General Network Troubleshooting
|
|
- Agatha Weaver
- 5 years ago
- Views:
Transcription
1 Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise (CE) because CE uses network communication to function. Because the techniques outlined in this document are independent of any software, they can be used in conjunction with any version of CE. INTRODUCTION... 2 PING...2 Usage of PING... 2 TRACERT...4 Usage of TRACERT... 4 NSLOOKUP...5 NETSTAT...7 Usage of NETSTAT... 7 TELNET...9 Usage of TELNET... 9 CONTACTING CRYSTAL DECISIONS FOR TECHNICAL SUPPORT /23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 1
2 Introduction This paper introduces and explains troubleshooting techniques for networks that are independent of software. The reason that these techniques are key is that they allow you to test the connectivity of a system on a network at the Operating System (OS) level rather than through software. This type of troubleshooting eliminates software from the equation, making for a clearer test. The document is designed to follow a logical flow for troubleshooting. The tests PING, TRACERT, and NSLOOKUP are placed in the order that they should be performed. PING PING is used to test network connectivity response between two computers on a network. You can think of a PING command like submarines and naval ships that send a ping sound to determine the distance between objects based on the amount of time it takes to receive a response. PING sends a packet in the form of an Internet Control Message Protocol (ICMP) packet. The most important aspect of PING is the fact that it shows whether there is a response from a target computer. In this way you can determine if network communication is possible between two computers. Usage of PING The following parameters can be used with PING. ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] [-k host-list]] [-w timeout] destination-list Definitions of parameters: -t Ping the specified host until stopped. To see statistics and continue - type Control-Break; To stop - type Control-C. -a Resolve addresses to hostnames. -n count Number of echo requests to send. -l size Send buffer size. -f Set Don't Fragment flag in packet. -i TTL Time To Live. -v TOS Type Of Service. -r count Record route for count hops. -s count Timestamp for count hops. -j host-list Loose source route along host-list. -k host-list Strict source route along host-list. -w timeout Timeout in milliseconds to wait for each reply. 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 2
3 Examples In the examples below, all bold text represents what is typed in at the command prompt. All italicized text represents what displays in response to what was just typed. All IP addresses and server names are used as examples only. For this test to be successful, use valid IP addresses and server names. This example shows a PING to the IP address in which the target computer responds. H:\>ping Pinging with 32 bytes of data: Reply from : bytes=32 time=31ms TTL=46 Reply from : bytes=32 time=31ms TTL=46 Reply from : bytes=32 time=15ms TTL=46 Reply from : bytes=32 time=31ms TTL=46 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 15ms, Maximum = 31ms, Average = 27ms You can also use domain names in PING, such as (ping This will resolve the name to its IP address and ping that IP. If the domain or alias does not exist, you may see the following: H:\>ping Unknown host Domains and DNS resolution will be covered later in this document.. Some further information about the above example: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss) Packet loss is the loss of data that was sent during a ping. It is not uncommon to see a 25% loss in the case of only pinging four times. However a 75% loss indicates communication issues that are usually physical on the network such as cabling and switches. NOTE Sometimes a computer is connected but there is 100% packet loss or no response from the host computer. This is due to a firewall configuration that is blocking ICMP packets (PINGs). In this case, you should speak to the network administrator. Minimum = 15ms, Maximum = 31ms, Average = 27ms The average response time in milliseconds (ms) indicates the average length of time it took to receive a response from the host computer. This can help you gauge lags that may exist in communication if you have slow transfer rates. Common replies can take anywhere from 2ms to 150ms. Replies ranging 300ms and over are characteristic of network lags. This example shows a PING to the IP address in which the target computer does not respond. H:\>ping Pinging with 32 bytes of data: 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 3
4 Request timed out. Request timed out. Request timed out. Request timed out. Ping statistics for : Packets: Sent = 4, Received = 0, Lost = 4 (100% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms If the PING receives no response, you can conclude that the communication issue is not software related but is a network issue. TRACERT TRACERT in Windows (TRACEROUTE in Unix) is short for trace route. This basically is a trace of the route that a communication between two computers takes. TRACERT is used to test a lag in communication or the point of network failure on a network (Intranet or Internet) that is causing poor to no connection between two computers. TRACERT sends pings to each of the computers along a route and responds with that data on each hop. If at one point during the trace all responses stop, it can help identify the source of network connectivity issues and whether they are caused by internal or external network conditions. For example, if an Internet Service Provider s Router is not responding, the network issues are external. Usage of TRACERT H:\>tracert Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name Options: -d Do not resolve addresses to hostnames. -h maximum_hops Maximum number of hops to search for target. -j host-list Loose source route along host-list. -w timeout Wait timeout milliseconds for each reply. Example: In the examples below, all bold text represents what is typed in at the command prompt. All italicized text represents what displays in response to what was just typed. NOTE An asterisk (*) indicates that there was no response for that PING. It is not uncommon to see one asterisk on a hop. H:\>tracert Tracing route to over a maximum of 30 hops 1 <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms internal.server.com [ ] 3 <10 ms 16 ms <10 ms /23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 4
5 4 <10 ms <10 ms <10 ms ms <10 ms <10 ms internal2.server.com [ ] 6 <10 ms 16 ms <10 ms internal3.server.com [ ] 7 <10 ms <10 ms <10 ms <10 ms <10 ms 16 ms <10 ms <10 ms <10 ms ge4-1.wanb-vancbc.ip.grouptelecom.net ] 10 <10 ms 15 ms <10 ms ge3-0.peera-sttlwa.ip.grouptelecom.net [ ] ms <10 ms 16 ms bpr2-so seattleswitchdesign.cw.net [ ] 12 <10 ms 15 ms 16 ms acr2-so seattle.cw.net [ ] ms 15 ms 32 ms dcr1-loopback.santaclara.cw.net [ ] ms 31 ms 16 ms bhr1-pos-0-0.santaclarasc5.cw.net [ ] ms 32 ms 31 ms csr21-ve243.santaclarasc4.cw.net [ ] ms 31 ms 31 ms google-exodus.exodus.net [ ] ms * 15 ms ms 15 ms 32 ms Trace complete. Note that the trace goes through each component on the network until it reaches its destination. Three PING response times are given for each hop on the route that are show in milliseconds. NSLOOKUP NSLOOKUP stands for Name Server Look Up. Domain Name Servers (DNS) are the servers on an Intranet or on the Internet that handle converting names such as or into a corresponding IP address such as NSLOOKUP is a way to log on to a DNS server and see what its response is for a particular domain, alias, or IP (reverse look-ups) NSLOOKUP can be used when a computer can ping an IP address but not the alias of that IP address. You can use NSLOOKUP to verify that the computer s DNS server can resolve the alias of the IP address. NOTE Another way to see what DNS servers a machine is using: Microsoft Windows NT, 2000, or XP: Start > Run > cmd > IPCONFIG /ALL Microsoft Windows 95, 98, and ME: Start > Run > winipcfg > OK Click More Info on the resulting window. Unix: Ifconfig Examples: The following example shows a standard search on the alias on the default DNS server that is used by the computer running NSLOOKUP. 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 5
6 In the examples below, some of the server names and IP addresses have been changed to invalid placeholders. This is for example purposes only. Your server names and IP addresses will appear when you use NSLOOKUP. In the examples below, all bold text represents what is typed in at the command prompt. All italicized text represents what displays in response to what was just typed. H:\>nslookup Default Server: someserver.somedomain.com Address: > Server: someserver.somedomain.com Address: Non-authoritative answer: Name: Address: Aliases: To see all of the associated records for the domain google.ca, change the q of NSLOOKUP: H:\>nslookup Default Server: someserver.somedomain.com Address: > set q=any > google.ca Server: someserver.somedomain.com Address: Non-authoritative answer: google.ca internet address = google.ca internet address = google.ca internet address = google.ca nameserver = ns1.google.com google.ca nameserver = ns2.google.com google.ca nameserver = ns3.google.com google.ca nameserver = ns4.google.com google.ca primary name server = ns1.google.com responsible mail addr = dns-admin.google.com serial = refresh = (6 hours) retry = 3600 (1 hour) expire = (12 days 33 mins 20 secs) default TTL = (1 day) google.ca MX preference = 10, mail exchanger = smtp1.google.com google.ca MX preference = 20, mail exchanger = smtp2.google.com google.ca MX preference = 30, mail exchanger = smtp3.google.com ns1.google.com internet address = ns2.google.com internet address = ns3.google.com internet address = /23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 6
7 ns4.google.com internet address = > This returns the entire zone file for the domain google.ca. This is important to be able to see the DNS servers that the domain is hosted on, the MX or mail record that the domain uses and the preference in which these MX records are set. If you want to run a query on the alias where it is hosted, change the server in NSLOOKUP. An example of this is shown below: H:\>nslookup Default Server: someserver.somedomain.com Address: > server ns1.google.com Default Server: ns1.google.com Address: > Server: ns1.google.com Address: Name: Address: Aliases: > NSLOOKUP can be a very powerful tool if you are connected to another computer by its Fully Qualified Domain Name (FQDN) or an alias such as server.domain.com. NSLOOKUP can tell you what DNS servers the host computer is using and what those DNS servers are resolving a name to. If the IP that the DNS server returns is not correct, it may explain connection issues. NETSTAT NETSTAT shows network status by supplying the contents of various network related data structure in various formats. It displays protocol statistics and current TCP/IP network connections. The format depends on which parameters are used. Usage of NETSTAT The following section outlines how TRACERT can be used with various parameters to display protocol statistics and current TCP/IP network connections. NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval] -a Displays all connections and listening ports. -e Displays Ethernet statistics. This may be combined with the -s option. -n Displays addresses and port numbers in numerical form. -p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP. 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 7
8 -r Displays the routing table. -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default. interval Redisplays selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If omitted, netstat will print the current configuration information once. Example: The following example shows all established connections with IPs and ports in which they are connected In the examples below, the IP addresses have been changed to invalid placeholders. This is for example purposes only. Your IP addresses will appear when you use NETSTAT. In the example below, all bold text represents what is typed in at the command prompt. All italicized text represents what displays in response to what was just typed. H:\>netstat -n Active Connections TIP: Try netstat an for a very detailed view of connections and open ports Proto Local Address Foreign Address State TCP CLOSE_WAIT TCP CLOSE_WAIT TCP CLOSE_WAIT TCP ESTABLISHED 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 8
9 TELNET TELNET can be used to test connectivity for different services that run on open ports. TELNET is used to connect to a computer on a port and test the connectivity of a service running on that computer. It is most commonly used to test Post Office Protocol (POP), SMTP, and Web Servers. Usage of TELNET H:\>telnet /? telnet [host [port]] host port specifies the hostname or IP address of the remote computer to connect to. Specifies the port number or service name. Basic Commands This section outlines basic commands when using TELNET. In the examples below, all bold text represents what is typed in at the command prompt. All italicized text represents what displays in response to what was just typed. All IP addresses and server names are used as examples only. For this test to be successful, use valid IP addresses and server names. If you type: H:\>telnet You will see: Microsoft (R) Windows 2000 (TM) Version 5.00 (Build 2195) Welcome to Microsoft Telnet Client Telnet Client Build Escape Character is 'CTRL+]' Microsoft Telnet> For a list of commands available in TELNET, type? : Microsoft Telnet>? Commands may be abbreviated. Supported commands are: close display open quit close current connection display operating parameters connect to a site exit telnet 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 9
10 set set options (type 'set?' for a list) status print status information unset unset options (type 'unset?' for a list)?/help print help information Microsoft Telnet> To troubleshoot services, set LOCAL_ECHO so that you can see what you are typing when connected: Microsoft Telnet> set LOCAL_ECHO POP POP is an Internet protocol used when accessing your . POP uses the port 110 To test a computer running a POP server you must connect to the name or IP of the computer that has the POP service and specify port 110 as the port to connect to. For example: Microsoft Telnet> open VANEXCH You should see something similar to this (screen will vary depending on the type of POP server running): +OK Microsoft Exchange POP3 server version ready This means you have a successful connection to the service. This verifies that the service is up and running. To log in type the following: (replace <username> with your username): user <username> If it is a valid user name, you should see the following: +OK Then type the following: (replace <password> with your password): pass <password> If it is a valid password for the user name, you should see: +OK This would show that you are able to log into the mail server with a valid account. To see the mail in that account: LIST 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 10
11 This is a list of mail messages with an index on the left and the message size To read a message type the following(replace <index> with the indexed you wish to read): RETR <index> The message should then display with its full message headers and body. If all of these tests are successful, you know that the POP service on the machine is functioning properly. If they are not all successful, you know that SMTP SMTP stands for Sending Mail Transfer Protocol and is used to send and receive from server to server. SMTP uses port 25. To test an SMTP service on a computer through TELNET, type the following replacing yourmailserver.com with the actual name of your mail server: Microsoft Telnet> open yourmailserver.com 25 The following are directions to send mail through TELNET to test the SMTP service. Lines in bold are what is typed. Replace example the addresses with valid addresses: Connected to yourmailserver.com. Escape character is '^]'. 220 mx.yourmailserver.com ESMTP Sendmail /8.12.9; Thu, 12 Jun :06: helo frommail.com 250 main.signalq.com Hello [ ], pleased to meet you mail from: butter22333@frommail.com butter22333@frommail.com... Sender ok rcpt to: webmaster@yourmailserver.com webmaster@yourmailserver.com... Recipient ok data 354 Enter mail, end with "." on a line by itself Subject: test message this is a test h5ch6gvi Message accepted for delivery 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 11
12 NOTE Notice how the domain of helo frommail.com and the domain of match. This is due to relaying permissions that are set on the mail server. Usually an administrator only allows valid users from valid domains that the SMTP server is sending mail for. Web Servers Web servers commonly run on port 80. To test a web server, telnet to port 80 by typing the following: Microsoft Telnet> open 80 Now if you type any character and press Enter you should get a response similar to the one shown below. HTTP/ Bad Request Date: Wed, 10 Jan :24:37 GMT Server: NCSA/1.5 Content-type: text/html <HEAD><TITLE>400 Bad Request < /TITLE> < /HEAD> <BODY><H1>400 Bad Request < /H1> Your client sent a query that this server could not understand.<p> Reason: Invalid or unsupported method.<p> < /BODY> If you receive this response, the web server is running. Contacting Crystal Decisions for Technical Support We recommend that you refer to the product documentation and that you visit our Technical Support web site for more resources. Self-serve Support: Support: Telephone Support: 9/23/ :00 AM Copyright 2003 Crystal Decisions, Inc. All Rights Reserved. Page 12
Homework 2 TCP/IP Network Monitoring and Management
Homework 2 TCP/IP Network Monitoring and Management Hw 2 Assigned on 2015/9/1, Due 2015/9/15 Hand-In Requirement Prepare a activity/laboratory report (name it Hw4-WebSys-YourName.docx) using the ECET Lab
More informationHomework 2: Lab Activity TCP/IP Network Monitoring and Management
Homework 2: Lab Activity TCP/IP Network Monitoring and Management Hw 2 Assigned on 2017/8/29, Due 2017/9/7 Hand-In Requirement Prepare a activity/laboratory report (name it Hw2-WebSys-YourName.docx) using
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationChapter 5: Trouble shooting of a network
5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationTable of Contents 1 System Maintaining and Debugging 1-1
Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4
More informationPing, tracert and system debugging commands
Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert
More informationHomework #2. Objective: GRADE A. Equipment List: Procedure/Data: Activity 1A. Emmanuel A. Ellis Web Systems 9/7/2017
Objective: GRADE A Homework #2 Emmanuel A. Ellis Web Systems 9/7/2017 In this lab, we will be learning about some of the more basic first level troubleshooting tactics when a device seemseems to not be
More informationTCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period
Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as
More informationNetwork concepts introduction & wireshark
Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity
More informationUsing ping, tracert, and system debugging
Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all
More informationThe flow of transferring the machining programs of the server PC and starting an automatic operation is as below.
CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4
More informationContents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9
Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 i Ping, tracert, and system debugging commands debugging Syntax Default
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationLab Troubleshooting Using traceroute Instructor Version 2500
Lab 9.3.4 Troubleshooting Using traceroute Instructor Version 2500 294-833 CCNA 2: Routers and Routing Basics v 3.1 - Lab 9.3.4 Copyright 2003, Cisco Systems, Inc. Objective Use the traceroute Cisco IOS
More informationTCP/IP Diagnostic Utilities on Windows 2008 Server
TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP
More informationCOMP2330 Data Communications and Networking
COMP2330 Data Communications and Networking Dr. Chu Xiaowen (Second semester, 2009-2010 academic year) Last update : Jan-19-2010 Laboratory 2 IP techniques: ipconfig, ping, tracert and netstat Objectives:
More informationTalia: idirect infiniti series Troubleshooting Guide 2 of 12 Start the isite application. You should see information about your IDU in the left pane,
Talia: idirect infiniti series Troubleshooting Guide 1 of 12 idirect infiniti series Troubleshooting Guide System information rev.2007-10-03 - download the latest version of this guide at www.talia.net
More informationInternet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1
Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems
More informationProcedure Note: The research steps for this lab are not included in this procedure.
Objective The objective of this lab assignment is to research and gain an understanding of the different tools and options available when needing to perform network analysis, and seek an understanding
More informationAisyatul Karima Jarkom Lanjut - Week 3 LOGO.
Network Analysis Tool Aisyatul Karima - 2012 Jarkom Lanjut - Week 3 www.themegallery.com Standar Kompetensi Pada akhir semester, mahasiswa mampu merancang, mengimplementasikan dan menganalisa sistem jaringan
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright
More informationContents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10
Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 i Ping, tracert, and system debugging commands debugging Syntax Default
More informationComputer Engineering II Solution to Exercise Sheet Chapter 4
Distributed Computing FS 2018 Prof. R. Wattenhofer Computer Engineering II Solution to Exercise Sheet Chapter 4 1 Quiz Questions a) A user provides his login credentials. The server then returns a cookie
More informationNetwork concepts introduction & wireshark. workshop
Network concepts introduction & workshop @KirilsSolovjovs ISO/OSI+DoD model Topics for our workshop Network layer models Ethernet, WiFi Layer3: ARP, ICMP, IPv4, IPv6 Layer4: UDP, TCP Routing Application
More informationExperiment No: Group B_4
Experiment No: Group B_4 R (2) N (5) Oral (3) Total (10) Dated Sign Problem Definition: Study and perform Linux networking commands emulation using Python or C++. 1.1Prerequisite: Basics of Networking.
More informationH
H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu
More information1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationCS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay
CS 716: Introduction to communication networks - 16 th class; 28 th Sept 2011 Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay What is IP address An identifier for a computer or device on a TCP/IP
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice
More informationFundamentals of Computer Networking AE6382
Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually
More informationAT&T Digital Subscriber Line Service
AT&T Digital Subscriber Line Service Windows 2000 Professional PC Configuration Guide Overview Welcome to AT&T DSL Internet Service! This guide is designed to help you configure your PC to access the Internet
More informationHP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine
HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal
More informationHOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP
HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP 1. Go to the Start Menu, choose Programs, Accessories, Communications, and open the Network Connections
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More informationThe term "router" in this document refers to both routers and Layer 3 switches. Step Command Remarks. ipv6 host hostname ipv6-address
Contents Configuring IPv6 DNS 1 Overview 1 Configuring the IPv6 DNS client 1 Configuring static domain name resolution 1 Configuring dynamic domain name resolution 1 Displaying and maintaining IPv6 DNS
More informationH
H12-223 Number: H12-223 Passing Score: 600 Time Limit: 120 min Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the administrator take?
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationConfiguring IP SLAs TCP Connect Operations
This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices
More informationNetwork problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting
Network problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting Martin Wicks (wicksy@wicksy.com) Freelance UNIX consultant 711 Consultancy Limited 20
More informationH3C S7500E Series Ethernet Switches. Network Management and Monitoring. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.
H3C S7500E Series Ethernet Switches Network Management and Monitoring Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 20100722-C-1.01 Product Version: Release
More informationConfiguring IPv6 DNS. Introduction to IPv6 DNS. Configuring the IPv6 DNS client. Configuring static domain name resolution
Contents Configuring IPv6 DNS 2 Introduction to IPv6 DNS 2 Configuring the IPv6 DNS client 2 Configuring static domain name resolution 2 Configuring dynamic domain name resolution 2 Displaying and maintaining
More informationHP A5500 EI & A5500 SI Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP A5500 EI & A5500 SI Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the
More informationAPPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7
INTRODUCTION Before installing an EWSi Portal Plus Controller on a network it is necessary to change the default IP address of the unit to one supplied by the network administrator. The following screen
More informationVolume INFOSEC4FUN/UNIX4FUN DOCS. IT Troubleshooting Documentation. Troubleshooting the Stack
Volume 1 INFOSEC4FUN/UNIX4FUN DOCS IT Troubleshooting Documentation Troubleshooting the Stack D E S I G N C U S T O M I Z A T I O N Chapter 1 OSI Model Troubleshooting should always start with the basics.
More informationHP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP 5820X & 5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationTable of Contents 1 DNS Configuration 1-1
Table of Contents 1 DNS Configuration 1-1 DNS Overview 1-1 Static Domain Name Resolution 1-1 Dynamic Domain Name Resolution 1-1 Configuring Domain Name Resolution 1-3 Configuring Static Domain Name Resolution
More informationVPN Connection through Zone based Firewall Router Configuration Example
VPN Connection through Zone based Firewall Router Configuration Example Document ID: 112051 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationLab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.
Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More informationCompTIA Network+ Lab Series Network Concepts. Lab 3: TCP/IP Utilities
CompTIA Network+ Lab Series Network Concepts Lab 3: TCP/IP Utilities Objective 1.5: Identify common TCP and UDP default ports Objective 1.6: Explain the function of common networking protocols Objective
More informationNetwork+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationHP 6125G & 6125G/XG Blade Switches
HP 6125G & 6125G/XG Blade Switches Network Management and Monitoring Configuration Guide Part number: 5998-3162b Software version: Release 2103 and later Document version: 6W103-20151020 Legal and notice
More informationHP 6125 Blade Switch Series
HP 6125 Blade Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-3162 Software version: Release 2103 Document version: 6W100-20120907 Legal and notice information Copyright
More informationinetquery 2005 User Guide
User Guide Table of Contents Page: 2 Introduction... 4 License Agreement... 5 LICENSE AGREEMENT...5 LICENSE... 5 OTHER RESTRICTIONS... 5 LIMITED WARRANTY...5 DISCLAIMER OF DAMAGES... 5 System Requirements...
More information(ICMP), RFC
Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to
More informationNetwork: infrastructure (hard/software) that enables endpoints (hosts) to communicate
221 7 (Inter)Networking Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate Internetwork: system of two or more networks (segments), connected via gateways, which enables
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking
Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationConfiguring IP Services
This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To
More informationFortiMail Gateway Setup and Configuration Technical Note
FortiMail Gateway Setup and Configuration Technical Note FortiMail Gateway Setup and Configuration Technical Note Document Version: Version 1 Publication Date: 04 April 2005 Description: This technical
More informationLAB 1 HOW THE WEB WORKS
LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route
More informationInternet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC
Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary
More informationTroubleshooting Your Network
Troubleshooting Your Network Networking for Home and Small Businesses Chapter 9 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationConfiguring IP Services
CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationLab - Using Wireshark to Examine TCP and UDP Captures
Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.
More informationDebian/GNU Linux Networking
Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationTroubleshooting External Services (External Message Store, Calendar Integrations, Calendar Information for PCTRs) in Cisco Unity Connection 8.
6 CHAPTER Troubleshooting External Services (External Message Store, Calendar Integrations, Calendar Information for PCTRs) in Cisco Unity Connection 8.0 See the following sections: Troubleshooting Access
More informationOSI Model with Protocols. Layer Name PDU Address Protocols Device
NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation
More informationChapter 10 - Configure ASA Basic Settings and Firewall using ASDM
Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.
More informationCisco Interconnecting Cisco Networking Devices Part 2
Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 R1# show running-config description ***Loopback*** ip address 192.168.1.1 255.255.255.255 Question: 374 description **Connected to R1-LAN**
More informationThe Administration Tab - Diagnostics
The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.
More informationLab Configuring Static Routes Instructor Version 2500
Lab 6.1.6 Configuring Static Routes Instructor Version 2500 Objective Configure static routes between routers to allow data transfer between routers without the use of dynamic routing protocols. Background/Preparation
More informationConfigure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch
Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More informationTable of Contents 1 Static Routing Configuration 1-1
Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-2 Configuring a Static Route 1-2 Configuration Prerequisites
More informationLAB 1 HOW THE WEB WORKS
LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route
More informationChapter 6. The Protocol TCP/IP. Introduction to Protocols
Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationI Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12
iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationLab Configuring HSRP and GLBP Topology
Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1
More informationHP A6600 Routers Network Management and Monitoring. Command Reference. Abstract
HP A6600 Routers Network Management and Monitoring Command Reference Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More information8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista
8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and
More informationNetworking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION
Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and
More information