Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. RAFIQ BIN CHE MAT ( )

Size: px
Start display at page:

Download "Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. RAFIQ BIN CHE MAT (2003285011)"

Transcription

1 Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. By RAFIQ BIN CHE MAT ( ) A project paper submitted to FACULTY OF INFRMATION TECHNOLOGY AND QUANTITATIVE SCIENCES MARA UNIVERSITY OF TECHNOLOGY In partialfiilfillmentof requirement for the BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Major Area: Commvmication Approved by the Examining Committee: : : ^.. : Pn. Zarina Binti Zainol Project Supervisor En/. Jamaluddin Bin MDi usof Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM, SELANGOR APRIL 2005

2 CERTIFICATION OF ORIGINALITY This is to certify that I am responsible for the work submitted in this project that the original work is my own except as specified in the references and acknowledgement and that the original work contained herein have not been taken r done by unspecified sources or persons. (RAFLQBINCHEMAT)

3 ACKNOWLEDGEMENT First and foremost, in the name of ALLAH, the Most Generous and Merciful. Praise to ALLAH S.W.T, the one and only that give me a blessing and a healthy condition to finish this final year project in the dateline submission. A special thank to all individual that help me to complete this final year project. The TCP/IP and UDP traffic monitoring tool would and could not finished without this help, dedication and contribution of all people which I shall announce their name shortly. I would like to take this opportunity to express my gratitude towards to my lecturer supervisor, Pn. Zarina binti Zainol for her untiring guidance, ideas, support, effort and concern towards in this project. Other than that, a special thanks to Assoc Prof Dr Saadiah binti Yahya for her support, advice, tips and ideas to do my report and project. I also would like to thank for my examiner. En. Jamaluddin Bin MD Yusof for his support and guidance in this project. A great thank to all SIG group, Computer Technology and Networking (CTN) lecturers and staff FTMSK that have guided and providing me with valuable of information and support during construct this project. Special thank to my family for understanding, encouragement and support my study. To my fellow friends whose name is remaining anonymous, that always gives their support and unconditional advice to complete this final year project. Without their brilliant idea and knowledge, this final year project would not be finished and incomplete. Thank to all. Ill

4 ABSTRACT The main purpose of this project is to develop a program that uses Windows XP to monitor the flow of the Transmission Control Protocol / Internet Protocol (TCP/IP) and User Datagram Protocol (UDP) traffic over the Local Area Network (LAN) and internet. The purpose of the program is to monitor and track the record of TCP/IP and UDP cormection traffic, such as the amount of traffic being transmitted from or received by the host machine, based on different applications. For example, in the case of usage of file transfer, the TCP/IP and UDP Traffic monitor checks the details of the data transmission including the size of messages transmitted or received during a given period of time, the source IP address and MAC address, the destination IP address and MAC address, the source and destination port number, the type of protocol that have been used and etc. The monitoring will also have the ability to keep the tracked data in a database access file and provide some statistical information to the user such as a report, total number of TCP/IP and UDP protocol and etc. The last result is presented from the testing phase in this project. IV

5 TABLE OF CONTENTS CONTENTS PAGES CERTIFICATION OF ORIGINALITY ACKNOWLEDMENT ABSTRACT TABLE OF CONTENTS LIST OF TABLE LIST OF FIGURES ii iii iv v viii ix CHAPTER 1: INTRODUCTION 1.1 PREFACE PROBLEM STATEMENT PROJECT OBJECTIVE PROJECT SCOPE PROJECT SIGNIFICANCE OUTLINE OF THE FOLLOWING CHAPTERS CONCLUSION 5 CHAPTER 2: LITERATURE REVIEW 2.1 INTRODUCTION DEFINITION OF PERTINENT TERMINOLOGIES Transmission Control Protocol (TCP) Concept User Datagram Protocol (UDP) Concept Internet Protocol (IP) Concept DIFFERENT APPROACHES TO SOLVE THE SIMILAR PROBLEM Pandora: A Flexible Network Monitoring Platform... 14

6 2.3.2 BLT: Bi-Layer Tracing of HTTP and TCP/IP ENMA: The World Wide Web (WWW) Server Performance Measurement System via Packet Monitoring Developing TCP/IP Port Scanning Tool Network Traffic Monitoring Analysis - SITARA Quality of Service WORKS 5000TM Wide Area Network Packet Capture and Analysis CONCLUSION 16 CHAPTER 3: RESEARCH METHODOLOGY 3.1 INTRODUCTION RESEARCH METHODOLOGY Data Collection Design and Development Planning Analysis Design Implementation Maintenance and Support Evaluation and Finding HARDWARE AND SOFTWARE REQUIREMENT Hardware requirement Software requirement CONCLUSION 29 CHAPTER 4: FINDINGS AND DISCUSSION 4.1 INTRODUCTION SCREEN DESIGN AND USER MANUAL Type of Adapter 30 VI

7 4.2.2 Main Page Start button Stop button Refresh button View All Data button Save button Search By Date button Search By Protocol Type button Total_Packet button Report button User Manual button New Scan button Exit button Database Access Table User Manual DISCUSSION CONCLUSION 52 CHAPTER 5: CONCLUSION AND RECOMMENDATION 5.1 CONCLUSION BENEFITS RECOMMENDATION FOR FUTURE WORK 54 BIBLIOGRAPHY 55 APPENDIX A 57 APPENDIX B 59 APPENDIX C 63 APPENDIX D 100 vn

8 LIST OF TABLE TABLE NUMBER NAME PAGES 2.1 TCP/IP protocol description 12 Vlll

9 LIST OF FIGURES FIGURES NUMBER NAME PAGES 2.1 Encapsulation of TCP data in an IP datagram TCP Header Format UDP Encapsulation UDP Header Format IP Datagram Methodology Flow Process Flow Importing The PacketX Type Library Entity Diagram Message will be displayed to inform the type of adapter has been used Main Menu Page Process of capturing data packet from the life Network Message will be displayed after the Stop button on the Option Menu was clicked Message will be displayed after the Stop Menu on the Menu List was clicked Message will be displayed after the Refi"esh button on the Option Menu was clicked Message will be displayed after the Refresh Menu On the Menu List was clicked Process of capturing data packet from the life network was continuing after Refresh button was clicked 36 IX

10 4.9 Message will be displayed after the View All Data Menu on the Menu List was clicked Message will be displayed after the View All button on the Option Menu was clicked All data in the database access file displayed after the Network Administrator proceeds to view all data Message will be displayed after the Save button on the Option Menu was clicked Message will be displayed after the Save Menu on the Menu List was clicked The Input Query will be displayed after the Search By Date Menu on the Menu List was clicked Sample Result Search By Date The Input Query will be displayed after the Search By Protocol Menu on the Menu List was clicked Sample Resuh after Search By TCP Protocol type Sample Result after Search By IP Protocol type Sample Resuh after Search By UDP Protocol type Total number of TCP/IP and UDP data packet during testing phase Full report about the data packet that has been stored in the database access file during testing phase User Manual New_Scan Menu was clicked to create a new process of capturing data packet from the life network Exit from the TCP/IP and UDP traffic monitoring tool The table of contents in the database access files during the testing phase 50

11 CHAPTER 1 INTRODUCTION 1.8 PREFACE Networks connect the servers to computers which from a client-server environment and it is becoming an important aspect in our life today. But, the rapid growth of the internetworking population nowadays has caused traffic on the network. The server system must be capable to handle the burstness of network traffic especially in peak hours. Many computer networks of today are based predominantly on the Transmission Control Protocol/Internet Protocol (TCP/IP), and User Datagram Protocol (UDP) that provides best effort service. So, the TCP/IP and UDP traffic monitoring tool is introduced to monitor the flow of the traffic on the network. Same with other network monitoring tools, this tool will be used to monitor the traffic in the network and make an analysis about the traffic in the network. The feature in this tool allows the Network Administrator to connect and retrieve the current state of the network and further compare it to historical data collected previously. Thus, the information obtained can be used to monitor and address trends in network utilization before they become problems. The idea is that, the program will be run in Visual Basic 6.0 and the information will be gathered from Network Interface Card (NIC). The following sections will briefly explain on the objectives of the project, followed by an overview of the project itself and the Transmission Control Protocol/Internet Protocol (TCP/IP), and User Datagram Protocol (UDP), which is the primary protocol being analyzed in this project, and the methodology used in this project.

12 1.9 PROBLEM STATEMENT As we know, many Transmission Control Protocol/Internet Protocol (TCPAP), and User Datagram Protocol (UDP) tools stores records into the log file and not into the database access. So, this tool will track the record of TCP/IP and UDP connection traffic, such as the amount of traffic being transmitted from or received by the host machine, based on different applications in the database access. For example, in the case of usage of file transfer, the TCP/IP and UDP traffic monitor checks the details of the data transmission including the number of messages transmitted or received during a given period of time and the size of message, whether it has an attachment or not. Besides that, there are problems to get a tool to monitor the traffic and network especially in windows platform. Many tools in the internet are provided for the Linux and FreeBSD platform. So, this project will come out a tool to solve the problem especially for the Network Administrator that need to monitor the flow of traffic on the network using a windows environment. Furthermore, this program is an open source or proprietary software. So all the users can use this program without license and it is free. It is also not a complicated or a large program, it will give an experience about how to develop a program that can monitor packets over the network. LIO PROJECT OBJECTIVE Every project must have objectives as guidance before implementing the project. So, we have defined our objectives based on our research and by considering

13 several constraints in order for us to make that piece of work a success, if possible. The main objectives of this project are: i. To develop a tool that can be used to monitor the flow of TCP/IP and UDP traffic in a network, where it can: a) track the record of TCP/IP and UDP connection traffic such as the amount of traffic being transmitted from or received by the host. b) keep the data tracked in a database access and provides some statistical information to the Network Administrator PROJECT SCOPE The focus of this project is to develop a tool that can be used to monitor the network traffic between Local Area Network (LAN). All the information in the network traffic will be tracked and recorded and then will be stored in the database access. Besides that, this project will be used in a Windows environment. At the end of research, the simulation and screen design will be shown. Even though, this tool can capture five protocol types in the life network but we have decided to concentrate to only three main protocols. Local Area Network (LAN) segment will be tested for monitoring and analyzing process in order to archive the second objective of this project. The three main protocols that will be concentrated in this tool are: i. Transmission Control Protocol (TCP) ii. Internet Protocol (IP) iii. User Datagram Protocol (UDP)

14 1.5 PROJECT SIGNIFICANCE The main significance of this project is that the tool can be used to monitor the flow of traffic between Local Area Network (LAN), especially in a windows environment. In addition, the Network Administrator can learn about a basic packet monitoring in the live network. Other significance is, more than information can be tracked and get from the network traffic using this tool. All the information that has been stored in the database file can be used to provide some statistical information by the Network Administrator. This tool also provides a Graphical User Interface (GUI) and more convenience and is user friendly to use by the Network Administrator. Furthermore this program can be used as a guideline on how to build a better program by the beginner programmer. 1.6 OUTLINE OF THE FOLLOWING CHAPTERS Chapter 2: Literature Review This chapter will be explained about the related literature review. We have explained about the concept of TCP/IP and UDP in the real network today. We also becoming with the study in a different approaches to solve the similar problem Chapter 3: Research Methodology In this chapter, we will discuss about our approaches or methodology that have been used from beginning until the end of the project. It is also included the System Development Life Cycle (SDLC) phase in order to develop the TCP/IP and UDP traffic monitoring tool.

15 1.6.3 Chapter 4: Finding and Discussion The last result of this project will be discussed and the screen layouts are show in this chapter Chapter 5: Conclusion and Recommendation The conclusion of this project will be explained and discussed in this chapter. In addition, the recommendation for future work also will be discussed. 1.7 CONCLUSION In this chapter, we explain about the introduction regarding the background of the problem, statement of the problem, objective of the project, scope of the project and significance of the project that have been discussed. This chapter also gives a rough of idea about the problem that is to be solved.

16 CHAPTER 2 LITERATURE REVIEW 2.3 INTRODUCTION Literature review is the beginning of the framework that will be used as reference or guideline for the researchers. It can give a lot of good ideas to make a great research. In this project, the internetworking needs a long time to grow like today. From the DARPA military project in the late 1960's, the evolution of the Internet makes what is impossible become a reality. At that time it is only used by U.S. Military and several local universities for research development. After the invention of the World Wide Web in the 1990's, the world saw a rapid growth of Internet with million of users worldwide. The rapid growth of the Internet users globally causes the traffic to congest in the internetworking environment. 2.4 DEFINITION OF PERTINENT TERMINOLOGIES Transmission Control Protocol (TCP) Concept Transmission Control Protocol (TCP) is the most important connectionoriented protocol. It provides reliable information transfer service for higher layer applications (Cisco Networking Academy Program, 2th edition. Cisco Press.2001). Furthermore, TCP is a connection establishment, error recovery, and have a flow control for avoiding errors. Error recovery is

17 implemented by retransmissions and packet reordering. Usually, TCP provides two main functions for the dynamic flow control. First, a retransmission timer is used for determining a lost packet at the sending TCP host. The second approach is to control the window size for the sent but unacknowledged packets. Beside that, TCP have a header that contains various fields including the source and destination ports, sequence and acknowledgment numbers, window size, TCP flags, urgent pointer, and reserved bits. (Karen Kent Frederick, 2001) IP datagram TCP segment IP header TCP header TCP data 20 bytes 20 bytes Figure 2.1: Encapsulationof TCP data in an IP datagram.

18 16 bits 16 bits 16 bits source port number 16 bits destination port number 32 bits sequence number 32 bits acknowledgent number 4 bits headei lenght Reserved; (6 bits) LAF F 9F RC 16 bits window size 16 bits TCP checksum 16 bits urgent pointer Options (if any) Data (if any) Figure 2.2: TCP Header Format TCP also provides reliable connection service to pairs of processes. It does not assume reliability from the lower-level protocol such as IP. TCP assigns a sequence number to each byte transmitted, and expects a positive acknowledgement (ACK) from receiving TCP. If the

19 ACK is not received within the timeout interval, the data are retransmitted. As data are transmitted in blocks, namely, TCP segments, the sequence number of the first data byte in the segment is sent to the destination host. The receiving TCP uses the sequence numbers to rearrange the segments when they arrive out of order, and eliminate duplicate segments. The receiving TCP when sending an ACK back to the sender, also indicates to the sender the number of bytes it can receive beyond the last received TCP segments, without causing overrun and overflow in its internal buffers. This number sent in the ACK is actually the highest sequence number it can receive without problems. This mechanism is also referred to as a window-mechanism. (Pompan Tadthong, 1999) In a multi-network environment, TCP is intended to provide a reliable process-to-process communication service. The TCP is intended to be a host-to-host protocol in common use in multiple networks. A few categories that is important in the TCP. First is a Basic Data Transfer. The TCP is able to transfer a continuous stream of octets in each direction between its users. In general, the TCP decide when to block and forward data at their own convenience. The second is reliability. TCP must recover from data that is damaged, lost, duplicated, or delivered out of order. TCP assigning a sequence number to each octet transmitted, and requiring a positive acknowledgment (ACK) from the receiving TCP. If the ACK is not received within a timeout interval, the data is retransmitted. At the receiver, the sequence numbers are used to correctly order segments that may be received out of order and to eliminate duplicates. Damage is

20 handled by adding a checksum to each segment transmitted, checking it at the receiver, and discarding damaged segments. The next categories are Flow Control. TCP provides a means for the receiver to receive the amount of data sent by the sender. ACK is send by a sender to the receiver. The window indicates an allowed number of octets that the sender may transmit before receiving further permission. In the Multiplexing TCP allow for many processes within a single Host. The TCP provides a set of addresses or ports within each host. A pair of sockets uniquely identifies each connection. That is, a socket may be simultaneously used in multiple connections. (Information Science Institute, University of Southern California, 1981) 2,2,2 User Datagram Protocol (UDP) Concept User Datagram Protocol (UDP) provides a mechanism for applications to send encapsulated raw IP datagrams and send them without having to establish a connection. Thus, it adds low overhead but requires the application to take responsibility for error recovery. (Pompan Tadthong, 1999) In addition, UDP is functionally at transport layer protocol. It is connectionless, and does not provide a reliable transport. On the other hand, UDP gives an application a direct access to the datagram service of the IP layer. The multicast and broadcast services are available by using UDP. (Cisco Networking Academy Program, 2th edition. Cisco Press.2001). 10

21 The UDP packet is called a user datagram and has no flow-control mechanism. UDP only attempt at error control is the checksum. The UDP header contains the source port number, destination port number, total length and checksum. (Cisco Networking Academy Program, 2th edition. Cisco Press.2001). IP datagram UDP segment IP header UDP header UDP data Figure 2.3: UDP encapsulation. 8 bytes 16 bits source port number 16 bits destination port number 16 bits Total Lenght 16 bits Checksum Figure 2.4: UDP Header Format 11

22 2,2.3 Internet Protocol (IP) Concept IP is an unreliable and connectionless datagram protocol. It is the best effort delivery service. IP provide no error checking or tracking but it has an error detection method called checksum. IP is functionally at Network layer protocol. Packet in the IP layer is called datagram. Each datagram is handled independently, and can follow different route to the destination. The maximum number length of datagram is 65,535 bytes. The IP header contains the version number, header length, differentiated services, datagram length, identification number, fragmentation flags, fragmentation offset, time to live, user of the protocol, checksum, source address and destination address. (Behrouz A. Forouzan & Sophia Chung Fegan, 2003) Protocol TCP (Transmission Control Protocol) UDP (User Datagram Protocol) temet Protocol) Description The protocol used t exchange data between applications The protocol used to exchange data between applications, but more simpler and less reliable than TCP The protocol used t exchange raw data between remote hosts. Table 2.1: TCP/IP protocol description 12

23 ^ -- '«-I- f_ t-tw^tnr ' '' ~ T- ^ / K < bytes ) N V VER 4 bits HLEN 4 bits DS 8 bits Total Length 16 bits Identification 16 bits Flags 3 bits Fragmentation offset 13 bits Time to live 8 bits Protocol 8 bits Header checksum 16 bits Source IP address Destination IP address Option Figure 2.5: IP Datagram 13

24 2.3 DIFFERENT APPROACHES TO SOLVE THE SIMILAR PROBLEM Pandora: A Flexible Network Monitoring Platform This project is done by Simon Patarin and Mesaac Makpangou from Inra Sor Group Rocquencourt, France. The main objective in this project is developing a netw^ork monitoring platform that captures packets using purely passive techniques. The methodology is performed by stacking the appropriate components. Then the evaluations were conducted to show the overheads due to Pandora's flexibility do not significantly affect performance. They find that the layering structure of Pandora has little impact on performance in comparison with the tcpdump. Furthermore, they also get a result that the Pandora is not fast enough to monitor high bandwidth network, dedicated to HTTP. In addition, Pandora is an efficient flexible continuous monitoring tool that can be can run at 24 hours a day, 7 days a week BLT: Bi-Layer Tracing of HTTP and TCP/IP According to Anja Feldmann from Universitaat des Saarlandes, Saarbrucken, Germany, this project is to develop software that allows collecting traces continuously, online, and at any point in the network. It used Dec Alpha platform to implementing the packet collection from the network. The methodology that is used in gathering the information from the user that is running modified Web Browsers; from Web content provider logging information about which data is retrieved from their Web server; from Web proxies logging information about which data is requested by the users of the Web proxy; and from the wire via packet monitoring. The finding from this project is no notion of files and requests, responses pairs will be properly matched among others. 14

DEVELOPING A WEB-BASED PACKET MONITORING TOOL

DEVELOPING A WEB-BASED PACKET MONITORING TOOL DEVELOPING A WEB-BASED PACKET MONITORING TOOL Hamsiah bt. Mohamed Said 2003192664 Bachelor of Science (Hons) Data Communication and Networking Faculty of Information Technology and Quantitative Sciences

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Transport Layer. Chapter 3.4. Think about

Transport Layer. Chapter 3.4. Think about Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard)

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Internet Protocols. Background CHAPTER

Internet Protocols. Background CHAPTER CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

The present and the future of TCP/IP

The present and the future of TCP/IP The present and the future of TCP/IP David Espina Project in Electronics dea09001@student.mdh.com Dariusz Baha Computer science dba04002@student.mdh.se ABSTRACT The Transport Control Protocol (TCP) and

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Universiti Teknologi MARA. ANALYSIS THE PERFORMANCE OF VIDEO CONFERENCING BASED ON QUALITY OF SERVICE (QoS) Nor Hayaty binti Amran

Universiti Teknologi MARA. ANALYSIS THE PERFORMANCE OF VIDEO CONFERENCING BASED ON QUALITY OF SERVICE (QoS) Nor Hayaty binti Amran Jb^O00 2^^Zf Universiti Teknologi MARA ANALYSIS THE PERFORMANCE OF VIDEO CONFERENCING BASED ON QUALITY OF SERVICE (QoS) Nor Hayaty binti Amran Thesis submitted in fulfilment of the requirements for BSc

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

How To Understand The Internet Of S (Netware)

How To Understand The Internet Of S (Netware) Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation

More information

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Advanced Computer Networks Project 2: File Transfer Application

Advanced Computer Networks Project 2: File Transfer Application 1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software TCP/IP Programming Joel Snyder, Opus1 Geoff Bryant, Process Software Portions Copyright 1996 TGV Software, Inc., Copyright 1996 Process Software Corp. Copyright 1996 Opus1 Course Roadmap Slide 2 NM055

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP. Advanced TCP/IP Overview There is one primary set of protocols that runs networks and the Internet today. In this lesson, you will work with those protocols: the Transmission Control Protocol (TCP) and

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

A comparison of TCP and SCTP performance using the HTTP protocol

A comparison of TCP and SCTP performance using the HTTP protocol A comparison of TCP and SCTP performance using the HTTP protocol Henrik Österdahl (henost@kth.se), 800606-0290, D-01 Abstract This paper discusses using HTTP over SCTP as an alternative to the traditional

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

VisuSniff: A Tool For The Visualization Of Network Traffic

VisuSniff: A Tool For The Visualization Of Network Traffic VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 oechsle@informatik.fh-trier.de Oliver Gronz University

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

TCP Performance Management for Dummies

TCP Performance Management for Dummies TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Per-Flow Queuing Allot s Approach to Bandwidth Management

Per-Flow Queuing Allot s Approach to Bandwidth Management Allot s Approach to Bandwidth Management February 2002 Table of Contents Introduction...3 An Overview of TCP/IP...3 What is Bandwidth Management?...4 Allot s Per-Flow Queuing...5 How It Works... 5 Per-Flow

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Ethereal: Getting Started

Ethereal: Getting Started Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me

More information

MASTER'S THESIS. Testing as a Service for Machine to Machine Communications. Jorge Vizcaíno 2014

MASTER'S THESIS. Testing as a Service for Machine to Machine Communications. Jorge Vizcaíno 2014 MASTER'S THESIS Testing as a Service for Machine to Machine Communications Jorge Vizcaíno 2014 Master of Science (120 credits) Computer Science and Engineering Luleå University of Technology Department

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

Introduction to IP networking

Introduction to IP networking DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill david.idol@unc.edu http://www.cs.unc.edu/~mxrider

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information