Lab 2: Network Troubleshooting NET311 - Computer Networks Management

Similar documents
Lab 6: SNMPv3 Security NET311 - Computer Network Management

ICMP Computer Networks Lab Lab Course Number: Lab Course Name: Computer Networks (A) 3. Lab Name: ICMP

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.

Lab Two Using Wireshark to Discover IP NAME:

Lab 7: SNMP PDU Formats NET311 - Computer Network Management

Lab 4: SNMP in Linux NET311 - Computer Networks Management

Shortest Path First Example

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative

NET311 Computer Network Management Tools, Systems and Engineering

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers

COMP2330 Data Communications and Networking

Wireshark Lab: IP v6.0

Problem Set 7 Due: Start of Class, November 2

NETWORK PACKET ANALYSIS PROGRAM

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

ICMP messages generating by the Ping program; ICMP messages generated by the Traceroute program; the format and contents of an ICMP message.

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

COMP2330 Data Communications and Networking

GAME100 Lab 5. Before beginning the lab, please download and install Cisco Packet Trace

Firewall Stateful Inspection of ICMP

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security

Table of Contents 1 System Maintaining and Debugging 1-1

Lab 6.7.1: Ping and Traceroute

Lab Assignment 3 for ECE374

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols

EMT2455 Data Communications 4. Network Layer. Dr. Xiaohai Li. Dept. of Computer Eng. Tech., NYCCT. Last Update: Nov.

(ICMP), RFC

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

Using ping, tracert, and system debugging

LAB THREE STATIC ROUTING

Network Layer (4): ICMP

ICS 351: Networking Protocols

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12

Lab 1: Packet Sniffing and Wireshark

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Lab Exercise Protocol Layers

Cisco Exam Cisco Certified Network Associate (CCNA) Version: 14.7 [ Total Questions: 653 ]

Lab I: Using tcpdump and Wireshark

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11

Wireshark Exercises Solutions

Lab Using Wireshark to Examine Ethernet Frames

Packet Tracer - Using Traceroute to Discover the Network (Instructor Version)

This is a sample Lab report from ECE 461 from previous years. L A B 6

Lab Troubleshooting Using traceroute Instructor Version 2500

Lab Applying a Logical Layered Model to a Physical Network

Laboration 2 Troubleshooting Switching and First-Hop Redundancy

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

5. Write a capture filter for question 4.

Lab Using Wireshark to Examine Ethernet Frames

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Introduction to Computer Networks

Introduction to Computer Networking Netkit lab Routing protocols: RIP and OSPF

Sirindhorn International Institute of Technology Thammasat University

Wire Shark Lab1. Intro

Three interface Router without NAT Cisco IOS Firewall Configuration

Internet Control Message Protocol (ICMP)

15-441: Computer Networks Spring 2017 Homework 3

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Lab 5 Packet Capture Traffic Analysis With Wireshark

Using NAT in Overlapping Networks

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Lab - Using Wireshark to Examine TCP and UDP Captures

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Introduction to Firewalls using IPTables

CS 457 Lecture 11 More IP Networking. Fall 2011

Lab - Create User Accounts in Windows 8

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Table of Contents. Cisco NAT Order of Operation

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

CS459 Internet Measurements

Update your network settings

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Application Layer -1- Network Tools

Exercises: Basics of Networking II Experiential Learning Workshop

HP 5120 SI Switch Series

HP A5500 EI & A5500 SI Switch Series Network Management and Monitoring. Configuration Guide. Abstract

CS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay

Homework 2 TCP/IP Network Monitoring and Management

Access Switch VLAN Y Y.1 /24

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Hands-On Ethical Hacking and Network Defense

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine

Lab 8: Introduction to Pen Testing (HPING)

SAVIO STEPHEN DSOUZA (SSD37)

Wireshark Lab: HTTP SOLUTION

Static routing KTHNOC/SUNET. January 18, 2004

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Material for the Networking lab in EITF25 & EITF45

Lab - Observing DNS Resolution

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Ping, tracert and system debugging commands

Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018

Experiment 2: Wireshark as a Network Protocol Analyzer

COMPUTER NETWORKING LAB EXERCISES (TP) 4

Browser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred.

Transcription:

Lab 2: Network Troubleshooting NET311 - Computer Networks Management Instructor: Dr. Mostafa Dahshan Objectives 1. Use protocol analyzers, such as Wireshark, to inspect the packet contents. 2. Use basic network troubleshooting tools, such as ping and traceroute utilities. References 1. Computer Networks 5/E, Lab Exercise, Protocol Layers, David Wetherall. 2. Computer Networks 5/E, Lab Exercise, ICMP, David Wetherall. Instructions 1. Read the lab instructions. 2. Provide question answers and screenshots in the supplied answer sheet. 3. After finishing the lab, upload your saved answer sheet to LMS. NET311 Dr. Mostafa Dahshan Page 1 of 9

Part 1: Protocol Analyzers 1. Run the Wireshark application as an Administrator. 2. In Wireshark, select the Ethernet interface, and start a capture using the following filter: tcp port 80 3. Open Windows PowerShell and type the following command: Invoke-WebRequest http://www.ksu.edu.sa NET311 Dr. Mostafa Dahshan Page 2 of 9

4. After the command is finished, return to Wireshark and stop the capture. Lab sheet 1.1: provide a screenshot of Wireshark screen showing the captured packets. 5. Locate the packet HTTP GET packet and double click on it to inspect it. 6. Expand the details of Internet Protocol Version 4. Lab sheet 1.2: Fill the following details of the Internet Protocol Version 4 protocol. Total Length Time to Live Protocol Source Destination NET311 Dr. Mostafa Dahshan Page 3 of 9

7. Expand the details of Hypertext Transfer Protocol. Lab sheet 1.3: Fill the following details of the Hypertext Transfer Protocol. Hint: You can use Control-C to copy from the Wireshark window. Request Method Request URI User-Agent Host NET311 Dr. Mostafa Dahshan Page 4 of 9

Part 2: Network Troubleshooting Tools 1. Run the Wireshark application as an Administrator. 2. In Wireshark, select the Ethernet interface, and start a capture using the following filter: icmp 3. Open Windows PowerShell and type the following command: ping www.google.com.sa NET311 Dr. Mostafa Dahshan Page 5 of 9

4. After the command is finished, return to Wireshark and stop the capture. 5. Inspect the ICMP packets by expanding the Internet Control Message Protocol fields, then answer the following questions. Lab sheet 2.1: Answer the following questions. What is the Type/Code value of the first ICMP request? What is Type/Code value of the first ICMP reply? What is Sequence number of the second ICMP request? What is Sequence number of the second ICMP reply? What is Data of the third ICMP request? What is Data of the third ICMP reply? What is Time of the fourth ICMP request? What is Time of the fourth ICMP reply? 6. Close the Wireshark capture. NET311 Dr. Mostafa Dahshan Page 6 of 9

7. In Wireshark, select the Ethernet interface, and start a capture using the following filter: icmp 8. Open Windows PowerShell and type the following command: tracert -d www.yahoo.com Lab sheet 2.2: Provide a screenshot showing the output of the tracert command. 9. After the command is finished, return to Wireshark and stop the capture. NET311 Dr. Mostafa Dahshan Page 7 of 9

10. Inspect the ICMP packets by expanding the Internet Control Message Protocol fields, then answer the following questions. Lab sheet 2.3: Answer the following questions. What is the TTL (Time to live) value in the first ICMP request? What is the Type/Code value of the first ICMP request? What is the Type/Code value of the first ICMP TTCL Exceeded response? How many ICMP packets with TTL = 1? What is the source IP address of the second ICMP TTL Exceeded response? What is the source IP address of the third ICMP TTL Exceeded response? What is the largest TTL value in ICMP requests after the last TTL Exceeded response? NET311 Dr. Mostafa Dahshan Page 8 of 9

11. Expand the Internet Protocol Version 4 section of the first ICMP request. Lab sheet 2.4: Provide a screenshot showing the details of the Internet Protocol Version 4 section of the first ICMP request. 12. Expand the Internet Control Message Protocol -> Internet Protocol Version 4 subsection of the first ICMP Time Exceeded response. Lab sheet 2.5: Provide a screenshot showing the details of the first ICMP Time Exceeded response. 13. Compare the payload of the ICMP response with the ICMP request. NET311 Dr. Mostafa Dahshan Page 9 of 9