Ingineria Programării în Reţea ea (IPR) Unelte software utile în proiectarea şi i implementarea unei ea

Size: px
Start display at page:

Download "Ingineria Programării în Reţea ea (IPR) Unelte software utile în proiectarea şi i implementarea unei ea"

Transcription

1 Ingineria Programării în Reţea ea (IPR) Unelte software utile în proiectarea şi i implementarea unei aplicaţii ii de reţea ea

2 Ping Instrumentul ul cel mai popular pentru testarea conectivităţii ii într-o o reţea ea IP Disponibil pe majoritatea sistemelor de operare Codul sursa: Sintaxa: ping arg. adresaip(sau hostname) Ştefan SAVU, Mihai IVANOVICI 2

3 Ping funcţionare Calculatorul sursă trimite pachete de tip ICMP echo request către destinaţie ie şi i aşteaptă a răspunsuri ICMP echo response La final se calculează ă statistici privind: nr. de pachete trimise/recepţionate, ionate, timpul de round trip (min, media, max, mdev) Ştefan SAVU, Mihai IVANOVICI 3

4 Ping exemple (1) linux-413h:~ # ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=64 time=0.367 ms 64 bytes from : icmp_seq=2 ttl=64 time=0.991 ms 64 bytes from : icmp_seq=3 ttl=64 time=0.312 ms 64 bytes from : icmp_seq=4 ttl=64 time=0.319 ms 64 bytes from : icmp_seq=5 ttl=64 time=0.467 ms 64 bytes from : icmp_seq=6 ttl=64 time=0.393 ms 64 bytes from : icmp_seq=7 ttl=64 time=0.343 ms ping statistics packets transmitted, 7 received, 0% packet loss, time 6001ms rtt min/avg/max/mdev = 0.312/0.456/0.991/0.223 ms Ştefan SAVU, Mihai IVANOVICI 4

5 Ping exemple (2) C:\Documents and Settings\ro1v00r7>ping Pinging a165.g.akamai.net [ ] with 32 bytes of data: Reply from : bytes=32 time=44ms TTL=56 Reply from : bytes=32 time=43ms TTL=56 Reply from : bytes=32 time=42ms TTL=56 Reply from : bytes=32 time=43ms TTL=56 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 42ms, Maximum = 44ms, Average = 43ms Ştefan SAVU, Mihai IVANOVICI 5

6 Ping protocolul ICMP Mesajul de echo request type 8 Mesajul de echo reply type 0 Ştefan SAVU, Mihai IVANOVICI 6

7 Ping 4 paşi i pentru testarea unei conexiuni 1. ping testarea interfeţei ei de loopback (verificăm că protocolul TCP/IP e instalat) 2. ping adresa_ip_locala testarea interfeţei ei de reţea ea locală 3. ping adresa_ip_gateway_default testarea conectivităţii ii către exterior 4. ping adresa_ip_destinaţie ie testare conectivitate cu echipamentul destinaţie ie Ştefan SAVU, Mihai IVANOVICI 7

8 Ping TTL (TimeToLeave( TimeToLeave) TTL = nr. max. de routere prin care pachetul poate trece înainte de a fi aruncat; fiecare e router decrementeză acest câmp cu o unitate Ştefan SAVU, Mihai IVANOVICI 8

9 TTL exemplu Aflăm TTL-ul maşinii locale: Reply from : bytes=32 time<1ms TTL=128 Reply from : bytes=32 time<1ms TTL=128 Ping către maşina locală: PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=120 time=21.7 ms 64 bytes from : icmp_seq=2 ttl=120 time=5.48 ms Ştefan SAVU, Mihai IVANOVICI 9

10 TTL exemplu (continuare) Verificare TTL: Tracing route to sg5.gazduire.ro [ ] over a maximum of 30 hops: 1 2 ms 1 ms 1 ms nas-pppoe pppoe-bartolomeu2.brasov.rdsnet.ro [ ] 2 2 ms 2 ms 2 ms dr05.brasov.rdsnet.ro [ ].65] 3 2 ms 2 ms 2 ms rdsnet.ro 221.rdsnet.ro [ ] 4 2 ms 2 ms 2 ms rdsnet.ro 161.rdsnet.ro [ ] 5 4 ms 5 ms 5 ms rdsnet.ro 105.rdsnet.ro [ ] 6 5 ms 27 ms 5 ms qr04.bucuresti.rdsnet.ro [ ] 7 5 ms 5 ms 5 ms rdsnet.ro [ ] 8 5 ms 7 ms 5 ms c3560-v02.gazduire.ro [ ] 9 5 ms 5 ms 5 ms sg5.gazduire.ro [ ] Trace complete. 8 (= ) routere (noduri) între sursă şi i destinaţie ie Ştefan SAVU, Mihai IVANOVICI 10

11 Atacuri folosind ping Ping of death: -atacul e bazat pe pachete ICMP fragmentate (RFC( 791 nu permite pachete mai mari de 65,535 bytes ) -la destinaţie ie pachetul este reasamblat şi i poate genera un buffer overflow, urmat de crash-ul sistemului Ping flood: -un atac simplu de tip DOS (Denial Of Service) -reuşeşte dacă banda atacatorului este mai mare decât banda victimei Ştefan SAVU, Mihai IVANOVICI 11

12 Ping şi i securitatea Multe firewall-uri din ziua de azi fac calculatoarele invizibile (nu răspund la ping) Unii provideri de Internet filtreză prin routerele lor mesajele de tip ICMP, pentru a opri un eventual atac cu ping Ştefan SAVU, Mihai IVANOVICI 12

13 Ping din Internet Câteva site-uri de unde puteţi i da ping din Internet: ge&pid=2 Ştefan SAVU, Mihai IVANOVICI 13

14 Traceroute Utilitar care permite vizualizarea rutei de la sursă la destinaţie ie (nivelul 3) Sintaxa: traceroute arg. adresaip(sau hostname) Sau, pentru Windows: tracert arg. adresaip(sau hostname) Ştefan SAVU, Mihai IVANOVICI 14

15 Traceroute exemple (1) Tracing route to google.com [ ] over a maximum of 30 hops: 1 11 ms 15 ms 15 ms nas-pppoe pppoe-bartolomeu2.brasov.rdsnet.ro [ ] 2 15 ms 15 ms 15 ms dr05.brasov.rdsnet.ro [ ].65] 3 15 ms 15 ms 15 ms rdsnet.ro 221.rdsnet.ro [ ] 4 15 ms 15 ms 15 ms rdsnet.ro 161.rdsnet.ro [ ] 5 31 ms 30 ms 46 ms br01.frankfurt.rdsnet.ro [ ] ms 171 ms 31 ms xr01.frankfurt.rdsnet.ro [ ] 7 31 ms 30 ms 31 ms ms 30 ms 31 ms ms 62 ms 46 ms ms 140 ms 124 ms ms 124 ms 124 ms ms 124 ms 124 ms ms 124 ms 124 ms ms 124 ms 124 ms eh-in in-f99.google.com [ ] Trace complete. Ştefan SAVU, Mihai IVANOVICI 15

16 Traceroute exemple (2)( traceroute to cern.ch ( ), 40 hops max, 40 byte packets ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms 7 * * * 8 * * * 9 * * * 10 * * * ms ms ms Ştefan SAVU, Mihai IVANOVICI 16

17 Traceroute - utilizare Cu traceroute se pot identifica rutele congestionate Se poate determina cel mai rapid mirror pentru download Ştefan SAVU, Mihai IVANOVICI 17

18 Traceroute - securitate Unele routere/noduri îşi ascund identitatea pentru a oferi protecţie Unii atacatori au folosit traceroute pentru a avea o imagine asupra arhitecturii unei reţele ele Ştefan SAVU, Mihai IVANOVICI 18

19 Tcpdump Utilitar destinat monitorizării traficului în n reţea ea şi i achiziţionării ionării de date. Plăcile de reţea ea Ethernet capurează la nivelul data-link doar pachetele destinate lor sau cele de broadcast. Pentru a captura toate frame-urile tcpdump trece interfaţa într-un mod special de lucru, numit promiscuous. Ştefan SAVU, Mihai IVANOVICI 19

20 Tcpdump - utilizare Sintaxa: tcpdump arg. Exemple de argumente: -i i eth0 capturează doar pe interfaţa eth0 -c21 se opreşte după 21 packete... Ştefan SAVU, Mihai IVANOVICI 20

21 Tcpdump exemple (1) 7:39: IP > linux: : ICMP echo request, id 512, seq 7680, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 7680, length 40 07:39: IP > linux: : ICMP echo request, id 512, seq 7936, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 7936, length 40 07:39: IP > linux: : ICMP echo request, id 512, seq 8192, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 8192, length 40 07:39: IP > linux: : ICMP echo request, id 512, seq 8448, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 8448, length 40 Ştefan SAVU, Mihai IVANOVICI 21

22 Tcpdump exemple (2) 07:39: arp who-has has tell linux 07:39: arp reply is-at 00:50:56:c0:00:01 (oui( Unknown) 07:39: IP > linux.ssh: : P : (128) ack win :39: IP > linux.ssh: : F 128:128(0) ack 1 win :39: IP linux.ssh > : F 1:1(0) ack 129 win :39: IP > linux.ssh: :. ack 2 win :39: IP > linux.ssh: : S : (0) win <mss 1460,nop,nop,sackOK> 07:39: IP linux.ssh > : S : (0) ack win 5840 <mss 1460,nop,nop,sackOK> 07:39: IP > linux.ssh: :. ack 1 win :39: IP linux.ssh > : P 1:21(20) ack 1 win :39: IP > linux.ssh: P 1:45(44) ack 21 win :39: IP linux.ssh > :. ack 45 win :39: IP > linux.ssh: : P 45:381(336) ack 21 win :39: IP linux.ssh > :. ack 381 win 6432 Ştefan SAVU, Mihai IVANOVICI 22

23 Tcpdump explicaţii ii 07:39: Timpul în n care pachetul TCP a intrat în n reţeaua eaua locală IP tip pachet adresa şi i portul sursă linux.ssh destinaţia ia şi i portul destinaţie ie P 1:45(44) ack 21 win proprietăţi tcp: intervalul numerelor de secvenţă,, urmat de nr. de octeţi i din interval, dimensiunea ferestrei pe care sursa e capabilă sa o accepte Ştefan SAVU, Mihai IVANOVICI 23

24 Wireshark Cel mai popular analizor de reţea ea Cunoscut iniţial ial sub numele de Ethereal Similar cu tcpdump, diferenţa a majoră o reprezintă GUI-ul Ştefan SAVU, Mihai IVANOVICI 24

25 Wireshark features Suportă 935 de protocoale Pachetele pot fi capturate din medii ca Ethernet, FDDI (Fiber Distributed Data Interface), PPP (Point to Point Protocol), Token Ring, IEEE802.11, Loopback Permite definirea de filtref Ştefan SAVU, Mihai IVANOVICI 25

26 Wireshark filtre Operatori de comparare suportaţi: ==!= > < <= >= Ştefan SAVU, Mihai IVANOVICI 26

27 Wireshark filtre Operaţii logice && ^^! Ştefan SAVU, Mihai IVANOVICI 27

28 Wireshark exemple aplicare filtre dns icmp ip.addr == ip.src!= and ip.dst!= tcp.port == 21 tcp.dstport == 23 tcp.flags tcp.flags.syn == 0x02 Ştefan SAVU, Mihai IVANOVICI 28

29 Wireshark exemple (1) Ştefan SAVU, Mihai IVANOVICI 29

30 Wireshark exemple (2) Ştefan SAVU, Mihai IVANOVICI 30

31 Ştefan SAVU, Mihai IVANOVICI 31

32 Iptraf Utilitar de consolă ă pentru Linux Oferă statistici privind interfeţele ele de reţea: ea: traficul in şi i out (în( n kbits/sec şi pachete/sec), traficul total pe o interfaţă Statistici în n funcţie de tipul pachelor: IP, Non-IP Trafic detaliat în n funcţie de protocol: TCP, UDP, ICMP, Other IP Ştefan SAVU, Mihai IVANOVICI 32

33 Iptraf Suportă Ethernet,, FDDI, ISDN, SLIP, PPP şi i Loopback Sunt suportate majoritatea plăcilor de reţea ea deorece este folosită interfaţa a de tip raw socket a kernelului Linux Logging Un modul de statisică pe întregul LAN Ştefan SAVU, Mihai IVANOVICI 33

34 Iptraf exemplu Ştefan SAVU, Mihai IVANOVICI 34

CONFIGURAREA UNUI SERVER IRC IN LINUX. Bica Bogdan *

CONFIGURAREA UNUI SERVER IRC IN LINUX. Bica Bogdan * CONFIGURAREA UNUI SERVER IRC IN LINUX Bica Bogdan * In this exemple i show how to configure an irc server based on ircd dameon named ircu.this is the main file name ircd.conf and the most important.configure

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Table of Contents 1 System Maintaining and Debugging Commands 1-1 Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Design activities. Session III. 1. Topology. - Selecting and placing devices - Interconnecting devices

Design activities. Session III. 1. Topology. - Selecting and placing devices - Interconnecting devices Design activities Session I 1. Topology - Selecting and placing devices - Interconnecting devices 2. Providing connectivity between directly connected devices - Configuring addresses for servers and hosts

More information

Proiectarea Rețelelor 32. Controlul modelelor de trafic in retea prin alterarea atributelor BGP

Proiectarea Rețelelor 32. Controlul modelelor de trafic in retea prin alterarea atributelor BGP Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Proiectarea Rețelelor 32. Controlul modelelor de trafic in retea prin alterarea atributelor BGP De ce ebgp? De ce ibgp?

More information

Proiectarea Rețelelor 1. Componentele hardware ale unui sistem de calcul

Proiectarea Rețelelor 1. Componentele hardware ale unui sistem de calcul Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Proiectarea Rețelelor 1. Componentele hardware ale unui sistem de calcul Integrated IS-IS 25 Noiembrie 2010 Proiectarea

More information

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Table of Contents 1 System Maintenance and Debugging Commands 1-1 Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display

More information

Utilizarea formularelor in HTML

Utilizarea formularelor in HTML Utilizarea formularelor in HTML Formulare Un formular este constituit din elemente speciale, denumite elemente de control (controls), cum ar fi butoane radio, butoane de validare, câmpuri text, butoane

More information

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 i Ping, tracert, and system debugging commands debugging Syntax Default

More information

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems

More information

Rețele de Calculatoare și Internet

Rețele de Calculatoare și Internet Facultatea de Electronică, Telecomunicații și Tehnologia Informației Rețele de Calculatoare și Internet Internet Control Message Protocol Hampău Bogdan Master IISC An 2 1 Cuprins I. ICMP version 4... 3

More information

Ingineria Sistemelor de Programare

Ingineria Sistemelor de Programare Ingineria Sistemelor de Programare Interfete grafice (Swing) mihai.hulea@aut.utcluj.ro 2017 Scurt istoric AWT: Abstract Windowing Toolkit import java.awt.* Swing Java FX Swing Demo Libraria Swing Swing

More information

PNI SmartCAM. versiune Android. - manual de utilizare-

PNI SmartCAM. versiune Android. - manual de utilizare- PNI SmartCAM versiune Android - manual de utilizare- Introducere: Acest manual se refera la instalarea si utilizarea aplicatiei PNI SmartCAM, software necesar monitorizarii atat camerei cu IP PNI 631W,

More information

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12 iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap

More information

Ping, tracert and system debugging commands

Ping, tracert and system debugging commands Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert

More information

IPv4 (Part III) รศ.ดร.อน นต ผลเพ ม. Asso. Prof. Anan Phonphoem, Ph.D. Feb 2018

IPv4 (Part III) รศ.ดร.อน นต ผลเพ ม. Asso. Prof. Anan Phonphoem, Ph.D. Feb 2018 Feb 2018 IPv4 (Part III) รศ.ดร.อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand 1 Outline

More information

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status

More information

Fisiere text in Java.

Fisiere text in Java. Fisiere text in Java. Doru Anastasiu Popescu Prelucrarea fisierelor text in Java Aspecte teoretice: http://cursuri.cs.pub.ro/~poo/wiki/index.php/input/output http://upm.ro/intranet/ecalin/cd_educational/cd/javac/cap3.htm

More information

Table of Contents 1 System Maintaining and Debugging 1-1

Table of Contents 1 System Maintaining and Debugging 1-1 Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols. Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you

More information

Ingineria Sistemelor de Programare. UML Diagrama Cazurilor de Utilizare 2016

Ingineria Sistemelor de Programare. UML Diagrama Cazurilor de Utilizare 2016 Ingineria Sistemelor de Programare UML Diagrama Cazurilor de Utilizare mihai.hulea@aut.utcluj.ro 2016 Introducere UML UML UML = Unified Modeling Language Dezvoltat in cadrul Object Management Group In

More information

Contents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10

Contents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 i Ping, tracert, and system debugging commands debugging Syntax Default

More information

Manual utilizare PNI SmartCAM (Versiune ios)

Manual utilizare PNI SmartCAM (Versiune ios) 1 Manual utilizare PNI SmartCAM (Versiune ios) 2 1. Descriere software PNI SmartCAM (versiune ios) este un instrument pentru administrarea camerelor prin retea, ce pot fi adaugate manual sau prin cautare

More information

Lenuta Alboaie Reţele de calculatoare

Lenuta Alboaie Reţele de calculatoare Programarea in retea - OOB- Lenuta Alboaie adria@info.uaic.ro 1 Cuprins Trimiterea si receptarea datelor in regim 2 Ideea: in timpul unei conexiuni cind sunt transmise date ( inband data ), si daca la

More information

1. Să se determine de câte ori apare cifra c în scrierea în baza p a numărului n.

1. Să se determine de câte ori apare cifra c în scrierea în baza p a numărului n. Observatii: Codul de mai jos a fost realizat si testat pe pagina online: https://www.tutorialspoint.com/compile_pascal_online.php 1. Să se determine de câte ori apare cifra c în scrierea în baza p a numărului

More information

Using ping, tracert, and system debugging

Using ping, tracert, and system debugging Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all

More information

Oferta speciala Vodafone

Oferta speciala Vodafone Oferta speciala Vodafone PERSOANA DE CONTACT S.N.A.P. MATEI MARIN 0722.615.321 Intre orele 08.30 15.00 Abonamente voce cu terminale in rate: 2 Red Connect Eco 7.5 Minute nelimitate in orice retea nationala

More information

C13. INTERFATA PARALELA PROGRAMABILA (PPI) I8255A (PIO)

C13. INTERFATA PARALELA PROGRAMABILA (PPI) I8255A (PIO) C13. INTERFATA PARALELA PROGRAMABILA (PPI) I8255A (PIO) 1.Descriere PIO 2. Arhitectura PIO 3. Programare PIO 4. PIO in PC 5. Aplicatii http://www.advancedmsinc.com/iocards/8255.htm http://www.eisti.fr/~ga/phy/iitr/ii05/tr.pdf

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet

More information

ICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP

ICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP 112039 Computer Networks Lab - 3 ICMP 1. Lab Course Number: 112039 2. Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP 4. Lab Overview: In this lab, we ll investigate the ICMP protocol; examine

More information

Optimizarea rutării. Proiectarea Rețelelor

Optimizarea rutării. Proiectarea Rețelelor Optimizarea rutării Proiectarea Rețelelor Cuprins Redistribuția între protocoale de rutare Manipularea rutelor Passive-interface Distanțe administrative Distribute-list Route-maps Redistribuţie Policy

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

Curs 4 Alexandru Bujor

Curs 4 Alexandru Bujor Curs 4 Alexandru Bujor ISO/OSI vs TCP/IP Conectori folositi Tipul de cablu Verificarea link-ului: ip link show Adresare la nivelul retelei locale Ethernet (L1 + L2) Adresa MAC Practic: Verificare cu ifconfig

More information

Laborator 5 Instrucțiunile repetitive

Laborator 5 Instrucțiunile repetitive Laborator 5 Instrucțiunile repetitive Instrucțiunea for Instrucțiunea for permite repetarea unei secvențe de instrucțiuni atâta timp cât o condiție este îndeplinita. În plus, oferă posibilitatea execuției

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

Tehnici avansate de programare

Tehnici avansate de programare Tehnici avansate de programare Curs - Cristian Frăsinaru acf@infoiasi.ro Facultatea de Informatică Universitatea Al. I. Cuza Iaşi Adnotarea elementelor Tehnici avansate de programare p.1/1 Cuprins Ce sunt

More information

Homework 2 TCP/IP Network Monitoring and Management

Homework 2 TCP/IP Network Monitoring and Management Homework 2 TCP/IP Network Monitoring and Management Hw 2 Assigned on 2015/9/1, Due 2015/9/15 Hand-In Requirement Prepare a activity/laboratory report (name it Hw4-WebSys-YourName.docx) using the ECET Lab

More information

6. Identificarea vulnerabilităńilor

6. Identificarea vulnerabilităńilor 6. Identificarea vulnerabilităńilor VulnerabilităŃi Eroare de programare sau greşeală de configurare ce poate crea breşe în securitatea sistemelor Dacă nu sunt corectate la timp pot fi exploatate de către

More information

ATACURI PRIVIND SECURITATEA REŢELEI STUDIU DE CAZ ARP POISONING NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY.

ATACURI PRIVIND SECURITATEA REŢELEI STUDIU DE CAZ ARP POISONING NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY. ATACURI PRIVIND SECURITATEA REŢELEI STUDIU DE CAZ ARP POISONING Luminiţa DEFTA, Student Doctorand, Universitatea din Piteşti NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY. Luminiţa DEFTA, Ph.D Student,

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

H

H H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the

More information

Table of Contents 1 Static Routing Configuration 1-1

Table of Contents 1 Static Routing Configuration 1-1 Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-2 Configuring a Static Route 1-2 Configuration Prerequisites

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

H

H H12-223 Number: H12-223 Passing Score: 600 Time Limit: 120 min Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the administrator take?

More information

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

IPv4 (Part III) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. Nov 2010

IPv4 (Part III) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. Nov 2010 Nov 2010 IPv4 (Part III) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand 1 Outline

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Using DNS Service for Amplification Attack

Using DNS Service for Amplification Attack Using DNS Service for Amplification Attack Outline Use DNS service to achieve load balancing for a server cluster Carry out an amplification attack by taking advantage of DNS service Enforce firewall rules

More information

Networks and Bridges Commands

Networks and Bridges Commands bridge, page 2 bridges bridge, page 3 show running-config bridges, page 4 show system networks, page 5 show system packages, page 6 ping, page 7 ping-ipv6, page 8 traceroute, page 9 1 bridge bridge To

More information

Laborator 10. SGBD-ul MySQL (partea I)

Laborator 10. SGBD-ul MySQL (partea I) Laborator 10 SGBD-ul MySQL (partea I) 1. Introduceţi următoarea secvenţă PHP: $dbh = mysql_connect("localhost", "Costica", "mypass") or die("unable to connect to MySQL"); $selectdb = mysql_select_db('lucrudb');

More information

Laborator 8 Java Crearea claselor de obiecte. Variabilele (campurile) clasei de obiecte

Laborator 8 Java Crearea claselor de obiecte. Variabilele (campurile) clasei de obiecte Laborator 8 Java Crearea claselor de obiecte. Variabilele (campurile) clasei de obiecte Probleme rezolvate: Scrieti, compilati si rulati toate exemplele din acest laborator: 1. Programul urmator (LotoConstante.java)

More information

General Network Troubleshooting

General Network Troubleshooting Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

CS615 - Aspects of System Administration

CS615 - Aspects of System Administration CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu

More information

Lab 9.8.1: Address Resolution Protocol (ARP)

Lab 9.8.1: Address Resolution Protocol (ARP) Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

Configuring Routes on the ACE

Configuring Routes on the ACE CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

la Microsoft Office Communicator pentru ca modificarea selecţiei dispozitivului telefonic să se actualizeze.

la Microsoft Office Communicator pentru ca modificarea selecţiei dispozitivului telefonic să se actualizeze. QUICK START GUIDE Plug-in de selec ie a telefonului pentru caracteristica de control al apelurilor din Microsoft Office Communicator pentru Cisco Unified Presence versiunea 7.0(3) Prezentare generală 2

More information

Capitolul 4. Subnivelul Controlul Accesului la Mediu (MAC=Medium Access Control)

Capitolul 4. Subnivelul Controlul Accesului la Mediu (MAC=Medium Access Control) Capitolul 4 Subnivelul Controlul Accesului la Mediu (MAC=Medium Access Control) 1 The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Alocare

More information

A quick tutorial on using tshark

A quick tutorial on using tshark A quick tutorial on using tshark Ross Maloney January 24, 2017 The network sniffing program tshark is the terminal oriented version of the GUI version wireshark. This GUI version was initially called ethereal.

More information

Packet Capturing with TCPDUMP command in Linux

Packet Capturing with TCPDUMP command in Linux Packet Capturing with TCPDUMP command in Linux In this tutorial we will be looking into a very well known tool in Linux system administrators tool box. Some times during troubleshooting this tool proves

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

Lab Two Using Wireshark to Discover IP NAME:

Lab Two Using Wireshark to Discover IP NAME: Lab Two Using Wireshark to Discover IP NAME: In this lab, we ll investigate the IP protocol, focusing on the IP datagram. We ll do so by analyzing a trace of IP datagrams sent and received by an execution

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol

More information

Exercises: Basics of Networking II Experiential Learning Workshop

Exercises: Basics of Networking II Experiential Learning Workshop Exercises: Basics of Networking II Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents

More information

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety

More information

Cursul X decembrie 2011

Cursul X decembrie 2011 Cursul 12 12 802.1X 20-21 decembrie 2011 Obiective Recapitulare: Securitatea în rețele Protocolul 802.1X RADIUS Exemplu de funcționare 802.1X MACsec Configurare 802.1X 2 Cursul 12 Recapitulare Riscuri

More information

Wireshark Lab: IP v6.0

Wireshark Lab: IP v6.0 Wireshark Lab: IP v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb

More information

CS615 - Aspects of System Administration

CS615 - Aspects of System Administration CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu

More information

Network packet analyzer Wireshark

Network packet analyzer Wireshark Network packet analyzer Wireshark Antonio Cianfrani NetLab - Dipartimento DIET Università Sapienza di Roma E-mail: antonio.cianfrani@uniroma1.it What is a packet analyzer? A network packet analyzer is

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security TCP/IP Protocol Suite http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 ARP overview datalink

More information

TRANSFORMATOARE DE CURENT

TRANSFORMATOARE DE CURENT MAK 140/80 TRANSFORMATOARE DE CURENT Aceste transformatoare de curent pot fi utilizate pentru curenţi de la 200 A la 2000 A. Ele sunt transformatoare de curent de tip inel. Sunt fabricate conform standardelor

More information

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1 Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-5 Introduction to IPv6 DNS 1-8 Protocols

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

JavaScript - Intorducere. Și nu numai...

JavaScript - Intorducere. Și nu numai... JavaScript - Intorducere Și nu numai... Ce facem azi Nu o sa va vină să credeți. Pe foaia albă vă scrieți numele și prenumele ȘI Povestim despre JavaScript Exemple de aplicare discutii și surprize mici

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Experiment 2: Wireshark as a Network Protocol Analyzer

Experiment 2: Wireshark as a Network Protocol Analyzer Experiment 2: Wireshark as a Network Protocol Analyzer Learning Objectives: To become familiarized with the Wireshark application environment To perform basic PDU capture using Wireshark To perform basic

More information

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1 Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-6 Introduction to IPv6 DNS 1-8 Protocols

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

ICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message.

ICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message. Ethereal Lab: ICMP Version: 1.0 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. In this lab, we ll explore several aspects

More information

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet

More information

Address Resolution APPLIED SECURITY BASICS. Alberto Caponi

Address Resolution APPLIED SECURITY BASICS. Alberto Caponi Address Resolution APPLIED SECURITY BASICS Alberto Caponi alberto.caponi@uniroma2.it What does it happen really on Internet? Internet Client (your devices) Server (google, facebook, etc.) What a web page

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Homework #2. Objective: GRADE A. Equipment List: Procedure/Data: Activity 1A. Emmanuel A. Ellis Web Systems 9/7/2017

Homework #2. Objective: GRADE A. Equipment List: Procedure/Data: Activity 1A. Emmanuel A. Ellis Web Systems 9/7/2017 Objective: GRADE A Homework #2 Emmanuel A. Ellis Web Systems 9/7/2017 In this lab, we will be learning about some of the more basic first level troubleshooting tactics when a device seemseems to not be

More information

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information