Ingineria Programării în Reţea ea (IPR) Unelte software utile în proiectarea şi i implementarea unei ea
|
|
- Jennifer James
- 6 years ago
- Views:
Transcription
1 Ingineria Programării în Reţea ea (IPR) Unelte software utile în proiectarea şi i implementarea unei aplicaţii ii de reţea ea
2 Ping Instrumentul ul cel mai popular pentru testarea conectivităţii ii într-o o reţea ea IP Disponibil pe majoritatea sistemelor de operare Codul sursa: Sintaxa: ping arg. adresaip(sau hostname) Ştefan SAVU, Mihai IVANOVICI 2
3 Ping funcţionare Calculatorul sursă trimite pachete de tip ICMP echo request către destinaţie ie şi i aşteaptă a răspunsuri ICMP echo response La final se calculează ă statistici privind: nr. de pachete trimise/recepţionate, ionate, timpul de round trip (min, media, max, mdev) Ştefan SAVU, Mihai IVANOVICI 3
4 Ping exemple (1) linux-413h:~ # ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=64 time=0.367 ms 64 bytes from : icmp_seq=2 ttl=64 time=0.991 ms 64 bytes from : icmp_seq=3 ttl=64 time=0.312 ms 64 bytes from : icmp_seq=4 ttl=64 time=0.319 ms 64 bytes from : icmp_seq=5 ttl=64 time=0.467 ms 64 bytes from : icmp_seq=6 ttl=64 time=0.393 ms 64 bytes from : icmp_seq=7 ttl=64 time=0.343 ms ping statistics packets transmitted, 7 received, 0% packet loss, time 6001ms rtt min/avg/max/mdev = 0.312/0.456/0.991/0.223 ms Ştefan SAVU, Mihai IVANOVICI 4
5 Ping exemple (2) C:\Documents and Settings\ro1v00r7>ping Pinging a165.g.akamai.net [ ] with 32 bytes of data: Reply from : bytes=32 time=44ms TTL=56 Reply from : bytes=32 time=43ms TTL=56 Reply from : bytes=32 time=42ms TTL=56 Reply from : bytes=32 time=43ms TTL=56 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 42ms, Maximum = 44ms, Average = 43ms Ştefan SAVU, Mihai IVANOVICI 5
6 Ping protocolul ICMP Mesajul de echo request type 8 Mesajul de echo reply type 0 Ştefan SAVU, Mihai IVANOVICI 6
7 Ping 4 paşi i pentru testarea unei conexiuni 1. ping testarea interfeţei ei de loopback (verificăm că protocolul TCP/IP e instalat) 2. ping adresa_ip_locala testarea interfeţei ei de reţea ea locală 3. ping adresa_ip_gateway_default testarea conectivităţii ii către exterior 4. ping adresa_ip_destinaţie ie testare conectivitate cu echipamentul destinaţie ie Ştefan SAVU, Mihai IVANOVICI 7
8 Ping TTL (TimeToLeave( TimeToLeave) TTL = nr. max. de routere prin care pachetul poate trece înainte de a fi aruncat; fiecare e router decrementeză acest câmp cu o unitate Ştefan SAVU, Mihai IVANOVICI 8
9 TTL exemplu Aflăm TTL-ul maşinii locale: Reply from : bytes=32 time<1ms TTL=128 Reply from : bytes=32 time<1ms TTL=128 Ping către maşina locală: PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=120 time=21.7 ms 64 bytes from : icmp_seq=2 ttl=120 time=5.48 ms Ştefan SAVU, Mihai IVANOVICI 9
10 TTL exemplu (continuare) Verificare TTL: Tracing route to sg5.gazduire.ro [ ] over a maximum of 30 hops: 1 2 ms 1 ms 1 ms nas-pppoe pppoe-bartolomeu2.brasov.rdsnet.ro [ ] 2 2 ms 2 ms 2 ms dr05.brasov.rdsnet.ro [ ].65] 3 2 ms 2 ms 2 ms rdsnet.ro 221.rdsnet.ro [ ] 4 2 ms 2 ms 2 ms rdsnet.ro 161.rdsnet.ro [ ] 5 4 ms 5 ms 5 ms rdsnet.ro 105.rdsnet.ro [ ] 6 5 ms 27 ms 5 ms qr04.bucuresti.rdsnet.ro [ ] 7 5 ms 5 ms 5 ms rdsnet.ro [ ] 8 5 ms 7 ms 5 ms c3560-v02.gazduire.ro [ ] 9 5 ms 5 ms 5 ms sg5.gazduire.ro [ ] Trace complete. 8 (= ) routere (noduri) între sursă şi i destinaţie ie Ştefan SAVU, Mihai IVANOVICI 10
11 Atacuri folosind ping Ping of death: -atacul e bazat pe pachete ICMP fragmentate (RFC( 791 nu permite pachete mai mari de 65,535 bytes ) -la destinaţie ie pachetul este reasamblat şi i poate genera un buffer overflow, urmat de crash-ul sistemului Ping flood: -un atac simplu de tip DOS (Denial Of Service) -reuşeşte dacă banda atacatorului este mai mare decât banda victimei Ştefan SAVU, Mihai IVANOVICI 11
12 Ping şi i securitatea Multe firewall-uri din ziua de azi fac calculatoarele invizibile (nu răspund la ping) Unii provideri de Internet filtreză prin routerele lor mesajele de tip ICMP, pentru a opri un eventual atac cu ping Ştefan SAVU, Mihai IVANOVICI 12
13 Ping din Internet Câteva site-uri de unde puteţi i da ping din Internet: ge&pid=2 Ştefan SAVU, Mihai IVANOVICI 13
14 Traceroute Utilitar care permite vizualizarea rutei de la sursă la destinaţie ie (nivelul 3) Sintaxa: traceroute arg. adresaip(sau hostname) Sau, pentru Windows: tracert arg. adresaip(sau hostname) Ştefan SAVU, Mihai IVANOVICI 14
15 Traceroute exemple (1) Tracing route to google.com [ ] over a maximum of 30 hops: 1 11 ms 15 ms 15 ms nas-pppoe pppoe-bartolomeu2.brasov.rdsnet.ro [ ] 2 15 ms 15 ms 15 ms dr05.brasov.rdsnet.ro [ ].65] 3 15 ms 15 ms 15 ms rdsnet.ro 221.rdsnet.ro [ ] 4 15 ms 15 ms 15 ms rdsnet.ro 161.rdsnet.ro [ ] 5 31 ms 30 ms 46 ms br01.frankfurt.rdsnet.ro [ ] ms 171 ms 31 ms xr01.frankfurt.rdsnet.ro [ ] 7 31 ms 30 ms 31 ms ms 30 ms 31 ms ms 62 ms 46 ms ms 140 ms 124 ms ms 124 ms 124 ms ms 124 ms 124 ms ms 124 ms 124 ms ms 124 ms 124 ms eh-in in-f99.google.com [ ] Trace complete. Ştefan SAVU, Mihai IVANOVICI 15
16 Traceroute exemple (2)( traceroute to cern.ch ( ), 40 hops max, 40 byte packets ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms 7 * * * 8 * * * 9 * * * 10 * * * ms ms ms Ştefan SAVU, Mihai IVANOVICI 16
17 Traceroute - utilizare Cu traceroute se pot identifica rutele congestionate Se poate determina cel mai rapid mirror pentru download Ştefan SAVU, Mihai IVANOVICI 17
18 Traceroute - securitate Unele routere/noduri îşi ascund identitatea pentru a oferi protecţie Unii atacatori au folosit traceroute pentru a avea o imagine asupra arhitecturii unei reţele ele Ştefan SAVU, Mihai IVANOVICI 18
19 Tcpdump Utilitar destinat monitorizării traficului în n reţea ea şi i achiziţionării ionării de date. Plăcile de reţea ea Ethernet capurează la nivelul data-link doar pachetele destinate lor sau cele de broadcast. Pentru a captura toate frame-urile tcpdump trece interfaţa într-un mod special de lucru, numit promiscuous. Ştefan SAVU, Mihai IVANOVICI 19
20 Tcpdump - utilizare Sintaxa: tcpdump arg. Exemple de argumente: -i i eth0 capturează doar pe interfaţa eth0 -c21 se opreşte după 21 packete... Ştefan SAVU, Mihai IVANOVICI 20
21 Tcpdump exemple (1) 7:39: IP > linux: : ICMP echo request, id 512, seq 7680, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 7680, length 40 07:39: IP > linux: : ICMP echo request, id 512, seq 7936, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 7936, length 40 07:39: IP > linux: : ICMP echo request, id 512, seq 8192, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 8192, length 40 07:39: IP > linux: : ICMP echo request, id 512, seq 8448, length 40 07:39: IP linux > : ICMP echo reply, id 512, seq 8448, length 40 Ştefan SAVU, Mihai IVANOVICI 21
22 Tcpdump exemple (2) 07:39: arp who-has has tell linux 07:39: arp reply is-at 00:50:56:c0:00:01 (oui( Unknown) 07:39: IP > linux.ssh: : P : (128) ack win :39: IP > linux.ssh: : F 128:128(0) ack 1 win :39: IP linux.ssh > : F 1:1(0) ack 129 win :39: IP > linux.ssh: :. ack 2 win :39: IP > linux.ssh: : S : (0) win <mss 1460,nop,nop,sackOK> 07:39: IP linux.ssh > : S : (0) ack win 5840 <mss 1460,nop,nop,sackOK> 07:39: IP > linux.ssh: :. ack 1 win :39: IP linux.ssh > : P 1:21(20) ack 1 win :39: IP > linux.ssh: P 1:45(44) ack 21 win :39: IP linux.ssh > :. ack 45 win :39: IP > linux.ssh: : P 45:381(336) ack 21 win :39: IP linux.ssh > :. ack 381 win 6432 Ştefan SAVU, Mihai IVANOVICI 22
23 Tcpdump explicaţii ii 07:39: Timpul în n care pachetul TCP a intrat în n reţeaua eaua locală IP tip pachet adresa şi i portul sursă linux.ssh destinaţia ia şi i portul destinaţie ie P 1:45(44) ack 21 win proprietăţi tcp: intervalul numerelor de secvenţă,, urmat de nr. de octeţi i din interval, dimensiunea ferestrei pe care sursa e capabilă sa o accepte Ştefan SAVU, Mihai IVANOVICI 23
24 Wireshark Cel mai popular analizor de reţea ea Cunoscut iniţial ial sub numele de Ethereal Similar cu tcpdump, diferenţa a majoră o reprezintă GUI-ul Ştefan SAVU, Mihai IVANOVICI 24
25 Wireshark features Suportă 935 de protocoale Pachetele pot fi capturate din medii ca Ethernet, FDDI (Fiber Distributed Data Interface), PPP (Point to Point Protocol), Token Ring, IEEE802.11, Loopback Permite definirea de filtref Ştefan SAVU, Mihai IVANOVICI 25
26 Wireshark filtre Operatori de comparare suportaţi: ==!= > < <= >= Ştefan SAVU, Mihai IVANOVICI 26
27 Wireshark filtre Operaţii logice && ^^! Ştefan SAVU, Mihai IVANOVICI 27
28 Wireshark exemple aplicare filtre dns icmp ip.addr == ip.src!= and ip.dst!= tcp.port == 21 tcp.dstport == 23 tcp.flags tcp.flags.syn == 0x02 Ştefan SAVU, Mihai IVANOVICI 28
29 Wireshark exemple (1) Ştefan SAVU, Mihai IVANOVICI 29
30 Wireshark exemple (2) Ştefan SAVU, Mihai IVANOVICI 30
31 Ştefan SAVU, Mihai IVANOVICI 31
32 Iptraf Utilitar de consolă ă pentru Linux Oferă statistici privind interfeţele ele de reţea: ea: traficul in şi i out (în( n kbits/sec şi pachete/sec), traficul total pe o interfaţă Statistici în n funcţie de tipul pachelor: IP, Non-IP Trafic detaliat în n funcţie de protocol: TCP, UDP, ICMP, Other IP Ştefan SAVU, Mihai IVANOVICI 32
33 Iptraf Suportă Ethernet,, FDDI, ISDN, SLIP, PPP şi i Loopback Sunt suportate majoritatea plăcilor de reţea ea deorece este folosită interfaţa a de tip raw socket a kernelului Linux Logging Un modul de statisică pe întregul LAN Ştefan SAVU, Mihai IVANOVICI 33
34 Iptraf exemplu Ştefan SAVU, Mihai IVANOVICI 34
CONFIGURAREA UNUI SERVER IRC IN LINUX. Bica Bogdan *
CONFIGURAREA UNUI SERVER IRC IN LINUX Bica Bogdan * In this exemple i show how to configure an irc server based on ircd dameon named ircu.this is the main file name ircd.conf and the most important.configure
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationDesign activities. Session III. 1. Topology. - Selecting and placing devices - Interconnecting devices
Design activities Session I 1. Topology - Selecting and placing devices - Interconnecting devices 2. Providing connectivity between directly connected devices - Configuring addresses for servers and hosts
More informationProiectarea Rețelelor 32. Controlul modelelor de trafic in retea prin alterarea atributelor BGP
Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Proiectarea Rețelelor 32. Controlul modelelor de trafic in retea prin alterarea atributelor BGP De ce ebgp? De ce ibgp?
More informationProiectarea Rețelelor 1. Componentele hardware ale unui sistem de calcul
Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Proiectarea Rețelelor 1. Componentele hardware ale unui sistem de calcul Integrated IS-IS 25 Noiembrie 2010 Proiectarea
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationUtilizarea formularelor in HTML
Utilizarea formularelor in HTML Formulare Un formular este constituit din elemente speciale, denumite elemente de control (controls), cum ar fi butoane radio, butoane de validare, câmpuri text, butoane
More informationContents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9
Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 i Ping, tracert, and system debugging commands debugging Syntax Default
More informationInternet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1
Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems
More informationRețele de Calculatoare și Internet
Facultatea de Electronică, Telecomunicații și Tehnologia Informației Rețele de Calculatoare și Internet Internet Control Message Protocol Hampău Bogdan Master IISC An 2 1 Cuprins I. ICMP version 4... 3
More informationIngineria Sistemelor de Programare
Ingineria Sistemelor de Programare Interfete grafice (Swing) mihai.hulea@aut.utcluj.ro 2017 Scurt istoric AWT: Abstract Windowing Toolkit import java.awt.* Swing Java FX Swing Demo Libraria Swing Swing
More informationPNI SmartCAM. versiune Android. - manual de utilizare-
PNI SmartCAM versiune Android - manual de utilizare- Introducere: Acest manual se refera la instalarea si utilizarea aplicatiei PNI SmartCAM, software necesar monitorizarii atat camerei cu IP PNI 631W,
More informationI Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12
iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap
More informationPing, tracert and system debugging commands
Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert
More informationIPv4 (Part III) รศ.ดร.อน นต ผลเพ ม. Asso. Prof. Anan Phonphoem, Ph.D. Feb 2018
Feb 2018 IPv4 (Part III) รศ.ดร.อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand 1 Outline
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationFisiere text in Java.
Fisiere text in Java. Doru Anastasiu Popescu Prelucrarea fisierelor text in Java Aspecte teoretice: http://cursuri.cs.pub.ro/~poo/wiki/index.php/input/output http://upm.ro/intranet/ecalin/cd_educational/cd/javac/cap3.htm
More informationTable of Contents 1 System Maintaining and Debugging 1-1
Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More informationLab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.
Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you
More informationIngineria Sistemelor de Programare. UML Diagrama Cazurilor de Utilizare 2016
Ingineria Sistemelor de Programare UML Diagrama Cazurilor de Utilizare mihai.hulea@aut.utcluj.ro 2016 Introducere UML UML UML = Unified Modeling Language Dezvoltat in cadrul Object Management Group In
More informationContents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10
Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 i Ping, tracert, and system debugging commands debugging Syntax Default
More informationManual utilizare PNI SmartCAM (Versiune ios)
1 Manual utilizare PNI SmartCAM (Versiune ios) 2 1. Descriere software PNI SmartCAM (versiune ios) este un instrument pentru administrarea camerelor prin retea, ce pot fi adaugate manual sau prin cautare
More informationLenuta Alboaie Reţele de calculatoare
Programarea in retea - OOB- Lenuta Alboaie adria@info.uaic.ro 1 Cuprins Trimiterea si receptarea datelor in regim 2 Ideea: in timpul unei conexiuni cind sunt transmise date ( inband data ), si daca la
More information1. Să se determine de câte ori apare cifra c în scrierea în baza p a numărului n.
Observatii: Codul de mai jos a fost realizat si testat pe pagina online: https://www.tutorialspoint.com/compile_pascal_online.php 1. Să se determine de câte ori apare cifra c în scrierea în baza p a numărului
More informationUsing ping, tracert, and system debugging
Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all
More informationOferta speciala Vodafone
Oferta speciala Vodafone PERSOANA DE CONTACT S.N.A.P. MATEI MARIN 0722.615.321 Intre orele 08.30 15.00 Abonamente voce cu terminale in rate: 2 Red Connect Eco 7.5 Minute nelimitate in orice retea nationala
More informationC13. INTERFATA PARALELA PROGRAMABILA (PPI) I8255A (PIO)
C13. INTERFATA PARALELA PROGRAMABILA (PPI) I8255A (PIO) 1.Descriere PIO 2. Arhitectura PIO 3. Programare PIO 4. PIO in PC 5. Aplicatii http://www.advancedmsinc.com/iocards/8255.htm http://www.eisti.fr/~ga/phy/iitr/ii05/tr.pdf
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet
More informationICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP
112039 Computer Networks Lab - 3 ICMP 1. Lab Course Number: 112039 2. Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP 4. Lab Overview: In this lab, we ll investigate the ICMP protocol; examine
More informationOptimizarea rutării. Proiectarea Rețelelor
Optimizarea rutării Proiectarea Rețelelor Cuprins Redistribuția între protocoale de rutare Manipularea rutelor Passive-interface Distanțe administrative Distribute-list Route-maps Redistribuţie Policy
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationComputer Networks Security: intro. CS Computer Systems Security
Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication
More informationCurs 4 Alexandru Bujor
Curs 4 Alexandru Bujor ISO/OSI vs TCP/IP Conectori folositi Tipul de cablu Verificarea link-ului: ip link show Adresare la nivelul retelei locale Ethernet (L1 + L2) Adresa MAC Practic: Verificare cu ifconfig
More informationLaborator 5 Instrucțiunile repetitive
Laborator 5 Instrucțiunile repetitive Instrucțiunea for Instrucțiunea for permite repetarea unei secvențe de instrucțiuni atâta timp cât o condiție este îndeplinita. În plus, oferă posibilitatea execuției
More informationCS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet
More informationChapter 5: Trouble shooting of a network
5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping
More informationTehnici avansate de programare
Tehnici avansate de programare Curs - Cristian Frăsinaru acf@infoiasi.ro Facultatea de Informatică Universitatea Al. I. Cuza Iaşi Adnotarea elementelor Tehnici avansate de programare p.1/1 Cuprins Ce sunt
More informationHomework 2 TCP/IP Network Monitoring and Management
Homework 2 TCP/IP Network Monitoring and Management Hw 2 Assigned on 2015/9/1, Due 2015/9/15 Hand-In Requirement Prepare a activity/laboratory report (name it Hw4-WebSys-YourName.docx) using the ECET Lab
More information6. Identificarea vulnerabilităńilor
6. Identificarea vulnerabilităńilor VulnerabilităŃi Eroare de programare sau greşeală de configurare ce poate crea breşe în securitatea sistemelor Dacă nu sunt corectate la timp pot fi exploatate de către
More informationATACURI PRIVIND SECURITATEA REŢELEI STUDIU DE CAZ ARP POISONING NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY.
ATACURI PRIVIND SECURITATEA REŢELEI STUDIU DE CAZ ARP POISONING Luminiţa DEFTA, Student Doctorand, Universitatea din Piteşti NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY. Luminiţa DEFTA, Ph.D Student,
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationH
H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the
More informationTable of Contents 1 Static Routing Configuration 1-1
Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-2 Configuring a Static Route 1-2 Configuration Prerequisites
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationH
H12-223 Number: H12-223 Passing Score: 600 Time Limit: 120 min Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the administrator take?
More informationInternet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC
Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationIPv4 (Part III) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. Nov 2010
Nov 2010 IPv4 (Part III) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand 1 Outline
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationUsing DNS Service for Amplification Attack
Using DNS Service for Amplification Attack Outline Use DNS service to achieve load balancing for a server cluster Carry out an amplification attack by taking advantage of DNS service Enforce firewall rules
More informationNetworks and Bridges Commands
bridge, page 2 bridges bridge, page 3 show running-config bridges, page 4 show system networks, page 5 show system packages, page 6 ping, page 7 ping-ipv6, page 8 traceroute, page 9 1 bridge bridge To
More informationLaborator 10. SGBD-ul MySQL (partea I)
Laborator 10 SGBD-ul MySQL (partea I) 1. Introduceţi următoarea secvenţă PHP: $dbh = mysql_connect("localhost", "Costica", "mypass") or die("unable to connect to MySQL"); $selectdb = mysql_select_db('lucrudb');
More informationLaborator 8 Java Crearea claselor de obiecte. Variabilele (campurile) clasei de obiecte
Laborator 8 Java Crearea claselor de obiecte. Variabilele (campurile) clasei de obiecte Probleme rezolvate: Scrieti, compilati si rulati toate exemplele din acest laborator: 1. Programul urmator (LotoConstante.java)
More informationGeneral Network Troubleshooting
Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More information(ICMP), RFC
Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu
More informationLab 9.8.1: Address Resolution Protocol (ARP)
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More informationConfiguring Routes on the ACE
CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationla Microsoft Office Communicator pentru ca modificarea selecţiei dispozitivului telefonic să se actualizeze.
QUICK START GUIDE Plug-in de selec ie a telefonului pentru caracteristica de control al apelurilor din Microsoft Office Communicator pentru Cisco Unified Presence versiunea 7.0(3) Prezentare generală 2
More informationCapitolul 4. Subnivelul Controlul Accesului la Mediu (MAC=Medium Access Control)
Capitolul 4 Subnivelul Controlul Accesului la Mediu (MAC=Medium Access Control) 1 The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Alocare
More informationA quick tutorial on using tshark
A quick tutorial on using tshark Ross Maloney January 24, 2017 The network sniffing program tshark is the terminal oriented version of the GUI version wireshark. This GUI version was initially called ethereal.
More informationPacket Capturing with TCPDUMP command in Linux
Packet Capturing with TCPDUMP command in Linux In this tutorial we will be looking into a very well known tool in Linux system administrators tool box. Some times during troubleshooting this tool proves
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice
More informationPacket Header Formats
A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used
More informationLab Two Using Wireshark to Discover IP NAME:
Lab Two Using Wireshark to Discover IP NAME: In this lab, we ll investigate the IP protocol, focusing on the IP datagram. We ll do so by analyzing a trace of IP datagrams sent and received by an execution
More informationCIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol
More informationExercises: Basics of Networking II Experiential Learning Workshop
Exercises: Basics of Networking II Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents
More informationCS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay
Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety
More informationCursul X decembrie 2011
Cursul 12 12 802.1X 20-21 decembrie 2011 Obiective Recapitulare: Securitatea în rețele Protocolul 802.1X RADIUS Exemplu de funcționare 802.1X MACsec Configurare 802.1X 2 Cursul 12 Recapitulare Riscuri
More informationWireshark Lab: IP v6.0
Wireshark Lab: IP v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu
More informationNetwork packet analyzer Wireshark
Network packet analyzer Wireshark Antonio Cianfrani NetLab - Dipartimento DIET Università Sapienza di Roma E-mail: antonio.cianfrani@uniroma1.it What is a packet analyzer? A network packet analyzer is
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationApplied Networks & Security
Applied Networks & Security TCP/IP Protocol Suite http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 ARP overview datalink
More informationTRANSFORMATOARE DE CURENT
MAK 140/80 TRANSFORMATOARE DE CURENT Aceste transformatoare de curent pot fi utilizate pentru curenţi de la 200 A la 2000 A. Ele sunt transformatoare de curent de tip inel. Sunt fabricate conform standardelor
More informationTable of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1
Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-5 Introduction to IPv6 DNS 1-8 Protocols
More informationEXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.
HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This
More informationJavaScript - Intorducere. Și nu numai...
JavaScript - Intorducere Și nu numai... Ce facem azi Nu o sa va vină să credeți. Pe foaia albă vă scrieți numele și prenumele ȘI Povestim despre JavaScript Exemple de aplicare discutii și surprize mici
More informationIntroduction to Computer Networks. CS 166: Introduction to Computer Systems Security
Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet
More informationExperiment 2: Wireshark as a Network Protocol Analyzer
Experiment 2: Wireshark as a Network Protocol Analyzer Learning Objectives: To become familiarized with the Wireshark application environment To perform basic PDU capture using Wireshark To perform basic
More informationTable of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1
Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-6 Introduction to IPv6 DNS 1-8 Protocols
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message.
Ethereal Lab: ICMP Version: 1.0 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. In this lab, we ll explore several aspects
More informationCSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical
CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet
More informationAddress Resolution APPLIED SECURITY BASICS. Alberto Caponi
Address Resolution APPLIED SECURITY BASICS Alberto Caponi alberto.caponi@uniroma2.it What does it happen really on Internet? Internet Client (your devices) Server (google, facebook, etc.) What a web page
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationHomework #2. Objective: GRADE A. Equipment List: Procedure/Data: Activity 1A. Emmanuel A. Ellis Web Systems 9/7/2017
Objective: GRADE A Homework #2 Emmanuel A. Ellis Web Systems 9/7/2017 In this lab, we will be learning about some of the more basic first level troubleshooting tactics when a device seemseems to not be
More informationThe Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.
The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution
More informationDongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis
Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More information