Computer Networks: Lab 3 Traceroute and IP Luca Bedogni

Similar documents
Lab Two Using Wireshark to Discover IP NAME:

Problem Set 7 Due: Start of Class, November 2

Wireshark Lab: IP v6.0

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

Topics for This Week

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.

Network Layer (4): ICMP

Wireshark Lab: TCP v7.0

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

Network Architecture

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Before beginning this lab, you ll probably want to review sections 3.5 and 3.7 in the text. 1

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative

Network Management & Monitoring

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Congestion Control in TCP

Network Architecture. TOC Architecture

Congestion Control in TCP

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

User Datagram Protocol

Send documentation comments to You must enable FCIP before attempting to configure it on the switch.

ICS 451: Today's plan

The evasive speed of your Internet

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

The Internetworking Problem. Internetworking. A Translation-based Solution

Documents. Configuration. Important Dependent Parameters (Approximate) Version 2.3 (Wed, Dec 1, 2010, 1225 hours)

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Lab 6.7.1: Ping and Traceroute

ECE 697J Advanced Topics in Computer Networks

Computer Networks Security: intro. CS Computer Systems Security

TS Open Day Data Center Fibre Channel over IP

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12

This is a sample Lab report from ECE 461 from previous years. L A B 6

Lecture 9: Internetworking

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

EE586 Homework and Laboratory #5 Due November 3, 2010

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

Your Name: Your student ID number:

Network Test and Monitoring Tools

Chapter 4 Network Layer: The Data Plane

Chapter 12 Network Protocols

ICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP

ICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message.

Internet Control Message Protocol (ICMP)

H

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

internet technologies and standards

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Summary Report. Prepared for: Refresh Date: 28 Oct :02

Datagram. Source IP address. Destination IP address. Options. Data

Computer Networks Principles

The Network Layer and Routers

General Network Troubleshooting

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Lecture 3. The Network Layer (cont d) Network Layer 1-1

CSE 123A Computer Networks

ECE4110 Internetwork Programming. Introduction and Overview

CS 457 Lecture 11 More IP Networking. Fall 2011

(ICMP), RFC

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

19: Networking. Networking Hardware. Mark Handley

A Whirlwind Introduction to the Internet Overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

PRACTICE QUESTIONS ON RESOURCE ALLOCATION

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Network Analyzer :- Introduction to Wireshark

Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers

===================================================================== Exercises =====================================================================

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

K2289: Using advanced tcpdump filters

Computer Networking. Introduction. Quintin jean-noël Grenoble university

Protocol Overview. TCP/IP Performance. Connection Types in TCP/IP. Resource Management. Router Queues. Control Mechanisms ITL

Network Performance: Queuing

WHITE PAPER. The Shortfalls of Traceroute in Modern Multi-Path Networks

II. Principles of Computer Communications Network and Transport Layer

Firewall Stateful Inspection of ICMP

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

CS244a: An Introduction to Computer Networks

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web

Where we are in the Course

Lecture 19: Network Layer Routing in the Internet

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

ECE 158A: Lecture 7. Fall 2015

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Computer Networks & Security 2016/2017

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination

Congestion Control in TCP

Bidirectional Forwarding Detection

Example questions for the Final Exam, part A

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Computer Networks and Data Systems

Transcription:

Computer Networks: Lab 3 Traceroute and IP Luca Bedogni Department of Computer Science and Engineering University of Bologna

A brief introduction We will leverage the traceroute utility It traces the route from your computer to the destination It does that by sending messages with increasingly big TTLs Can do this with live capture, or we need the ip-ethereal-trace-1 from the wireshark-traces.zip file A TTL=1 REPLY B

A brief introduction We will leverage the traceroute utility It traces the route from your computer to the destination It does that by sending messages with increasingly big TTLs Can do this with live capture, or we need the ip-ethereal-trace-1 from the wireshark-traces.zip file A TTL=2 TTL=1 REPLY B

A brief introduction We will leverage the traceroute utility It traces the route from your computer to the destination It does that by sending messages with increasingly big TTLs Can do this with live capture, or we need the ip-ethereal-trace-1 from the wireshark-traces.zip file A TTL=3 TTL=2 TTL=1 REPLY B

A brief introduction We will leverage the traceroute utility It traces the route from your computer to the destination It does that by sending messages with increasingly big TTLs Can do this with live capture, or we need the ip-ethereal-trace-1 from the wireshark-traces.zip file A TTL=4 TTL=3 TTL=2 TTL=1 REPLY B

A brief introduction We will leverage the traceroute utility It traces the route from your computer to the destination It does that by sending messages with increasingly big TTLs Can do this with live capture, or we need the ip-ethereal-trace-1 from the wireshark-traces.zip file A TTL=5 TTL=4 TTL=3 TTL=2 TTL=1 REPLY B

A brief introduction We will leverage the traceroute utility It traces the route from your computer to the destination It does that by sending messages with increasingly big TTLs Can do this with live capture, or we need the ip-ethereal-trace-1 from the wireshark-traces.zip file A TTL=6 TTL=5 TTL=4 TTL=3 TTL=2 TTL=1 REPLY B

Traceroute Traceroute purpose is to identify the problematic link in a network It may be very time consuming if abused General syntax is

Traceroute example What is the average round trip time? Why is it so different? Is this enough to understand how the network behaves?

How to (correctly) use traceroute Seems pretty easy Just type traceroute my.end.point It ll show my all intermediate lantecy values Where it stops or where it takes too much, that s where the problem is Unfortunately, it almost never is like this What could go wrong? Modern routers are pretty well run Congestion and routing loops are becoming less frequent So the other issues are far more complex How to correctly read traceroute outputs? They look very easy to be understood read

Traceroute output HOP # Router IP Measurements Traceroute sends typically 3 probe packets Most implementations use UDP But ICMP and TCP can be used Each probe is independent - Unique IDs Each packet may be sent in a completely different path This may be visible to the user in form of multiple Ips for each hop However, it may be invisible as well How is latency computed? Difference between: Timestamp at the beginning Timestamp for the return packet Routers in between do not do any time processing Hence the latency is the sum of the time it took to reach the router + router time to generate a reply + time to get back

Interpreting the output Understanding correctly the DNS information is key You can discover: Location IATA or ICAO Airport codes CLLI Codes City name or abbreviations of it Guessing Interface type Most routers put the interface info in the DNS But may not be updated Router type Sysadmins do not always follow conventions Core Routers CR, Core, GBR, BB, CCR, EBR Peering Routers BR, Border, Edge, IR, IGR, Peer Customer Routers AR, Aggr, Cust, CAR, HSA, GW Network boundaries and relationships Typically where problems occur

Location interpretation Name Airport Code CLLI Other codes Atlanta, GA ATL ATLNGA Chicago, IL ORD, MDW CHCGIL CHI New York, NY JFL, LGA NYCMNY NYC, NYM San Jose, CA SJC SNJSCA SJO, SV, SF Seattle, WA SEA STTLWA Amsterdam, NL AMS AMSTNL Montreal, CA YUL MTRLPQ MTL Paris, FR CDG PARSFR PAR

Interface interpretation Interface Type CISCO IOS CISCO IOS XR Juniper Fast Ethernet Fa#/# fe-#/#/# Gigabit Ethernet Gi#/# Gi#/#/#/# ge-#/#/# 10 Gigabit Ethernet Te#/# Te#/#/#/# te-#/#/# SONET Pos#/# POS#/#/#/# so-#/#/# Tunnel Tu# TT# ip-#/#/# ATM ATM#/# AT#/#/#/# at-#/ /# Example: xe-11-1-0.edge1.newyork1.level3.net Xe is a 10 Gigabit ethernet with at least 12 slots

More on network delay Typically network delays can occur due to 3 steps Serialization delay Caused by the encoding of the data to be transmitted in packets HELLO -> Header, Data Queuing delay Caused by routers buffering the packet and waiting to retransmit it Propagation delay Caused by the signal which propagates on the medium from source to destination

Serialization Delay Serialization is the process of encoding data packets into the PHY The faster the interface, the faster the process Really easy to compute - SIZE/SPEED Example: what is the serialization delay of a 1500B packet on a 1Mbps link? 1Mbps -> 1000 Kb/s -> 125 KB/s -> 125000 bps 1500/125000 = 0.012 seconds Packets move inside the communication link as an atomic unit You can t transmit half a packet and transmit the other one later You can t retransmit a packet until you have received it all Every time a router acquires a packet a serialization delay occurs With modern modems and routers it is a less of an issue

Queuing delay Queuing happens when routers hold packets in their buffer waiting for an opportunity to transmit Each moment the router keeps the packet in memory, the overall latency increases Can t I eliminate queuing? Scenario 1 Imagine packets enter the router through a 1Gbps link, and have to be sent over a 100 Mbps link The router buffers the packet and send them whenever the 100 Mbps link is ready Scenario 2 A lot of senders and few receivers 40 sender on 10 Gbps slots, sending to 1 receiver on a 10 Gbps slot Hence, some sort of queuing is necessary Better: it increases throughput! At every moment, an interface could either transmit or receive Queuing packets at the router enables the output interface to always send

Queuing bad or good? GOOD BAD

Propagation Delay The propagation delay is the time spent on the medium For short distances, negligible For long distances it may cause considerable latency Propagation delay on a straight fiber route at the equator takes approximately 400ms

How can I put this to good use We have learned the different types of delay How can we use those ideas to troubleshoot networking problems? Do you notice anything strange? Here?

Summing up Delay is caused by Time needed to reach the router from the source Time needed by the router to generate the reply Time needed for the packet to get back The second source of delay does not involve real packets Routers may actually slow down ICMP traffic Different paths: fast for normal packets, slow for handling special packets Router CPUs are typically slow ICMP generation is not the router priority Latency spikes in the middle may not be harmful if they do not propagate over Asymmetric paths Artificial rate limit

Asymmetric paths Traceroute measures two paths But only one is visible Unless you have traceroute in both directions Still, very hard to get all the possible asymmetric paths Asymmetric paths typically start at network boundaries Where policy change

How many paths?

Asymmetric paths Try to send 1 probe (-q 1) Still, you don t have the guarantee that each probe goes through the same path

Lab3 Open the ip-ethereal-trace-1 file What is the IP address of your computer? What is the size of the IP header and the size of the IP payload? Has the data been fragmented? What are the fields that always change in the traceroute request? Send a bigger traceroute (i.e. traceroute host 32768). Is it possible to tell which are the first, intermediate and last packets of a frame? How? Experiment with different sizes. How many packets are sent with 3500 bytes?