Homework 3 TCP/IP Network Monitoring and Management



Similar documents
Hands On Activities: TCP/IP Network Monitoring and Management

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Troubleshooting Tools

Laboratorio 3 Comunicación sincrónica Vía Satélite

Laboratorio 4. Comunicación sincrónica Vía Satélite

Computer Networks I Laboratory Exercise 1

Guideline for setting up a functional VPN

LAB THREE STATIC ROUTING

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

LESSON Networking Fundamentals. Understand TCP/IP

Lab PC Network TCP/IP Configuration

ICS 351: Today's plan

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

1.0 Basic Principles of TCP/IP Network Communications

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Network Pop Quiz 5 Brought to you by please visit our site!

BASIC ANALYSIS OF TCP/IP NETWORKS

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

1 PC to WX64 direction connection with crossover cable or hub/switch

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

Part A:Background/Preparation

Technical Support Information Belkin internal use only

Effect of Windows XP Firewall on Network Simulation and Testing

IPv6 Diagnostic and Troubleshooting

BASIC TCP/IP NETWORKING

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

Introduction to Network Security Lab 1 - Wireshark

Domain 5.0: Network Tools

Get quick control over your Linux server with server commands

Traceroute The Internet s Diagnostic Tool

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

File transfer and login using IPv6, plus What to do when things don t work

Introduction to Analyzer and the ARP protocol

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Networking Test 4 Study Guide

Network Management and Debugging. Jing Zhou

Laboratory guide nº 2

Sample Configuration Using the ip nat outside source static

Transport and Network Layer

Using IPM to Measure Network Performance

Workstation ARP. Objective. Background / Preparation

Instructor Notes for Lab 3

Cisco Configuring Commonly Used IP ACLs

Internet Control Protocols Reading: Chapter 3

Subnetting,Supernetting, VLSM & CIDR

Unix System Administration

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015

2. IP Networks, IP Hosts and IP Ports

Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Configuring DNS on Cisco Routers

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

8.2 The Internet Protocol

Pre-lab and In-class Laboratory Exercise 10 (L10)

IST 220 Honors Project. Subnets with Variable Length Subnet Masks

TCP/IP Network Essentials. Linux System Administration and IP Services

RARP: Reverse Address Resolution Protocol

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

Computer Networks/DV2 Lab

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

Lab - Using Wireshark to View Network Traffic

Unverified Fields - A Problem with Firewalls & Firewall Technology Today

PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server

Network layer: Overview. Network layer functions IP Routing and forwarding

Firewall Troubleshooting

NETWORK LAYER/INTERNET PROTOCOLS

Lab Conducting a Network Capture with Wireshark

04 Internet Protocol (IP)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Chapter 6. About This Chapter. Before You Begin. Windows 2000 Naming Schemes. [Previous] [Next]

Additional Information: A link to the conference website is available at:

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

HOST AUTO CONFIGURATION (BOOTP, DHCP)

Sample Configuration Using the ip nat outside source list C

Lab 1: Introduction to the network lab

The Barracuda Network Connector. System Requirements. Barracuda SSL VPN

Troubleshooting IP Routing

AutoDownload: SQL Server and Network Trouble Shooting

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

Host Configuration (Linux)

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

IP - The Internet Protocol

EE984 Laboratory Experiment 2: Protocol Analysis

Configuring Flexible NetFlow

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP)

IP Addressing A Simplified Tutorial

IP addressing and forwarding Network layer

Module 1: Reviewing the Suite of TCP/IP Protocols

Network Layer: Address Mapping, Error Reporting, and Multicasting

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

idatafax Troubleshooting

Configuring Static and Dynamic NAT Simultaneously

TCP/IP, Addressing and Services

NQA Technology White Paper

IPv6 Fundamentals: A Straightforward Approach

CS197U: A Hands on Introduction to Unix

Transcription:

Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report guideline found at http://www.etcs.ipfw.edu/~lin/infoforallcourses/laboratoryreport.htm; make sure that you copy all activity/question and results in the DATA section Due September 24, 2013 as an email attachment TCP/IP network management tasks include Traffic monitoring Troubleshooting network access Adding new hosts (also known as nodes or stations) to the network Mounting remote disks and exporting local disks with Network File System (NFS) Large networks probably need a commercial network analyzer, or at least a hardware tester such as a time domain refelctometer (TDR). But many smaller networks can get by with publicly available free tools. A list of diagnostic service functions for helping network monitoring, management, and troubleshooting are as shown below. Testing the network connection: ping command (for both Windows and UNIX) Troubleshooting Network Access using: winipcfg command (Windows), ifconfig (UNIX), netstat, and arp command Configure the network interface: winipcfg command (Windows), and ifconfig (UNIX) Network monitoring: netstat command (for both Windows and UNIX) Display active network connections: netstat command (for both Windows and UNIX) Display interface statistics: netstat command (for both Windows and UNIX) Display active routes of connections: route command (for both Windows and UNIX) Manipulate static routing tables: route command (for both Windows and UNIX) Tracing routes: tracert command (Windows), traceroute command (UNIX) For a Windows 7 or Windows 8-based PC, these commands are available from the command prompt which is available by clicking on the window icon (located at the lower left taskbar of the Windows Desktop), and enter command or cmd; and you will see the Windows s Command Window similar to the one below: 1

Activity 1/Question 1: You are asked by the CIO of a small company of less than 200 employees to find a network analyzer with a budget of about $3,000. Search the Internet for at least three products (can be software-based or hardware-based), create a table to show a feature comparison of at least three products, and prepare your recommendation for the order. 2. Network Management Commands NETSTAT Command The netstat command can be used to check network configuration and monitor a system s TCP/IP network activity. It will provide a variety of information on how much and what kind of network activity is going on. The netstat command syntax can be found by entering the following command under the MS Command Prompt (an example of Windows 7 machine): C:\Users\Lin>netstat? Displays protocol statistics and current TCP/IP network connections. NETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-t] [interval] -a Displays all connections and listening ports. -b Displays the executable involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. Note that this option can be time-consuming and will fail unless you have sufficient permissions. -e Displays Ethernet statistics. This may be combined with the -s option. -f Displays Fully Qualified Domain Names (FQDN) for foreign addresses. -n Displays addresses and port numbers in numerical form. -o Displays the owning process ID associated with each connection. -p proto Shows connections for the protocol specified by proto; proto may be any of: TCP, UDP, TCPv6, or UDPv6. If used with the -s option to display per-protocol statistics, proto may be any of: IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6. -r Displays the routing table. -s Displays per-protocol statistics. By default, statistics are shown for IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6; the -p option may be used to specify a subset of the default. -t Displays the current connection offload state. interval Redisplays selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If omitted, netstat will print the current configuration information once. Activity 2/Question 2: Enter the following commands netstat 2

netstat? netstat -rn Enter proper commands for the following networking information of your computer, and copy all display results to your activity report: o Displays all connections and listening ports of your computer, also find the HTTP connection port. o Display your computer s Ethernet statistics o Display address and port number of your own computer in numerical format o Show connections for the protocol specified by TCP protocol o Show routing table that stored in your computer o Display fully Qualified Domain Names for foreign addresses o Display per-protocol statistics IPCONFIG Command To detect bad IP addresses, incorrect subnet masks, and improper broadcast addresses, the ipconfig command can be used to obtain a copy of basic configuration of the interface. The winipcfg command can also be used for changing setup of the network adapter. We note that if the LAN consists of a single Ethernet network, no explicit routing is usually needed. Activity 3/Question 3: Type ipconfig? to show all command options; then copy all display results to your activity report. Read How to use winipcfg to view TCP/IP settings? (http://support.microsoft.com/kb/141698 ) and View Using IPCONFIG in Windows 7, http://www.youtube.com/watch?v=ztxb9ejgh70; and write a short summary of lesson learned. Ping Command The ping command verifies whether a remote host can be reached. It also shows statistic about packet loss and delivery time. The ping command is design for troubleshooting and tracking a single-point hardware or software failure in the Internet. When called, the ping command sends one datagram per second and print one line of output for every ECHO_RESPONSE returned; it sends a message to the designated host and then informs you whether the message was successfully transmitted. This command is designed for use in network testing, measurement, and management. It was originally used in the UNIX-based networks to see if a remote host is up and responding, and for manual fault isolation. However, it is also found in the Windows based computer systems. The Windows version of ping command is as listed below: C:\Users\Lin\Documents>ping Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] [-k host-list]] [-w timeout] [-R] [-S srcaddr] [-4] [-6] target_name Options: -t Ping the specified host until stopped. To see statistics and continue - type Control-Break; To stop - type Control-C. -a Resolve addresses to hostnames. -n count Number of echo requests to send. -l size Send buffer size. -f Set Don't Fragment flag in packet (IPv4-only). -i TTL Time To Live. -v TOS Type Of Service (IPv4-only. This setting has been deprecated and has no effect on the type of service field in the IP Head 3

er). -r count Record route for count hops (IPv4-only). -s count Timestamp for count hops (IPv4-only). -j host-list Loose source route along host-list (IPv4-only). -k host-list Strict source route along host-list (IPv4-only). -w timeout Timeout in milliseconds to wait for each reply. -R Use routing header to test reverse route also (IPv6-only). -S srcaddr Source address to use. -4 Force using IPv4. -6 Force using IPv6. The LINUX version of ping command can be obtained by typing the command at the command line. [lin@paullinux lin]$ ping usage: ping [-LRdfnqrv] [-c count] [-i wait] [-l preload] [-p pattern] [-s packetsize] [-t ttl] [-I interface address] host [lin@paullinux lin]$ ping -c 10 www.mit.edu PING DANDELION-PATCH.MIT.EDU (18.181.0.31): 56 data bytes 64 bytes from 18.181.0.31: icmp_seq=0 ttl=242 time=59.0 ms 64 bytes from 18.181.0.31: icmp_seq=1 ttl=242 time=45.6 ms 64 bytes from 18.181.0.31: icmp_seq=2 ttl=242 time=48.6 ms 64 bytes from 18.181.0.31: icmp_seq=3 ttl=242 time=50.4 ms 64 bytes from 18.181.0.31: icmp_seq=4 ttl=242 time=47.5 ms 64 bytes from 18.181.0.31: icmp_seq=5 ttl=242 time=65.8 ms 64 bytes from 18.181.0.31: icmp_seq=6 ttl=242 time=54.7 ms 64 bytes from 18.181.0.31: icmp_seq=7 ttl=242 time=48.5 ms 64 bytes from 18.181.0.31: icmp_seq=8 ttl=242 time=51.6 ms 64 bytes from 18.181.0.31: icmp_seq=9 ttl=242 time=48.9 ms --- DANDELION-PATCH.MIT.EDU ping statistics --- 10 packets transmitted, 10 packets received, 0% packet loss round-trip min/avg/max = 45.6/52.0/65.8 ms Activity 4/Question 4: Enter the following commands, copy all the display results to your activity report, and explain what results are obtained. ping www.mit.edu ping n 10 www.mit.edu ping www.microsoft.com ping www.ucla.edu ping www.purdue.edu ARP (Address Resolution Protocol) Command The ARP command provides information about Ethernet/IP address translation. We can use it to detect systems on the local network that are configured with the wrong IP address. C:\Users\Lin\Documents>arp Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP). ARP -s inet_addr eth_addr [if_addr] ARP -d inet_addr [if_addr] ARP -a [inet_addr] [-N if_addr] [-v] -a Displays current ARP entries by interrogating the current 4

protocol data. If inet_addr is specified, the IP and Physical addresses for only the specified computer are displayed. If more than one network interface uses ARP, entries for each ARP table are displayed. -g Same as -a. -v Displays current ARP entries in verbose mode. All invalid entries and entries on the loop-back interface will be shown. inet_addr Specifies an internet address. -N if_addr Displays the ARP entries for the network interface specified by if_addr. -d Deletes the host specified by inet_addr. inet_addr may be wildcarded with * to delete all hosts. -s Adds the host and associates the Internet address inet_addr with the Physical address eth_addr. The Physical address is given as 6 hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr if_addr Specifies a physical address. If present, this specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface will be used. Example: > arp -s 157.55.85.212 00-aa-00-62-c6-09... Adds a static entry. > arp -a... Displays the arp table. Activity 5/Question 5: Enter the following commands, copy all the display results to your activity report, and explain what results are obtained. arp a Read ARP found at Microsoft Web site and prepare a short summary: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/arp.mspx?mfr=true ROUTE Command Static routing: It may be used for small to medium-sized networks not characterized by many redundant paths to most destinations. This can be setup by issuing explicit route commands. The route command can be found in both UNIX and Window computers. Some versions of the route command will also display the current routing tables. Activity 6/Question 6: Enter the following commands, copy the display results, and explain what results are obtained: route route print route print -4 route print -6 Tracing Route The command for telling us which route packets take going from our system to a remote system is tracert (Windows) or traceroute (UNIX). It prints information about each hop. C:\Users\Lin\Documents>tracert Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] [-R] [-S srcaddr] [-4] [-6] target_name Options: -d Do not resolve addresses to hostnames. 5

-h maximum_hops Maximum number of hops to search for target. -j host-list Loose source route along host-list (IPv4-only). -w timeout Wait timeout milliseconds for each reply. -R Trace round-trip path (IPv6-only). -S srcaddr Source address to use (IPv6-only). -4 Force using IPv4. -6 Force using IPv6. Activity 7/Question 7: Enter the following commands, copy the display results, and explain what results are obtained: tracert www.mit.edu tracert www.microsoft.edu tracert www.purdue.edu tracert www.iu.edu 6