DEVELOPING A WEB-BASED PACKET MONITORING TOOL

Size: px
Start display at page:

Download "DEVELOPING A WEB-BASED PACKET MONITORING TOOL"

Transcription

1 DEVELOPING A WEB-BASED PACKET MONITORING TOOL Hamsiah bt. Mohamed Said Bachelor of Science (Hons) Data Communication and Networking Faculty of Information Technology and Quantitative Sciences Mara University of Technology Shah Alam May 2006

2 Title: DEVELOPING A WEB-BASED PACKET MONITORING TOOL By: HAMSIAH BT. MOHAMED SAID ( ) A project paper submitted to FACULTY OF INFORMATION TECHNOLOGY AND QUANTITATIVE SCIENCES MARA UNIVERSITY OF TECHNOLOGY In partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by Examining Committee: Major Area: MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM, SELANGOR MAY 2006 i

3 CERTIFICATION OF ORIGINALITY This is certify that I am responsible for the work submitted in this project that the original work is my own except as specified in the references and acknowledgement and that the original work contained herein have not been taken or done by unspecified sources or persons. (HAMSIAH BT MOHAMED SAID) ii

4 ACKNOWLEDGEMENT BISMILLAHIRRAHMANIRRAHIM In the name of Allah, the most gracious and the most merciful. Alhamdulillah, thanks to the Almighty for the blessing me with strength and courage to complete this report. In the midst of preparing and completing this report, I have the privilege of obtaining assistance and guidance from various sources. Therefore, I would like to express my deepest appreciation to those involved in this thesis. First and foremost, I would like to express my appreciations and millions of thanks to my project supervisor, Pn. Zarina binti Zainol, who had sacrificed time and effort in providing me with ideas and guidance through this semester in order to complete this thesis. Other than that, a special thanks to Assoc Prof. Dr Saadiah bt. Yahya for her support, advice, tips and ideas to do my report and project. I also would like to thank for my examiner, En. Jamaluddin b. Md. Yusof for his support and guidance in this project. A great thank to all SIG group, CTN lecturers and staff FTMSK that have guided and providing me with valuable of information and support during construct this project. Special thanks to my family for understanding, encouragement and support my study. To my fellow friends whose name is remaining anonymous, I would like to thank for their help, friendship and countless support to me. May Allah S.W.T. bless all of them for their support. Thank you to all of you from the deepest of my heart. iii

5 ABSTRACT This project is an effort in to develop a web-based program to monitor the network traffic over a local host and a local network based on the flow of the User Datagram Protocol. This system was developed to have the feature that can show packet traffic in detail such as source and destination IP address, source and destination port number, total number of packets transferred, session and other data. Besides, it capable to capture traffic from multiple network adapters simultaneously. This monitoring tool uses the web interface so users can easily access traffic information via generic and easy to use Web browser. It also has the ability to sort and retrieve the information from database. This program will be written in java language on background process and PHP on foreground process based on Window XP Operating System platform. Throughout this report, there will be altogether 5 chapters. The first chapter will be explaining the scope and objective of this project. Second chapter focus on some definition of pertinent terminologies and other projects related to this project. The third chapter will be discussing the method being used to develop the system or program. The fourth chapter will present the results from this project and finally the overall progress and achievement of this project will be discussed in chapter five. iv

6 TABLE OF CONTENTS PAGE CHAPTER 1: INTRODUCTION 1.1 PREFACE PROBLEM STATEMENT PROJECT OBJECTIVE PROJECT SCOPE SIGNIFICANCE OF THE PROJECT CHAPTER 2: LITERATURE REVIEW 2.1 INTRODUCTION DEFINITION OF PERTINENT TERMINOLOGIES Web-based application Packet Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Port Number DIFFERENT APPROACHES TO SOLVE THE SIMILAR PROBLEM Developing TCP/IP and UDP Traffic Monitoring Tool Network Traffic Monitoring Analysis-SITARA Quality of Service Works 5000TM Developing A Packet Capturing Program Developing Port Scanning Detector Program CONCLUSION CHAPTER 3: METHODOLOGY 3.1 INTRODUCTION RESEARCH METHODOLOGY Data Collection..13 v

7 3.2.2 Design and Development Planning Analysis Design Implementation Testing HARDWARE AND SOFTWARE REQUIREMENT Hardware Requirement Software Requirement CONCLUSION..22 CHAPTER 4: FINDINGS AND DISCUSSIONS 4.1 INTRODUCTION MONITORING THE PACKET Background Process Foreground Process DISCUSSION CHAPTER 5: CONCLUSION AND RECOMMENDATION 5.1 CONCLUSION BENEFITS RECOMMENDATION FOR FUTURE WORK..34 BIBLIOGRAPHY.35 vi

8 APPENDIX A: Installation of J2SDK & NetBeans IDE..36 APPENDIX B: Installation of Apache..39 APPENDIX C: Installation of PHP...41 APPENDIX D: Program Source Code a) Java Monitor Program...44 b) Create Database 51 c) PHP Script.53 GANTT CHART.68 vii

9 LIST OF FIGURES FIGURES NUMBER NAME PAGES 3.1 Methodology Flow Flowchart of Background Process Flowchart of Foreground Process Input Dialog for Username Input Dialog for Password Table of Adapter Type Table of UDP Exit Button The Main Page Record on Device Record on Device Delete Button Confirmation Delete Button.32 viii

10 LIST OF TABLE TABLE NUMBER NAME PAGES 1.0 TCP Packet Format UDP Packet Format.10 ix

11 CHAPTER 1 INTRODUCTION 1.1 PREFACE As a network evolves and grows, it becomes a more critical and indispensable resource to the organization. As more network resources are available to users, the network becomes more complex, and maintaining the network becomes more complicated. Loss of network resources and poor performance are results of increased complexity and are not acceptable to the users. The network administrator must actively manage the network, diagnose problems, prevent situations from occurring, and provide the best performance of the network for the users. Effective management of LANs and WANs is the key element to maintaining a productive environment in the networking world. As more services become available to more users, the performances of networks suffer. Network administrators, through constant monitoring, must recognize and be able to rectify problems before they become noticeable to the end users. Various tools and protocols are available to monitor the network on a local and remote basis. A comprehensive understanding of these tools is critical to effective network management. So, the first step to solve this problem is by monitoring the traffic with suitable and cost effective tool. The proposed tool is by packet monitoring tool that will be developing by us. This tool will be used to monitor the packet in the network and make an analysis about the packet in the network. This tool will be used to monitor and track the record packet connection traffic. It can view detailed statistics for IP connections: IP addresses, ports, sessions, etc. Besides that this tool can capture traffic form multiple adapters simultaneously. This monitoring tool also has the ability to sort and retrieve the tracked data in a database access and 1

12 provide statistical information to the user. This data can be access quickly and easily. Thus, the information obtained can be used to monitor and address trends in network utilization before they become problem. 1.2 PROBLEM STATEMENT In the communication networks, traffic is the common problem that always occurs to the end users. As the network expands, traffic become heavy, thus possibilities for the networks to congest is very high. The rapidly growing number of users and application and especially the growth in recreational traffic, has led to application slow downs and user complaints. Network administrators are under pressure to fix these problems despite tight budgets and limited staff. Network administrator needs cost-effective, intuitive tools that can be used to monitor the traffic in the network and make an analysis about the traffic utilization before they become problem. Furthermore, there are problems to get a tool to monitor traffic in windows platform. Many tools already are provided for the Linux and FreeBSD platform. So, this tool is developing to operate in Windows environment. Besides that, other tool stores all record into the log file and not into database access. So, this tool will track the record in the database access and make it easy for network administrator to analyst the traffic. Regarding to this matter, this project was carried out in order to fulfill this requirement. Furthermore, this program is open source or proprietary software. So all the users can use this program without license and it is free. 1.3 PROJECT OBJECTIVE 2

13 By looking at brief introduction and problem statement before, the main objectives of this project are: i. To develop a tool that can be used to monitor the flow of packet connection traffic in a network, where it can: a) Track the record of packet connection traffic via web-based application. b) Keep the data tracked in a database access and provides statistical information to the Network Administrator. 1.4 PROJECT SCOPE In completing this project, several scopes have been taken as a guideline. The scopes are as follows: a) This tool can be used to monitor the network traffic between Local Area Network. b) This project will be used in a Windows environment. 1.5 PROJECT SIGNIFICANCE By completing this project we hope that the tool can be used to monitor the flow of traffic in order to give important statistical information to network administrator to manage the network flow and performance. By managing the traffic, the network productivity can be enhanced by giving the priority to the work related application. As for the user, they will be receiving a better performance if the network performance has been well monitored and managed. This monitoring tool uses the web interface so users can easily access traffic information via generic and easy to use Web browser. This project also gives significance to researcher because it gives an experience about how to develop a program that can monitor packets over the network. 3

14 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Literature review is the beginning of the framework that will be used as reference or guideline to researchers. In this chapter, we will review all information related to get better understanding. Besides that we will review the concept of TCP/IP and UDP and state a few things that should be understand to develop this web-based packet monitoring tool. 2.2 DEFINITION OF PERTINENT TERMINOLOGIES Web-based application Web-based application is a program that runs on computer that connects to the Internet and control using the simple Web browser (like Netscape or Internet Explorer) provides. The interface consists of all of the various objects that a browser can display, like text, images, text boxes, check boxes, radio buttons, and push buttons. Though the underlying language that describes how a web page should appear - called HTML - is somewhat restrictive in regards to exact layout specifications and sizing, Web browser can conceivably act as an interface to just about any program that exists. The browser retrieves and displays a starting Web page which usually has built-in connections to other documents. (Discovering Computers, Shelly Cashman Series, 2005) Packet 4

15 A packet is the unit of data that is routed between an origin and a destination on the internet or any other packet-switched network. When any file ( message, HTML file, Uniform Resource Locator (URL), and so fourth) is sent from one place to another, the Transmission Control Protocol (TCP) layer of TCP/IP divides the file into chunks of an efficient size for routing. Each of these packets is separately numbered and includes the Internet address of the destination. The individual packets for a given file may travel different routes through the network or Internet. When they have all arrived, they are reassembled into the original file by the TCP layer at the receiving end. On the Internet, the network breaks an message into parts of a certain size in bytes. These are the packets. Each packet carries the information that will help it get to its destination -- the sender's IP address, the intended receiver's IP address, something that tells the network how many packets this message has been broken into and the number of this particular packet. The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. A typical packet contains perhaps 1,000 or 1,500 bytes. Each packet is then sent off to its destination by the best available route -- a route that might be taken by all the other packets in the message or by none of the other packets in the message. This makes the network more efficient. First, the network can balance the load across various pieces of equipment on a millisecond-by-millisecond basis. Second, if there is a problem with one piece of equipment in the network while a message is being transferred, packets can be routed around the problem, ensuring the delivery of the entire message. Depending on the type of network, packets may be referred to by another name: frame block cell segment Most packets are split into three parts: 5

16 Header - The header contains instructions about the data carried by the packet. These instructions may include: o Length of packet (some networks have fixed-length packets, while others rely on the header to contain this information) o Synchronization (a few bits that help the packet match up to the network) o Packet number (which packet this is in a sequence of packets) o Protocol (on networks that carry multiple types of information, the protocol defines what type of packet is being transmitted: , Web page, streaming video) o Destination address (where the packet is going) o Originating address (where the packet came from) Payload - Also called the body or data of a packet. This is the actual data that the packet is delivering to the destination. If a packet is fixed-length, then the payload may be padded with blank information to make it the right size. Trailer - The trailer, sometimes called the footer, typically contains a couple of bits that tell the receiving device that it has reached the end of the packet. It may also have some type of error checking. The most common error checking used in packets is Cyclic Redundancy Check (CRC). CRC is pretty neat. Here is how it works in certain computer networks: It takes the sum of all the 1s in the payload and adds them together. The result is stored as a hexadecimal value in the trailer. The receiving device adds up the 1s in the payload and compares the result to the value stored in the trailer. If the values match, the packet is good. But if the values do not match, the receiving device sends a request to the originating device to resend the packet. Each packet's header will contain the proper protocols, the originating address, the destination, and the packet number (1, 2, 3 or 4 since there are 4 packets). Routers in the network will look at the destination address in the header and compare it to their lookup table to find out where to send the packet. Once the packet arrives at its destination, computer will strip the header and trailer off each packet and reassemble the based on the numbered sequence of the packets. 6

17 2.2.3 Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) is a reliable connection protocol. Computers that communicate using this type of protocol must establish a mutual connection between them and keep the two way conversation alive to ensure full data connectivity. ( Behrouz A. Forouzan, 2003). TCP maintains the reliability of data flow by implementing a kind of flow control mechanism known as windowing or sliding window. This mechanism helps to avoid the sender from overwhelming the receiver with packets or data that cannot be stored by the receiver s memory. In addition, TCP uses acknowledgement to ensure that the data sender sends reach safely on the receiver side. A TCP packet looks like this: Source port address (16 bits) Destination port address (16 bits) Sequence number (32 bits) Acknowledgement number (32 bits) Header Reserved Control Window size length (6 bits) (6 bits) (16 bits) (4 bits) Checksum Urgent pointer (16 bits) (16 bits) Options and padding Table 1: TCP Packet Format 7

18 The segment consists of a byes header, followed by data from the application program. The header is 20 bytes if there is no option and up to 60 bytes if it contains options. The meaning and purpose of these header fields are: Source port address This is a 16-bit field that defines the port number of the application program in the host that is sending the segment. Destination port address This is 16-bit field that defines the port number of the application program in the host that is receiving the segment. Sequence number This 32-bit field defines the number assigned to the first byte of data contained in this segment. The sequence number tells the destination which byte in this sequence comprises the first byte in the segment. Acknowledgment number This 32-bit field defines the byte number that the receiver of the segment is expecting to receive from the other party. Header length This 4-bit field indicates the number of 4-byte words in the TCP header. Reserved This is a 6 bit field reserved for future use. Control This field defines control bits to enable flow control, connection establishment and termination, connection abortion and the mode of data transfer in TCP. 8

19 Window size This field defines the size of the window, in bytes, that the other party must maintain. Checksum This 16-bit field contains the checksum whereas the inclusion of the checksum for TCP is mandatory. Urgent pointer This is 16-bit field, which is valid only if the urgent flag is set, is used when the segment contains urgent data. Option There can be up to 40 bytes of optional information in the TCP header User Datagram Protocol (UDP) The User Datagram Protocol (UDP) is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. UDP transmits much less information and UDP packets are both simpler and smaller than TCP packets. It is connectionless and does not provide a reliable transport. User Datagram Protocol provides a mechanism for applications to send encapsulated raw IP datagram and send them without having to establish a connection. UDP gives an application a direct access to the datagram service of the IP layer. (Cisco Networking Academy Program, 2th edition. Cisco Press. 2001). The following lists some uses of the UDP protocol: 9

20 UDP is suitable for a process that requires simple request-response communication with little concern for flow and error control. It is not usually used for a process that needs to send bulk data such as FTP. UDP is suitable for a process with internal flow and error control mechanism. For example, the Trivial File Transfer Protocol (TFTP) process includes flow and error-control. UDP is suitable transport protocolfor multicasting and broadcasting capabilities are embedded in the UDP software but not in TCP software. UDP is used for management process such as SNMP. UDP is used for some route updating protocols such as Routing Information Protocol. A UDP packet looks like this: Source port number Destination port number (16 bits) (16 bits) Total length Checksum (16 bits) (16 bits) Table 2: UDP Packet Format PORT NUMBER Ports are transport layer (TCP and UDP) connection points numbered from 0 to 65,535. According to Internet Assigned Number Authority (IANA) classification, the port space of 0 to 65,535 actually breaks down into three ranges. The first 1024 ports (0-1023) are system-reserved ports or well known ports. They are used only by the system or root process and programs executed by privileged users. The next group of ports is called registered ports. This group ranges from 1024 to The last groups of ports range from to This group is referred to as dynamic or private ports. Ports are used by the operating system to make connections to remote systems. Through ports, the system can identify which service it is requesting from another 10

21 system. There are more than hundreds of TCP and UDP ports, but in this project we will implement the standard port. 2.3 DIFFERENT APPROACHES TO SOLVE THE SIMILAR PROBLEM This section briefly discussed any similarity and differences on our project Developing TCP/IP and UDP Traffic Monitoring Tool. This project is done by Rafiq B. Che Mat, CS 225 April The main objective is to develop a tool to monitor the TCP/IP and UDP traffic. The implementation is done by using basic language (Visual Basic 6.0) program. Methodology used is an analysis, design, implementation and testing. The differences with our project are the development of this tool is use PHP program Network Traffic Monitoring Analysis-SITARA Quality of Service Works 5000TM This research is done by Mashitah Bt. Mohd. Ghazali, CS225 May The background and objective is to make analysis from monitoring network traffic by application or protocol : HTTP, FTP, Telnet, SMTPUDP and SMTPTCP. The finding in this project is the best way to improve the network performance is by implementing the Quality of Service Solution Developing A Packet Capturing Program This research was done by Norizah Bt. Hamzah in May Her project is develop a program to capture packet from the network interface card. and analyze same protocol such as ICMP, TCP and UDP. The differences with our project that her packet-capturing program written in C language based on Linux Operating System platform. 11

22 2.3.4 Developing Port Scanning Detector Program This project is done by Muhammad Fendi B. Osman. The main objective of this project is to develop a host base Port Scanning Detector Program that is able to detect various port scanning activities. The program written in C programming language and run in Linux RedHat 9.0 operating system. 2.4 CONCLUSION As a conclusion, the preliminary study before the research is performed is important as it will provide the information needed in the next stage of designing the algorithm and detailing the problem scope. In this chapter the information about the traffic monitoring tool gathered and its problem scope and parameter involved and the past study done on problem area should lead to better understanding on the problem. It also gives new ideas to be applied into this research. 12

23 CHAPTER 3 RESEARCH METHODOLOGY 3.1 INTRODUCTION In order to accomplish this research, a sequence of methodologies is to be needed. It is a crucial to organize the phases systematically as it is a vital role in ensuring the process of finishing this project paper is well planned. Below is the list of processes involved in this research methodology. 3.2 RESEARCH METHODOLOGY There are a few phases involved in this project such as: Data Collection Design and Development o Planning o Analysis o Design o Implementation o Testing Evaluation and Finding 13

24 Figure 3.1: Methodology Flow Data Collection Data collection is needed to gather information including getting the literature review about a particular topic. Beside that, another approach to solve the similar problem also is findings as references. All the data are collected from the references books and others sources such as surfing internet. In addition, the latest software that can capture the data traffic 14

Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. RAFIQ BIN CHE MAT (2003285011)

Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. RAFIQ BIN CHE MAT (2003285011) Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. By RAFIQ BIN CHE MAT (2003285011) A project paper submitted to FACULTY OF INFRMATION TECHNOLOGY AND QUANTITATIVE SCIENCES MARA UNIVERSITY OF TECHNOLOGY

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Transport Layer. Chapter 3.4. Think about

Transport Layer. Chapter 3.4. Think about Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Transformation of honeypot raw data into structured data

Transformation of honeypot raw data into structured data Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

A WEB-BASED SYSTEM APPLYING THE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) CONCEPTS ON CUSTOMER SERVICES AND SUPPORT (CSS)

A WEB-BASED SYSTEM APPLYING THE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) CONCEPTS ON CUSTOMER SERVICES AND SUPPORT (CSS) 3-7455 A WEB-BASED SYSTEM APPLYING THE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) CONCEPTS ON CUSTOMER SERVICES AND SUPPORT (CSS) IN INSTITUTE OF RESEARCH, DEVELOPMENT AND COMMERCIALIZATION (IRDC), UiTM SHAH

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP. Advanced TCP/IP Overview There is one primary set of protocols that runs networks and the Internet today. In this lesson, you will work with those protocols: the Transmission Control Protocol (TCP) and

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

TCP/IP and the Internet

TCP/IP and the Internet TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Module 1: Reviewing the Suite of TCP/IP Protocols

Module 1: Reviewing the Suite of TCP/IP Protocols Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008

More information

Universiti Teknologi MARA. ANALYSIS THE PERFORMANCE OF VIDEO CONFERENCING BASED ON QUALITY OF SERVICE (QoS) Nor Hayaty binti Amran

Universiti Teknologi MARA. ANALYSIS THE PERFORMANCE OF VIDEO CONFERENCING BASED ON QUALITY OF SERVICE (QoS) Nor Hayaty binti Amran Jb^O00 2^^Zf Universiti Teknologi MARA ANALYSIS THE PERFORMANCE OF VIDEO CONFERENCING BASED ON QUALITY OF SERVICE (QoS) Nor Hayaty binti Amran Thesis submitted in fulfilment of the requirements for BSc

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

How To Understand The Internet Of S (Netware)

How To Understand The Internet Of S (Netware) Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult: How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Network Management Quality of Service I

Network Management Quality of Service I Network Management Quality of Service I Patrick J. Stockreisser [email protected] Lecture Outline Basic Network Management (Recap) Introduction to QoS Packet Switched Networks (Recap) Common

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

Universiti Teknologi MARA. Implementing Net-Talk in FTMSK

Universiti Teknologi MARA. Implementing Net-Talk in FTMSK Universiti Teknologi MARA Implementing Net-Talk in FTMSK Mohd Hizzol Bin Mohd Yusof Thesis submitted in fiilfqlment of the requirements for Bachelor of Science (Hons) In Data Communication And Networking

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively

More information

User Datagram Protocol - Wikipedia, the free encyclopedia

User Datagram Protocol - Wikipedia, the free encyclopedia Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers

More information

DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954

DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954 DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET By NUR ATIQAH BT. HASAN 2003470954 In partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons.) IN DATA COMMUNICATION AND NETWORKING

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services

Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services CS4983 Senior Technical Report Brian Chown 0254624 Faculty of Computer Science University of New Brunswick Canada

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

How To Understand The Layered Architecture Of A Network

How To Understand The Layered Architecture Of A Network COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

EE984 Laboratory Experiment 2: Protocol Analysis

EE984 Laboratory Experiment 2: Protocol Analysis EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Internet Packets. Forwarding Datagrams

Internet Packets. Forwarding Datagrams Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

More information