COMP 3630 - The Internet Name: Dr. Joseph NG Office: R707 (Run Run Shaw Building) Phone: 2339-7864 HomePage:

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
METEOROLOGICAL TELECOMMUNICATION AND METCAP A GLANCE TO NETWORK BRIEFLY Ömer Hüdai ALBAYRAK 2010ALANYA.
HATHITRUST A Shared Digital Repository HathiTrust: A Second Life for Library Collections Jeremy York Exploring Humanities Cyberinfrastructure April 30,
1º HARVARD UNIVERSITY - USA 2º UNIVERSITY OF CAMBRIDGE - UK.
SYSTEM ADMINISTRATION Chapter 19
Nassau Community College
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Electronic Commerce Last Week
Terralite Solutions.  TCP/IP setting for communications  Subscription  Unicast  Multicast  UDP  Communications troubleshooting.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
1 Version 3.1 Module 4 Learning About Other Devices.
Autostatus Graduate Student: Yan-Shiang Wang Adviser: Quincy Wu.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-on Networking Fundamentals
Internet Control Message Protocol (ICMP)
Herramientas para diagnósticos. Ping USO: Ping nombre.dominio o dirección IP Options: -t Ping the specifed host until interrupted. -a Resolve addresses.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Bioengineering Graduate Program Fischell Department of Bioengineering University of Maryland John P. Fisher, Ph.D. Professor and Associate Chair Director.
McNair Scholars Program Second Summer Research Experience.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
Florida’s Doctorate Programs in Key Areas of Basic Research Board of Governors Strategic Planning Committee Florida A&M University April 22, 2004.
Faculty Council Presentation Monday, January 26, 2004.
Windows routing and resolution. Basic concepts  Host name: machine.sub-domain.domain example: mail.ubalt.edu same machine name in Windows in NetBIOS.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
HATHITRUST A Shared Digital Repository HathiTrust and TRAC DigitalPreservation 2012 July 25, 2012 Jeremy York, Project Librarian, HathiTrust.
E MATERIAL PREPARATION OF A COURSE Presented By Kadam Shishirkumar N. M. Tech. (IIT Bombay) Mechanical Engineering B.V.C.O.E. Navi Mumbai.
1 Fall 2004 Freshman Profile September 9, Total Number of Applications = (+13%)
HATHITRUST A Shared Digital Repository HathiTrust and the Future of Research Libraries American Antiquarian Society March 31, 2012 Jeremy York, Project.
組態管理 ( Configuration Management) 陳彥錚 (Yen-Cheng Chen)
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
IT ELECTRONIC COMMERCE THEORY NOTES
Lesson 2: The World Wide Web Objectives After completing this lesson, you will be able to:  Define WWW and its relation to the Internet.  Explain how.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
HATHITRUST A Shared Digital Repository Institution Uses of HathiTrust Jeremy York University of Maine May 24, 2013.
Form Processing Week Four. Form Processing Concepts The principal tool used to process Web forms stored on UNIX servers is a CGI (Common Gateway Interface)
Network Layer: Address Mapping, Error Reporting, and Multicasting
HATHITRUST A Shared Digital Repository HathiTrust Large Digital Libraries: Beyond Google Books Modern Language Association January 5, 2012 Jeremy York,
COMP2322 Lab 5 IP Steven Lee March 18, IP Internet Protocol Network layer protocol 3.
HathiTrust: A valuable and visionary Partnership.
Chapter 5e.  Upon completion of this chapter, you should be able to:  Find IP configuration settings on Windows & Linux  Troubleshoot IP configuration.
Faculty Salary Study Comparison to AAU Data Exchange Institutions
CompTIA Network+ N Authorized Cert Guide
TCP/IP Utilities Richard Goldman May 29, 2003.
COMP2322 Lab 5 IP Steven Lee March 22, 2017.
Network Commands 2 Linux Ubuntu A.S.
Network Tools and Utilities
Chapter 6 – Routing.
8 Network Layer Part V Computer Networks Tutun Juhana
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
NETWORK TROUBLESHOOTING COMMANDS
Internet Control Message Protocol
Exercise 10 Toking Ring MTU=4464 Ethernet MTU=1500 FDDI MTU=4352 H1 H2
Presentation transcript:

COMP The Internet Name: Dr. Joseph NG Office: R707 (Run Run Shaw Building) Phone: HomePage: ICQ: I am not going to tell you! Planned Conference Trip: November December 5 (Phoenix, Arizona, U.S.A.) Guest Lecture by Mr. Y. K. Chan on December 3.

COMP The Internet Subject Contents (4 weeks left) –The Cyber Map Project Use of ping, traceroute from UNIX, and tracert from NT Internet application using cgi or perl –Internet Applications Case Studies Search Engines (Yahoo vs. Lycos) Interactive TV (iTV) Emerging Technologies leading to Electronic Commerce Hands-on Experience for PGP (Y.K. Chan)

COMP The Internet The Cyber Map Project –Project Descriptions Given the host address of the Top-22 Universities in U.S.A.; Use traceroute (unix) or tracert (NT) to find out the routes from HKBU to each of the address and record the gateways in between; Using the ping command to estimate the round trip delay from HKBU to each gateway; Construct a graph to represent the connectivity between HKBU and these 25 Universities; The graph is updated automatically and periodically; The delay and connectivity information is made available through a web page;

COMP The Internet The Cyber Map Project –Top-22 Universities of U.S.A. 3wi.htm (courtesy to US News) 1. Massachusetts Inst. of Technology 2. Stanford University (CA) 2. University of California Berkeley 4. California Institute of Technology 4. University of Illinois Urbana-Champaign 6. University of Michigan Ann Arbor 7. Carnegie Mellon University (PA) 7. Cornell University (NY) 7. Georgia Institute of Technology 10. University of Texas Austin 11. Purdue University West Lafayette (IN) 12. Princeton University (NJ) 12. University of Wisconsin Madison 14. Johns Hopkins University (MD) 14. Northwestern University (IL) 14. Pennsylvania State University 14. Rensselaer Polytechnic Inst. (NY) 18. Rice University (TX) 18. Texas A&M University College Station 18. University of California Los Angeles 18. University of Minnesota Twin Cities 18. Virginia Tech

COMP The Internet The Cyber Map Project –Useful commands from unix and Windows NT ping -- ping utilizes the ICMP protocol's ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from the specified host or network gateway. traceroute -- traceroute in unix and tracert in Windows NT provide the same function. Traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host. netstat -- netstat basically shows the network status. Depending on the options you select, it displays the state of all sockets and all routing table entries; normally only interface, host, network and default routes are shown. Note: consult the man pages for these commands.

COMP The Internet The Cyber Map Project –Use Yahoo or Lycos and search for traceroute and related applications and see if you have any new idea in working on your Cyber Map project. –For Examples (from Lycos) NeoTrace GTrace VisualRoute Cybergeography -- a cool site ( –Article: “MAPPING THE INTERNET WITH TRACEROUTE” by Jack Rickard –Type in “traceroute” from Yahoo will give you a list of traceroute servers.

COMP The Internet The Cyber Map Project –Programming Although you can easily find the source code of “ping” and “traceroute” from the web or from the book “unix network programming” by Richard Stevens, you may want to do the project in a quick and dirty way by simply writing a C program with and make use of the “system” call. So call traceroute from your program and redirect the output to a tmp file, and later on read back this tmp file and get the gateway information. Use “ping” to update the delay information automatically and periodically. Design a simple web page for query.