LAB ONE -- COMPUTER NETWORKING
Lab Guidelines:
Lab writeups are generally due one week after completion.
Group lab writeups are encouraged.
The sections to include: introduction and explanation,
OBJECTIVE: The student will become familiar with various automated tools used to probe the Internet. These tools are ping, traceroute, and tracert.
WRITEUP:
Answer these questions from are taken from Chapter 2 in COMER:
----------------------------------------------------------------------------------
BACKGROUND AND ADDITIONAL INFORMATION
ON Ping, Traceroute, Tracert, and Telnet.
PING……………………………..
To Ping a server via DOS you will need two things
1. Windows 95/98/NT
2. A live connection to the internet
To ping a server click on your MS Window's "Start" button; click on the "Run"
option then type in the word "command" in the pop up window and then select the
OK button. A DOS window will open. Into this window, type "ping useforesite.com"
(note: this DOS environment is case sensitive; make sure all text is lower case.)
Something similar to the following should appear:
----------------------------------------------------------------------------
Pinging useforesite.com [209.239.40.39] with 32 bytes of data:
Request timed out.
Reply from 209.239.40.39: bytes=32 time=245ms TTL=54
Reply from 209.239.40.39: bytes=32 time=244ms TTL=54
Reply from 209.239.40.39: bytes=32 time=218ms TTL=54
Ping statistics for 209.239.40.39:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 218ms, Maximum = 245ms, Average = 176ms
--------------------------------------------------------------------------------
Let's break it down:
First line:
--------------------------------------------------------------------------------
Pinging useforesite.com [209.239.40.39] with 32 bytes of data:
--------------------------------------------------------------------------------
useforesite.com is the URL (Universal Resource Locator) which identifies this web site.
It's the same as http://www.useforesite.com. [209.239.40.39] is the IP address. this
number is the numeric address to http://www.useforesie.com
In fact http://209.239.40.39
entered in to your browser will take you to the same place. The URL is a system which is
used to make web surfing easier for humans since we can remember names better than we can
numbers. When a URL like http://useforesite.com is typed into your browser the computer
converts that address to http://209.239.40.39 and sends this number to routers on the
internet. The router's use this number to find ForeSite Design's server so it can display
this page on your browser. To the routers, this page's exact address is
http://209.239.40.30/tut_ping.shtml (tut_ping.shtml is the file name of this page).
The packet size of the file being sent to perform the ping is 32 bytes.
Second line
-----------------------------------------------------------------------------
Request timed out.
--------------------------------------------------------------------------------
This was forced to happen by lowering the available time for the packet to make its trip. Sometimes the internet get bogged down and runs very slowly. This is the error message you will see if it takes too long for the packets to return. The exact default time is approximately on the order of 550 to 750 ms. If you get this error message you can make it go away by increasing the amount of time for the packet to make its trip. This is accomplished by invoking a switch within the ping command.
To see a list of available ping switch options, do the following;
in the DOS window type "ping" and hit the enter key.
The syntax for increasing the time out default time is "ping -w ### useforesite.com" where ### is the amount of time in milliseconds you wish to allow for the packet's round trip. I forced the "Request timed out" by typing in the following:
"ping -w 50 useforesite.com.
If your pings are not returning to you, try increasing this number to 750 or higher if necessary. Ping speeds will often average 150 - 375 ms depending on your type of connection. If you're seeing times in excess of 800 ms, something is probably amiss with the connection. If this is the case, using tracert will help isolate the offending nod.
Lines 3 - 5
--------------------------------------------------------------------------------
Reply from 209.239.40.39: bytes=32 time=245ms TTL=54
Reply from 209.239.40.39: bytes=32 time=244ms TTL=54
Reply from 209.239.40.39: bytes=32 time=218ms TTL=54
--------------------------------------------------------------------------------
Bytes is an indication of the packet size. Time is how long the round trip took in milliseconds and TTL is Time To Live. TTL is a number between 0 and 254 which is assigned to the packet. Each nod, server or router along the way reduces this number by one. If the packet number gets to zero before it reaches it's destination it is discarded. This prevents lost packets from roaming the internet indefinitely.
If you are connected to the internet via a 14,400 modem then the, amount of time for the round trip will be higher than those displayed above. The ISP's modem's speeds in this example are 28,800. If you would like to log directly into LTU’s server and run ping from there then click here. The difference in speeds are significant and this will give you a good idea of how fast information can be sent from one side of the US continent to the other and back. The average time is 30 to 40 ms. That's a factor of seven greater than the above examples and gives you a good idea of where internet bottlenecks are and why some pages are loading slowly onto you browser.
TRACEROUTE TUTORIAL
All communication across a network is
broken into packets before sending and is reassembled at the receiving end.
Let's say we are sending a 100 page
letter to someone and his mailslot is only big enough for one page at a time.
So we have to send each page in its own envelope with its own addressing and
stamp. Several things can happen:
1.
All the envelopes are delivered without mishap (giggle).
2.
None of the envelopes are delivered (either you or the
receiver
or both are not online or your ISP has router difficulty or Atlanta
has been hit in a pre-emptive tactical nuclear strike).
3.
Some of the envelopes are delivered.
If it is the last case, and it usually
is, success depends on how many of the envelopes are delivered. Some protocols
will try to resend lost envelopes but in the end, there will usually be some
missing information. If you try to read a book with a few missing pages, you
still get the gist of the story as long as the missing pages are not
consecutive and don't include critical plot changes. In the same way, the web
server, ftp server or your local computer can recover from some missing packets
to finish your upload or download.
If say, 95% of the packets arrive
intact, the receiving computer can assume the missing material from context.
For example:
She _ells seashe_l_ by the _eashor_.
Is easily translated into:
She sells seashells by the seashore.
If say, only 80% of the packets arrive
safely, there is not enough to put the whole message back together, this:
_he ___ls __ashe___ b_ the __asho__
is not enough to work with.
If the receiver sees that it has
received less than 80% of say, the first 20% of the message:
__e se___ s_a___
it gives up early and sends a message
like "blocking call canceled" or "connection failed".
Web browsers will give slightly
different error messages.
Missing
or delayed packets will be the cause of 90% percent of your connection
difficulty.
The first step in diagnosing
connection problems is to run a traceroute. This will help to determine what
path your connection takes across the Internet to reach our servers. The
traceroute tool is not intended to gauge your Internet connection as a whole
but to show the specific path you take to a specific location. If you have a
Windows95 or WindowsNT computer, you can use the built-in traceroute program to
do this.
Macintosh users can get a free traceroute utility from allmacintosh.com
Click on the 'start' button and go to 'programs'. Choose 'MS-DOS prompt'
('Command Prompt' in NT) and at the 'c:\windows>' prompt, type:
tracert yourdomainname.com
You will be presented with a string of
numbers representing the connect times of three packets sent to the next server
in line through which you must pass on your way to our server. That
server then sends three packets to the next server in line and reports those
times back to you. If you see an asterisk in place of a connect time, this
means that packet was placed on a network wire at the same time another server
placed a packet on the wire and they overwrote each other (commonly called a
data collision). This is indicative of heavy traffic on that network and three
asterisks on the same line mean that may be a dead connection. In this case we
suggest logging off and logging back on to your ISP to see if you can get a
different connect route. If you see long connect times (consistently in excess
of 400ms), the server on that "hop" may be busy servicing other
packets . This traceroute is only a snapshot of network traffic at that moment
in time. It should be run several times to determine the "trends" of
the traffic. To save it to a file for future reference, type:
tracert yourdomainname.com >
C:\trace.txt
This will create a file in the root
directory of your hard drive named 'trace.txt' that you can then view with
'notepad'. Any subsequent traces can be appended to the trace.txt file with:
tracert yourdomainname.com >> C:\trace.txt
The next step is to determine the path that the server's packets take to you.
You can connect to your site via the built-in Windows95 telnet program. Our telnet
tutorial explains the steps (WindowsNT has the same Telnet program
built-in).
Once you are at the telnet prompt on the server, type:
traceroute 64.20.82.177
The number above should be the IP address of your current connection to the
InterNet. If no number appears, our server was unable to determine your
addresss and you will need to contact your ISP or network administrator.
The results of these server side traceroutes can be cut and pasted into a local
file via notepad.exe or this command will send the results to you via email:
traceroute 64.20.82.177 | mail you@yourdomain.com
The symbol between the the IP address
and "mail" above is known as "the pipe" and should be above
the backslash on your keyboard.
If looking at the results of these
traceroutes, both to and from the server does not yield any obvious answers
regarding your connection, email them to us and we will investigate further. If
the results point to specific traffic congestion somewhere between you and the
sever, logging off your Internet connection and reconnecting may help. This may
cause your ISP to assign you a different temporary local IP address which may
take a different path to our server.
Shopping for ISP's should be done
using the traceroute tool. Many ISP's offer free evaluation periods during
which you may monitor the connection reliability with this tool. Remember to
run the trace several times to get a feel for the "trend" of the
traffic.
TRACERT TUTORIAL
To run a trace right now you need two
things.
1. You
need to be running Windows 95, 98 or NT
2. You
need to be logged onto the internet.
If you don't have Windows 95, 98 or NT
and consequently cannot perform the functions below then go to a page that provides a program which
will allow you to run traceroute from your serverClick on Window's
"Start" button, then click on the "Run" option. Type
the word "command" in the popup window, don't use the quotations,
then click the OK button. A DOS window will open.
Tracert Options
In this DOS window, type the word
"tracert" and hit the enter key. A menu of switch options will appear
and look like this.
Usage: tracert [-d] [-h maximum_hops]
[-j host-list] [-w timeout] target_name
Options:
-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list.
-w timeout Wait timeout milliseconds for each reply.
If you wish to invoke any of these
options, the syntax is tracert -d hostname.com or tracert -h 12 hostname.com
The default settings work fine and usually
don't need to be changed. The following method invokes a trace without altering
the default settings.
In the DOS window, type the word
"tracert ####" where
#### is the IP address or URL of the host you want to trace (use lower
case letters). To run a trace to our web site's server (Computer) from your PC, type
"tracert useforesite.com" or "tracert 209.239.40.39" ignore
the quotes. If there are no traffic jams or problems on any of the
routers along the way, you'll see something similar to the following.
*Note: To close this DOS shell
popup window, type the word "exit" and hit enter.
Tracing route to useforesite.com
[209.239.40.39]
over a maximum of 30 hops:
1 196 ms 161 ms 163 ms wg.dvol.com [206.20.144.10]
2 181 ms 160 ms 162 ms irx.dvol.com [206.20.144.1]
3 193 ms 181 ms 204 ms cust-2-frm-4-3.ph.idt.net [169.132.128.113]
4 180 ms 187 ms 188 ms ph-t1.gw-1.dc.idt.net [206.20.128.33]
5 197 ms 161 ms 162 ms core-1-eth-2-3.dc.idt.net [169.132.128.65]
6 216 ms 223 ms 212 ms fddi2-1-0.br1.dca.globalcenter.net [192.41.177.118]
7 189 ms 161 ms 168 ms pos6-0-0-155M.cr1.IAD.globalcenter.net [204.152.166.6]
8 209 ms 175 ms 222 ms fe0-0.cr2.IAD.globalcenter.net [204.152.166.132]
9 224 ms 186 ms 194 ms s3-0.cr1.BWI.globalcenter.net [209.143.255.6]
10 230 ms 216 ms 213 ms alabanza-to-fgc.globalcenter.net [209.143.255.26]
11 250 ms 195 ms 202 ms alabanza-to-fgc.globalcenter.net [209.143.255.26]
12 219 ms 211 ms 215 ms useforesite.com [209.239.40.39]
Trace complete.
This is the route the trace took to
get from the local PC to the address on useforesite's server.
Dissect the information
line by line
Tracing route to useforesite.com
[209.239.40.39] over a maximum of 30
hops:
First line of text
The first line refers to the
useforesite.com URL (Universal Resource Locator) and the respective IP address
[209.239.40.39]. These two identifiers are one and the same. It's easier for
humans to remember words than it is for them to remember numbers so URL's are
used by humans to locate other human's servers while the numbers are used by
computers to locate another computer. URL's were created as a matter of
convenience for people. IP's were the original method for calling another
computer.
Second line of text
= maximum of 30 hops
No! This isn't referring to how many
of your favorite beverages you may consume before getting flagged at your local
bar.
Think of hops, nodes, computers,
servers and PCs as all being pretty much the same thing. This line is saying
"If it takes more than 30 hops to get from this originating PC to the
destination PC's address then stop trying". This number (30) is
configurable by using the -h switch listed above (the syntax is, tracert -h #
hostname.com [where # is the maximum number of hops
for the trace to take]). You may wish to lower this number
but if a trace takes more than thirty hops to anyplace in the world, there's
something seriously wrong.
Lines 1 & 2
1 196 ms 161 ms 163 ms wg.dvol.com
[206.20.144.10]
2 181 ms 160 ms 162 ms irx.dvol.com [206.20.144.1]
Delaware Valley Online
The first three sets of numbers
followed by "ms" is the amount of time in milliseconds that it took
for a packet of information to get from the PC which initiated the trace to the
receiving computer and sent back to the originator on three separate journeys.
The average round trip to the first server was 173ms or (196+161+163) ÷
3 = 173. These times are not cumulative as you pass down the list each
represents the time it took for that individual server to send the packet back.
An easy way to identify the hosting
companies and back bone providers along a traced route is to enter there IP
address into your browsers address pane. Using the above example you could
enter either http://206.20.144.10 or http://www.dvol.com both are the same thing.
What else does line 1 and 2 tell us?
Both are from dvol.com so both are nodes which are probably located at the same
physical facility. They are simply two computers at a single ISP's (Internet Service Provider) facility. Line one
is the first computer that encountered the packets from the trace. Line two is
the second and so on. So the trace first entered the dvol.com facility via the
computer at line # 1 and was routed over to the computer at line # 2 by which
it left the facility and went on to idt.net.
Lines 3 - 5
3 193 ms 181 ms 204 ms
cust-2-frm-4-3.ph.idt.net [169.132.128.113]
4 180 ms 187 ms 188 ms ph-t1.gw-1.dc.idt.net [206.20.128.33]
5 197 ms 161 ms 162 ms core-1-eth-2-3.dc.idt.net [169.132.128.65]
The trace entered idt.net on the
computer at line # 3. This computer has a designation of ph.idt.net.
Again you could visit their web site by pointing your browser to http://www.idt.net . The ph is an interesting
feature as it is an indication of Philadelphia, PA USA.
IDT
The packet at line # 4 (ph-t1.gw-1.dc.idt.net
[206.20.128.33]) has now traveled to a server at idt.net which handles the
Washington DC area (dc.idt.net). This server is located in the Philadelphia
area but routes all packets to the DC area which need to go to DC. This is
shown by the use of ph-tl at the beginning of the address. This server is in
Philadelphia but handles traffic to the DC area.
Line # 5 (core-1-eth-2-3.dc.idt.net
[169.132.128.65]) is indicating that we are still at idt.net but are now on
a server or router at a core or backbone facility in DC. Which is an eth-ernet.
This is an indication of peering onto a major backbone provider of the internet
which happens to be MAE East (MAE = Metropolitan Area Ethernet). Note the map
above, courtesy IDT.
Lines 6 - 11
6 216 ms 223 ms 212 ms
fddi2-1-0.br1.dca.globalcenter.net [192.41.177.118]
7 189 ms 161 ms 168 ms pos6-0-0-155M.cr1.IAD.globalcenter.net [204.152.166.6]
8 209 ms 175 ms 222 ms fe0-0.cr2.IAD.globalcenter.net [204.152.166.132]
9 224 ms 186 ms 194 ms s3-0.cr1.BWI.globalcenter.net [209.143.255.6]
10 230 ms 216 ms 213 ms alabanza-to-fgc.globalcenter.net [209.143.255.26]
11 250 ms 195 ms 202 ms alabanza-to-fgc.globalcenter.net [209.143.255.26]
------------------------------------------------------------------------
Lines 6 - 11 are all computers/routers
owned by Global Center. Their address's are not as easily deciphered but there
is some other relevant information worthy of comment. Line # 6 has a 155M
designation in it. This is most likely a reference to a 155 Mbps OC-3 or
Optical Carrier line. This is a fiber optic cable capable of transmission
speeds of 155 Megabytes per second. Very Very Fast.
Global Center
Line 12
12 219 ms 211 ms 215 ms
useforesite.com [209.239.40.39]
Here we are at the destination server (computer). It only took, on average, 215ms or
slightly less than a quarter of a second for a packet of information to be sent
out from a PC in the Philadelphia area through 11 computers over 3000 miles and
back again. That's 22 connections and 6000 miles in a quarter of a second.
Whew! That's fast. Consider this: 80% of that travel time was spent between the
originating PC and the first computers which happens to be an ISP whose modem
connection speeds are limited to 28,800 kbps. That means the trip through 20
servers and 6000 miles really only took 42ms which is only 4 hundredths of a
second.
Other indicators to
look for in a hop:
ATM
can support data transfer rates from 25 Mbps to 622 Mbps,
HSSI transfers up to 52 Mbps comparable to a T3 line at 44
Mbps,
OC3 transfers up to 155 Mbps,
DS3 transfers up to 45 Mbps
Study the following
trace hops to see what you can determine from them.
170 ms 181 ms 156 ms
mae-east.iconnet.net [192.41.177.75]
190 ms 156 ms 168 ms Hssi0-0.balt01.IConNet.NET [204.245.69.49]
174 ms 229 ms 185 ms Serial10-1-0.phi02.IConNet.NET [204.245.69.69]
338 ms 326 ms 304 ms unknown-atm5-0-0.Seattle.cw.net [166.49.26.6]
189 ms 251 ms 198 ms core10-hssi-1.SanFrancisco.cw.net [204.70.10.221]
Tracert is the command that we used in
the DOS window throughout the preceding tutorial. The UNIX equivalent is
traceroute. If you can telnet into your web sites server, simply type in
traceroute hostname.com where hostname is the URL to whatever site you want to
trace or you could type in the IP address like this; traceroute
123.45.678.912.
Locate a host --
Why not just run a trace and use the first backbone provider which has
hosting packages? Backbone providers are big with big overhead. Their time is
money and if you need a personal touch with the web design process expect to
pay a premium price.
To cut down on cost some companies
have dedicated servers at the backbone providers facilities which are coupled
to their access lines. This allows us to have very low overhead and provide a
personal touch without the expense. This should give you a good idea of what
you should expect from a host.
All the above mentioned factors effect
the internet as a whole and it's possible for one to have the best hardware
configuration out there and the site can and probably will suffer from time to
time because of the web surfers path or connection to the site, after all, the
web surfer has to connect through an ISP which connects to a NAP or MAE which
goes through another or multiple NAP's or MAE's which connects to the final
host. Any one of these connections could be a potential bottleneck. Taking care of all the configuration details
on your end will, however, improve your odds for a good connection.
The
term "TELNET" refers to the remote login that's possible on the
Internet because of the TELNET Protocol. Telnet allows you to remotely access a
computer over the Internet. In other words, you can tell that computer to
create, edit, execute and delete files just as if you were sitting at that
computer.
The use of this term as a verb, as in "Telnet to a host" means to establish a connection across the Internet from one host to another. Usually, you must have an account on the remote host to be able to login to it once you've made a connection. However, some hosts provide public services that do not require a personal account.
A
long time ago, computers were behemoths that occupied entire rooms. In order
for more than one person to use the computer, "terminals" were
connected to the computer. At first these terminals were teletypes - just fancy
typewriters called TTYs. The computers could tell these TTYs to print
characters, do line feeds and carriage returns, and read input from the person
typing at them. Then CRT (video) terminals were introduced, and ways of
handling characters displayed on a screen had to be developed. These early
terminals included the DEC family of VTs (Video Terminals) like the VT-52 and
the VT-100. They were pretty fancy. They allowed users to do "full screen
editing" by moving a cursor around the screen and deleting characters at
will. They also allowed the computers to print special characters like lines
and dashes, display bold text, or clear the screen entirely.
Nowadays we don't live in caves and hunt mammoth, but we still use this emulation for remote login sessions like Telnet. The emulation of old terminal types, like TTY or VT-100, are good ways of controlling a computer through another computer because they were character based and were designed to transmit and receive data quickly and efficiently.
UNIX Sites
Basic UNIX Commands
List Contents of Directories - and
[options]
ls |
lists
files in current directory |
ls
-l |
provides
long listing of current directory |
ls
-l /usr/jane |
provides
long listing of directory /usr/jane |
ls
-a |
list
all entries (including ones starting with a decimal) |
ls
-i |
print
inode numbers |
ls
-t |
sort
by modification time |
ls
-x |
multi-column
list, sorted across each row |
What would you like to do?
ACTION |
Command |
Examples |
append
to file |
cat
>> |
cat
>> file |
changing
permission group |
chgrp |
chgrp
GroupName FileOrDirectory |
combine
2 files |
cat |
cat
File1 File2 > File3 |
copy
files |
cp |
cp
MyFile CopyOfMyFile |
create
a file |
cat |
cat
> NewFile |
edit
files |
ed |
ed
File |
list
files |
ls |
ls
usr/mac |
move
a file (to directory) |
mv |
mv
MyFile docs/html/mine |
remove
a file |
rm |
rm
UnWantedFile |
rename
a file |
mv |
mv
OldFilename NewFilename |
view
files |
cat |
cat
plan.dec |
view
files |
page or more |
page
plan.dec |
Change
Login Password |
passwd |
passwd |
change
to another directory |
cd |
cd
/usr/tmp |
create
a directory |
mkdir |
mkdir
/usr/paul/budget |
find
out where you are |
pwd |
pwd |
go
to your home directory |
cd |
cd |
remove
an empty directory |
rmdir |
rmdir
junk |
Redirection of Output or Input
> redirects the output of a command to a
file
>> redirects the
output of a command to the end of an existing file
< takes the
input of a command from a file, not the terminal
chmod --- Change Access Modes
chmod [mode] files
modes can be numeric or symbolic
The symbolic case consists of the form of [agou][+-=][rwx] where:
a |
group,
other and user access permissions(all) |
g |
group
access permissions |
o |
other
access permissions |
u |
user
access permissions |
r |
read
permission |
w |
write
permission |
x |
execute
permission |
Example: |
add
write permission for user and group to a file: chmod ug+w files |
For
numeric case consult above sites for more details. |
|
X-- |
owner's
permission |
-X- |
group's
permission |
--X |
other's
permission |
where X is the octal sum of 04 (read),
02 (write), 01 (execute) for user, group and other.
Numeric Example: chmod 640 FileOrFolderName
changes permissions so user has read, write permission (4+2+0=6), group has
read permission(4+0+0), and other has no permissions. This makes 640.
--------------------------------------------------------------------------------------------
You
can run Windows Telnet by following the steps below:
For security reasons, your password
does not display on the screen.
After you log in, the welcome screen
appears.
The line at the bottom of the screen
contains your username. This line, with the % symbol at the end, is called a command
prompt. It lets you know that your server is waiting for you to tell it what to
do.
If you’ve made it
this far, congratulations! You’ve successfully established a Telnet session
with your NT Virtual Server`s mail server.
At this point, you
have the following options:
Even if you don’t
care right now why you need to type a particular line at the command prompt,
you can always go back later to learn more about the inner workings of your NT
Virtual Server`s mail server.