计算机网络实验一

常用网络命令的使用及Wireshark 的简单使用 目的:熟悉ping 、ipconfig 、netstat 、tracert 、arp 等命令的使用;了解真实环境下的网络通信过程;Wireshark

常用网络命令的使用及Wireshark 的简单使用 目的:

熟悉ping 、ipconfig 、netstat 、tracert 、arp 等命令的使用;

了解真实环境下的网络通信过程;

Wireshark 实验工具安装,以HTTP 协议为例简单使用Wireshark 。

实验步骤:

一.常用网络命令的使用

1. ping 命令

ping 是一个测试程序,如果ping 运行正确,你大体上就可以排除网络访问层、网卡、modem 的输入输出线路、电缆和路由器等存在的故障,从而减小了问题的范围。 基本用法: Ping IP 地址,如下:

使用ping 命令来查找问题所在或检验网络运行情况的典型次序:

ping 127.0.0.1

ping 本机ip (断掉网线后结果?)

ping 局域网内其他ip

ping 网关ip

ping 远程ip

Ping 域名

ping ip -t——连续对ip 地址执行ping 命令,直到被用户以ctrl c中断。

,

ping ip -l 2000——指定ping 命令中的数据长度为2000字节,而不是缺省的32字节。 ping ip -n——执行特定次数的ping 命令。

2. ipconfig 命令

该命令用于检查网络TCP/IP配置的信息, 如IP 地址、MAC 地址、DNS 等。

ipconfig 、ipconfig /all、ipconfig /renew、ipconfig /release等

3. netstat 命令

该命令用户显示各协议相关的统计及数据,一般用于检查本地主机的各个端口的网络连接情况。

,

不同种类:

netstat –r 显示网络各种通信协议的状态

netstat –E 显示以太网层的数据统计情况

netstat –A 显示网络中有效连接的信息

netstat –N 显示所有已经建立的连接

4. tracert 命令

该命令用于检查由本地主机到目标主机所经历的路由信息。

5. arp 命令

arp 命令显示和修改地址解析协议(ARP )缓存中的项目。

,

二. W ireshark 的简单使用

1. wireshark 下载安装

软件下载地址:https://www.wireshark.org/download.html Wireshark 使用教程: 安装流程:

1. 下载时选择与实验机器型号对应的版本

2. 打开wireshark 安装程序

3. 按照默认设置完成安装

,

2. Wireshark 的简单使用: Http 协议分析(详细流程见英文文档:Wireshark_HTTP_v6.1.pdf)

在这部分中,我们将以Http 协议为例,学习掌握Wireshark 的简单使用,探讨HTTP 协议的几个方面:基本/响应交互,HTTP 消息格式,检索大型HTML 文件,检索HTML 文件嵌入对象,HTTP 身份验证和安全。

过程和细节:

1. 基本的HTTP 请求/响应:

a. 启动Web 浏览器;

b. 启动Wireshark 的数据包嗅探器,然后输入“http ”(不带引号);

c. 稍等片刻,然后开始捕获Wireshark 的数据包;

d. 在浏览器输入以下网址;

e. 停止Wireshark 捕获数据包,wireshark 获取数据如下图:

2. HTTP 条件请求/响应(file2)

a. 启动网页浏览器,并确保浏览器的缓存清零;

b. 启动Wireshark 的数据包嗅探器;

c. 输入以下网址到浏览器

d. 再次快速输入相同的URL 到您的浏览器(或只需选择浏览器上的刷新按钮): e. 停止Wireshark 的数据包捕获,并在显示过滤器规格窗口输入“http ”。

,

3. 检索长文档(file3):

a. 启动Web 浏览器,并确保浏览器的缓存清零;

b. 启动Wireshark 的数据包嗅探器;

c. 输入以下网址到浏览器

d. 停止Wireshark 的数据包捕获,并在显示过滤器规格窗口输入“http ”,所以只捕

获HTTP 信息将被显示出来。

4. 嵌入对像的HTML 文档(file4):

a. 启动网页浏览器,并确保浏览器的缓存清零;

b. 启动Wireshark 的数据包嗅探器;

c. 输入以下网址到浏览器

d. 停止Wireshark 捕获数据包,并在显示过滤器规格窗口输入“http ”,以至于只显

示捕获的HTTP 信息。

5. HTTP 认证(file5)

a. 确保浏览器的缓存清零,并关闭浏览器。然后,启动浏览器;

b. 启动Wireshark 的数据包嗅探器;

c. 输入以下网址到浏览器: 在弹出框键入要求的用户名和密码。用户名是“wireshark-students ”,密码为“network ”;

d. 停止Wireshark 的数据包捕获,并在显示过滤器窗口输入“http ”,确保只有捕获

的HTTP 消息在分组列表窗口显示。

实验结果检查(实验课结束前完成):

1. 单独演示常用网络命令;

2. 检查wireshark 安装情况及基本操作;

3. 演示Http 协议抓包分析的操作流程;

4. 1人1组,上交实验报告;

5. 实验报告回答Http 协议指导书的问题(附件Wireshark_HTTP_v6.1.pd红色标记)

,

附件:

Wireshark Lab: HTTP v6.1

Supplement to Computer Networking: A Top-Down

Approach, 6th ed., J.F. Kurose and K.W. Ross

“Tell me and I forget. Show me and I remember. Involve me

and I understand.” Chinese proverb

© 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved

Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we’re now ready to use Wireshark to investigate protocols in operation. In this lab, we’ll explore several aspects of the HTTP protocol: the basic GET/response interaction, HTTP message formats, retrieving large HTML files, retrieving HTML files with embedded objects, and HTTP authentication and security. Before beginning these labs, you might want to review Section 2.2 of the text.1

1. The Basic HTTP GET/response interaction

Let’s begin our exploration of HTTP by downloading a very simple HTML file - one that is very short, and contains no embedded objects. Do the following:

1. Start up your web browser.

2. Start up the Wireshark packet sniffer, as described in the Introductory lab (but don’t yet

begin packet capture). Enter “http” (just the letters, not the quotation marks) in the display-filter-specification window, so that only captured HTTP messages will be

displayed later in the packet-listing window. (We’re only interested in the HTTP

protocol here, and don’t want to see the clutter of all captured packets).

3. Wait a bit more than one minute (we’ll see why shortly), and then begin Wireshark

packet capture. 1 References to figures and sections are for the 6th edition of our text, Computer Networks, A Top-down Approach, 6th ed., J.F. Kurose and K.W. Ross, Addison-Wesley/Pearson, 2012.

,

4. Enter the following to your browser

Your browser should display the very simple, one-line HTML file.

5. Stop Wireshark packet capture.

Your Wireshark window should look similar to the window shown in Figure 1. If you are unable to run Wireshark on a live network connection, you can download a packet trace that was created when the steps above were followed.2

Figure 1: Wireshark Display after http://gaia.cs.umass.edu/wireshark-labs/

HTTP-wireshark-file1.html has been retrieved by your browser

The example in Figure 1 shows in the packet-listing window that two HTTP messages were captured: the GET message (from your browser to the gaia.cs.umass.edu web server) and the response message from the server to your browser. The packet-contents window shows details of the selected message (in this case the HTTP OK message, which is highlighted in the packet-listing window). Recall that since the HTTP message was carried inside a TCP segment, which was carried inside an IP datagram, which was carried within an Ethernet frame, Wireshark displays the Frame, Ethernet, IP, and TCP packet information as well. We want to minimize the 2 Download the zip file and extract the file http-ethereal-trace-1. The traces in this zip file were collected by Wireshark running on one of the author’s computers, while performing the steps indicated in the Wireshark lab. Once you have

downloaded the trace, you can load it into Wireshark and view the trace using the File pull down menu, choosing Open , and then selecting the http-ethereal-trace-1 trace file. The resulting display should look similar to Figure 1. (The Wireshark user interface displays just a bit differently on different

operating systems, and in different versions of Wireshark).

,

amount of non-HTTP data displayed (we’re interested in HTTP here, and will be investigating these other protocols is later labs), so make sure the boxes at the far left of the Frame, Ethernet, IP and TCP information have a plus sign or a right-pointing triangle (which means there is hidden, undisplayed information), and the HTTP line has a minus sign or a down-pointing triangle (which means that all information about the HTTP message is displayed).

(Note: You should ignore any HTTP GET and response for favicon.ico. If you see a reference to this file, it is your browser automatically asking the server if it (the server) has a small icon file that should be displayed next to the displayed URL in your browser. We’ll ignore references to this pesky file in this lab.).

By looking at the information in the HTTP GET and response messages, answer the following questions. When answering the following questions, you should print out the GET and response messages (see the introductory Wireshark lab for an explanation of how to do this) and indicate where in the message you’ve found the information that answers the following questions. When you hand in your assignment, annotate the output so that it’s clear where in the output you’re getting the information for your answer (e.g., for our classes, we ask that students markup paper copies with a pen, or annotate electronic copies with text in a colored font).

1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server

running?

2. What languages (if any) does your browser indicate that it can accept to the server?

3. What is the IP address of your computer? Of the gaia.cs.umass.edu server?

4. What is the status code returned from the server to your browser?

5. When was the HTML file that you are retrieving last modified at the server?

6. How many bytes of content are being returned to your browser?

7. By inspecting the raw data in the packet content window, do you see any headers within

the data that are not displayed in the packet-listing window? If so, name one.

In your answer to question 5 above, you might have been surprised to find that the document you just retrieved was last modified within a minute before you downloaded the document. That’s because (for this particular file), the gaia.cs.umass.edu server is setting the file’s last-modified time to be the current time, and is doing so once per minute. Thus, if you wait a minute between accesses, the file will appear to have been recently modified, and hence your browser will download a “new” copy of the document.

2. The HTTP CONDITIONAL GET/response interaction

Recall from Section 2.2.6 of the text, that most web browsers perform object caching and thus perform a conditional GET when retrieving an HTTP object. Before performing the steps below, make sure your browser’s cache is empty. (To do this under Firefox, select Tools->Clear Recent History and check the Cache box, or for Internet Explorer, select Tools->Internet Options->Delete File; these actions will remove cached files from your browser’s cache.) Now do the following:

,

∙ Start up your web browser, and make sure your browser’s cache is cleared, as discussed

above.

∙ Start up the Wireshark packet sniffer

∙ Enter the following URL into your browser

Your browser should display a very simple five-line HTML file.

∙ Quickly enter the same URL into your browser again (or simply select the refresh button

on your browser)

∙ Stop Wireshark packet capture, and enter “http” in the display-filter-specification

window, so that only captured HTTP messages will be displayed later in the packet-listing window.

∙ (Note: If you are unable to run Wireshark on a live network connection, you can use

the http-ethereal-trace-2 packet trace to answer the questions below; see footnote 1. This trace file was gathered while performing the steps above on one of the author’s

computers.)

Answer the following questions:

8. Inspect the contents of the first HTTP GET request from your browser to the server. Do

you see an “IF-MODIFIED-SINCE” line in the HTTP GET?

9. Inspect the contents of the server response. Did the server explicitly return the contents

of the file? How can you tell?

10. Now inspect the contents of the second HTTP GET request from your browser to the

server . Do you see an “IF-MODIFIED-SINCE:” line in the HTTP GET? If so, what

information follows the “IF-MODIFIED-SINCE:” header?

11. What is the HTTP status code and phrase returned from the server in response to this

second HTTP GET? Did the server explicitly return the contents of the file? Explain.

3. Retrieving Long Documents

In our examples thus far, the documents retrieved have been simple and short HTML files. Let’s next see what happens when we download a long HTML file. Do the following:

∙ Start up your web browser, and make sure your browser’s cache is cleared, as discussed

above.

∙ Start up the Wireshark packet sniffer

∙ Enter the following URL into your browser

Your browser should display the rather lengthy US Bill of Rights.

∙ Stop Wireshark packet capture, and enter “http” in the display-filter-specification

window, so that only captured HTTP messages will be displayed.

∙ (Note: If you are unable to run Wireshark on a live network connection, you can use

the http-ethereal-trace-3 packet trace to answer the questions below; see footnote 1.

标签: