:[{file}] y:[/d][/m][/s] BASIC [[x:]{file}] BASICA [[x:]{file}] CD [[x:]\{name}]
INDEX OF COMMANDS In this index of commands, anything between square brackets indicates an alternative or a facultative addition to the command in question; "x:" and "y:" mean the designation of a drive;
More informationConfiguring IP Services
This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To
More informationConfiguring IPv4 Broadcast Packet Handling
Configuring IPv4 Broadcast Packet Handling Finding Feature Information Configuring IPv4 Broadcast Packet Handling Last Updated: April 12, 2011 This module explains what IPv4 broadcast packets are, when
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationLab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.
Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you
More informationConfiguring IPv4 Broadcast Packet Handling
Configuring IPv4 Broadcast Packet Handling This module explains what IPv4 broadcast packets are, when they are used, and how to customize your router s configuration for situations when the default behavior
More informationMaterial for the Networking lab in EITF25 & EITF45
Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab
More informationBasic DOS Commands MCQ
1. An entire path name, consisting of several sub-directory names can contain upto A) 13 character B) 36 character C) 63 character D) 53 character 2. In which year the first operating system was developed
More informationConfiguring IP Services
CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in
More informationCOMS3200/7201 Computer Networks 1 (Version 1.0)
COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationHELP Use the help command to list all the following supported commands:
Available commands within Windows Recovery Console The following commands are available within the Windows Recovery Console. The commands are not case-sensitive. HELP Use the help command to list all the
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More information5. Write a capture filter for question 4.
Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.
More information8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista
8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and
More informationUsing Cisco IOS Software
APPENDIX A This appendix describes the basics about using the Cisco IOS software that is installed on every Cisco ubr905 and Cisco ubr925 cable access routers: Accessing the Command-Line Interface, page
More informationLab Two Using Wireshark to Discover IP NAME:
Lab Two Using Wireshark to Discover IP NAME: In this lab, we ll investigate the IP protocol, focusing on the IP datagram. We ll do so by analyzing a trace of IP datagrams sent and received by an execution
More informationIOS and Configuration Basics
APPENDIX C This appendix contains basic information about the Cisco Internet Operating System (IOS) software and includes the following sections: Cisco IOS Modes of Operation Getting Context-Sensitive
More informationCS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal
CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationUsing ICMP to Troubleshoot TCP/IP Networks
Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which
More informationFirewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
More informationLab 3: Basic Device Configuration
Lab 3: Basic Device Configuration University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 2 Lab 3: Basic Device Configuration **Given
More informationConfiguring Dynamic ARP Inspection
21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the
More informationChecking Port Status and Connectivity
CHAPTER 5 This chapter describes how to check switch port status and connectivity on the Catalyst 4500 series switch. This chapter includes the following major sections: Checking Module Status, page 5-1
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationUsing AutoInstall and Setup
Using AutoInstall and Setup The Cisco IOS software includes two features that simplify or automate the configuration of Cisco devices AutoInstall allows a network manager to load configuration files onto
More informationTFTP and FTP Basics BUPT/QMUL
TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer
More informationAdditional laboratory
Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationOutline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols
SC/CSE 3213 Winter 2013 L9: Control Protocols Sebastian Magierowski York University 1 Outline ICMP ARP DHCP NAT (not a control protocol) 2 1 Control Protocols IP is used to transfer data Network layer
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationSE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer
SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?
More informationConfiguring IP Services
Configuring IP Services Last Updated: December 16, 2011 This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationINTERNET BASICS / FILE OPERATIONS Defining Information Technology
L A B 2 INTERNET BASICS / FILE OPERATIONS Defining Information Technology This lab covers fundamental concepts of network organization, focusing on the client-server model for network resources such as
More informationH
H12-223 Number: H12-223 Passing Score: 600 Time Limit: 120 min Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the administrator take?
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice
More informationLab Troubleshooting Using traceroute Instructor Version 2500
Lab 9.3.4 Troubleshooting Using traceroute Instructor Version 2500 294-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 9.3.4 Copyright 2003, Cisco Systems, Inc. Objective Use the traceroute Cisco IOS
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationPacket Tracer - Using Traceroute to Discover the Network (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Scenario The company you work for has acquired a new branch location.
More informationConfiguring Basic File Transfer Services
Using basic file transfer services, you can configure a router as a Trivial File Transfer Protocol (TFTP) or Reverse Address Resolution Protocol (RARP) server, configure the router to forward extended
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationTable of Contents. Appendix A - More on Windows. M205/M206 Installation and Configuration Guide
Table of Contents Overview......................................... A-1 Key Features......................................... A-1 New Features......................................... A-1 M205/M206 Configuration.....................................
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationH
H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the
More informationConventions in this tutorial
This document provides an exercise using Digi JumpStart for Windows Embedded CE 6.0. This document shows how to develop, run, and debug a simple application on your target hardware platform. This tutorial
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationRouter Startup and Configuration
Router Startup and Configuration Router Startup In general, the boot process follows these steps: Test hardware (POST) Load the bootstrap program Locate and load the Cisco IOS Locate and load the router
More informationVERSION Lab 3: Link Layer
Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More information1. Which OSI layers offers reliable, connection-oriented data communication services?
CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationThe flow of transferring the machining programs of the server PC and starting an automatic operation is as below.
CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationUsing the Command Line Interface
CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs
More informationConfiguring Dynamic ARP Inspection
Finding Feature Information, page 1 Restrictions for Dynamic ARP Inspection, page 1 Understanding Dynamic ARP Inspection, page 3 Default Dynamic ARP Inspection Configuration, page 6 Relative Priority of
More informationLab 2.8.1: Basic Static Route Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 172.16.3.1 255.255.255.0 N/A S0/0/0 172.16.2.1 255.255.255.0 N/A Fa0/0 172.16.1.1 255.255.255.0 N/A R2
More information4. Basic IP Support Protocols
4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols
More informationInternet Control Message Protocol
Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.
More informationCisco WAAS Software Command Summary
2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationTCP/IP Transport Layer Protocols, TCP and UDP
TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark
More informationConfiguring IP Addressing
8 Configuring IP Addressing Contents Overview..................................................... 8-2.............................................. 8-2 Just Want a Quick Start with IP Addressing?....................
More information1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationLab 4.2.5a Connectivity Tests Ping
Lab 4.2.5a Connectivity Tests Ping Objective Use the ping command to send ICMP datagrams to target host. Verify that the network layer between source and destination is working properly. Retrieve information
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationIPv6 Commands: ipv6 h to ipv6 mi
IPv6 Commands: ipv6 h to ipv6 mi ipv6 hello-interval eigrp, page 3 ipv6 hold-time eigrp, page 5 ipv6 hop-limit, page 7 ipv6 host, page 8 ipv6 icmp error-interval, page 10 ipv6 inspect, page 12 ipv6 inspect
More informationExam E1 Copyright 2010 Thaar AL_Taiey
Exam E1 2 Exam E1 E1-1. Which of the following statements is true regarding the internetwork shown in Figure E1-1? (Select all that apply) Figure E1-1 A Sample Internetwork A. The link number 15 uses a
More informationipv6 hello-interval eigrp
ipv6 hello-interval eigrp ipv6 hello-interval eigrp To configure the hello interval for the Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv6 routing process designated by an autonomous system
More informationDescription of the Windows XP Recovery Console for advanced users
Page 1 of 11 Article ID: 314058 - Last Review: September 22, 2008 - Revision: 5.4 Description of the Windows XP Recovery Console for advanced users System Tip This article applies to a different version
More informationChapter 5: Trouble shooting of a network
5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping
More informationICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP
112039 Computer Networks Lab - 3 ICMP 1. Lab Course Number: 112039 2. Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP 4. Lab Overview: In this lab, we ll investigate the ICMP protocol; examine
More informationComputer Architecture Lab 1 (Starting with Linux)
Computer Architecture Lab 1 (Starting with Linux) Linux is a computer operating system. An operating system consists of the software that manages your computer and lets you run applications on it. The
More informationFirewall Stateful Inspection of ICMP
Firewall Stateful Inspection of ICMP Last Updated: March 26, 2012 The Firewall Stateful Inspection of ICMP feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages
More informationCCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)
CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationOSI Model with Protocols. Layer Name PDU Address Protocols Device
NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCCNA Explorer 1 Chapter 11 Configuring & Testing Your Network
CCNA Explorer 1 Chapter 11 Configuring & Testing Your Network 11.1.1 What is the system software in Cisco devices? The Cisco IOS provides devices with what network services? How is the IOS generally accessed?
More informationCS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists
CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists Name: In this lab you will learn: PartA Cisco 2600 Router Configuration Static Routing PartB 20 min Dynamic
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationAuxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets
Internet Layer Auxiliary Protocols aw division into three tasks: Data transfer over a global network oute decision at the sub-nodes Control of the network or transmission status outing Protocols outing
More information