SlideShare une entreprise Scribd logo
1  sur  43
Network Testing and
Debugging
TCP/IP CONCEPTS, WIRING, CONFIGURATING NETWORK, PROTOCOLS
S a d e e d A m e e n P O
s a d e e d a m e e n @ g m a i l . c o m
Testing and Debugging
 Testing activity is carried down to find the
defect in the network and its configurations.
 Identify and remove errors from computer
hardware or from network is termed as
debugging
09-03-2015sadeedameen@gmail.com
2
Possible points of failure
 The cable is plugged into the wrong network
 Host machine is plugged into the wrong network
 Host machine has a bad network card
 Machine is offline
 The web server may not be running
09-03-2015sadeedameen@gmail.com
3
Testing the IP configuration
 Windows systems offer a command-line tool,
called ipconfig, that lets you find out your
computer's IP configuration
 The output of this command gives the IP
configuration for each interface
 a computer with two network cards and one
wireless adapter has 3 interfaces each with its
own configuration
09-03-2015sadeedameen@gmail.com
4
Testing the IP configuration cont
 The Ethernet interface connected to the local area network (network card) is not
active since the cable is disconnected, but the PPP adapter (MTS) is configured.
 Machines on a same network must use a same address range (with different
addresses) and a same subnet mask
 In the case of a local network, connecting machines that do not have routable
IP addresses, so-called private address ranges must be used
 The default gateway refers to, when applicable, the IP address of the machine
offering internet access. DNS servers
 The DNS servers must correspond to the organization's DNS servers; most of the
time these are the service provider's DNS servers
09-03-2015sadeedameen@gmail.com
5
Testing the connection
 To test the proper functioning of a network
 Ping utility is a highly practical utility provided as a standard feature
with most operating systems.
 Ping lets you send a data packet to a network computer and lets
you evaluate the response time
 ping -t 192.168.0.3 Ping the IP addresses of the network's computers
 ping -t Mickey Ping the computer names
 Ping –t www.google.com ping a domain name
09-03-2015sadeedameen@gmail.com
6
Testing the connection cont
09-03-2015sadeedameen@gmail.com
7
Network Testing
 Load Testing
 Stress Testing
 Negative Testing
 Inopportune Testing
 Conformance/Compliance Testing
 Line Speed Testing
 Performance Testing
 Robustness/Security Testing
 Interoperability Testing 09-03-2015sadeedameen@gmail.com
8
Load Testing
 Load testing is the process of putting demand on a system or device
and measuring its response. Load testing is performed to determine a
system's behavior under both normal and anticipated
peak loadconditions
 Where a system can support testing to actual volumes we have a
performance testing service to meet your requirements.
 Our network testing services provides comprehensive concurrent user
simulation of user and system traffic. This can be conducted while
concurrently generating threats and attacking traffic at high loads.
09-03-2015sadeedameen@gmail.com
9
Stress Testing
 Stress testing is a form of deliberately intense or thorough
testing used to determine the stability of a given nework.
 It involves testing beyond normal operational capacity,
often to a breaking point, in order to observe the results
 Stress testing is the process of determining the ability of a
network or device to maintain a certain level of
effectiveness under unfavorable conditions.
09-03-2015sadeedameen@gmail.com
10
Stress Testing
Actions involved may include:
 Running several resource-intensive applications in a single computer at
the same time
 Attempting to hack into a computer and use it as a zombie to
spreadspam
 Flooding a server with useless e-mail messages
 Making numerous, concurrent attempts to access a single Web site
 Attempting to infect a system with viruses, Trojans, spyware or
othermalware
09-03-2015sadeedameen@gmail.com
11
Negative Testing
 Process to verify that the device under test responds
correctly to error conditions or unacceptable input
conditions.
 Negative testing can be challenging because the
number of incorrect conditions is unlimited.
 Example of a negative test would be using a security
protocol for authentication with an incorrect parameter
09-03-2015sadeedameen@gmail.com
12
Inopportune Testing
 Process to verify that the device under test is able to
react properly when an unexpected event occurs
 The event is syntactically correct, but occurs when not
expected
 Inopportune testing is a specific instance of negative
protocol conformance testing.
09-03-2015sadeedameen@gmail.com
13
Conformance/Compliance Testing
 Testing both the capabilities and behavior of an implementation, and
checking what is observed against the conformance requirements in the
relevant International Standards.(ISO/IEC 9646-1:1994(E))
 testing to see if the device under test operates according to that
requirement
 This is done by creating a series of single function tests for each
requirement, resulting in thousands of tests
 An example of a conformance test is to check if the “ping” command
operates correctly.
09-03-2015sadeedameen@gmail.com
14
Line Speed Testing
 Process of verifying that a device can operate at its rated
line speed, when the bandwidth is 100% utilized or saturated.
 process of subjecting the device under test to out of
boundary conditions
 For example, if the device is rated as operating at 5 Giga
bytes per second, then the device should be able to handle
incoming traffic utilizing all the available bandwidth
09-03-2015sadeedameen@gmail.com
15
Performance Testing
 Process of verifying that the performance of the
device under test meets an acceptable level
 Performance testing is a superset of line speed
testing in which performance applies to many
aspects of a network device or application,
and not just line speed.
09-03-2015sadeedameen@gmail.com
16
Robustness/Security Testing
 Process of subjecting a device under test to particular input streams
 The input streams may be one of three types:
 Random input streams
 Valid input streams
 Invalid input streams
 Security testing is more broadly defined to include monitoring /
surveillance and the detection of specific exploits like IP spoofing or
phishing etc
09-03-2015sadeedameen@gmail.com
17
Interoperability Testing
 Process of testing devices from multiple manufacturers by interacting
in such a manner as to exercise the network protocol under test
 Interoperability testing is very useful in the early stages of a new
product
 As products mature, interoperability testing becomes less valuable as
it does not uncover enough new bugs to warrant the cost of setting
up, configuring and managing network equipment from various
manufacturers.
09-03-2015sadeedameen@gmail.com
18
Network Testing and Debugging
Penetration testing
09-03-2015sadeedameen@gmail.com
19
Penetration testing
 Evaluating the security of a network by hacking.
Basically, it is an analysis of system for any potential
vulnerabilities that may result from any of the following:
Poor or improper system configuration
Known and / or unknown hardware or software
flaws
Operational weaknesses in process
Technical countermeasures
09-03-2015sadeedameen@gmail.com
20
Penetration testing cont
Importance of PenetrationTesting:
 It prevents financial loss through from hackers or extortionists or
disgruntled employees
 It prevents financial loss through unreliable business systems and
processes
 From an operational perspective, penetration testing helps shape
information security strategy.
 It protects your brand by avoiding loss of consumer confidence
and business reputation.
09-03-2015sadeedameen@gmail.com
21
Basic Network Troubleshooting Tools
Ping
 The most commonly used network tool is the ping utility
 This utility is used to provide a basic connectivity test between the
requesting host and a destination host.
 This is done by using the Internet Control Message Protocol (ICMP)
which has the ability to send an echo packet to a destination host
and a mechanism to listen for a response from this host
09-03-2015sadeedameen@gmail.com
22
Tracert/traceroute
 once the ping utility has been used to determine basic
connectivity, the tracert/traceroute utility can used to determine
more specific information about the path to the destination host
 It includes the route the packet takes and the response time of
these intermediate hosts
 Tracert for Windows machines and traceroute for Linux/unix
based machines
09-03-2015sadeedameen@gmail.com
23
Tracert/traceroute cont
09-03-2015sadeedameen@gmail.com
24
Ipconfig/ifconfig
 The utilities that can be used to find out this IP configuration
information include the ipconfig utility on Windows machines and
the ifconfig utility on Linux/unix based machines.
 One of the most important things that must be completed when
troubleshooting a networking issue is to find out the specific IP
configuration of the variously affected hosts
09-03-2015sadeedameen@gmail.com
25
Ipconfig/ifconfig cont
09-03-2015sadeedameen@gmail.com
26
Nslookup
 Some of the most common networking issues revolve around issues with
Dynamic Name System (DNS) address resolution issues.
 The nslookup utility can be used to lookup the specific IP address(es)
associated with a domain name. If this utility is unable to resolve this
information, there is a DNS issue
 Along with simple lookup, the nslookup utility is able to query specific
DNS servers to determine an issue with the default DNS servers
configured on a host
09-03-2015sadeedameen@gmail.com
27
Nslookup cont
09-03-2015sadeedameen@gmail.com
28
Netstat
 the current state of the active network
connections on a host
 It is also possible to use the netstat utility to
determine which services on a host that is
associated with specific active ports
09-03-2015sadeedameen@gmail.com
29
09-03-2015sadeedameen@gmail.com
30
PuTTY/Tera Term
 When connecting to a variety of different types of
equipment, a telnet, SSH or serial client is required; when
this is required both the puTTY and Tera Term programs are
able to provide these functionalities.
 The selection of one over the other is strictly a personal
preference.
09-03-2015sadeedameen@gmail.com
31
PuTTY/Tera Term cont
09-03-2015sadeedameen@gmail.com
32
Subnet and IP Calculator
 These can be used to unsure a correct IP address selection and with
this a correct IP address configuration
 While this type of tool is used by senior level network engineers, much of
the information obtained from the tool becomes simpler to calculate
the longer and more experience you have in the field
 Two of the more commonly used free IP calculators include
Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced
Subnet Calculator
09-03-2015sadeedameen@gmail.com
33
Subnet and IP Calculator cont
09-03-2015sadeedameen@gmail.com
34
Speedtest.net/pingtest.net
 A very easy test that can be used to both determine the Internet bandwidth
available to a specific host and to determine the quality of an Internet
connection is the use of the tools available at the speedtest.net and
pingtest.net websites
 The speedtest.net site provides the ability to determine the amount of
bandwidth that is available to a specific host at a specific point in time
 This is a good tool to use when measuring how long it is going to take to
upload or download information from a local to remote host
 The pingtest.net website is used to determine the quality of the connection by
measuring the ping response times and jitter amounts over a short period of
time. 09-03-2015sadeedameen@gmail.com
35
Speedtest.net/pingtest.net cont
 This information can be used to determine a likelihood
of how well the measured connection will deal with
certain types of high demand traffic like Voice over IP
(VoIP) or gaming
09-03-2015sadeedameen@gmail.com
36
Speedtest.net/pingtest.net cont
09-03-2015sadeedameen@gmail.com
37
Speedtest.net/pingtest.net cont
09-03-2015sadeedameen@gmail.com
38
Pathping/mtr
 In an effort to take advantage of the benefits of both
the ping and tracert/traceroute commands, the
pathping and mtr utilities were developed
 Both of these tools take the functionality and
information that can be obtained from these types of
tools and provide a more detailed single picture of the
path characteristics from a specific host to a specific
destination
09-03-2015sadeedameen@gmail.com
39
Pathping/mtr->Pathping
09-03-2015sadeedameen@gmail.com
40
Pathping/mtr->mtr
09-03-2015sadeedameen@gmail.com
41
Route
This utility is used to display the current status of the routing table on a host
09-03-2015sadeedameen@gmail.com
42
09-03-2015sadeedameen@gmail.com
43

Contenu connexe

Tendances

Straight&Cross-over cable connection
Straight&Cross-over cable connectionStraight&Cross-over cable connection
Straight&Cross-over cable connectionHoracio Aceveda
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring ToolJoe Shestak
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshootingJerome Luison
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Network design
Network designNetwork design
Network designcsk selva
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systemsrahmanitayulia
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 

Tendances (20)

Straight&Cross-over cable connection
Straight&Cross-over cable connectionStraight&Cross-over cable connection
Straight&Cross-over cable connection
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Ip address
Ip addressIp address
Ip address
 
Network design
Network designNetwork design
Network design
 
Ip address
Ip addressIp address
Ip address
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 

En vedette

Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Sailaja Tennati
 
Organic user interface presentaion
Organic user interface presentaionOrganic user interface presentaion
Organic user interface presentaionSADEED AMEEN
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & MonitoringAWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & MonitoringIan Massingham
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chefkamalikamj
 
Extending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS CloudExtending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS CloudAmazon Web Services
 
Tools Used In PC Hardware Servicing
Tools Used In PC Hardware ServicingTools Used In PC Hardware Servicing
Tools Used In PC Hardware ServicingBrian Mary
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshootingzaisahil
 
Network testing course
Network testing courseNetwork testing course
Network testing coursetcpipguru
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
Strategies in teaching the least mastered skills
Strategies in teaching the least mastered skillsStrategies in teaching the least mastered skills
Strategies in teaching the least mastered skillsCarlo Magno
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshootingsl0wupl0ads
 
Science Intervention materials on science
Science Intervention materials on scienceScience Intervention materials on science
Science Intervention materials on sciencearjeanmedel
 
Module 6.9 tle
Module 6.9 tleModule 6.9 tle
Module 6.9 tleNoel Tan
 
Semi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, CookerySemi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, CookeryQA Ilagan
 
Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)QA Ilagan
 
Use of tools in PC hardware servicing
Use of tools in PC hardware servicingUse of tools in PC hardware servicing
Use of tools in PC hardware servicingCupay Dabu
 

En vedette (20)

Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance
 
Organic user interface presentaion
Organic user interface presentaionOrganic user interface presentaion
Organic user interface presentaion
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & MonitoringAWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chef
 
Extending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS CloudExtending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS Cloud
 
Tools Used In PC Hardware Servicing
Tools Used In PC Hardware ServicingTools Used In PC Hardware Servicing
Tools Used In PC Hardware Servicing
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Mobile App Testing Strategy
Mobile App Testing StrategyMobile App Testing Strategy
Mobile App Testing Strategy
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Strategies in teaching the least mastered skills
Strategies in teaching the least mastered skillsStrategies in teaching the least mastered skills
Strategies in teaching the least mastered skills
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
 
Science Intervention materials on science
Science Intervention materials on scienceScience Intervention materials on science
Science Intervention materials on science
 
Module 6.9 tle
Module 6.9 tleModule 6.9 tle
Module 6.9 tle
 
K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
 
Semi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, CookerySemi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, Cookery
 
Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)
 
Use of tools in PC hardware servicing
Use of tools in PC hardware servicingUse of tools in PC hardware servicing
Use of tools in PC hardware servicing
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Similaire à Network testing and debugging

Log correlation SIEM rule examples and correlation engine performance data
Log correlation SIEM rule examples and correlation engine  performance dataLog correlation SIEM rule examples and correlation engine  performance data
Log correlation SIEM rule examples and correlation engine performance dataErtugrul Akbas
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17redpel dot com
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Jim Kaplan CIA CFE
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdfCSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdfAlNioTarusan
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponseErtugrul Akbas
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET Journal
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit frameworkPawanKesharwani
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDatacomsystemsinc
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadJeannieHeldt
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...Glen Alleman
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxIRJET Journal
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingIRJET Journal
 

Similaire à Network testing and debugging (20)

Log correlation SIEM rule examples and correlation engine performance data
Log correlation SIEM rule examples and correlation engine  performance dataLog correlation SIEM rule examples and correlation engine  performance data
Log correlation SIEM rule examples and correlation engine performance data
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Types of Non Functional Testing
Types of Non Functional TestingTypes of Non Functional Testing
Types of Non Functional Testing
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdfCSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
 
spamzombieppt
spamzombiepptspamzombieppt
spamzombieppt
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit framework
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo download
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
 

Plus de SADEED AMEEN

Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisSADEED AMEEN
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSADEED AMEEN
 
Software process Models
Software process ModelsSoftware process Models
Software process ModelsSADEED AMEEN
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control systemSADEED AMEEN
 
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...SADEED AMEEN
 
Organic User Interface
Organic User InterfaceOrganic User Interface
Organic User InterfaceSADEED AMEEN
 

Plus de SADEED AMEEN (8)

Resume
ResumeResume
Resume
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control system
 
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
 
Tails os
Tails osTails os
Tails os
 
Organic User Interface
Organic User InterfaceOrganic User Interface
Organic User Interface
 

Dernier

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Dernier (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Network testing and debugging

  • 1. Network Testing and Debugging TCP/IP CONCEPTS, WIRING, CONFIGURATING NETWORK, PROTOCOLS S a d e e d A m e e n P O s a d e e d a m e e n @ g m a i l . c o m
  • 2. Testing and Debugging  Testing activity is carried down to find the defect in the network and its configurations.  Identify and remove errors from computer hardware or from network is termed as debugging 09-03-2015sadeedameen@gmail.com 2
  • 3. Possible points of failure  The cable is plugged into the wrong network  Host machine is plugged into the wrong network  Host machine has a bad network card  Machine is offline  The web server may not be running 09-03-2015sadeedameen@gmail.com 3
  • 4. Testing the IP configuration  Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration  The output of this command gives the IP configuration for each interface  a computer with two network cards and one wireless adapter has 3 interfaces each with its own configuration 09-03-2015sadeedameen@gmail.com 4
  • 5. Testing the IP configuration cont  The Ethernet interface connected to the local area network (network card) is not active since the cable is disconnected, but the PPP adapter (MTS) is configured.  Machines on a same network must use a same address range (with different addresses) and a same subnet mask  In the case of a local network, connecting machines that do not have routable IP addresses, so-called private address ranges must be used  The default gateway refers to, when applicable, the IP address of the machine offering internet access. DNS servers  The DNS servers must correspond to the organization's DNS servers; most of the time these are the service provider's DNS servers 09-03-2015sadeedameen@gmail.com 5
  • 6. Testing the connection  To test the proper functioning of a network  Ping utility is a highly practical utility provided as a standard feature with most operating systems.  Ping lets you send a data packet to a network computer and lets you evaluate the response time  ping -t 192.168.0.3 Ping the IP addresses of the network's computers  ping -t Mickey Ping the computer names  Ping –t www.google.com ping a domain name 09-03-2015sadeedameen@gmail.com 6
  • 7. Testing the connection cont 09-03-2015sadeedameen@gmail.com 7
  • 8. Network Testing  Load Testing  Stress Testing  Negative Testing  Inopportune Testing  Conformance/Compliance Testing  Line Speed Testing  Performance Testing  Robustness/Security Testing  Interoperability Testing 09-03-2015sadeedameen@gmail.com 8
  • 9. Load Testing  Load testing is the process of putting demand on a system or device and measuring its response. Load testing is performed to determine a system's behavior under both normal and anticipated peak loadconditions  Where a system can support testing to actual volumes we have a performance testing service to meet your requirements.  Our network testing services provides comprehensive concurrent user simulation of user and system traffic. This can be conducted while concurrently generating threats and attacking traffic at high loads. 09-03-2015sadeedameen@gmail.com 9
  • 10. Stress Testing  Stress testing is a form of deliberately intense or thorough testing used to determine the stability of a given nework.  It involves testing beyond normal operational capacity, often to a breaking point, in order to observe the results  Stress testing is the process of determining the ability of a network or device to maintain a certain level of effectiveness under unfavorable conditions. 09-03-2015sadeedameen@gmail.com 10
  • 11. Stress Testing Actions involved may include:  Running several resource-intensive applications in a single computer at the same time  Attempting to hack into a computer and use it as a zombie to spreadspam  Flooding a server with useless e-mail messages  Making numerous, concurrent attempts to access a single Web site  Attempting to infect a system with viruses, Trojans, spyware or othermalware 09-03-2015sadeedameen@gmail.com 11
  • 12. Negative Testing  Process to verify that the device under test responds correctly to error conditions or unacceptable input conditions.  Negative testing can be challenging because the number of incorrect conditions is unlimited.  Example of a negative test would be using a security protocol for authentication with an incorrect parameter 09-03-2015sadeedameen@gmail.com 12
  • 13. Inopportune Testing  Process to verify that the device under test is able to react properly when an unexpected event occurs  The event is syntactically correct, but occurs when not expected  Inopportune testing is a specific instance of negative protocol conformance testing. 09-03-2015sadeedameen@gmail.com 13
  • 14. Conformance/Compliance Testing  Testing both the capabilities and behavior of an implementation, and checking what is observed against the conformance requirements in the relevant International Standards.(ISO/IEC 9646-1:1994(E))  testing to see if the device under test operates according to that requirement  This is done by creating a series of single function tests for each requirement, resulting in thousands of tests  An example of a conformance test is to check if the “ping” command operates correctly. 09-03-2015sadeedameen@gmail.com 14
  • 15. Line Speed Testing  Process of verifying that a device can operate at its rated line speed, when the bandwidth is 100% utilized or saturated.  process of subjecting the device under test to out of boundary conditions  For example, if the device is rated as operating at 5 Giga bytes per second, then the device should be able to handle incoming traffic utilizing all the available bandwidth 09-03-2015sadeedameen@gmail.com 15
  • 16. Performance Testing  Process of verifying that the performance of the device under test meets an acceptable level  Performance testing is a superset of line speed testing in which performance applies to many aspects of a network device or application, and not just line speed. 09-03-2015sadeedameen@gmail.com 16
  • 17. Robustness/Security Testing  Process of subjecting a device under test to particular input streams  The input streams may be one of three types:  Random input streams  Valid input streams  Invalid input streams  Security testing is more broadly defined to include monitoring / surveillance and the detection of specific exploits like IP spoofing or phishing etc 09-03-2015sadeedameen@gmail.com 17
  • 18. Interoperability Testing  Process of testing devices from multiple manufacturers by interacting in such a manner as to exercise the network protocol under test  Interoperability testing is very useful in the early stages of a new product  As products mature, interoperability testing becomes less valuable as it does not uncover enough new bugs to warrant the cost of setting up, configuring and managing network equipment from various manufacturers. 09-03-2015sadeedameen@gmail.com 18
  • 19. Network Testing and Debugging Penetration testing 09-03-2015sadeedameen@gmail.com 19
  • 20. Penetration testing  Evaluating the security of a network by hacking. Basically, it is an analysis of system for any potential vulnerabilities that may result from any of the following: Poor or improper system configuration Known and / or unknown hardware or software flaws Operational weaknesses in process Technical countermeasures 09-03-2015sadeedameen@gmail.com 20
  • 21. Penetration testing cont Importance of PenetrationTesting:  It prevents financial loss through from hackers or extortionists or disgruntled employees  It prevents financial loss through unreliable business systems and processes  From an operational perspective, penetration testing helps shape information security strategy.  It protects your brand by avoiding loss of consumer confidence and business reputation. 09-03-2015sadeedameen@gmail.com 21
  • 22. Basic Network Troubleshooting Tools Ping  The most commonly used network tool is the ping utility  This utility is used to provide a basic connectivity test between the requesting host and a destination host.  This is done by using the Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host 09-03-2015sadeedameen@gmail.com 22
  • 23. Tracert/traceroute  once the ping utility has been used to determine basic connectivity, the tracert/traceroute utility can used to determine more specific information about the path to the destination host  It includes the route the packet takes and the response time of these intermediate hosts  Tracert for Windows machines and traceroute for Linux/unix based machines 09-03-2015sadeedameen@gmail.com 23
  • 25. Ipconfig/ifconfig  The utilities that can be used to find out this IP configuration information include the ipconfig utility on Windows machines and the ifconfig utility on Linux/unix based machines.  One of the most important things that must be completed when troubleshooting a networking issue is to find out the specific IP configuration of the variously affected hosts 09-03-2015sadeedameen@gmail.com 25
  • 27. Nslookup  Some of the most common networking issues revolve around issues with Dynamic Name System (DNS) address resolution issues.  The nslookup utility can be used to lookup the specific IP address(es) associated with a domain name. If this utility is unable to resolve this information, there is a DNS issue  Along with simple lookup, the nslookup utility is able to query specific DNS servers to determine an issue with the default DNS servers configured on a host 09-03-2015sadeedameen@gmail.com 27
  • 29. Netstat  the current state of the active network connections on a host  It is also possible to use the netstat utility to determine which services on a host that is associated with specific active ports 09-03-2015sadeedameen@gmail.com 29
  • 31. PuTTY/Tera Term  When connecting to a variety of different types of equipment, a telnet, SSH or serial client is required; when this is required both the puTTY and Tera Term programs are able to provide these functionalities.  The selection of one over the other is strictly a personal preference. 09-03-2015sadeedameen@gmail.com 31
  • 33. Subnet and IP Calculator  These can be used to unsure a correct IP address selection and with this a correct IP address configuration  While this type of tool is used by senior level network engineers, much of the information obtained from the tool becomes simpler to calculate the longer and more experience you have in the field  Two of the more commonly used free IP calculators include Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced Subnet Calculator 09-03-2015sadeedameen@gmail.com 33
  • 34. Subnet and IP Calculator cont 09-03-2015sadeedameen@gmail.com 34
  • 35. Speedtest.net/pingtest.net  A very easy test that can be used to both determine the Internet bandwidth available to a specific host and to determine the quality of an Internet connection is the use of the tools available at the speedtest.net and pingtest.net websites  The speedtest.net site provides the ability to determine the amount of bandwidth that is available to a specific host at a specific point in time  This is a good tool to use when measuring how long it is going to take to upload or download information from a local to remote host  The pingtest.net website is used to determine the quality of the connection by measuring the ping response times and jitter amounts over a short period of time. 09-03-2015sadeedameen@gmail.com 35
  • 36. Speedtest.net/pingtest.net cont  This information can be used to determine a likelihood of how well the measured connection will deal with certain types of high demand traffic like Voice over IP (VoIP) or gaming 09-03-2015sadeedameen@gmail.com 36
  • 39. Pathping/mtr  In an effort to take advantage of the benefits of both the ping and tracert/traceroute commands, the pathping and mtr utilities were developed  Both of these tools take the functionality and information that can be obtained from these types of tools and provide a more detailed single picture of the path characteristics from a specific host to a specific destination 09-03-2015sadeedameen@gmail.com 39
  • 42. Route This utility is used to display the current status of the routing table on a host 09-03-2015sadeedameen@gmail.com 42