Internet Tool Practice. 이지민 장동현

Size: px
Start display at page:

Download "Internet Tool Practice. 이지민 장동현"

Transcription

1 Internet Tool Practice 이지민 장동현

2 Outline Internet Tools ping traceroute nslookup ifconfig arp netstat synack nmap Iperf crontab Homeworks 2

3 ping (1/3) sends an ICMP ECHO_REQUEST message to a host tests whether another host is reachable measures the round-trip time to the host Usage ping [-options value ] destination Option type : -s (size), -c (count), -i (interval ), -t (TTL) etc. Ex) ping c 5 mmlab.snu.ac.kr Reference In the UNIX-like system, man ping Because the options of ping are different according to OS, see man-page for details Applicable to all the commands introduced here 3

4 ping (2/3) $ ping -c 3 -t 10 mmlab.snu.ac.kr PING mmlab.snu.ac.kr ( ) 56(84) bytes of data. 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=1 ttl=62 time=1.57 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=2 ttl=62 time=0.387 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=3 ttl=62 time=1.41 ms --- mmlab.snu.ac.kr ping statistics packets transmitted, 3 received, 0% packet loss, time 2005ms rtt min/avg/max/mdev = 0.387/1.125/1.574/0.525 ms 4

5 ping (3/3) $ ping -c 3 -i 3 mmlab.snu.ac.kr PING mmlab.snu.ac.kr ( ) 56(84) bytes of data. 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=1 ttl=62 time=0.411 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=2 ttl=62 time=0.550 ms 64 bytes from mmlab.snu.ac.kr ( ): icmp_seq=3 ttl=62 time=80.0 ms --- mmlab.snu.ac.kr ping statistics packets transmitted, 3 received, 0% packet loss, time 6005ms rtt min/avg/max/mdev = 0.411/27.002/80.045/ ms 5

6 traceroute (1/2) let us see the route that IP datagrams follow from one host to another Although there are no guarantees that two consecutive IP datagrams from the same source to the same destination follow the same route, most of the time they do. Usage traceroute [-options value ] hostname Ex) traceroute 6

7 traceroute (2/2) $ traceroute mmlab.snu.ac.kr traceroute to mmlab.snu.ac.kr ( ), 30 hops max, 40 byte packets ( ) ms ms ms ( ) ms ms ms 3 mmlab ( ) ms ms ms $ traceroute traceroute to hyperion.cs.berkeley.edu ( ), 30 hops max, 38 byte packets ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms 6 seoulgsr.kreonet.net ( ) ms ms ms 7 baramgsr-seoulgsr.kreonet.net ( ) ms ms ms. 17 hyperion.cs.berkeley.edu ( ) ms ms ms 7

8 nslookup (1/2) Allow anyone to directly query a name server and retrieve any of the information known to the DNS System Usage nslookup [ - option ] [ name - ] [ server ] interactive mode non-interactive mode another program host google.co.kr dig google.co.kr 8

9 $ nslookup > mmlab.snu.ac.kr Server: Address: #53 Name: mmlab.snu.ac.kr Address: > Server: Address: #53 nslookup (2/2) in-addr.arpa name = mmlab.snu.ac.kr. $ nslookup cse.snu.ac.kr Server: Address: #53 Non-authoritative answer: Name: cse.snu.ac.kr Address:

10 ifconfig Check the network interface configuration Usage ifconfig [interface] $ /sbin/ifconfig eth0 Link encap:ethernet HWaddr 00:B0:D0:68:B1:C6 inet addr: Bcast: Mask: inet6 addr: fe80::2b0:d0ff:fe68:b1c6/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets: errors:0 dropped:0 overruns:150 frame:150 TX packets: errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes: (3.0 GiB) TX bytes: (46.5 MiB).. 10

11 arp manipulate the system ARP cache Usage arp [option] hostname $ arp -a? ( ) at 00:00:0c:07:ac:00 on rl0 [ethernet]? ( ) at 00:d0:02:cb:e3:fc on rl0 [ethernet]? ( ) at 00:0a:5e:01:e2:ba on rl0 [ethernet]? ( ) at 00:e0:98:b0:fa:7d on rl0 [ethernet]? ( ) at 00:04:76:d0:0a:ab on rl0 [ethernet] csebrg1.snu.ac.kr ( ) at 00:50:04:bf:c5:b9 on rl0 [ethernet] topaz.snu.ac.kr ( ) at 00:0d:61:3b:8f:59 on rl0 [ethernet] garnet.snu.ac.kr ( ) at 00:0e:35:0d:fe:96 on rl0 [ethernet] opal.snu.ac.kr ( ) at 00:11:11:0f:2f:c0 on rl0 [ethernet] emerald.snu.ac.kr ( ) at 00:4f:4e:0d:51:2d on rl0 [ethernet] smart1.snu.ac.kr ( ) at 00:00:f0:91:0d:3a on rl0 [ethernet]? ( ) at 00:50:da:91:0b:0d on rl0 [ethernet] 11

12 Show network status Usage netstat [option] Options netstat (1/2) -a : show the state of all sockets. But normally sockets used by server processes are not shown. -i : show status and statistics for the physical interfaces -n : show network addresses as numbers -r : show the routing table 12

13 netstat (2/2) $ netstat r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface localnet * U eth0 default UG eth0 $ netstat rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface U eth UG eth0 13

14 Description synack (1/3) Establishes a Client-Server connection by calling connect which performs the 3-way Handshake of the TCP Protocol Measures the time taken for the connection to be established b/w the client & server Closes the connection once the RTT is measured by calling close which performs a 4-packet exchange Repeats the above process at regular intervals (defined by the user) after the connection is closed Performs statistical analysis on the RTT data obtained Reference 14

15 Usage synack [-options] host synack (2/3) Options -p ## port number to send to (default 22) -k ## no. of connections to be made -i ## Time interval between connections in secs (default 1 sec) -u ## Time interval between connections in microsecs -z ## Percentile 1 (default 25) -Z ## Percentile 2 (default 75) -S ## Timout in secs (default 1 Sec) -s ## Timeout in millisecs 15

16 $./synack -p 80 -k 10 synack (3/3) SYN-ACK to moose.snu.ac.kr ( ), 10 Packets connected to moose.snu.ac.kr : Seq = 0, RTT = ms connected to moose.snu.ac.kr : Seq = 1, RTT = ms connected to moose.snu.ac.kr : Seq = 2, RTT = ms connected to moose.snu.ac.kr : Seq = 3, RTT = ms connected to moose.snu.ac.kr : Seq = 4, RTT = ms connected to moose.snu.ac.kr : Seq = 5, RTT = ms connected to moose.snu.ac.kr : Seq = 6, RTT = ms connected to moose.snu.ac.kr : Seq = 7, RTT = ms connected to moose.snu.ac.kr : Seq = 8, RTT = ms connected to moose.snu.ac.kr : Seq = 9, RTT = ms Waiting for outstanding packets (if any)... ***** Round Trip Statistics of SYN-ACK to moose.snu.ac.kr (Port = 80) ****** 10 packets transmitted, 10 packets received, 0.00 percent packet loss round-trip (ms) min/avg/max = 0.612/1.001/1.782 (std = 0.531) (median = 0.698) (interquartile range = 1.087) (25 percentile = 0.667) (75 percentile = 1.754) 16

17 Network Mapper nmap (1/2) Network exploration tool and security scanner Scan large networks to determine which hosts are up and what services are offering Usage nmap [Scan Types] [ Options] <host> Reference In the unix shell, man nmap 17

18 nmap (2/2) $ nmap mmlab.snu.ac.kr Starting Nmap 4.11 ( ) at :39 KST Interesting ports on mmlab.snu.ac.kr ( ): Not shown: 1504 closed ports, 170 filtered ports PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 80/tcp open http 110/tcp open pop3 587/tcp open submission 3306/tcp open mysql Nmap finished: 1 IP address (1 host up) scanned in seconds 18

19 iperf (1/2) is a tool to measure maximum TCP bandwidth allowing the tuning of various parameters and UDP characteristics reports bandwidth, delay jitter, datagram loss for a TCP connection : throughput, bandwidth for a UDP connection : throughput, jitter, lost/total datagram Usage iperf [-s -c host] [options] 19

20 iperf (2/2) $ iperf -s Server listening on TCP port 5001 TCP window size: 85.3 KByte (default) [ 4] local port 5001 connected with port [ 4] sec 1.25 GBytes 1.07 Gbits/sec $ iperf c martini.snu.ac.kr Client connecting to martini.snu.ac.kr, TCP port 5001 TCP window size: 49.4 KByte (default) [ 3] local port connected with port 5001 [ 3] sec 1.25 GBytes 1.08 Gbits/sec 20

21 Crontab crontab [ -u user ] { -l -r -e } -u user user 사용자에대해서 crontab 작업을수행한다. 생략하면 crontab 명령을실행하는사용자에대해서 crtontab 작업을수행. -l 현재 cron table 을보여준다. -r 현재 cron table 을삭제한다. -e 현재 cron table 을편집한다. cron table 의각필드 minute(0~59) hour(0-23) day(1-31) month(1-12) weekday(1-7) command 요일필드 : 1( 월 ), 2( 화 ), 3( 수 ), 4( 목 ), 5( 금 ), 6( 토 ), 7( 일 ) '*' : everytime '-' : 범위지정, 예를들어시간필드에 1-3 이면 1 시와 3 시사이즉 1 시 2 시 3 시 ',' : separator, 예를들어시간필드에 1,3 이면 1 시와 3 시 사용예 * * 1 ~/bin/log_cat 매주월요일오후 2 시 30 분에 ~/bin/log_cat 을실행 * * ~/bin/log_report 매월 1 일새벽 2 시 30 분에 ~/bin/log_report 를실행 21

CIS Test 1- Practice - Fall 2011

CIS Test 1- Practice - Fall 2011 CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you

More information

FiberstoreOS IP Service Configuration Guide

FiberstoreOS IP Service Configuration Guide FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP...4 1.1 Overview...4 1.2 Configuring ARP... 4 1.3 Validation commands...5 2 Configuring Proxy ARP... 7 2.1 Overview...7 2.2 Configuring

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination s: Semester 2/2009 Course Title Instructor : ITS332 Information Technology II

More information

IP over IB Protocol. Introduction CHAPTER

IP over IB Protocol. Introduction CHAPTER CHAPTER 3 The following sections appear in this chapter: Introduction, page 3-1 Manually Configure IPoIB for Default IB Partition, page 3-2 Subinterfaces, page 3-2 Verify IPoIB Functionality, page 3-5

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)

More information

Quick guide for configuring a system with multiple IP-LINKs

Quick guide for configuring a system with multiple IP-LINKs Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected

More information

FiberstoreOS. IP Service Configuration Guide

FiberstoreOS. IP Service Configuration Guide FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP... 1 1.1 Overview... 1 1.2 Configuring ARP... 1 1.3 Validation commands...2 2 Configuring Proxy ARP...4 2.1 Overview... 4 2.2 Configuring

More information

Enabling CDC_ETHER Connection for Skywire GSM CAT1

Enabling CDC_ETHER Connection for Skywire GSM CAT1 Enabling CDC_ETHER Connection for Skywire GSM CAT1 NimbeLink Corp Updated: February 2018 PN 30262 rev 4 NimbeLink Corp. 2018. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction

More information

FSOS IP Service Configuration Guide

FSOS IP Service Configuration Guide FSOS IP Service Configuration Guide Contents 1 Configuring ARP... 5 1.1 Overview... 5 1.2 Configuring ARP... 5 1.3 Validation commands...6 2 Configuring Proxy ARP...8 2.1 Overview... 8 2.2 Configuring

More information

APPLICATION NOTE. Scope. Reference Documents. Software Ethernet Bridge on SAMA5D3/D4. Atmel SMART SAMA5D3/D4 Series

APPLICATION NOTE. Scope. Reference Documents. Software Ethernet Bridge on SAMA5D3/D4. Atmel SMART SAMA5D3/D4 Series SMART APPLICATION NOTE Software Ethernet Bridge on SAMA5D3/D4 Atmel SMART SAMA5D3/D4 Series Scope The Atmel SMART SAMA5D3/D4 series are high-performance, power-efficient embedded MPUs based on the ARM

More information

Application of Mininet

Application of Mininet 1 Application of Mininet Report of Wireless communication and mobile network Project Nie Xiaofang 5110309418 1 2 Abstract: This report is the summary with learning mininet. And it starts with the basics.

More information

Enabling CDC-ETHER Connection for Skywire CAT1

Enabling CDC-ETHER Connection for Skywire CAT1 Enabling CDC-ETHER Connection for Skywire CAT1 NimbeLink Corp Updated: May 2017 PN 30111 rev 5 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction 2 1.1 Orderable

More information

TABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2

TABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LAB REFERENCE & TOPOLOGY INFORMATION... 3 3 DELETE THE EXISTING OUT OF BAND NODE MANAGEMENT ADDRESSES CONFIGURATION FOR YOUR DESIGNATED ACI FABRIC... 4 4 CONFIGURE

More information

Let us ping! First we will learn the Hello World of a networked machine.

Let us ping! First we will learn the Hello World of a networked machine. AN INTRODUCTION TO LINUX NETWORKING In this article, we ll explore networking under GNU/Linux. You ll find it interesting to manage the entire network through certain valid keystrokes known as commands.

More information

GM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010

GM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010 GM8126 MAC DRIVER User Guide Rev.: 1.0 Issue Date: December 2010 REVISION HISTORY Date Rev. From To Dec. 2010 1.0 - Original Copyright 2010 Grain Media, Inc. All Rights Reserved. Printed in Taiwan 2010

More information

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution

More information

Detecting Sniffers on Your Network

Detecting Sniffers on Your Network Detecting Sniffers on Your Network Sniffers are typically passive programs They put the network interface in promiscuous mode and listen for traffic They can be detected by programs such as: ifconfig eth0

More information

Javier Sedano David Fernández

Javier Sedano David Fernández Javier Sedano (javier.sedano@agora-2000.com) David Fernández (david@dit.upm.es) Introduction Dual stack Tunneling Translation Conclusions Madrid 2003 Global IPv6 Summit Coexistence and Transition 2 Motivation

More information

Network problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting

Network problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting Network problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting Martin Wicks (wicksy@wicksy.com) Freelance UNIX consultant 711 Consultancy Limited 20

More information

TCP/IP Network Essentials

TCP/IP Network Essentials TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet

More information

IPv6 LAB. Practical IPv6. Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT

IPv6 LAB. Practical IPv6. Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT IPv6 LAB Practical IPv6 Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT Contents Lab topology IPv6 in Common OSs Basic IPv6 Configuration IPv6 useful commands Using IPv6 with Python

More information

ECE 358 Project 3 Encapsulation and Network Utilities

ECE 358 Project 3 Encapsulation and Network Utilities ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities

More information

lab rip experiences with RIPv2 distance vector protocol

lab rip experiences with RIPv2 distance vector protocol lab rip experiences with RIPv2 distance vector protocol hosts need routing each host with a network stack performs some elementary routing ip layer nic eth0? lo the network stack may be used to access

More information

Hostname and IP Address

Hostname and IP Address 1/19 IP Addressing Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Hostname and IP Address 2/19 browser What is the IP address of www.isoc.org? www.isoc.org

More information

UCS IPv6 Management Configuration Example

UCS IPv6 Management Configuration Example UCS IPv6 Management Configuration Example Document ID: 118784 Contributed by Padmanabhan Ramaswamy and Shankar Prasath, Cisco TAC Engineers. Mar 06, 2015 Contents Introduction Prerequisites Requirements

More information

estadium Project Lab 2: Iperf Command

estadium Project Lab 2: Iperf Command estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure

More information

15-441: Computer Networks Spring 2017 Homework 3

15-441: Computer Networks Spring 2017 Homework 3 15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page

More information

Homework 2 TCP/IP Network Monitoring and Management

Homework 2 TCP/IP Network Monitoring and Management Homework 2 TCP/IP Network Monitoring and Management Hw 2 Assigned on 2015/9/1, Due 2015/9/15 Hand-In Requirement Prepare a activity/laboratory report (name it Hw4-WebSys-YourName.docx) using the ECET Lab

More information

This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host.

This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host. Networking Guide for BeagleBone (Black or Green) by Brian Fraser Last update: Nov 17, 2017 This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

1. TABLE OF CONTENTS INTRODUCTION TECHNICAL SPECIFICATIONS INSTALLATION... 6

1. TABLE OF CONTENTS INTRODUCTION TECHNICAL SPECIFICATIONS INSTALLATION... 6 1. TABLE OF CONTENTS 1. TABLE OF CONTENTS... 1 2. INTRODUCTION... 2 3. TECHNICAL SPECIFICATIONS... 3 4. INSTALLATION... 6 5. PROPERTIES... 8 5.1 TCP/IP NETWORK MODEL...8 5.2 TCP AND UDP...9 5.2.1 IP...10

More information

Interface Management

Interface Management COSC301 Laboratory Manual Required Reading Prior to Lab To ensure you get plenty of time to ask for any help during the lab, please ensure you have read at least Section 1, A Map, Notation and a bit of

More information

VLAN Configurations. 1 of :18. Available Categories. Adobe. Macromedia

VLAN Configurations. 1 of :18. Available Categories. Adobe. Macromedia Custom Search Available Categories Adobe Macromedia Programming SQL Server Administration Networking Microsoft Products Mac OS Linux systems Mobile devices XML Certification Misc Available Tutorials Lan

More information

Router with OpenFlow Part 2

Router with OpenFlow Part 2 Router with OpenFlow Part 2 Fundamentals of a Routing Table and How to Implement One with OpenFlow Aggregate Destination Hosts Network Address: 192.168.1.0 Net Mask: 24 Host X Router A Host Y Destination

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet

More information

For personnal use only

For personnal use only Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.

More information

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two

More information

Using Shell Commands

Using Shell Commands This chapter contains the following sections: General Administration, page 1 Working with Databases, page 9 Importing Certificates, page 13 Accessing Root Privileges, page 14 Using a Multi-Node Setup,

More information

Homework 2: Lab Activity TCP/IP Network Monitoring and Management

Homework 2: Lab Activity TCP/IP Network Monitoring and Management Homework 2: Lab Activity TCP/IP Network Monitoring and Management Hw 2 Assigned on 2017/8/29, Due 2017/9/7 Hand-In Requirement Prepare a activity/laboratory report (name it Hw2-WebSys-YourName.docx) using

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Linux. Computer networks - Administration 1DV202. fredag 30 mars 12

Linux. Computer networks - Administration 1DV202. fredag 30 mars 12 Linux Computer networks - Administration 1DV202 Configuration files /etc/hosts /etc/resolv.conf /etc/network/interfaces /etc/hosts 127.0.0.1 localhost.localdomain localhost 127.0.1.1 lokal.kalmar.se lokal

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

Network Test and Monitoring Tools

Network Test and Monitoring Tools ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4

More information

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator

More information

Packet Generator User Guider V0.1

Packet Generator User Guider V0.1 Packet Generator User Guider V0.1 Based on DeanSys Pktgen-0.0.4 dean@deansys.com www.deansys.com, Oct.20,2006 Page 1 Contents Contents... 2 Chapter 1. Abstract... 4 Chapter 2. How to install it?... 5 2.1

More information

Network Socket Programming - 2 BUPT/QMUL

Network Socket Programming - 2 BUPT/QMUL Network Socket Programming - 2 BUPT/QMUL 2017-3-20 Review Basic Concepts in NP Introduction to Network Programming Importance Classes Environments in this course Program Developing Phases Skills Useful

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration Network Architecture Hardware Routing Getting connected Centralization/decentralization Network topology Network debugging tools Networking hardware Ethernet

More information

Basics of GNS3 and Cisco IOS

Basics of GNS3 and Cisco IOS Lab00: Objectives: Basics of GNS3 and Cisco IOS IERG4090 Lab00 P.1 Upon completion of this lab, you will be able to: - Extract a given topology GNS3 archive - Start GNS3 - Open the given topology file

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Wi-Fi Guide: Edimax USB Adapter on BBG

Wi-Fi Guide: Edimax USB Adapter on BBG Wi-Fi Guide: Edimax USB Adapter on BBG August 3 rd 2017 Table of Contents: Page 1: Page 2: Page 3: Page 4: Page 5: Introduction & Hardware requirements Getting Started Connecting to a network using Network

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution

More information

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall

More information

PC BASED REAL TIME DATA EXCHANGE ON 10GbE OPTICAL NETWORK USING RTOS*

PC BASED REAL TIME DATA EXCHANGE ON 10GbE OPTICAL NETWORK USING RTOS* THIC Software and Hardware Technology THCC03 PC BASED REAL TIME DATA EXCHANGE ON 10GbE OPTICAL NETWORK USING RTOS* Ninth International Workshop on Personal Computers and Particle Accelerator Controls (PCaPAC

More information

Printed by Jed Crandall Sep 01, 11 6:35 netsstuff.txt PCMCIA USB IDE SCSI. Network interfaces. Framebuffer devices. Display.

Printed by Jed Crandall Sep 01, 11 6:35 netsstuff.txt PCMCIA USB IDE SCSI. Network interfaces. Framebuffer devices. Display. Sep 01, 11 6:35 Page 1/20 Script started on Thu 01 Sep 2011 05:41:59 AM MDT ^[[4mrhea^[[24m:^[[1m~^[[0m> ifconfig eth0 Link encap:ethernet HWaddr 00:24:e8:3c:98:11 inet addr:64.106.21.25 Bcast:64.106.21.255

More information

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C

More information

Fundamentals of Computer Networking AE6382

Fundamentals of Computer Networking AE6382 Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally

More information

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally

More information

Configuring the BeagleBone Black s Ethernet Port for SSH Access

Configuring the BeagleBone Black s Ethernet Port for SSH Access Configuring the BeagleBone Black s Ethernet Port for SSH Access NimbeLink Corp Updated: April 2016 PN 30112 rev 1 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction

More information

Packet Generator User Guide V0.4

Packet Generator User Guide V0.4 Packet Generator User Guide V0.4 Based on DeanSys Pktgen-0.0.8 dean@deansys.com www.deansys.com, Feb.20,2007 Page 1 Contents Contents... 2 Chapter 1. Abstract... 5 1.1 Scope...7 1.2 Feature List...7 Chapter

More information

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 i Ping, tracert, and system debugging commands debugging Syntax Default

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Table of Contents 1 System Maintaining and Debugging Commands 1-1 Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining

More information

StampA5D3x/PortuxA5/PanelA5. Quickstart Guide

StampA5D3x/PortuxA5/PanelA5. Quickstart Guide StampA5D3x/PortuxA5/PanelA5 Quickstart Guide StampA5D3x/PortuxA5/PanelA5 StampA5D3x/PortuxA5/PanelA5: Quickstart Guide Copyright 2015 taskit GmbH All rights to this documentation and to the product(s)

More information

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12 iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status

More information

Deploy Dual Stack CentOS 7 Instance in AWS

Deploy Dual Stack CentOS 7 Instance in AWS Deploy Dual Stack CentOS 7 Instance in AWS Lawrence E. Hughes Sixscape Communications Pte Ltd. 26 Oct 2017 This assumes you have already created an AWS account and a dual stack VPC. Click Launch Instance

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003 [CRT09] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 MODULE NO: CPU5003 Date: Wednesday 21 st January 2015 Time: 10:00 13:00 INSTRUCTIONS

More information

CS615 - Aspects of System Administration

CS615 - Aspects of System Administration CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu

More information

Accessing the Networking Stack

Accessing the Networking Stack The Cisco IOS XR Software serves as a networking stack for communication. This section explains how applications on IOS XR can communicate with internal processes, and with servers or outside devices.

More information

H

H H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the

More information

CS 477/677 Computer Communications & Networks The Network Layer: IP

CS 477/677 Computer Communications & Networks The Network Layer: IP Network Layer 1 CS 477/677 Computer Communications & Networks The Network Layer: IP Text: Data and Computer Communications, 8 th Edition, William Stallings Chapters 18-18.5, 12, (optional: 19.2-19.4) Objectives:

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

General Network Troubleshooting

General Network Troubleshooting Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise

More information

Debian/GNU Linux Networking

Debian/GNU Linux Networking Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network

More information

Quick Start Guide for BeagleBone Black. Table of Contents. by Brian Fraser Last update: Summer, 2015

Quick Start Guide for BeagleBone Black. Table of Contents. by Brian Fraser Last update: Summer, 2015 Quick Start Guide for BeagleBone Black by Brian Fraser Last update: Summer, 2015 This document guides the user through: 1. Installing Ubuntu in a virtual machine. 2. Connecting to the target using serial

More information

Experiment No: Group B_4

Experiment No: Group B_4 Experiment No: Group B_4 R (2) N (5) Oral (3) Total (10) Dated Sign Problem Definition: Study and perform Linux networking commands emulation using Python or C++. 1.1Prerequisite: Basics of Networking.

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice

More information

The NBN Experience: The Interwebs at the Speed of Light. Jason But.

The NBN Experience: The Interwebs at the Speed of Light. Jason But. The NBN Experience: The Interwebs at the Speed of Light Jason But jbut@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline NBN Nuts and Bolts What happens

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Network Configuration for Cisco UCS Director Baremetal Agent

Network Configuration for Cisco UCS Director Baremetal Agent Network Configuration for Cisco UCS Director Baremetal Agent This chapter contains the following sections: About the Network Configuration Options, page 1 Single Network for Management and PXE, page 1

More information

Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities

Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security Lab guide: Traffic analysis and TCP/IP Vulnerabilities Revised on 2016-10-18 Alpha version: This is an early version and

More information

Emergency shell commands 1

Emergency shell commands 1 Contents Emergency shell commands 1 copy 1 delete 1 dir 2 display copyright 4 display install package 4 display interface m-eth0 5 display ip routing-table 7 display ipv6 routing-table 7 display version

More information

Network Administra0on

Network Administra0on Network Administra0on (Introduc0on) Administración en Red 1 Index Introduc0on (TCP/IP) Network Interface Link Layer Network Layer Monitoring/Test Administración en Red 2 Introduc0on (TCP/IP) Protocol Suite,

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

IPv6 Deployment at ORNL

IPv6 Deployment at ORNL IPv6 Deployment at ORNL Greg Hinkel hinkelgc@ornl.gov ETCSS October 24, 2012 Outline Purpose Quick v6 intro Background v6 traffic Develop an IPv6 plan Contain v6 traffic v6 test network (Phase 1) Config

More information

Access Server: User's and Developer's Guide <<< Previous Next >>>

Access Server: User's and Developer's Guide <<< Previous Next >>> 1 of 14 12/9/2008 10:18 AM Access Server: User's and Developer's Guide > Chapter 2. Getting Started with Access Server Access Server can be controlled in three ways: by using the WWW

More information

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Table of Contents 1 System Maintenance and Debugging Commands 1-1 Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display

More information

Networking Approaches in. a Container World. Flavio Castelli Engineering Manager

Networking Approaches in. a Container World. Flavio Castelli Engineering Manager Networking Approaches in a Container World Flavio Castelli Engineering Manager fcastelli@suse.com Rossella Sblendido Engineering Manager rsblendido@suse.com Disclaimer There a many container engines, I

More information

SSC-D02 HOMEWORK 2. Jean-Yves Le Boudec. November 6, 2002

SSC-D02 HOMEWORK 2. Jean-Yves Le Boudec. November 6, 2002 SSC-D02 HOMEWORK 2 Jean-Yves Le Boudec November 6, 2002 Exercise 1 You need to log on to a UNIX machine for this exercise. You may have to use the UNIX commands: traceroute, arp, ping, ifconfig, nslookup,

More information

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative 1. What is the IP address and TCP port number used by your client computer (source) to transfer the file to spinlab.wpi.edu? My computer is at 10.211.55.3. The source port is 49247. See screenshot below.

More information

CS615 - Aspects of System Administration

CS615 - Aspects of System Administration CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Networking II Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information