Internet Tool Practice. 이지민 장동현
|
|
- Crystal May
- 5 years ago
- Views:
Transcription
1 Internet Tool Practice 이지민 장동현
2 Outline Internet Tools ping traceroute nslookup ifconfig arp netstat synack nmap Iperf crontab Homeworks 2
3 ping (1/3) sends an ICMP ECHO_REQUEST message to a host tests whether another host is reachable measures the round-trip time to the host Usage ping [-options value ] destination Option type : -s (size), -c (count), -i (interval ), -t (TTL) etc. Ex) ping c 5 mmlab.snu.ac.kr Reference In the UNIX-like system, man ping Because the options of ping are different according to OS, see man-page for details Applicable to all the commands introduced here 3
4 ping (2/3) $ ping -c 3 -t 10 mmlab.snu.ac.kr PING mmlab.snu.ac.kr ( ) 56(84) bytes of data. 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=1 ttl=62 time=1.57 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=2 ttl=62 time=0.387 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=3 ttl=62 time=1.41 ms --- mmlab.snu.ac.kr ping statistics packets transmitted, 3 received, 0% packet loss, time 2005ms rtt min/avg/max/mdev = 0.387/1.125/1.574/0.525 ms 4
5 ping (3/3) $ ping -c 3 -i 3 mmlab.snu.ac.kr PING mmlab.snu.ac.kr ( ) 56(84) bytes of data. 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=1 ttl=62 time=0.411 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=2 ttl=62 time=0.550 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=3 ttl=62 time=80.0 ms --- mmlab.snu.ac.kr ping statistics packets transmitted, 3 received, 0% packet loss, time 6005ms rtt min/avg/max/mdev = 0.411/27.002/80.045/ ms 5
6 traceroute (1/2) let us see the route that IP datagrams follow from one host to another Although there are no guarantees that two consecutive IP datagrams from the same source to the same destination follow the same route, most of the time they do. Usage traceroute [-options value ] hostname Ex) traceroute 6
7 traceroute (2/2) $ traceroute mmlab.snu.ac.kr traceroute to mmlab.snu.ac.kr ( ), 30 hops max, 40 byte packets ( ) ms ms ms ( ) ms ms ms 3 mmlab ( ) ms ms ms $ traceroute traceroute to hyperion.cs.berkeley.edu ( ), 30 hops max, 38 byte packets ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms 6 seoulgsr.kreonet.net ( ) ms ms ms 7 baramgsr-seoulgsr.kreonet.net ( ) ms ms ms. 17 hyperion.cs.berkeley.edu ( ) ms ms ms 7
8 nslookup (1/2) Allow anyone to directly query a name server and retrieve any of the information known to the DNS System Usage nslookup [ - option ] [ name - ] [ server ] interactive mode non-interactive mode another program host google.co.kr dig google.co.kr 8
9 $ nslookup > mmlab.snu.ac.kr Server: Address: #53 Name: mmlab.snu.ac.kr Address: > Server: Address: #53 nslookup (2/2) in-addr.arpa name = mmlab.snu.ac.kr. $ nslookup cse.snu.ac.kr Server: Address: #53 Non-authoritative answer: Name: cse.snu.ac.kr Address:
10 ifconfig Check the network interface configuration Usage ifconfig [interface] $ /sbin/ifconfig eth0 Link encap:ethernet HWaddr 00:B0:D0:68:B1:C6 inet addr: Bcast: Mask: inet6 addr: fe80::2b0:d0ff:fe68:b1c6/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets: errors:0 dropped:0 overruns:150 frame:150 TX packets: errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes: (3.0 GiB) TX bytes: (46.5 MiB).. 10
11 arp manipulate the system ARP cache Usage arp [option] hostname $ arp -a? ( ) at 00:00:0c:07:ac:00 on rl0 [ethernet]? ( ) at 00:d0:02:cb:e3:fc on rl0 [ethernet]? ( ) at 00:0a:5e:01:e2:ba on rl0 [ethernet]? ( ) at 00:e0:98:b0:fa:7d on rl0 [ethernet]? ( ) at 00:04:76:d0:0a:ab on rl0 [ethernet] csebrg1.snu.ac.kr ( ) at 00:50:04:bf:c5:b9 on rl0 [ethernet] topaz.snu.ac.kr ( ) at 00:0d:61:3b:8f:59 on rl0 [ethernet] garnet.snu.ac.kr ( ) at 00:0e:35:0d:fe:96 on rl0 [ethernet] opal.snu.ac.kr ( ) at 00:11:11:0f:2f:c0 on rl0 [ethernet] emerald.snu.ac.kr ( ) at 00:4f:4e:0d:51:2d on rl0 [ethernet] smart1.snu.ac.kr ( ) at 00:00:f0:91:0d:3a on rl0 [ethernet]? ( ) at 00:50:da:91:0b:0d on rl0 [ethernet] 11
12 Show network status Usage netstat [option] Options netstat (1/2) -a : show the state of all sockets. But normally sockets used by server processes are not shown. -i : show status and statistics for the physical interfaces -n : show network addresses as numbers -r : show the routing table 12
13 netstat (2/2) $ netstat r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface localnet * U eth0 default UG eth0 $ netstat rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface U eth UG eth0 13
14 Description synack (1/3) Establishes a Client-Server connection by calling connect which performs the 3-way Handshake of the TCP Protocol Measures the time taken for the connection to be established b/w the client & server Closes the connection once the RTT is measured by calling close which performs a 4-packet exchange Repeats the above process at regular intervals (defined by the user) after the connection is closed Performs statistical analysis on the RTT data obtained Reference 14
15 Usage synack [-options] host synack (2/3) Options -p ## port number to send to (default 22) -k ## no. of connections to be made -i ## Time interval between connections in secs (default 1 sec) -u ## Time interval between connections in microsecs -z ## Percentile 1 (default 25) -Z ## Percentile 2 (default 75) -S ## Timout in secs (default 1 Sec) -s ## Timeout in millisecs 15
16 $./synack -p 80 -k 10 synack (3/3) SYN-ACK to moose.snu.ac.kr ( ), 10 Packets connected to moose.snu.ac.kr : Seq = 0, RTT = ms connected to moose.snu.ac.kr : Seq = 1, RTT = ms connected to moose.snu.ac.kr : Seq = 2, RTT = ms connected to moose.snu.ac.kr : Seq = 3, RTT = ms connected to moose.snu.ac.kr : Seq = 4, RTT = ms connected to moose.snu.ac.kr : Seq = 5, RTT = ms connected to moose.snu.ac.kr : Seq = 6, RTT = ms connected to moose.snu.ac.kr : Seq = 7, RTT = ms connected to moose.snu.ac.kr : Seq = 8, RTT = ms connected to moose.snu.ac.kr : Seq = 9, RTT = ms Waiting for outstanding packets (if any)... ***** Round Trip Statistics of SYN-ACK to moose.snu.ac.kr (Port = 80) ****** 10 packets transmitted, 10 packets received, 0.00 percent packet loss round-trip (ms) min/avg/max = 0.612/1.001/1.782 (std = 0.531) (median = 0.698) (interquartile range = 1.087) (25 percentile = 0.667) (75 percentile = 1.754) 16
17 Network Mapper nmap (1/2) Network exploration tool and security scanner Scan large networks to determine which hosts are up and what services are offering Usage nmap [Scan Types] [ Options] <host> Reference In the unix shell, man nmap 17
18 nmap (2/2) $ nmap mmlab.snu.ac.kr Starting Nmap 4.11 ( ) at :39 KST Interesting ports on mmlab.snu.ac.kr ( ): Not shown: 1504 closed ports, 170 filtered ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 80/tcp open http 110/tcp open pop3 587/tcp open submission 3306/tcp open mysql Nmap finished: 1 IP address (1 host up) scanned in seconds 18
19 iperf (1/2) is a tool to measure maximum TCP bandwidth allowing the tuning of various parameters and UDP characteristics reports bandwidth, delay jitter, datagram loss for a TCP connection : throughput, bandwidth for a UDP connection : throughput, jitter, lost/total datagram Usage iperf [-s -c host] [options] 19
20 iperf (2/2) $ iperf -s Server listening on TCP port 5001 TCP window size: 85.3 KByte (default) [ 4] local port 5001 connected with port [ 4] sec 1.25 GBytes 1.07 Gbits/sec $ iperf c martini.snu.ac.kr Client connecting to martini.snu.ac.kr, TCP port 5001 TCP window size: 49.4 KByte (default) [ 3] local port connected with port 5001 [ 3] sec 1.25 GBytes 1.08 Gbits/sec 20
21 Crontab crontab [ -u user ] { -l -r -e } -u user user 사용자에대해서 crontab 작업을수행한다. 생략하면 crontab 명령을실행하는사용자에대해서 crtontab 작업을수행. -l 현재 cron table 을보여준다. -r 현재 cron table 을삭제한다. -e 현재 cron table 을편집한다. cron table 의각필드 minute(0~59) hour(0-23) day(1-31) month(1-12) weekday(1-7) command 요일필드 : 1( 월 ), 2( 화 ), 3( 수 ), 4( 목 ), 5( 금 ), 6( 토 ), 7( 일 ) '*' : everytime '-' : 범위지정, 예를들어시간필드에 1-3 이면 1 시와 3 시사이즉 1 시 2 시 3 시 ',' : separator, 예를들어시간필드에 1,3 이면 1 시와 3 시 사용예 * * 1 ~/bin/log_cat 매주월요일오후 2 시 30 분에 ~/bin/log_cat 을실행 * * ~/bin/log_report 매월 1 일새벽 2 시 30 분에 ~/bin/log_report 를실행 21
CIS Test 1- Practice - Fall 2011
CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you
More informationFiberstoreOS IP Service Configuration Guide
FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP...4 1.1 Overview...4 1.2 Configuring ARP... 4 1.3 Validation commands...5 2 Configuring Proxy ARP... 7 2.1 Overview...7 2.2 Configuring
More informationChapter 5 Network Layer
Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange
More informationSirindhorn International Institute of Technology Thammasat University
Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination s: Semester 2/2009 Course Title Instructor : ITS332 Information Technology II
More informationIP over IB Protocol. Introduction CHAPTER
CHAPTER 3 The following sections appear in this chapter: Introduction, page 3-1 Manually Configure IPoIB for Default IB Partition, page 3-2 Subinterfaces, page 3-2 Verify IPoIB Functionality, page 3-5
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)
More informationQuick guide for configuring a system with multiple IP-LINKs
Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected
More informationFiberstoreOS. IP Service Configuration Guide
FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP... 1 1.1 Overview... 1 1.2 Configuring ARP... 1 1.3 Validation commands...2 2 Configuring Proxy ARP...4 2.1 Overview... 4 2.2 Configuring
More informationEnabling CDC_ETHER Connection for Skywire GSM CAT1
Enabling CDC_ETHER Connection for Skywire GSM CAT1 NimbeLink Corp Updated: February 2018 PN 30262 rev 4 NimbeLink Corp. 2018. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction
More informationFSOS IP Service Configuration Guide
FSOS IP Service Configuration Guide Contents 1 Configuring ARP... 5 1.1 Overview... 5 1.2 Configuring ARP... 5 1.3 Validation commands...6 2 Configuring Proxy ARP...8 2.1 Overview... 8 2.2 Configuring
More informationAPPLICATION NOTE. Scope. Reference Documents. Software Ethernet Bridge on SAMA5D3/D4. Atmel SMART SAMA5D3/D4 Series
SMART APPLICATION NOTE Software Ethernet Bridge on SAMA5D3/D4 Atmel SMART SAMA5D3/D4 Series Scope The Atmel SMART SAMA5D3/D4 series are high-performance, power-efficient embedded MPUs based on the ARM
More informationApplication of Mininet
1 Application of Mininet Report of Wireless communication and mobile network Project Nie Xiaofang 5110309418 1 2 Abstract: This report is the summary with learning mininet. And it starts with the basics.
More informationEnabling CDC-ETHER Connection for Skywire CAT1
Enabling CDC-ETHER Connection for Skywire CAT1 NimbeLink Corp Updated: May 2017 PN 30111 rev 5 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction 2 1.1 Orderable
More informationTABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2
TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LAB REFERENCE & TOPOLOGY INFORMATION... 3 3 DELETE THE EXISTING OUT OF BAND NODE MANAGEMENT ADDRESSES CONFIGURATION FOR YOUR DESIGNATED ACI FABRIC... 4 4 CONFIGURE
More informationLet us ping! First we will learn the Hello World of a networked machine.
AN INTRODUCTION TO LINUX NETWORKING In this article, we ll explore networking under GNU/Linux. You ll find it interesting to manage the entire network through certain valid keystrokes known as commands.
More informationGM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010
GM8126 MAC DRIVER User Guide Rev.: 1.0 Issue Date: December 2010 REVISION HISTORY Date Rev. From To Dec. 2010 1.0 - Original Copyright 2010 Grain Media, Inc. All Rights Reserved. Printed in Taiwan 2010
More informationThe Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.
The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution
More informationDetecting Sniffers on Your Network
Detecting Sniffers on Your Network Sniffers are typically passive programs They put the network interface in promiscuous mode and listen for traffic They can be detected by programs such as: ifconfig eth0
More informationJavier Sedano David Fernández
Javier Sedano (javier.sedano@agora-2000.com) David Fernández (david@dit.upm.es) Introduction Dual stack Tunneling Translation Conclusions Madrid 2003 Global IPv6 Summit Coexistence and Transition 2 Motivation
More informationNetwork problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting
Network problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting Martin Wicks (wicksy@wicksy.com) Freelance UNIX consultant 711 Consultancy Limited 20
More informationTCP/IP Network Essentials
TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet
More informationIPv6 LAB. Practical IPv6. Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT
IPv6 LAB Practical IPv6 Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT Contents Lab topology IPv6 in Common OSs Basic IPv6 Configuration IPv6 useful commands Using IPv6 with Python
More informationECE 358 Project 3 Encapsulation and Network Utilities
ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities
More informationlab rip experiences with RIPv2 distance vector protocol
lab rip experiences with RIPv2 distance vector protocol hosts need routing each host with a network stack performs some elementary routing ip layer nic eth0? lo the network stack may be used to access
More informationHostname and IP Address
1/19 IP Addressing Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Hostname and IP Address 2/19 browser What is the IP address of www.isoc.org? www.isoc.org
More informationUCS IPv6 Management Configuration Example
UCS IPv6 Management Configuration Example Document ID: 118784 Contributed by Padmanabhan Ramaswamy and Shankar Prasath, Cisco TAC Engineers. Mar 06, 2015 Contents Introduction Prerequisites Requirements
More informationestadium Project Lab 2: Iperf Command
estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure
More information15-441: Computer Networks Spring 2017 Homework 3
15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page
More informationHomework 2 TCP/IP Network Monitoring and Management
Homework 2 TCP/IP Network Monitoring and Management Hw 2 Assigned on 2015/9/1, Due 2015/9/15 Hand-In Requirement Prepare a activity/laboratory report (name it Hw4-WebSys-YourName.docx) using the ECET Lab
More informationThis document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host.
Networking Guide for BeagleBone (Black or Green) by Brian Fraser Last update: Nov 17, 2017 This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More information1. TABLE OF CONTENTS INTRODUCTION TECHNICAL SPECIFICATIONS INSTALLATION... 6
1. TABLE OF CONTENTS 1. TABLE OF CONTENTS... 1 2. INTRODUCTION... 2 3. TECHNICAL SPECIFICATIONS... 3 4. INSTALLATION... 6 5. PROPERTIES... 8 5.1 TCP/IP NETWORK MODEL...8 5.2 TCP AND UDP...9 5.2.1 IP...10
More informationInterface Management
COSC301 Laboratory Manual Required Reading Prior to Lab To ensure you get plenty of time to ask for any help during the lab, please ensure you have read at least Section 1, A Map, Notation and a bit of
More informationVLAN Configurations. 1 of :18. Available Categories. Adobe. Macromedia
Custom Search Available Categories Adobe Macromedia Programming SQL Server Administration Networking Microsoft Products Mac OS Linux systems Mobile devices XML Certification Misc Available Tutorials Lan
More informationRouter with OpenFlow Part 2
Router with OpenFlow Part 2 Fundamentals of a Routing Table and How to Implement One with OpenFlow Aggregate Destination Hosts Network Address: 192.168.1.0 Net Mask: 24 Host X Router A Host Y Destination
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet
More informationFor personnal use only
Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.
More informationCHAPTER 7 DEMONSTRATE THE PAN IN LINUX
CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two
More informationUsing Shell Commands
This chapter contains the following sections: General Administration, page 1 Working with Databases, page 9 Importing Certificates, page 13 Accessing Root Privileges, page 14 Using a Multi-Node Setup,
More informationHomework 2: Lab Activity TCP/IP Network Monitoring and Management
Homework 2: Lab Activity TCP/IP Network Monitoring and Management Hw 2 Assigned on 2017/8/29, Due 2017/9/7 Hand-In Requirement Prepare a activity/laboratory report (name it Hw2-WebSys-YourName.docx) using
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationLinux. Computer networks - Administration 1DV202. fredag 30 mars 12
Linux Computer networks - Administration 1DV202 Configuration files /etc/hosts /etc/resolv.conf /etc/network/interfaces /etc/hosts 127.0.0.1 localhost.localdomain localhost 127.0.1.1 lokal.kalmar.se lokal
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationChapter 5: Trouble shooting of a network
5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping
More informationNetwork Test and Monitoring Tools
ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4
More informationInternetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)
Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator
More informationPacket Generator User Guider V0.1
Packet Generator User Guider V0.1 Based on DeanSys Pktgen-0.0.4 dean@deansys.com www.deansys.com, Oct.20,2006 Page 1 Contents Contents... 2 Chapter 1. Abstract... 4 Chapter 2. How to install it?... 5 2.1
More informationNetwork Socket Programming - 2 BUPT/QMUL
Network Socket Programming - 2 BUPT/QMUL 2017-3-20 Review Basic Concepts in NP Introduction to Network Programming Importance Classes Environments in this course Program Developing Phases Skills Useful
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet
More informationBasics of GNS3 and Cisco IOS
Lab00: Objectives: Basics of GNS3 and Cisco IOS IERG4090 Lab00 P.1 Upon completion of this lab, you will be able to: - Extract a given topology GNS3 archive - Start GNS3 - Open the given topology file
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationNetworking Fundamentals
Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationWi-Fi Guide: Edimax USB Adapter on BBG
Wi-Fi Guide: Edimax USB Adapter on BBG August 3 rd 2017 Table of Contents: Page 1: Page 2: Page 3: Page 4: Page 5: Introduction & Hardware requirements Getting Started Connecting to a network using Network
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationThe Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.
The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution
More informationFirewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense
FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall
More informationPC BASED REAL TIME DATA EXCHANGE ON 10GbE OPTICAL NETWORK USING RTOS*
THIC Software and Hardware Technology THCC03 PC BASED REAL TIME DATA EXCHANGE ON 10GbE OPTICAL NETWORK USING RTOS* Ninth International Workshop on Personal Computers and Particle Accelerator Controls (PCaPAC
More informationPrinted by Jed Crandall Sep 01, 11 6:35 netsstuff.txt PCMCIA USB IDE SCSI. Network interfaces. Framebuffer devices. Display.
Sep 01, 11 6:35 Page 1/20 Script started on Thu 01 Sep 2011 05:41:59 AM MDT ^[[4mrhea^[[24m:^[[1m~^[[0m> ifconfig eth0 Link encap:ethernet HWaddr 00:24:e8:3c:98:11 inet addr:64.106.21.25 Bcast:64.106.21.255
More information( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture
CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C
More informationFundamentals of Computer Networking AE6382
Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationFundamentals of Linux Platform Security
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationFundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationConfiguring the BeagleBone Black s Ethernet Port for SSH Access
Configuring the BeagleBone Black s Ethernet Port for SSH Access NimbeLink Corp Updated: April 2016 PN 30112 rev 1 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction
More informationPacket Generator User Guide V0.4
Packet Generator User Guide V0.4 Based on DeanSys Pktgen-0.0.8 dean@deansys.com www.deansys.com, Feb.20,2007 Page 1 Contents Contents... 2 Chapter 1. Abstract... 5 1.1 Scope...7 1.2 Feature List...7 Chapter
More informationContents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9
Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 i Ping, tracert, and system debugging commands debugging Syntax Default
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More informationStampA5D3x/PortuxA5/PanelA5. Quickstart Guide
StampA5D3x/PortuxA5/PanelA5 Quickstart Guide StampA5D3x/PortuxA5/PanelA5 StampA5D3x/PortuxA5/PanelA5: Quickstart Guide Copyright 2015 taskit GmbH All rights to this documentation and to the product(s)
More informationI Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12
iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationDeploy Dual Stack CentOS 7 Instance in AWS
Deploy Dual Stack CentOS 7 Instance in AWS Lawrence E. Hughes Sixscape Communications Pte Ltd. 26 Oct 2017 This assumes you have already created an AWS account and a dual stack VPC. Click Launch Instance
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003
[CRT09] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 MODULE NO: CPU5003 Date: Wednesday 21 st January 2015 Time: 10:00 13:00 INSTRUCTIONS
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu
More informationAccessing the Networking Stack
The Cisco IOS XR Software serves as a networking stack for communication. This section explains how applications on IOS XR can communicate with internal processes, and with servers or outside devices.
More informationH
H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the
More informationCS 477/677 Computer Communications & Networks The Network Layer: IP
Network Layer 1 CS 477/677 Computer Communications & Networks The Network Layer: IP Text: Data and Computer Communications, 8 th Edition, William Stallings Chapters 18-18.5, 12, (optional: 19.2-19.4) Objectives:
More informationROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP
IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding
More informationCS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly
More informationGeneral Network Troubleshooting
Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise
More informationDebian/GNU Linux Networking
Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network
More informationQuick Start Guide for BeagleBone Black. Table of Contents. by Brian Fraser Last update: Summer, 2015
Quick Start Guide for BeagleBone Black by Brian Fraser Last update: Summer, 2015 This document guides the user through: 1. Installing Ubuntu in a virtual machine. 2. Connecting to the target using serial
More informationExperiment No: Group B_4
Experiment No: Group B_4 R (2) N (5) Oral (3) Total (10) Dated Sign Problem Definition: Study and perform Linux networking commands emulation using Python or C++. 1.1Prerequisite: Basics of Networking.
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice
More informationThe NBN Experience: The Interwebs at the Speed of Light. Jason But.
The NBN Experience: The Interwebs at the Speed of Light Jason But jbut@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline NBN Nuts and Bolts What happens
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationNetwork Configuration for Cisco UCS Director Baremetal Agent
Network Configuration for Cisco UCS Director Baremetal Agent This chapter contains the following sections: About the Network Configuration Options, page 1 Single Network for Management and PXE, page 1
More informationInstituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities
Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security Lab guide: Traffic analysis and TCP/IP Vulnerabilities Revised on 2016-10-18 Alpha version: This is an early version and
More informationEmergency shell commands 1
Contents Emergency shell commands 1 copy 1 delete 1 dir 2 display copyright 4 display install package 4 display interface m-eth0 5 display ip routing-table 7 display ipv6 routing-table 7 display version
More informationNetwork Administra0on
Network Administra0on (Introduc0on) Administración en Red 1 Index Introduc0on (TCP/IP) Network Interface Link Layer Network Layer Monitoring/Test Administración en Red 2 Introduc0on (TCP/IP) Protocol Suite,
More informationMaterial for the Networking lab in EITF25 & EITF45
Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab
More informationIPv6 Deployment at ORNL
IPv6 Deployment at ORNL Greg Hinkel hinkelgc@ornl.gov ETCSS October 24, 2012 Outline Purpose Quick v6 intro Background v6 traffic Develop an IPv6 plan Contain v6 traffic v6 test network (Phase 1) Config
More informationAccess Server: User's and Developer's Guide <<< Previous Next >>>
1 of 14 12/9/2008 10:18 AM Access Server: User's and Developer's Guide > Chapter 2. Getting Started with Access Server Access Server can be controlled in three ways: by using the WWW
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationNetworking Approaches in. a Container World. Flavio Castelli Engineering Manager
Networking Approaches in a Container World Flavio Castelli Engineering Manager fcastelli@suse.com Rossella Sblendido Engineering Manager rsblendido@suse.com Disclaimer There a many container engines, I
More informationSSC-D02 HOMEWORK 2. Jean-Yves Le Boudec. November 6, 2002
SSC-D02 HOMEWORK 2 Jean-Yves Le Boudec November 6, 2002 Exercise 1 You need to log on to a UNIX machine for this exercise. You may have to use the UNIX commands: traceroute, arp, ping, ifconfig, nslookup,
More information4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative
1. What is the IP address and TCP port number used by your client computer (source) to transfer the file to spinlab.wpi.edu? My computer is at 10.211.55.3. The source port is 49247. See screenshot below.
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More information