Ethereal Exercise 1: Introduction to Ethereal
|
|
- Clinton Walker
- 7 years ago
- Views:
Transcription
1 Course: Semester: ELE437 Ethereal Exercise 1: Introduction to Ethereal While the ELE437 course doesn t have a lab component, many of the experiences in lab-based courses can be done as homework assignments instead. Applications such as Ethereal, which is available for Windows, MacOS, Linux/Unix, and other platforms, make it possible to capture network activity and analyze it from the physical layer up to the application layer. With Ethereal, you can also open previously recorded capture sessions and analyze the timing, addresses, protocols, and other information. Assumed Background Knowledge A basic understanding of the following items are assumed throughout this exercise. Most of them are from Chapter 1 of the Tanenbaum textbook: Protocol hierarchies, the OSI model, and the TCP/IP reference model. What the Physical, Data Link, Network, Transport, and Application layers are. What Ethernet is and what protocol layer it is at How a packet at one layer fits into a packet at a lower layer: o In the figure below, a high-layer packet at Layer N+1 is equivalent to the payload of another packet at a lower layer (Layer N). Even if the packet at Layer N+1 has a header or trailer, they will be treated as part of the payload once the data is passed down to Layer N. This makes it possible to use any number of different protocols at Layer N+1 without necessarily having Layer N know what protocol is being used at Layer N+1. o In general, the only requirement between neighboring layers is that they must have interfaces that allow them to pass data back and forth. o See Chapters 3 and later of the textbook for more details on packets. Figure 0: Simplified Packet-to-Payload Layering Relationship 1
2 Exercise 1 In order to become familiar with Ethereal, it s useful to step through the capture process on your own. Examining a pre-recorded capture file can also be very useful, so both will be done in this exercise. Of course, the Ethereal application needs to be installed first, so that must be done first. Part A: Downloading and Installing Ethereal The latest version of Ethereal can be downloaded for your operating system at Version was used for the screenshots in this document, but other versions should be very similar. Once the Ethereal installer has been downloaded, simply run it. DO NOT download the source code unless you are willing and able to compile it for your platform. If using Linux, you ll need to be root to perform Part B. Part B: Configuring Ethereal and Capturing Packets Now that Ethereal has been installed, it can be run from the Start menu (for Windows users) or by typing ethereal at a command line (for other operating systems). Once open, a window similar to the following one should appear: Figure 1: Ethereal with no capture data loaded 2
3 First, you need to find an active network interface to capture data from. Go to the Capture menu (ALT+C) and select Interfaces (I). Figure 2: Basic Capture Interface Information The window above should appear with all of the network interfaces in your system listed under the Description heading. You can find an active network interface to use for capturing by observing which interface has a steadily increasing number under the Packets heading. In this case, the Motorola USB Cable Modem is active. Once an active interface has been identified, press the Prepare button on that interface s row. The Capture Options box will then appear, as shown in Figure 3. Under Display Options, select the Update list of packets in real time checkbox. Under Capture, deselect the Capture packets in promiscuous mode checkbox. When these changes have been made, press Start to begin capturing packets. A capture summary window will appear and the main Ethereal window will begin to fill up with packet data. After you see the main Ethereal window fill up with packet data, press the Stop button in the Capture window shown in Figure 4. Please note that your capture results are likely to be very different from the precaptured data file that you ll be looking at in the next section. 3
4 Figure 3: Ethereal s Capture Options Dialog box Figure 4: Capture Status window in Ethereal 4
5 Part C: Examining a Pre-Recorded Capture File Now that you know how to perform your own capture, it s necessary to examine a pre-recorded capture file. This will make it possible to point out all of the different information that appears in Ethereal when a capture is performed so that you can knowledgably analyze your own packet captures in the future. In Figure 5 on the next page, the capture file quietcapture.cap has been opened in Ethereal. You can download this file from the ELE437 web site at This is a capture from a quiet network in which the activity involves only two computers. One of the computers is sending out packets to request services available over the network (packets using the SSDP protocol) while the other computer provides information about itself (the packet using the BROWSER protocol). Descriptions of the data in this capture will be given on the next few pages. The capture data in the main window is divided into three parts: 1) Trace List Pane (Top) In this pane, basic information about the packets captured such as the time, source IP, destination IP, and protocol are given. By clicking on the column labels at the top such as Source or Protocol, the capture data will be sorted by the selected label. This makes it easy to group all packets together that have the same source IP address, destination IP address, or use the same protocol. SSDP Protocol: Looking at the Protocol column, most of the packets are using the SSDP protocol. SSDP, which stands for Simple Service Discovery Protocol, is a protocol that allows networked computers to discover remote services and devices that are available for them to use. It also allows networked computers to announce new services and devices that they re willing and able to share. Currently, most SSDP-capable devices are printers, fax machines, and other computers on a network. However in the future it may even be possible to have an SSDP-capable coffee maker that is automatically detected by your computer and that can be easily programmed to make particular types of coffee on different days and at different times for each network client. 5
6 Figure 5: Captured Packets from a Quiet Network 6
7 BROWSER Protocol: The only other protocol in the trace list is BROWSER. This is the Microsoft Windows Browser Protocol, and in this case it is being used by the computer with IP address to tell other computers about itself (it provides the computer name, workgroup name, OS version, etc). 2) Protocol Layer Pane (Middle) This pane shows which protocols were used for the packet currently selected in the Trace List pane. The protocol listing begins at the physical layer and then includes the data link, network, transport, and application layers in that order. In the example above, the protocol breakdown starting at the data link layer is as follows: Data Link Layer: Ethernet II Network Layer: Internet Protocol (IP) Transport Layer: User Datagram Protocol (UDP) Application Layer: Hypertext Transfer Protocol (HTTP) At each layer, the (plus sign) to the left of the protocol name can be clicked on to get more details on the packet data. For example, you can see in Figure 6 that at the physical layer the arrival time and length of the packet were recorded. These pieces of information aren t actually a part of the transmitted packet, but are recorded by Ethereal to maximize the amount of information you have about any packets received, even at a very low level. Figure 6: Physical Layer Data in the Protocol Pane To see data that was actually part of a transmitted packet you can look at the details for any of the higher-level protocols. In Figure 7, Ethereal has used the bytes of the IP header (detailed in Figure 5-53 on page 434 of the textbook) to obtain the information shown. The details at the network layer show us what version of IP was used, the length of the IP packet header, the length of the IP packet, and other important details. Of course, the source and destination IP addresses given on the summary line at the top are in the details as well. 7
8 Figure 7: Network Layer Data in the Protocol Pane 3) Raw Packet Pane (Bottom) Finally, the pane at the bottom of Figure 5 contains the hexadecimal and ASCII representations of packet data in their raw forms. By selecting a particular layer line in Protocol Layer pane, all of the packet data related to that layer will be highlighted in the Raw Packet pane. For example, in Figure 8 the transport layer line for the User Datagram Protocol (UDP) has been selected in the Protocol Layer pane and the corresponding bytes are highlighted in the Raw Packet pane. Notice that the first two hex bytes, 0x07 and 0x6D form the 16-bit number 0x76D and that the decimal equivalent is This is the source port number, as shown in the selected line of the Protocol Layer pane. Similarly, the destination port is in the next two bytes, 0x07 and 0x6C. For more details on UDP and the UDP header format, see Section 6.4 of the textbook on page 524. Figure 8: Transport Layer Data in the Raw Packet Pane If you instead select the application layer line for the Hypertext Transfer Protocol (HTTP), you will notice that the meaningful information in the Raw Packet Pane is the highlighted ASCII characters. This brings up an important point: at the physical, data link, network, and transport layers most of the meaningful information will be in the form of bits and bytes representing addresses, ports, and other information in packet headers. 8
9 As a result, the selected ASCII characters at these layers are likely to have no meaning while the selected hex data can be interpreted more easily. At the application layer however, the highlighted ASCII characters can be very useful since web browsers, clients, and chat programs are likely to transmit and receive ASCII text. Of course, not all data at the application layer is text, and some text may be encrypted, so in some cases neither the hexadecimal nor the ASCII display in the Raw Packet Pane will provide any obviously meaningful information. In these cases, Ethereal may only be able to tell you that a TCP packet is pre Part D: Trace Summary Statistics While the Trace List, Protocol Layer, and Raw Packet panes provides varying levels of detail about a network capture, Ethereal can also provide you with a simple summary of the entire capture. You can get to the summary in Ethereal by going to the Statistics menu (ALT+S) and selecting Summary (S), as shown in Figure 9. Figure 9: Opening the Capture Summary in Ethereal Figure 10 shows the summary for the quietnetwork.cap file used in this exercise. Useful information such as the number of packets captured, the total number of bytes captured, and the average data rate are given. 9
10 Figure 10: Capture Summary for quietnetwork.cap Online Resources Simple Service Discovery Protocol (SSDP): Address Resolution Protocol (ARP): 10
11 Questions Use the quietnetwork_15minutes.cap capture trace file from to answer the following questions. 1. For the capture file specified above, a. How many seconds does Ethereal report the trace to be? b. What are two different ways to determine this? 2. When this trace was captured, a capture limit of 15 minutes was specified. However, the trace length shows up as less than 15 minutes. Why? 3. How many packets appear in this trace? 4. In quietnetwork.cap we saw two types of packets: SSDP announcements from one computer and a BROWSER announcement from another PC. a. Do you see these types of packets in quietnetwork_15minutes.cap? b. If yes, what is the packet number for the first SSDP packet and the first BROWSER packet? 5. What other protocols appear in the trace, if any? Click on the heading for the Protocol column to sort the packets by protocol to make this easier. 6. In quietnetwork.cap, we saw only two different source IP addresses, and a. Do you see any additional source IP addresses in the quietnetwork_15minutes.cap trace? (Note: If your capture only shows the MAC address for some packets, you must examine them to find the IP address) b. If yes, give the IP address and any packet number at which is occurs. Grading - 12 points - The questions have the following point values: 1) 3 points (1 for a, 2 for b) 2) 2 points 3) 1 point 4) 3 points (1 for a, 2 for b) 5) 1 point 6) 2 points (1 for each) 11
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationWireshark Tutorial INTRODUCTION
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationLab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
More informationWireshark Tutorial. Figure 1: Packet sniffer structure
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation
More informationEKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
More informationPacket Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
More informationEthereal: Getting Started
Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me
More informationSnoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points
Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course
More informationLab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
More informationWireshark Lab: Assignment 1w (Optional)
Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationNetwork Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
More informationCapture and analysis of the network traffic with Wireshark
Capture and analysis of the network traffic with Wireshark Lab Objectives Understanding the purpose of Wireshark Studying configuration settings and capture options of Wireshark Studying Wireshark filters
More informationLab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More information6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6.1. Wireshark network sniffer Wireshark (originally called Ethereal) is a freeware network sniffer. A sniffer investigates and analyzes network traffic.
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationHands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
More informationIntroduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
More informationInstall MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
More informationModule 1: Reviewing the Suite of TCP/IP Protocols
Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14
More informationCET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationIntroduction to Wireshark Network Analysis
Introduction to Wireshark Network Analysis Page 2 of 24 Table of Contents INTRODUCTION 4 Overview 4 CAPTURING LIVE DATA 5 Preface 6 Capture Interfaces 6 Capture Options 6 Performing the Capture 8 ANALYZING
More informationModern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
More informationPre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
More informationPREFACE http://www.okiprintingsolutions.com 07108001 iss.01 -
Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors
More informationWireshark Quick-Start Guide. Instructions on Using the Wireshark Packet Analyzer
Wireshark Quick-Start Guide Instructions on Using the Wireshark Packet Analyzer July 2, 2008 Table of Contents Chapter 1: Getting Started... 3 I) Current Version... 4 II) Installation... 4 III) Specifying
More informationLab Module 3 Network Protocol Analysis with Wireshark
Pacific Northwest National Laboratory Lab Module 3 Network Protocol Analysis with Wireshark NATO ASI on Energy Infrastructure Security October 2015 PNNL-##### Lab Module 3 Network Protocol Analysis with
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More informationWorkstation ARP. Objective. Background / Preparation
Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as
More informationTCP Packet Tracing Part 1
TCP Packet Tracing Part 1 Robert L Boretti Jr (robb@us.ibm.com) Marvin Knight (knightm@us.ibm.com) Advisory Software Engineers 24 May 2011 Agenda Main Focus - TCP Packet Tracing What is TCP - general description
More informationUSER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008
More informationVisio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
More informationThis chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
More informationPacket Monitor in SonicOS 5.8
Packet Monitor in SonicOS 5.8 Document Contents This document contains the following sections: Packet Monitor Overview on page 1 Configuring Packet Monitor on page 5 Using Packet Monitor and Packet Mirror
More informationFigure 1. Wireshark Menu Bar
Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationDesigning AirPort Extreme Networks
Designing AirPort Extreme Networks Contents 1 Getting Started 5 About AirPort 5 How AirPort Works 6 How Wireless Internet Access Is Provided 6 Configuring AirPort Extreme Base Station Internet Access
More informationMacintosh Clients and Windows Print Queues
Macintosh Clients and Windows Print Queues OS X Maverick, Lion Mountain, Leopard, Tiger, and Panther Pre-Configuration Requirements Ensure Macintosh machines have a valid Host A and PTR records in your
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationLecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationSetting up your laptop to print to the student lounge printer
Setting up your laptop to print to the student lounge printer Click on the system you are using: 1) MacOS X 10.2 2) MacOS X 10.3/10.4 3) Windows 2000/XP 4) Windows 7/Vista 1) MacOS X 10.2 In order to print
More informationEINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
More informationM2M Series Routers. Port Forwarding / DMZ Setup
Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationZebra printers using CPCL, EPL and ZPL command languages.
Application Note: ZSN108111-v3 Date: September 20, 2012 Product(s) Affected: Task: Zebra printers using CPCL, EPL and ZPL command languages. Installing the CUPS Zebra printer driver on a Linux/Unix or
More informationMany home and small office networks exist for no
C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach
More informationLab 7.1.9b Introduction to Fluke Protocol Inspector
Lab 7.1.9b Introduction to Fluke Protocol Inspector DCE SanJose1 S0/0 S0/0 SanJose2 #1 #2 Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationEE984 Laboratory Experiment 2: Protocol Analysis
EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More informationCOMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
More informationWireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction
Wireshark Lab: HTTP Version: 2.0 (Sept. 2009) 2009 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 5 th edition. Having gotten our feet wet with the Wireshark packet
More informationNetwork Forensics Network Traffic Analysis
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationNetwork FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
More informationEasy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
More informationLaboratory Exercises V: IP Security Protocol (IPSec)
Department of Electronics Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture (FESB) University of Split, Croatia Laboratory Exercises V: IP Security Protocol (IPSec) Keywords:
More information1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A
1-Port Wireless USB 2.0 Print Server Model # APSUSB201W Quick Installation Guide Ver. 2A Section 1 Step 1Connect one end of the Ethernet cable to the RJ-45 port of the Print Server and attach the other
More informationHands-on MESH Network Exercise Workbook
Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More informationChapter 4 Restricting Access From Your Network
Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can
More informationNetwork Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
More information01 - Introduction. Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication.
MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication Davide Eynard nternet Technology 01 - ntroduction 2 Welcome! My name is Davide Eynard davide.eynard@usi.ch This course
More informationSmoking and any food or drinks are not permitted in the Applications Lab!
220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks
More informationSYMETRIX SOLUTIONS: TECH TIP August 2015
String Output Modules The purpose of this document is to provide an understanding of operation and configuration of the two different String Output modules available within SymNet Composer. The two different
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationConfiguring the WT-4 for Upload to a Computer (Infrastructure Mode)
Page 1 of 25 Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Windows 7 Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) This document provides basic instructions
More informationAn Introduction To The Web File Manager
An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular
More informationConfiguring the WT-4 for Upload to a Computer (Infrastructure Mode)
Introduction En Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a computer for transmission
More informationNetwork Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
More informationABB solar inverters. User s manual ABB Remote monitoring portal
ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904
More informationPacket Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
More informationWorking With Network Monitor Brian M. Posey and David Davis (WindowsNetworking.com)
Although networks are certainly more reliable than they used to be, problems do sometimes occur. For example, the network might be running more slowly than it normally does, or one device on a network
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationGEVPlayer. Quick Start Guide
GEVPlayer Quick Start Guide High-performance imaging data and video over Ethernet. Version 2.0 These products are not intended for use in life support appliances, devices, or systems where malfunction
More informationNetworking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
More informationIP/SIP Trunk Software User Guide
PRILINK http://www.prilink.com Tel: 905-882-4488 1-866-261-0649 Fax: 905-597-1139 Sales@prilink.com Support@prilink.com IP/SIP Trunk Software User Guide Table of Contents Overview...3 Getting Started...4
More informationFile Sharing. Peter Lo. CP582 Peter Lo 2003 1
File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationConnect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationConfiguring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
More informationIntroduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
More informationLab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationLinux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationSchool of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 3: Simple Network Management Protocol (SNMP) Operations Objective To become familiar with basic SNMP operations
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
More informationEthernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University
Ethernet and IP A slightly less introductory networking class Drew Saunders Networking Systems Stanford University Goals of Class Slightly more in-depth knowledge of Ethernet. Internet Protocol, TCP, UDP,
More informationImplementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More information