Free Essay

The Internet Protocol Suite and the Osi Reference Model

In:

Submitted By dessi2010
Words 906
Pages 4
Deserae Caldwell
Ip troubleshooting
The Internet Protocol Suite and the OSI Reference Model

Traceroute
The traceroute utility sends out either ICMP echo request (Windows) or UDP (most implementations) messages with gradually increasing IP TTL values to probe the path by which a packet traverses the network. The first packet with the TTL set to 1 will be discarded by the first hop, and the first hop will send back an ICMP TTL When the machine running the traceroute receives the ICMP TTL exceeded message, it can determine the hop via the source IP address. This continues until the destination is reached. The destination will return either an ICMP echo reply (Windows) or a ICMP port unreachable, indicating that the destination had been reached. Traceroute can return useful information about TCP/IP connectivity across your network Example of traceroute Return Codes | Code | Meaning | Possible Cause(s) | nnmsec | This gives, for each node, the round-trip time (in milliseconds) for the specified number of probes. | This is normal. | * | The probe timed out. | A device along the path either did not receive the probe or did not reply with an ICMP "packet life exceeded" message. | A | Administratively prohibited. | A device along the path, such as a firewall or router, may be blocking the probe and possibly other or all traffic; check access lists. | Q | Source quench. | A device along the path may be receiving to much traffic; check input queues. | H | An ICMP unreachable message has been received. | A routing loop may have occurred. |

Ping command
The ping command sends an ICMP Echo Request message to a destination host. Use Ping whenever you want to verify that a host computer can send IP packets to a destination host. You can also use Ping to isolate network hardware problems and incompatible configurations.

Isolate Host Routing Problems
Step 1 Check the host’s ability to send packets inside its own subnet. Either ping the host’s default gateway IP address from the host, or ping the host’s IP address from the default gateway. If the ping fails, do the following: * a. Ensure that the router’s interface used at the default gateway is in an “up and up” state. * b. Check the source host’s IP address and mask setting as compared to the router’s interface used as the default gateway. Ensure that both agree as to the subnet number and mask, and therefore agree to the range of valid addresses in the subnet. * c. If the router uses VLAN trunking, solve any trunk configuration issues, ensuring that the router is configured to support the same VLAN in which the host resides. * d. If the other steps do not lead to a solution, investigate Layer ½ problems with the LAN, as covered in Chapter 3. For example, look for an undefined VLAN.
Step 2 Verify the default gateway setting on the host by pinging one of the default router’s other interface IP addresses. Or, from the default router, use an extended ping of the host’s IP address with a source address from another of the router’s interfaces.
Step 3 Test connectivity to the destination host by using the extended traceroute command on the host’s default gateway, using the router’s interface attached to the source host for the source IP address of the packets. If the command successfully completes: * a. No routing problems exist in the forward route or reverse route directions. * b. If the end-user traffic still does not work (even though the traceroute worked), troubleshoot any ACLs on each interface on each router in the route, in both directions.
Step 4 If the traceroute command in Step 3 does not complete, test the forward route as follows: * a. telnet to the last traced router (the last router listed in the traceroute command). * b. Find that router’s route that matches the destination IP address that was used in the original traceroute command (show ip route, show ip route ip-address). * c. If no matching route is found, investigate why the expected route is missing. Typically it’s either a routing protocol issue or a static route misconfiguration. It could also be related to a missing connected route. * d. If a matching route is found, and the route is a default route, confirm that it will be used based on the setting for the ip classless/no ip classless commands. * e. If a matching route is found, ping the next-hop IP address listed in the route. Or, if the route is a connected route, ping the true destination IP address. * If the ping fails, investigate Layer 2 problems between this router and the IP address that was pinged, and investigate possible ACL problems. * If the ping works, investigate ACL issues. * f. If a matching route is found, and no other problems are found, confirm that the route is not errantly pointing in the wrong direction.
Step 5 If Step 4 does not identify a problem in the forward route, test the reverse route: * a. If the forward route on the last traced router refers to another router as the next-hop router, repeat the substeps of Step 3 from that nexthop router. Analyze the reverse route—the route to reach the source IP address used by the failed traceroute command. * b. If the forward route on the last traced router refers to a connected subnet, check the destination host’s IP settings. In particular, confirm the settings for the IP address, mask, and default gateway.

Similar Documents

Free Essay

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

Free Essay

Nt1210 Unit 3 Lab 3.3

...exercise 3.3.1 : Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? The four layers of the TCP/IP architecture can be compared to certain levels of the OSI model. It’s important to know what each level of the TCP/IP protocol architecture does, and how these layers map to the OSI model. The Application Layer of the TCP/IP model performs much the same tasks as the Application, Presentation, and Session layers of the OSI model. The Transport layer in the TCP/IP architecture is similar to the Transport layer in the OSI model. This layer can use TCP or UDP as well. The Internetwork layer in the TCP/IP architecture uses IP addresses to determine how packets should be routed. Remember that the OSI model uses IP addresses, or “Layer 3 Addresses”, at the Network layer. The two layers do much the same thing. This layer is also referred to in the TCP/IP model as the Internet layer. The Network Interface layer in the TCP/IP architecture serves to define the protocols and the hardware needed to actually deliver the data across the network. The Network Interface model does the work of both the Data Link and Physical Layers in the OSI model. exercise 3.3.2 : Identify the layer in which each protocol resides according to the TCP/IP model. See the above. exercise 3.3.3 : The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose...

Words: 691 - Pages: 3

Free Essay

System Engineerring Roles in Software Enginerring

...tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol that manages the individual conversations between...

Words: 2390 - Pages: 10

Free Essay

Nt1210 Intro to Networking Lab 3.3

...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services...

Words: 331 - Pages: 2

Free Essay

Essential Protocol

...Essential Network Protocols Modern computer networking leverages many components to enable computers on one network (or opposite side of the world) to communicate with a computer on a different network (or other side of the world). Of the components that enable network communication, there are several in the TCP/IP suite of protocols that work in the background to provide reliable Internet connection and data transport every day for millions of computers worldwide. Internet protocol or IP is an essential component of modern internetwork communication. IP is a connectionless protocol that provides neither fault tolerance nor error correction. It is also not responsible for the setup or teardown of network communications. The primary job assigned to IP is logical addressing and routing as it resides at layer 3 (the Network layer) of the OSI model. While every host on the network has a hardware address (also called a MAC address), hosts can only communicate with other hosts in the same broadcast domain using MAC addressing. For internetwork communication, a logical, unique network address is required so that the devices forwarding network traffic (primarily routers), can determine the source and destination and best route to forward data packets. The ARP or Address Resolution Protocol enables devices on a single network, in a single broadcast domain, to find the hardware or MAC address of a device on the network given the IP address...

Words: 1258 - Pages: 6

Premium Essay

Nt1230

...Yang Lab 3.1 Network Reference Models 3.1.1 1. What would happen if wireless devices were not governed by the WIFI Alliance and each vendor had its own standards and protocol? What impact would this have on your personal life or business communications? If the governed was not WIFI Alliance then each company will lose it customers because if you set a standard in just buying your product then you’re not going to go any farther than just a couple of months in selling them. This will lose interest in buying the product because then I would not know if it is safe or not. Lab 3.1 Review 1 1. Why would a three- layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication? 2. What is the history of the OSI reference model? How did it come about and why was it created? ` 3. What is the history of the TCP/ IP model? Why was it created? TCP/IP has two different names that come from. These key protocols two are usually considered the most important. The internet Protocol is the primary OSI network layer protocol that provides addressing, Datagram routing and other functions in a network. They were developed together with TCP/IP providing the mechanism for implanting the internet. Lab 3.2 the OSI Reference Model 3.2.1 Using Figure 3- 1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or Internet research to support your...

Words: 609 - Pages: 3

Free Essay

Tcp/Ip Osi Model

...TCP/IP OSI MODEL TCP/IPMODEL OS MODEL Eric Jones 1/31/2014 TCP/IP MODEL OS MODEL TCP/IP is a set of protocols that allows communication between to different computers. It separates networking functions into different layers. Each layer has a different task that is similar to another layer or functions. The TCP/IP is a short version of the OS Model it has four layers instead of seven. TCP/IP is the language of how computers communicate with other computers through the internet. TCP/IP is not a single network protocols it’s a suite of protocols. The TCP layer handles the message being sent and breaks it down into small units called packets which are transferred over to the network. The IP layer is most concerned about transmission. By using unique IP addresses assign to every active receiver on the network. TCP/IP combines the OSI application and the presentation layers and supports flexibility in hostnames and also handles Dns errors and mapping domain names. The OSI also known as the reference model it provides a method of standards and protocols which can be compared to assist in other connectivity. Most developers today now use a reference model/OSI Model learn how transmissions are framed and created to translate to other systems. I it begins with the physical layer of the transmitting system and travels through the other layers to the application layer. Once the data reaches the application layer it is processed by the receiving system. In some cases, the...

Words: 379 - Pages: 2

Free Essay

Phase 3 Ip

...Gaddy 09/03/2014 TCP/IP Model- This model IS the internet. That is to say, this is the basis on which the internet, as we know it, was created. That isn’t saying it was the first. The Internet protocol suite(TCP/IP) was introduced in 1982 as the standard networking protocol on ARPNET. In March of 1982, the Department of Defense adopted TCP/IP as the standard for military computer networking. Layers- Compared to the Open Systems Interconnection (OSI) model, the TCP/IP model has fewer layers. It uses encapsulation to provide abstraction of protocols and services. The Application layer is at the top and is logically closer to the user. This is where applications create the user data and communicate that data to other applications. The Transport layer provides the host to host communications, creating a channel for the communication needs of the applications. The Internet layer is where the datagrams are exchanged across the network. The Link layer serves to define the networking method, and includes the protocols describing the network topology. Now, compare this with the Open Systems Interconnection (OSI) model and its seven layers, wherein each layer facilitates the needs of the layer above it, while calling on the next layer below it. This model evolved from work with ARPNET, as well. This chart shows the four layers of the TCP/IP model, showing the basic flow of information from user, via applications, to another user. I like this model for its simplicity in form and...

Words: 513 - Pages: 3

Premium Essay

Nt1210 Unit 3 Assignment 1

...apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet and PPP. C. Data-link protocols define addresses that identify devices connected to the underlying physical link. 18. D. None of the answers is correct. 19. D. None of the answers is correct. 20. A. Data-link header B. Network layer header C. Transport layer header TCP/IP network: Short for Transmission Control Protocol/Internet Protocol....

Words: 699 - Pages: 3

Premium Essay

Cryptograph6Y

...Cryptographic Tunneling and OSI Model Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized users. (Summer, 2004) With the explosion of the World Wide Web and the need to connect various secure private networks to it, it is vital to protect private data from exploitation when it reaches the public networks for transmission. At the heart of the networks through which the information flows is the Open Systems Interconnection (OSI) model. Various techniques are used with respect to the OSI model that helps the data to be transmitted more securely during network transmissions. One of these techniques is Cryptographic tunneling. Cryptographic tunneling operates at the transport layer and network layer of the OSI model. Cryptographic tunneling is primarily used in VPNs or the Virtual Private Networks to add additional security to the data that is flowing through these networks.  A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. (Mason, 2002) The sender’s authentication, confidentiality of data and hiding the contents of the message is made possible using cryptographic tunneling. When we need data from private businesses to be transmitted through public networks, we make use of tunneling where the public network routing nodes are unaware of the transmission being part of private network. Hiding the packets to make them seem as if they were just like...

Words: 669 - Pages: 3

Premium Essay

Nt1310 Unit 7 Protocol And Standards

...Protocols and standards TCP/IP TCP/IP is a suite of communication protocols which are used to interconnect device on the networks to the internet. This can also be made into a private connection as an intranet. This protocol specifies how data is exchanged using the internet which provides end to end connections. This will then determine how the exchange items should be broken into packets, transmitted, received, routed and addressed to a destination. TCP/IP doesn’t need much central management with the ability to recover if any device on the network were to fail and is also designed in order to make a network much more reliable. There are two parts to this protocol, TCP and IP. The TCP shows how application are able to make different channels of communication in a...

Words: 1544 - Pages: 7

Premium Essay

Chapter 3 Labs Intro to Networking

...networks would only work for certain devices. 3.1.2 IBM Information Framework, a reference model for financial services makes banking operations easy for the end user. 3.1.3 Physical, data link, network, and transport 3.1.4 If a model is too detailed or to general many important details or program features can be missed or lost. It can also make a program harder to work with certain devices or other programs. 3.1 review 1. Because it doesn’t tell you how it will be transported or how it will be presented. 2. It is a communication model for the internet to standardize comms between networks. 3. It was created to simplify how data is formatted and transmitted on the internet. 3.2.1 The physical layer- defines the physical setup of the osi model. Data link- provides a reliable link between nodes Network- provides the functional and procedural means of transferring variable length data sequences (called datagrams) from one node to another connected to the same network The transport layer- provides the reliable sending of data packets between nodes (with addresses) located on a network, providing reliable data transfer services to the upper layers The session layer controls the dialogues (connections) between computers. The presentation layer establishes context between application-layer entities. The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. ...

Words: 775 - Pages: 4

Premium Essay

Protocols

...STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP) AND PROVIDED THE STANDARD FOR IMPLEMENTING THE INTERNET AND CONTINUES TO ENVOLVE MEETING STANDARDS BY THE INTERNET AND PRIVATE NETWORKS...

Words: 996 - Pages: 4

Premium Essay

Myself

...------------------------------------------------- OSI model From Wikipedia, the free encyclopedia OSI model | 7. Application Layer | NNTP  · SIP  · SSI  · DNS  · FTP  · Gopher · HTTP  · NFS  · NTP  · SMPP  · SMTP  ·DHCP  · SNMP  · Telnet  · Netconf  ·(more) | 6. Presentation Layer | MIME  · XDR  · TLS  · SSL | 5. Session Layer | Named Pipes  · NetBIOS  · SAP  · L2TP  ·PPTP | 4. Transport Layer | TCP  · UDP  · SCTP  · DCCP  · SPX | 3. Network Layer | IP (IPv4, IPv6)  · ICMP  · IPsec  · IGMP  ·IPX  · AppleTalk | 2. Data Link Layer | ATM  · SDLC  · HDLC  · ARP  · CSLIP  ·SLIP  · PLIP  · IEEE 802.3  · Frame Relay · ITU-T G.hn DLL  · PPP  · X.25 | 1. Physical Layer | EIA/TIA-232  · EIA/TIA-449  · ITU-T V-Series  · I.430  · I.431  · POTS  · PDH  ·SONET/SDH  · PON  · OTN  · DSL  ·IEEE 802.3  · IEEE 802.11  · IEEE 802.15 · IEEE 802.16  · IEEE 1394  · ITU-T G.hn PHY  · USB  · Bluetooth · Blue | This box: view · talk · edit | The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides...

Words: 3915 - Pages: 16

Premium Essay

Switch Configuration

...is responsible for access of the internet for a small business that is located near them. By the use of a small Tier3 they are able to do this. An ISP (Internet Service Provider) is a firm that provides internet to its subscribers that pay them a small fee for their access. In most cases ISP’s mainly focus on DSL, Cable modem, wireless and more recently, dedicated high speed interconnects such as Teir1 or fiber optics. In this case the ISP that I am helping is using a Teir3 meaning that they are only providing transit from other networks to reach the internet. There are three different ISP Tiers Tier1, Tier2 and Tier3; Tier1 is an ISP that has access to the entire Internet Region routing table only through its settlement-free peering relationships (DrPeering, 2013); A Tier2 ISP that purchases transit to reach destinations within an Internet Region (DrPeering , 2013). The basic requirements to run an ISP is having a solid backbone T1, 2 or 3; you will also need an Ethernet switch, an upstream router, a remote access server, and a local server for DNS and RADIUS (Patton Electronics, 2009). There are network layers associated ISP which consist of the Application Layer (Telnet, HTTP, FTP, SMTP), Transport Layer (TCP, UDP), Network Layer (IP), and the Physical Layer (Ethernet, X25, Token Ring). The application layer is reserved for communication protocols and methods designed for process to process communications across an IP (Internet Protocol) computer network. The Transport...

Words: 513 - Pages: 3