SlideShare a Scribd company logo
Network Testing and
Debugging
TCP/IP CONCEPTS, WIRING, CONFIGURATING NETWORK, PROTOCOLS
S a d e e d A m e e n P O
s a d e e d a m e e n @ g m a i l . c o m
Testing and Debugging
 Testing activity is carried down to find the
defect in the network and its configurations.
 Identify and remove errors from computer
hardware or from network is termed as
debugging
09-03-2015sadeedameen@gmail.com
2
Possible points of failure
 The cable is plugged into the wrong network
 Host machine is plugged into the wrong network
 Host machine has a bad network card
 Machine is offline
 The web server may not be running
09-03-2015sadeedameen@gmail.com
3
Testing the IP configuration
 Windows systems offer a command-line tool,
called ipconfig, that lets you find out your
computer's IP configuration
 The output of this command gives the IP
configuration for each interface
 a computer with two network cards and one
wireless adapter has 3 interfaces each with its
own configuration
09-03-2015sadeedameen@gmail.com
4
Testing the IP configuration cont
 The Ethernet interface connected to the local area network (network card) is not
active since the cable is disconnected, but the PPP adapter (MTS) is configured.
 Machines on a same network must use a same address range (with different
addresses) and a same subnet mask
 In the case of a local network, connecting machines that do not have routable
IP addresses, so-called private address ranges must be used
 The default gateway refers to, when applicable, the IP address of the machine
offering internet access. DNS servers
 The DNS servers must correspond to the organization's DNS servers; most of the
time these are the service provider's DNS servers
09-03-2015sadeedameen@gmail.com
5
Testing the connection
 To test the proper functioning of a network
 Ping utility is a highly practical utility provided as a standard feature
with most operating systems.
 Ping lets you send a data packet to a network computer and lets
you evaluate the response time
 ping -t 192.168.0.3 Ping the IP addresses of the network's computers
 ping -t Mickey Ping the computer names
 Ping –t www.google.com ping a domain name
09-03-2015sadeedameen@gmail.com
6
Testing the connection cont
09-03-2015sadeedameen@gmail.com
7
Network Testing
 Load Testing
 Stress Testing
 Negative Testing
 Inopportune Testing
 Conformance/Compliance Testing
 Line Speed Testing
 Performance Testing
 Robustness/Security Testing
 Interoperability Testing 09-03-2015sadeedameen@gmail.com
8
Load Testing
 Load testing is the process of putting demand on a system or device
and measuring its response. Load testing is performed to determine a
system's behavior under both normal and anticipated
peak loadconditions
 Where a system can support testing to actual volumes we have a
performance testing service to meet your requirements.
 Our network testing services provides comprehensive concurrent user
simulation of user and system traffic. This can be conducted while
concurrently generating threats and attacking traffic at high loads.
09-03-2015sadeedameen@gmail.com
9
Stress Testing
 Stress testing is a form of deliberately intense or thorough
testing used to determine the stability of a given nework.
 It involves testing beyond normal operational capacity,
often to a breaking point, in order to observe the results
 Stress testing is the process of determining the ability of a
network or device to maintain a certain level of
effectiveness under unfavorable conditions.
09-03-2015sadeedameen@gmail.com
10
Stress Testing
Actions involved may include:
 Running several resource-intensive applications in a single computer at
the same time
 Attempting to hack into a computer and use it as a zombie to
spreadspam
 Flooding a server with useless e-mail messages
 Making numerous, concurrent attempts to access a single Web site
 Attempting to infect a system with viruses, Trojans, spyware or
othermalware
09-03-2015sadeedameen@gmail.com
11
Negative Testing
 Process to verify that the device under test responds
correctly to error conditions or unacceptable input
conditions.
 Negative testing can be challenging because the
number of incorrect conditions is unlimited.
 Example of a negative test would be using a security
protocol for authentication with an incorrect parameter
09-03-2015sadeedameen@gmail.com
12
Inopportune Testing
 Process to verify that the device under test is able to
react properly when an unexpected event occurs
 The event is syntactically correct, but occurs when not
expected
 Inopportune testing is a specific instance of negative
protocol conformance testing.
09-03-2015sadeedameen@gmail.com
13
Conformance/Compliance Testing
 Testing both the capabilities and behavior of an implementation, and
checking what is observed against the conformance requirements in the
relevant International Standards.(ISO/IEC 9646-1:1994(E))
 testing to see if the device under test operates according to that
requirement
 This is done by creating a series of single function tests for each
requirement, resulting in thousands of tests
 An example of a conformance test is to check if the “ping” command
operates correctly.
09-03-2015sadeedameen@gmail.com
14
Line Speed Testing
 Process of verifying that a device can operate at its rated
line speed, when the bandwidth is 100% utilized or saturated.
 process of subjecting the device under test to out of
boundary conditions
 For example, if the device is rated as operating at 5 Giga
bytes per second, then the device should be able to handle
incoming traffic utilizing all the available bandwidth
09-03-2015sadeedameen@gmail.com
15
Performance Testing
 Process of verifying that the performance of the
device under test meets an acceptable level
 Performance testing is a superset of line speed
testing in which performance applies to many
aspects of a network device or application,
and not just line speed.
09-03-2015sadeedameen@gmail.com
16
Robustness/Security Testing
 Process of subjecting a device under test to particular input streams
 The input streams may be one of three types:
 Random input streams
 Valid input streams
 Invalid input streams
 Security testing is more broadly defined to include monitoring /
surveillance and the detection of specific exploits like IP spoofing or
phishing etc
09-03-2015sadeedameen@gmail.com
17
Interoperability Testing
 Process of testing devices from multiple manufacturers by interacting
in such a manner as to exercise the network protocol under test
 Interoperability testing is very useful in the early stages of a new
product
 As products mature, interoperability testing becomes less valuable as
it does not uncover enough new bugs to warrant the cost of setting
up, configuring and managing network equipment from various
manufacturers.
09-03-2015sadeedameen@gmail.com
18
Network Testing and Debugging
Penetration testing
09-03-2015sadeedameen@gmail.com
19
Penetration testing
 Evaluating the security of a network by hacking.
Basically, it is an analysis of system for any potential
vulnerabilities that may result from any of the following:
Poor or improper system configuration
Known and / or unknown hardware or software
flaws
Operational weaknesses in process
Technical countermeasures
09-03-2015sadeedameen@gmail.com
20
Penetration testing cont
Importance of PenetrationTesting:
 It prevents financial loss through from hackers or extortionists or
disgruntled employees
 It prevents financial loss through unreliable business systems and
processes
 From an operational perspective, penetration testing helps shape
information security strategy.
 It protects your brand by avoiding loss of consumer confidence
and business reputation.
09-03-2015sadeedameen@gmail.com
21
Basic Network Troubleshooting Tools
Ping
 The most commonly used network tool is the ping utility
 This utility is used to provide a basic connectivity test between the
requesting host and a destination host.
 This is done by using the Internet Control Message Protocol (ICMP)
which has the ability to send an echo packet to a destination host
and a mechanism to listen for a response from this host
09-03-2015sadeedameen@gmail.com
22
Tracert/traceroute
 once the ping utility has been used to determine basic
connectivity, the tracert/traceroute utility can used to determine
more specific information about the path to the destination host
 It includes the route the packet takes and the response time of
these intermediate hosts
 Tracert for Windows machines and traceroute for Linux/unix
based machines
09-03-2015sadeedameen@gmail.com
23
Tracert/traceroute cont
09-03-2015sadeedameen@gmail.com
24
Ipconfig/ifconfig
 The utilities that can be used to find out this IP configuration
information include the ipconfig utility on Windows machines and
the ifconfig utility on Linux/unix based machines.
 One of the most important things that must be completed when
troubleshooting a networking issue is to find out the specific IP
configuration of the variously affected hosts
09-03-2015sadeedameen@gmail.com
25
Ipconfig/ifconfig cont
09-03-2015sadeedameen@gmail.com
26
Nslookup
 Some of the most common networking issues revolve around issues with
Dynamic Name System (DNS) address resolution issues.
 The nslookup utility can be used to lookup the specific IP address(es)
associated with a domain name. If this utility is unable to resolve this
information, there is a DNS issue
 Along with simple lookup, the nslookup utility is able to query specific
DNS servers to determine an issue with the default DNS servers
configured on a host
09-03-2015sadeedameen@gmail.com
27
Nslookup cont
09-03-2015sadeedameen@gmail.com
28
Netstat
 the current state of the active network
connections on a host
 It is also possible to use the netstat utility to
determine which services on a host that is
associated with specific active ports
09-03-2015sadeedameen@gmail.com
29
09-03-2015sadeedameen@gmail.com
30
PuTTY/Tera Term
 When connecting to a variety of different types of
equipment, a telnet, SSH or serial client is required; when
this is required both the puTTY and Tera Term programs are
able to provide these functionalities.
 The selection of one over the other is strictly a personal
preference.
09-03-2015sadeedameen@gmail.com
31
PuTTY/Tera Term cont
09-03-2015sadeedameen@gmail.com
32
Subnet and IP Calculator
 These can be used to unsure a correct IP address selection and with
this a correct IP address configuration
 While this type of tool is used by senior level network engineers, much of
the information obtained from the tool becomes simpler to calculate
the longer and more experience you have in the field
 Two of the more commonly used free IP calculators include
Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced
Subnet Calculator
09-03-2015sadeedameen@gmail.com
33
Subnet and IP Calculator cont
09-03-2015sadeedameen@gmail.com
34
Speedtest.net/pingtest.net
 A very easy test that can be used to both determine the Internet bandwidth
available to a specific host and to determine the quality of an Internet
connection is the use of the tools available at the speedtest.net and
pingtest.net websites
 The speedtest.net site provides the ability to determine the amount of
bandwidth that is available to a specific host at a specific point in time
 This is a good tool to use when measuring how long it is going to take to
upload or download information from a local to remote host
 The pingtest.net website is used to determine the quality of the connection by
measuring the ping response times and jitter amounts over a short period of
time. 09-03-2015sadeedameen@gmail.com
35
Speedtest.net/pingtest.net cont
 This information can be used to determine a likelihood
of how well the measured connection will deal with
certain types of high demand traffic like Voice over IP
(VoIP) or gaming
09-03-2015sadeedameen@gmail.com
36
Speedtest.net/pingtest.net cont
09-03-2015sadeedameen@gmail.com
37
Speedtest.net/pingtest.net cont
09-03-2015sadeedameen@gmail.com
38
Pathping/mtr
 In an effort to take advantage of the benefits of both
the ping and tracert/traceroute commands, the
pathping and mtr utilities were developed
 Both of these tools take the functionality and
information that can be obtained from these types of
tools and provide a more detailed single picture of the
path characteristics from a specific host to a specific
destination
09-03-2015sadeedameen@gmail.com
39
Pathping/mtr->Pathping
09-03-2015sadeedameen@gmail.com
40
Pathping/mtr->mtr
09-03-2015sadeedameen@gmail.com
41
Route
This utility is used to display the current status of the routing table on a host
09-03-2015sadeedameen@gmail.com
42
09-03-2015sadeedameen@gmail.com
43

More Related Content

What's hot

Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
Joy Sarker
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Tumennast Erdenebold
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
Fahd Allebdi
 
Lecture 1: CompTIA A+ Certification
Lecture 1: CompTIA A+ CertificationLecture 1: CompTIA A+ Certification
Lecture 1: CompTIA A+ Certification
S. M. Ali Murtazawi
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
Abenezer Abiti
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6mlrbrown
 
Router configuration
Router configurationRouter configuration
Router configuration
ChoyonBonik
 
CSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGCSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSING
Marvin Bronoso
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
Marvin Bronoso
 
Network servers
Network serversNetwork servers
Network servers
Online
 
Network Cable Splicing LP
Network Cable Splicing LPNetwork Cable Splicing LP
Network Cable Splicing LP
Anacrissa Soriano
 
Router and types
Router and types Router and types
Router and types
Qazafie Mehrzad
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
EILLEN IVY PORTUGUEZ
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)
Melchor Maravillas
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
Von Alvarez
 

What's hot (20)

Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Lecture 1: CompTIA A+ Certification
Lecture 1: CompTIA A+ CertificationLecture 1: CompTIA A+ Certification
Lecture 1: CompTIA A+ Certification
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
 
Router configuration
Router configurationRouter configuration
Router configuration
 
CSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGCSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSING
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
 
Network servers
Network serversNetwork servers
Network servers
 
Network Cable Splicing LP
Network Cable Splicing LPNetwork Cable Splicing LP
Network Cable Splicing LP
 
Router and types
Router and types Router and types
Router and types
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
basic networking
basic networkingbasic networking
basic networking
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 

Viewers also liked

Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance
Sailaja Tennati
 
Organic user interface presentaion
Organic user interface presentaionOrganic user interface presentaion
Organic user interface presentaion
SADEED AMEEN
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Savvius, Inc
 
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & MonitoringAWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
Ian Massingham
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chefkamalikamj
 
Extending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS CloudExtending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS Cloud
Amazon Web Services
 
Tools Used In PC Hardware Servicing
Tools Used In PC Hardware ServicingTools Used In PC Hardware Servicing
Tools Used In PC Hardware Servicing
Brian Mary
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
Kak Yong
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
zaisahil
 
Network testing course
Network testing courseNetwork testing course
Network testing course
tcpipguru
 
Mobile App Testing Strategy
Mobile App Testing StrategyMobile App Testing Strategy
Mobile App Testing Strategy
Software Assurance LLC
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
SolarWinds
 
Strategies in teaching the least mastered skills
Strategies in teaching the least mastered skillsStrategies in teaching the least mastered skills
Strategies in teaching the least mastered skillsCarlo Magno
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
sl0wupl0ads
 
Science Intervention materials on science
Science Intervention materials on scienceScience Intervention materials on science
Science Intervention materials on sciencearjeanmedel
 
Module 6.9 tle
Module 6.9 tleModule 6.9 tle
Module 6.9 tle
Noel Tan
 
K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
Dr. Joy Kenneth Sala Biasong
 
Semi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, CookerySemi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, Cookery
QA Ilagan
 
Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)QA Ilagan
 
Use of tools in PC hardware servicing
Use of tools in PC hardware servicingUse of tools in PC hardware servicing
Use of tools in PC hardware servicing
Cupay Dabu
 

Viewers also liked (20)

Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance
 
Organic user interface presentaion
Organic user interface presentaionOrganic user interface presentaion
Organic user interface presentaion
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & MonitoringAWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chef
 
Extending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS CloudExtending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS Cloud
 
Tools Used In PC Hardware Servicing
Tools Used In PC Hardware ServicingTools Used In PC Hardware Servicing
Tools Used In PC Hardware Servicing
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Mobile App Testing Strategy
Mobile App Testing StrategyMobile App Testing Strategy
Mobile App Testing Strategy
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Strategies in teaching the least mastered skills
Strategies in teaching the least mastered skillsStrategies in teaching the least mastered skills
Strategies in teaching the least mastered skills
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
 
Science Intervention materials on science
Science Intervention materials on scienceScience Intervention materials on science
Science Intervention materials on science
 
Module 6.9 tle
Module 6.9 tleModule 6.9 tle
Module 6.9 tle
 
K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
 
Semi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, CookerySemi Detailed Lesson Plan in T.L.E, Cookery
Semi Detailed Lesson Plan in T.L.E, Cookery
 
Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)Lesson plan in TLE I (Grade 7)
Lesson plan in TLE I (Grade 7)
 
Use of tools in PC hardware servicing
Use of tools in PC hardware servicingUse of tools in PC hardware servicing
Use of tools in PC hardware servicing
 

Similar to Network testing and debugging

Log correlation SIEM rule examples and correlation engine performance data
Log correlation SIEM rule examples and correlation engine  performance dataLog correlation SIEM rule examples and correlation engine  performance data
Log correlation SIEM rule examples and correlation engine performance data
Ertugrul Akbas
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Types of Non Functional Testing
Types of Non Functional TestingTypes of Non Functional Testing
Types of Non Functional Testing
iFour Technolab Pvt. Ltd.
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
redpel dot com
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
Jim Kaplan CIA CFE
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdfCSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
AlNioTarusan
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET Journal
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit framework
PawanKesharwani
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
Datacomsystemsinc
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo download
JeannieHeldt
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Glen Alleman
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
ManageEngine, Zoho Corporation
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
IRJET Journal
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
Amy McMullin
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
IRJET Journal
 

Similar to Network testing and debugging (20)

Log correlation SIEM rule examples and correlation engine performance data
Log correlation SIEM rule examples and correlation engine  performance dataLog correlation SIEM rule examples and correlation engine  performance data
Log correlation SIEM rule examples and correlation engine performance data
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Types of Non Functional Testing
Types of Non Functional TestingTypes of Non Functional Testing
Types of Non Functional Testing
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdfCSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
 
spamzombieppt
spamzombiepptspamzombieppt
spamzombieppt
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit framework
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo download
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
Safe, Reliable, Available, High‒Integrity, and Fault Tolerant Embedded Softwa...
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
 

More from SADEED AMEEN

Resume
ResumeResume
Resume
SADEED AMEEN
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
SADEED AMEEN
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
SADEED AMEEN
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
SADEED AMEEN
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control system
SADEED AMEEN
 
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
SADEED AMEEN
 
Tails os
Tails osTails os
Tails os
SADEED AMEEN
 
Organic User Interface
Organic User InterfaceOrganic User Interface
Organic User Interface
SADEED AMEEN
 

More from SADEED AMEEN (8)

Resume
ResumeResume
Resume
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control system
 
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
 
Tails os
Tails osTails os
Tails os
 
Organic User Interface
Organic User InterfaceOrganic User Interface
Organic User Interface
 

Recently uploaded

一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 

Recently uploaded (20)

一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 

Network testing and debugging

  • 1. Network Testing and Debugging TCP/IP CONCEPTS, WIRING, CONFIGURATING NETWORK, PROTOCOLS S a d e e d A m e e n P O s a d e e d a m e e n @ g m a i l . c o m
  • 2. Testing and Debugging  Testing activity is carried down to find the defect in the network and its configurations.  Identify and remove errors from computer hardware or from network is termed as debugging 09-03-2015sadeedameen@gmail.com 2
  • 3. Possible points of failure  The cable is plugged into the wrong network  Host machine is plugged into the wrong network  Host machine has a bad network card  Machine is offline  The web server may not be running 09-03-2015sadeedameen@gmail.com 3
  • 4. Testing the IP configuration  Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration  The output of this command gives the IP configuration for each interface  a computer with two network cards and one wireless adapter has 3 interfaces each with its own configuration 09-03-2015sadeedameen@gmail.com 4
  • 5. Testing the IP configuration cont  The Ethernet interface connected to the local area network (network card) is not active since the cable is disconnected, but the PPP adapter (MTS) is configured.  Machines on a same network must use a same address range (with different addresses) and a same subnet mask  In the case of a local network, connecting machines that do not have routable IP addresses, so-called private address ranges must be used  The default gateway refers to, when applicable, the IP address of the machine offering internet access. DNS servers  The DNS servers must correspond to the organization's DNS servers; most of the time these are the service provider's DNS servers 09-03-2015sadeedameen@gmail.com 5
  • 6. Testing the connection  To test the proper functioning of a network  Ping utility is a highly practical utility provided as a standard feature with most operating systems.  Ping lets you send a data packet to a network computer and lets you evaluate the response time  ping -t 192.168.0.3 Ping the IP addresses of the network's computers  ping -t Mickey Ping the computer names  Ping –t www.google.com ping a domain name 09-03-2015sadeedameen@gmail.com 6
  • 7. Testing the connection cont 09-03-2015sadeedameen@gmail.com 7
  • 8. Network Testing  Load Testing  Stress Testing  Negative Testing  Inopportune Testing  Conformance/Compliance Testing  Line Speed Testing  Performance Testing  Robustness/Security Testing  Interoperability Testing 09-03-2015sadeedameen@gmail.com 8
  • 9. Load Testing  Load testing is the process of putting demand on a system or device and measuring its response. Load testing is performed to determine a system's behavior under both normal and anticipated peak loadconditions  Where a system can support testing to actual volumes we have a performance testing service to meet your requirements.  Our network testing services provides comprehensive concurrent user simulation of user and system traffic. This can be conducted while concurrently generating threats and attacking traffic at high loads. 09-03-2015sadeedameen@gmail.com 9
  • 10. Stress Testing  Stress testing is a form of deliberately intense or thorough testing used to determine the stability of a given nework.  It involves testing beyond normal operational capacity, often to a breaking point, in order to observe the results  Stress testing is the process of determining the ability of a network or device to maintain a certain level of effectiveness under unfavorable conditions. 09-03-2015sadeedameen@gmail.com 10
  • 11. Stress Testing Actions involved may include:  Running several resource-intensive applications in a single computer at the same time  Attempting to hack into a computer and use it as a zombie to spreadspam  Flooding a server with useless e-mail messages  Making numerous, concurrent attempts to access a single Web site  Attempting to infect a system with viruses, Trojans, spyware or othermalware 09-03-2015sadeedameen@gmail.com 11
  • 12. Negative Testing  Process to verify that the device under test responds correctly to error conditions or unacceptable input conditions.  Negative testing can be challenging because the number of incorrect conditions is unlimited.  Example of a negative test would be using a security protocol for authentication with an incorrect parameter 09-03-2015sadeedameen@gmail.com 12
  • 13. Inopportune Testing  Process to verify that the device under test is able to react properly when an unexpected event occurs  The event is syntactically correct, but occurs when not expected  Inopportune testing is a specific instance of negative protocol conformance testing. 09-03-2015sadeedameen@gmail.com 13
  • 14. Conformance/Compliance Testing  Testing both the capabilities and behavior of an implementation, and checking what is observed against the conformance requirements in the relevant International Standards.(ISO/IEC 9646-1:1994(E))  testing to see if the device under test operates according to that requirement  This is done by creating a series of single function tests for each requirement, resulting in thousands of tests  An example of a conformance test is to check if the “ping” command operates correctly. 09-03-2015sadeedameen@gmail.com 14
  • 15. Line Speed Testing  Process of verifying that a device can operate at its rated line speed, when the bandwidth is 100% utilized or saturated.  process of subjecting the device under test to out of boundary conditions  For example, if the device is rated as operating at 5 Giga bytes per second, then the device should be able to handle incoming traffic utilizing all the available bandwidth 09-03-2015sadeedameen@gmail.com 15
  • 16. Performance Testing  Process of verifying that the performance of the device under test meets an acceptable level  Performance testing is a superset of line speed testing in which performance applies to many aspects of a network device or application, and not just line speed. 09-03-2015sadeedameen@gmail.com 16
  • 17. Robustness/Security Testing  Process of subjecting a device under test to particular input streams  The input streams may be one of three types:  Random input streams  Valid input streams  Invalid input streams  Security testing is more broadly defined to include monitoring / surveillance and the detection of specific exploits like IP spoofing or phishing etc 09-03-2015sadeedameen@gmail.com 17
  • 18. Interoperability Testing  Process of testing devices from multiple manufacturers by interacting in such a manner as to exercise the network protocol under test  Interoperability testing is very useful in the early stages of a new product  As products mature, interoperability testing becomes less valuable as it does not uncover enough new bugs to warrant the cost of setting up, configuring and managing network equipment from various manufacturers. 09-03-2015sadeedameen@gmail.com 18
  • 19. Network Testing and Debugging Penetration testing 09-03-2015sadeedameen@gmail.com 19
  • 20. Penetration testing  Evaluating the security of a network by hacking. Basically, it is an analysis of system for any potential vulnerabilities that may result from any of the following: Poor or improper system configuration Known and / or unknown hardware or software flaws Operational weaknesses in process Technical countermeasures 09-03-2015sadeedameen@gmail.com 20
  • 21. Penetration testing cont Importance of PenetrationTesting:  It prevents financial loss through from hackers or extortionists or disgruntled employees  It prevents financial loss through unreliable business systems and processes  From an operational perspective, penetration testing helps shape information security strategy.  It protects your brand by avoiding loss of consumer confidence and business reputation. 09-03-2015sadeedameen@gmail.com 21
  • 22. Basic Network Troubleshooting Tools Ping  The most commonly used network tool is the ping utility  This utility is used to provide a basic connectivity test between the requesting host and a destination host.  This is done by using the Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host 09-03-2015sadeedameen@gmail.com 22
  • 23. Tracert/traceroute  once the ping utility has been used to determine basic connectivity, the tracert/traceroute utility can used to determine more specific information about the path to the destination host  It includes the route the packet takes and the response time of these intermediate hosts  Tracert for Windows machines and traceroute for Linux/unix based machines 09-03-2015sadeedameen@gmail.com 23
  • 25. Ipconfig/ifconfig  The utilities that can be used to find out this IP configuration information include the ipconfig utility on Windows machines and the ifconfig utility on Linux/unix based machines.  One of the most important things that must be completed when troubleshooting a networking issue is to find out the specific IP configuration of the variously affected hosts 09-03-2015sadeedameen@gmail.com 25
  • 27. Nslookup  Some of the most common networking issues revolve around issues with Dynamic Name System (DNS) address resolution issues.  The nslookup utility can be used to lookup the specific IP address(es) associated with a domain name. If this utility is unable to resolve this information, there is a DNS issue  Along with simple lookup, the nslookup utility is able to query specific DNS servers to determine an issue with the default DNS servers configured on a host 09-03-2015sadeedameen@gmail.com 27
  • 29. Netstat  the current state of the active network connections on a host  It is also possible to use the netstat utility to determine which services on a host that is associated with specific active ports 09-03-2015sadeedameen@gmail.com 29
  • 31. PuTTY/Tera Term  When connecting to a variety of different types of equipment, a telnet, SSH or serial client is required; when this is required both the puTTY and Tera Term programs are able to provide these functionalities.  The selection of one over the other is strictly a personal preference. 09-03-2015sadeedameen@gmail.com 31
  • 33. Subnet and IP Calculator  These can be used to unsure a correct IP address selection and with this a correct IP address configuration  While this type of tool is used by senior level network engineers, much of the information obtained from the tool becomes simpler to calculate the longer and more experience you have in the field  Two of the more commonly used free IP calculators include Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced Subnet Calculator 09-03-2015sadeedameen@gmail.com 33
  • 34. Subnet and IP Calculator cont 09-03-2015sadeedameen@gmail.com 34
  • 35. Speedtest.net/pingtest.net  A very easy test that can be used to both determine the Internet bandwidth available to a specific host and to determine the quality of an Internet connection is the use of the tools available at the speedtest.net and pingtest.net websites  The speedtest.net site provides the ability to determine the amount of bandwidth that is available to a specific host at a specific point in time  This is a good tool to use when measuring how long it is going to take to upload or download information from a local to remote host  The pingtest.net website is used to determine the quality of the connection by measuring the ping response times and jitter amounts over a short period of time. 09-03-2015sadeedameen@gmail.com 35
  • 36. Speedtest.net/pingtest.net cont  This information can be used to determine a likelihood of how well the measured connection will deal with certain types of high demand traffic like Voice over IP (VoIP) or gaming 09-03-2015sadeedameen@gmail.com 36
  • 39. Pathping/mtr  In an effort to take advantage of the benefits of both the ping and tracert/traceroute commands, the pathping and mtr utilities were developed  Both of these tools take the functionality and information that can be obtained from these types of tools and provide a more detailed single picture of the path characteristics from a specific host to a specific destination 09-03-2015sadeedameen@gmail.com 39
  • 42. Route This utility is used to display the current status of the routing table on a host 09-03-2015sadeedameen@gmail.com 42