Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
SYSTEM ADMINISTRATION Chapter 19
Based Computer Networks and Internets (Comer)
Internet Control Message Protocol (ICMP)
Chapter 5 The Network Layer.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
CS335 Networking & Network Administration Tuesday, May 11, 2010.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
CS335 Networking & Network Administration Introductions History of Networks Simple Computer Networks.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
NET0183 Networks and Communications Lecture 10 Basic Internet Measurements 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Defining the IP Packet Delivery Process INTRO v2.0—4-1.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Network Administration
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Binary to Decimal Conversion
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
How the Internet Works: What happens when information is sent from your computer?
Examining TCP/IP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
Linux Operations and Administration Chapter Eight Network Communications.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
LSNDI RMRA 1 Design and troubleshooting M Clements.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Click to edit Master subtitle style Chapter 8: IP Subnetting, Troubleshooting and Introduction to NAT Instructor:
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Network Layer IP Address.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
Lecture#6:Connectivity Verification
LESSON Networking Fundamentals Understand TCP/IP.
IP: Addressing, ARP, Routing
Click to edit Master subtitle style
Connectivity Verification
COMP2322 Lab 5 IP Steven Lee March 22, 2017.
Ping and traceroute.
Network Tools and Utilities
Error and Control Messages in the Internet Protocol
Part1: Ipconfig ping command Tracert command Getmac command
Troubleshooting IP Communications
Lecture#7:Connectivity Verification
Ping Hackathon 2018.
Lecture#6:Connectivity Verification
Internet Control Message Protocol
Presentation transcript:

Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises

Exercise/Assignment Assigned 9/12/2006 We will be doing parts of this exercise in class. Some parts will require outside research and reference. You need to submit the results of this exercise in a hardcopy format. The lab exercise is due 9/19/2006. It will count as a homework grade.

Pinging Ping is short for Packet Internet Groper It is a utility that sends a message to a computer and waits for a response –A utility is part of system software that is used to help manage the computer’s resources, as opposed to application software If the response is received, information about the times required and so on are reported If the response is not received in a certain amount of time, the request is said to have “timed out”

Pinging (Cont.) It works by sending special packets [ICMP (Internet Control Message Protocol) echo request and echo reply packets] to a destination, an IP address or domain name If the destination responds, you have a good TCP/IP connection (working route). There are many freeware and shareware PING utilities available for personal computers (see for example

Breaking it down Pinging consists of the command “ping” followed by an IP address or domain name –ping –ping It sends out special packets which request a response (echo reply) if the destination host is reached

host A computer that is connected to a TCP/IP network, including the Internet. Each host has a unique IP address. –A computer may always have the same address or may have a different address each time it connects to the networks –Two computers on the same network or internet at the same time should not have the same address

Usual form Instead of writing out a string of thirty-two 1’s and 0’s, IP addresses are usually written as four numbers between 0 and 255 separated by periods (the dotted decimal notation) For example

How many? With 32 bits, 2 32 devices could be distinguished Actually the number of valid IP addresses is less than 2 32 because certain addresses are reserved for special purposes ( is one example we’ll see later) –Another problem is that addresses are “owned” by people not using them

IP Address (cont.) In an isolated network, any set of IP addresses can be assigned. On the other hand, connecting a network to the Internet requires using registered IP addresses to avoid duplications. The InterNIC Registration Service assigns Internet addresses.

Domain name A domain name is a string of characters standing in for an IP address Can have –One Name  Multiple Addresses –One Address  Multiple Names Domain names are used in URLs to identify particular Web pages. For example, in the URL the domain name is pcwebopedia.com.

Packet A packet is a message (protocol + “some” data) or a piece of a message transmitted over a packet-switching network. A packet must also contain an address (identifier) so that it can be routed to its destination.

Packet switching A set of protocols (rules for communication) in which messages are broken into pieces called packets before being sent. The packets are transmitted individually (connectionless). –They may follow different routes –They can arrive out of order –Share the medium with other packets from other transmissions When the packets arrive, they are reassembled into the original message.

Pinging: Start/Run

Pinging: Type command in Run dialog box Actually cmd is preferred

Pinging: type ping followed by domain name

Pinging a host which was off at the time Can use IP instead of domain name Timed out

Pinging webopedia, also timed out

Webopedia ping timed out, even though site was up

Denial of service One possibility is that some companies block pings because their systems could become clogged with ping requests. Rejecting pings could make a site less vulnerable to a Denial of Service (DoS) attack, in which a site is flooded with so many requests that it cannot answer them all.

Ping Exercise Part 1 (30 points) Pick the address of a site you visit. You are going to use it to test some network diagnostics. What happened when you ping your site? Try it with a few more examples. What is happening? How can ping be useful?

Type ping /? To find the various options there are

Using the count request option to send 5 instead of 4

Useful or not? Simply pinging a remote host (a computer that is on one’s internet but not on one’s network) usually has an all or nothing outcome and as such can provide somewhat limited information A sequence of pinging can provide more information (see MCSE TCP/IP for Dummies)

Pinging yourself using localhost or : verifies that TCP/IP has been installed and started correctly Reserved IP address

Pinging yourself using your IP, checks that the IP is valid

You can use another utility ipconfig to find your IP if you don’t know it

Go to the start command Select the option run and type command.com You now have the black window and we are going to use this to check our connection. Run ipconfig—what is your address? What can you tell from your about your connection?

Pinging the Gateway – timing out here may indicate a problem with the router

Gateway Recall that one gets an internet by connecting more networks The point at which data leaves one (local) network and enters another is known as a gateway A node (a device on the Internet) can be either a gateway, router, or a host (end- point).

Host/Gateway When you are looking at some site on the net, your computer and the one containing the site are hosts On the other hand, the computers that direct the traffic, for example your Internet service provider (ISP) are gateway/router nodes.

Traceroute A utility that traces (determines the route taken by) a packet from your computer (the local host) to some other host on the network –It doesn’t actually follow a single packet but sends out a series of packets –The packets are restricted in the number of “hops” they can take It is limited by the time-to-live (TTL) field –When the limit is reached, information about the node is (should be) returned –Each consecutive packet is allowed one more hop

hop A hop is when a packet is transmitted from one node to the next. “Some Internet Service Providers (ISPs) advertise how many hops away from Internet backbone they are. Theoretically, the fewer hops it takes to get your data onto the backbone, the faster your access will be.” (webopedia)

Traceroute (Cont.) Traceroute shows how many hops were required to reach the destination as well as the length of time for each hop. When the web is sluggish, you can use traceroute to determine where the congestion lies.

Traceroute (Cont.) The original traceroute was for UNIX utility Windows has a traceroute utility called tracert. Go to Start/Run, type cmd, and then type “tracert” followed by the domain name of the host. For example: tracert

tracert

Tracert Exercise Part 2 (40 points) Using the command.com and tracert command, find the command to Ask your neighbor for their ip address— trace the route to them.

Other TCP/IP diagnostic commands Nbtstat Netstat Ipconfig Arp Hostname Route Look up these commands and see what they mean. Prepare a table with the list and the job of each command….site your sources.

Another Exercise part 3 (30 points) Find the ipconfig for your machine. Open the command window Look at the options for the NBTSTAT command. Run the NBTSTAT command using your ip address for your machine. Use the –A option. What did you find out?

Other sources