КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
Key principals. Requirements to Content of the protocolPURPOSE OF THE WORK LABORATORY WORK № 4 REQUIREMENTS TO CONTENT OF THE PROTOCOL LABORATORY ASSIGNMENTS HOME ASSIGNMENTS CHECK-UP QUESTIONS 3.3.1 Name the main limitation and disadvantages when using repeaters, bridges and switches when we break down a network into subnets. 3.3.2 What is the router and at what level of OSI model does it work? 3.3.3 Name the main functions of a router. 3.3.4 What is the remote bridge? 3.3.5 Name the main disadvantages of outers. 3.3.6 Explain the main differences between bridges and routers. 3.3.7 Name the main distinctions in Zyxel Prestige 128L setup as a bridge and a router. 3.3.8 Name functionalities of Zyxel Prestige 128L modem. 3.3.9 Describe the assignment of indicators and Zyxel Prestige 128L slots.
4.1 Study key principles. 4.2 Prepare answers to check-up questions.
3.5.1 Setup Zyxel Prestige 128L as the bridge, following instructions of a systematic study guide. 3.5.2 Check up the availability of a remote segment by means of ping command, or by getting access to resources of a remote segment. 3.5.3 Setup Zyxel Prestige 128L as a router, following instructions of a systematic study guide. You can receive IP-addresses from a teacher. 3.5.4 Check up the availability of a remote segment by means of ping command, or by getting access to resources of a remote segment.
3.6.1 The name of laboratory work. 3.6.2 Purpose of the work. 3.6.3 Results of home assignments. 3.6.4 Short description of the work done. 3.6.5 Conclusions about the work done. 3.6.6 Date, the signature of a student, the remark of a teacher.
THEME: TECHNOLOGY ANALYSIS OF DATA NETWORKS. MEANS AND ANALYSIS OF NETWORK CONFIGURATION BASED ON TCP / IP Analysis of the built-in network diagnostics based on TCP / IP and getting practical skills of diagnostics.
4.2.1 Basic tools used for network diagnostics based on TCP / IP Internet - the largest and one of its kind network in the world. Among global networks, it occupies a unique position. It correctly regarded as a sub network - the union of many networks, preserving independent significance. Indeed, the Internet has no clearly defined ownership, nor national origin. Any network can be connected to the Internet, and therefore, be considered as part of it, if it uses accepted for Internet protocols TCP / IP (Transmission Control Protocol / Internet Protocol) or is there a converter in the protocols TCP / IP. TCP / IP - an industry standard stack protocols designed for wide area networks. The composition of the family includes protocols UDP, ARP, ICMP, TELNET, FTP and many others. As the manifestation of an unstable individual nodes in the network based on TCP / IP the most important issue is the possibility of its monitoring and analysis. One method of diagnosing networks is the utility (short program) included in of the software package, TCP / IP. The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected networks called the Catenet. The network connecting devices are called Gateways. These gateways communicate between themselves for control purposes via a Gateway to Gateway Protocol (GGP). Occasionally a gateway or destination host will communicate with a source host, for example, to report an error in datagram processing. For such purposes this protocol, the Internet Control Message Protocol (ICMP), is used. ICMP, uses the basic support of IP as if it were a higher level protocol, however, ICMP is actually an integral part of IP, and must be implemented by every IP module. ICMP messages are sent in several situations: for example, when a datagram cannot reach its destination, when the gateway does not have the buffering capacity to forward a datagram, and when the gateway can direct the host to send traffic on a shorter route. The Internet Protocol is not designed to be absolutely reliable. The purpose of these control messages is to provide feedback about problems in the communication environment, not to make IP reliable. There are still no guarantees that a datagram will be delivered or a control message will be returned. Some datagrams may still be undelivered without any report of their loss. The higher level protocols that use IP must implement their own reliability procedures if reliable communication is required. The ICMP messages typically report errors in the processing of datagrams. To avoid the infinite regress of messages about messages etc., no ICMP messages are sent about ICMP messages. Also ICMP messages are only sent about errors in handling fragment zero of fragmented datagrams. (Fragment zero has the fragment offset equal zero).
The main utilities used in modern operating systems (OS), are: Ping - a procedure that is used for testing of the channels and nodes. Tracert (Traceroute) - displays the addresses of all routers on the way from client to remote host. Nslookup - check for the correct names in the address conversion and vice versa. Netstat - displays stats and current connections for the protocol TCP / IP. Ipconfig - shows the setup protocol IP. Default displays only IP-address, subnet mask and default gateway for connection each adapter, which is executed for binding to TCP / IP. Winipcfg - utility similar Ipconfig, but not in working mode command line, and by application interface. It can be use only on Windows 98. Finger - used to obtain information about the user removed machine. Telnet - use the Internet standard protocol for obtaining terminal access to remote machines. Whois - Search the Whois database for registration information net domain name, user's phone number, e-mail address and more. Net Time - sync system time with master server.
4.2.2 Utilities ping and tracert. Utilities ping and tracert (traceroute), used independently or together, determine the path that goes over the network packet to the destination and time, he reaches it. Based on the results of tests ping and tracert, you can determine where it stopped. Utility Ping by sending messages with echo-request protocol ICMP (Internet Control Message Protocol) connections to examine IP protocol level to another computer that supports TCP / IP. After each transmission of a message is displayed with an echo-response. Team ping, running without parameters displays help. Syntax
Table 4.2.1 – Parameters and description of utility Ping
The following example shows the results of the command ping: C: \> ping-l 1964 www.nnm.ru Ping www.nnm.ru [213.248.7.66] with 64 bytes: Reply from 213.248.7.66: byte = 64 h = 491ms TTL = 44 Reply from 213.248.7.66: byte = 64 h = 711ms TTL = 44 Reply from 213.248.7.66: byte = 64 h = 831ms TTL = 44 Reply from 213.248.7.66: byte = 64 h = 471ms TTL = 44 Ping statistics for 213.248.7.66: Packets: sent = 4 received = 4, Lost = 0 (0% loss), Estimated time of transmission and reception: smallest = 471ms, largest = 831ms, average = 626ms
Tracert utility determines the path to the destination using reference point in Lung-purpose of ICMP messages with a constant increasing values of lifetime (TTL) in the header packet. Derived path - a list of the nearest router that is on the road junction between the source and destination. Closer interface is Syntax
Parameters Options of Tracert utilities are presented in Table 4.2.2.
Table 4.2.2 – Parameters and description of Tracert utility
Note
Tracert command determines the route, sending the first echo-request from field TTL, which is 1. Further, this value will increase by unit for each echo packet is sent, as long until the final site will answer or until the Maximum the field TTL. Maximum Conversion Default is 30 and can be changed with the option-h. Way determined from analysis of ICMP messages elapsed time obtained from intermediate routers, and Lung-answer destination. However, some Routers do not send messages about the time that has elapsed for packages zero TTL values and therefore does not see team tracert. In this case for conversion is a series of asterisks (*).
Example: Tracing route to aport.ru [194.67.18.8] with the maximum number conversion 10: 1120 ms 120 ms 121 ms max3.farlep.net [213.130.1.251] 2130 ms 120 ms 120 ms teller-10mb-gw.farlep.net [213.130.1.254] 3120 ms 120 ms 791 ms core-0-0FE.farlep.net [213.130.0.28] 4141 ms 140 ms 160 ms core-0-pa4T-1-0-201fr.kiev.farlep.[213.130.0.102] 5801 ms 150 ms 150 ms router113.ukrsat.com [212.35.171.113] 6161 ms 150 ms 160 ms cyclone.ukrsat.com [212.35.160.97] 7731 ms 731 ms 751 ms NO-NIT-TN-6.taide.net [193.219.192.6] 8711 ms 711 ms 701 ms NO-NIT-TN-8.taide.net [193.219.193.138] 9711 ms 701 ms 711 ms oso-okr-i1-pos1-1.telia.net [213.248.78.49] 10 701 ms 711 ms 691 ms s-bb1-pos0-0-0.telia.net [213.248.66.89] Trace complete.
Дата добавления: 2014-12-27; Просмотров: 487; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |