Free Essay

Computer Network Lab Manual

In: Computers and Technology

Submitted By MahanteshGowda
Words 3647
Pages 15
CN LAB REPORT

Dept. of ISE, BVBCET
Department of Information Science & Engineering,
BVBCET Hubballi

COMPUTER NETWORKING
LAB
Mahantesh Patil 2BV14IS410

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-01
List the hardware components
1) Difference between switch and Hub:
2) Difference between SWITCH and ROUTER
3) Differences between Router and Gateway
4) What is the Difference between Subnetting and Supernetting?

HARDWARE COMPONENTS

Cables:

1|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable,
Twisted pair cable.

RJ-45

The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in
Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way.

2|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

SWITCHES:

Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports.

NIC(NETWORK INTERFACE CARD)

A network card, network adapter, or NIC is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the MAC address Each network interface card has its unique id. This is written on a chip which is mounted on the card
3|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Hub:

A hub is a networking device used to connect multiple devices directly to the network using cables. Each connection is called a 'port.' The connections typically consist of a fiber optic
Ethernet cable. When the hub receives data at one of its ports, it distributes the data to the other ports in the network. Typically, a hub sends all the data it receives to all the other ports.

Routers:

A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes – from the small, four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. Includes a mainframe system will need a gateway since this type of network uses different communication protocols.

4|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

GATEWAY:

A gateway interfaces networks that use different protocols. A gateway may contain devices such as protocol translator, impedance matching devices, rate converters, etc
Gateways, also called protocol converts, can operate at any network layer. The activities of a gateway are more complex than that of the router or switch as it communicates using more than one protocol.

Bridges:
Bridges are networking devices that divide up the network into different segments to manage the amount of traffic. This prevents unnecessary traffic from entering other parts of the network and reduces congestion. As a network becomes more complex, bridges make sure your network speed doesn't drop dramatically.

5|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

SERVER:

Server: In information technology, a server is a computer program that provides services to other computer programs in the same or other computers. A server is both a running instance of some software capable of accepting requests from clients, and the computer such a server runs on. Servers operate within a client-server architecture where "servers" are computer programs running to serve the requests of other programs, the "clients"

6|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Difference between switch and Hub:
Hub: In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.
Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance
Switch: A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons a switch is considered to be a much better choice than a hub.

Difference between SWITCH and HUB
Hub

Switch
Physical layer. Hubs are classified as Data Link Layer.
Layer 1 devices per the OSI model.
Network switches operate at Layer 2 of the OSI model.

Layer

4/12 ports

Switch is multi port Bridge. 24/48 ports Passive Device (Without Software)

Active
Device
(With Software) &
Networking device

Ports

Device Type

Data form Transmission

Electrical signal or bits

Frame (L2 Switch)
Frame
&Packet
(L3 switch)

7|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Difference between Switch and Router:
Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports
Router: A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes – from the small, four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. Includes a mainframe system will need a gateway since this type of network uses different communication protocols. Difference between Routers and Gateway:
Routers: are communication devices used to connect two different networks. A router sorts incoming data and distributes it to the correct destination. For example, if you have a network within a single office building, many different devices from within the network may access resources outside the network. The best example of this would be the Internet. A router ensures that requests from within the network for information over the Internet are distributed to the correct computer within the network.
The Internet itself uses numerous routers to direct all the traffic taking place. Such routers are typically very large and heavy-duty pieces of hardware, designed to handle huge amounts of data traffic. Routers can be used for wired connection, wireless connections or both. A router that provides a wireless connection is referred to as a 'wireless router.'
While routers are used to connect different networks, they only work if the network protocols are the same. A gateway interfaces networks that use different protocols. You can think of a gateway as a router that includes protocol translators. The terms 'router' and 'gateway' are often used interchangeably, but it is important to remember that only gateways make it possible to connect networks using different protocols.
Since the Internet and many other computer networks use the same TCP/IP protocols, routers are sometimes all that is needed for a particular network. However, any network that also

8|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

What is Subnetting?
Process of dividing an IP network in to sub divisions is called subnetting. Subnetting divides an IP address in to two parts as the network (or routing prefix) and the rest field (which is used to identify a specific host). CIDR notation is used to write a routing prefix. This notation uses a slash (/) to separate the network starting address and the length of the network prefix
(in bits). For example, in IPv4, 192.60.128.0/22 indicates that 22 bits are allocated for the network prefix and the remaining 10 bits are reserved for the host address. In addition, routing prefix can also be represented using the subnet mask. 255.255.252.0
(11111111.11111111.11111100.00000000) is the subnet mask for 192.60.128.0/22.
Separating the network portion and the subnet portion of an IP address is done by performing a bitwise AND operation between the IP address and the subnet mask. This would result in identifying the network prefix and the host identifier.

What is Supernetting?
Supernetting is the process of combining several IP networks with a common network prefix.
Supernetting was introduced as a solution to the problem of increasing size in routing tables.
Supernetting also simplifies the routing process. For example, the subnetworks 192.60.2.0/24 and 192.60.3.0/24 can be combined in to the supernetwork denoted by 192.60.2.0/23. In the supernet, the first 23 bits are the network part of the address and the other 9 bits are used as the host identifier. So, one address will represent several small networks and this would reduce the number of entries that should be included in the routing table. Typically, supernetting is used for class C IP addresses (addresses beginning with 192 to 223 in decimal), and most of the routing protocols support supernetting. Examples of such protocols are Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF). But, protocols such as Exterior Gateway Protocol (EGP) and the Routing Information Protocol (RIP) do not support supernetting.

9|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-02
Work on all networking commands in command prompt
Commands:
ARP

Ipconfig

Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display the network settings currently assigned and given by a network. This command can be utilized to verify a network connection as well as to verify your network settings.

10 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Ipconfig\all

Ping

11 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Ping is one of the most commonly used network commands that allows you to ping another network IP address. Pinging another address helps determine if the network card can communicate within the local network or outside network.

telnet

Netstat

The netstat command is used to display the TCP/IP network protocol statistics and information. 12 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Ns lookup

The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network.

Tracert
The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a network packet travels through the network and where it may fail or slow down. Using this information you can determine the computer, router, switch or other network device possibly causing your network issues.

13 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

After connecting a two pc’s
Ipconfig

14 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Netstat

Ns lookup

Tracert

15 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-03
Study the different header formats

Protocol Header Format
TCP

TCP segments are sent as internet datagrams. The Internet Protocol header carries several information fields, including the source and destination host addresses. A TCP header follows the internet header, supplying information specific to the TCP protocol. This division allows for the existence of host level protocols other than TCP.

16 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Table 156: TCP Segment Format
Field Name

Size
Description
(bytes)

2

Source Port: The 16-bit port number of the process that originated the TCP segment on the source device. This will normally be an ephemeral (client) port number for a request sent by a client to a server, or a wellknown/registered (server) port number for a reply from a server to a client.

2

Destination Port: The 16-bit port number of the process that is the ultimate intended recipient of the message on the destination device. This will usually be a wellknown/registered (server) port number for a client request, or an ephemeral (client) port numberfor a server reply. 4

Sequence Number: For normal transmissions, the sequence number of the first byte of data in this segment. In a connection request (SYN) message, this carries the initial sequence number (ISN) of the source
TCP. The first byte of data will be given the next sequence number after the contents of this field

Acknowledgme
4
nt Number

Acknowledgment Number: When the ACK bit is set, this segment is serving as an acknowledgment (in addition to other possible duties) and this field contains the sequence number the source is next expecting the destination to send.

Source Port

Destination
Port

Sequence
Number

Data Offset

1/2
(4 bits)

Data Offset: Specifies the number of 32-bit words of data in the TCP header. In other words, this value times four equals the number of bytes in the header, which must always be a multiple of four. It is called a “data offset” since it indicates by how many 32-bit words the start of the data is offset from the beginning of the TCP segment. Reserved

3/4
(6 bits)

Reserved: 6 bits reserved for future use; sent as zero.

17 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Control Bits

Window

Checksum

Urgent Pointer

Dept. of ISE, BVBCET

3/4
(6 bits)

2

Window: Indicates the number of octets of data the sender of this segment is willing to accept from the receiver at one time. This normally corresponds to the current size of the buffer allocated to accept data for this connection. This field is, in other words, the current receive window size for the device sending this segment, which is also the send window for the recipient of the segment. 2

Checksum: A 16-bit checksum for data integrity protection, computed over the entire TCP datagram plus a special “pseudo header” of fields. It is used to protect the entire TCP segment against not just errors in transmission, but also errors in delivery. Optional alternate checksum methods are also supported.

2

Urgent
Pointer: Used in conjunction with the URG control bit for priority data transfer. This field contains the sequence number of the last byte of urgent data. 18 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Options

Variabl e Padding

Padding: If the Options field is not a multiple of 32 bits
Variabl
in length, enough zeroes are added to pad the header so e it is a multiple of 32 bits.

Data

Variabl
Data: The bytes of data being sent in the segment. e UDP HEADER FORMAT

The User Datagram Protocol offers only a minimal transport service -- non-guaranteed datagram delivery -- and gives applications direct access to the datagram service of the IP layer. UDP is used by applications that do not require the level of service of TCP or that wish to use communications services (e.g., multicast or broadcast delivery) not available from
TCP.
UDP is almost a null protocol; the only services it provides over IP are check summing of data and multiplexing by port number. Therefore, an application program running over UDP
19 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

must deal directly with end-to-end communication problems that a connection-oriented protocol would have handled -- e.g., retransmission for reliable delivery, packetization and reassembly, flow control, congestion avoidance, etc., when these are required. The fairly complex coupling between IP and TCP will be mirrored in the coupling between UDP and many applications using UDP.
DHCP

Op – the message type (see DHCP message types table below)
Htype – Hardware address type (see HTYPE codes table below)
20 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Hlen – Hardware address length
Hops – set to zero by a client – but can optionally be used when booting via a relay agent
Xid – Transaction ID, a random number choosen by the client, used by the client and server so that no-one get confused between messages.
Secs – The number in seconds since the address was allocated, the client fills this part
Flags – Exactly what it says on the tin
Ciaddr – The clients IP address, but only if they have one, basically if the client is BOUND,
RENEW or REBINDING.
Yiaddr – Your (client) IP address.
Siaddr – IP address of the next server to use in bootstrap. Is returned in DHCPOFFER and
DHCPACK messages by the DCHP server.
Giaddr – VPN server IP address used in booting via relay agents
Chaddr – Client Hardware address (should be unique – LOL)
Sname – Optional server host name, should be a null terminated string
File – Boot file name, it should be a null terminated string. For DHCPDISCOVER messages it should be a fully generic name or null, for DHCPOFFER messages it should be a fully qualified directory path name.
Options – For optional parameters.
ARP

21 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

HTTP

DNS

22 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

As we can see, the Type field (red circle) in the first answer of the Authoritative Name Servers section is set to NS, which means this part contains information about the Authoritative name servers of the queried domain.

Going to the first answer of the Additional records, we can see that the Type field here is set to A, which means the data contained in this part is an IP address for the particular host.
When requesting the name servers for a domain, it also also essential their IP address is also provided, so that the client can construct a DNS query and send it to the name servers for that domain. In this article we analysed the DNS response message format by looking into the details of a DNS response packet. We also covered the different DNS type field messages and explained the contents of the DNS Response message.

23 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-04
Correlate Theory with TCP protocol
Using Netmon tool we are analysing TCP protocol with theory concepts. The following snaps will show the TCP protocol header formats.

In this below snap it shows TCP header format like,
Sorceport, destport, seqnumber, acknumber, etc

24 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Graph:

25 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

26 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-05
Bit Stuffing:
Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signalling information to a receiver. The receiver knows how to detect and remove or disregard the stuffed bits.
 Each frame begins and ends with a special bit pattern called a flag byte [01111110].
 Whenever sender data link layer encounters five consecutive ones in the data stream, it automatically stuffs a 0 bit into the outgoing stream.
 When the receiver sees five consecutive incoming ones followed by a 0 bit, it automatically de-stuffs the 0 bit before sending the data to the network layer.
Bit Stuffing:
Input Data: 0110111111100111110111111111100000
Stuffed data: 011011111 0 110011111 0 011111 0 11111 0 00000
Red colour highlighted bit is stuffed bit.
Unstuffed data: 0110111111100111110111111111100000

27 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Code:
Server:
#include
#include
#include
#pragma comment(lib,"ws2_32.lib") //Winsock Library int main(int argc , char *argv[])
{

WSADATA wsa ;
SOCKET s , new_socket; struct sockaddr_in server , client; int c, cnt; char msg [100],msg1[100]; char client_reply[2000]; int recv_size; int count=0,j,nl; int i,jl,a; char ar[60]; int flag = 0;

printf("\nInitialising Winsock..."); if (WSAStartup(MAKEWORD(2,2),&wsa) != 0)
{
printf("Failed. Error Code : %d",WSAGetLastError()); return 1;
}

28 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

printf("Initialised.\n");

if((s = socket(AF_INET , SOCK_STREAM , 0 )) == INVALID_SOCKET)
{
printf("Could not create socket : %d" , WSAGetLastError());
}
printf("Socket created.\n"); server.sin_family = AF_INET; server.sin_addr.s_addr = inet_addr ("127.0.0.1"); server.sin_port = htons( 8888 );

if( bind(s ,(struct sockaddr *)&server , sizeof(server)) == SOCKET_ERROR)
{
printf("Bind failed with error code : %d" , WSAGetLastError());
}
puts("Bind done"); listen(s , 3);

puts("Waiting for incoming connections...");

c = sizeof(struct sockaddr_in); new_socket = accept(s , (struct sockaddr *)&client, &c); if (new_socket == INVALID_SOCKET)
{
printf("accept failed with error code : %d" , WSAGetLastError());
29 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

}

puts("Connection accepted"); while(1){printf ("Server: "); printf("enter the bit string to be Stuffed::"); gets(ar); for (i=0;i…...

Similar Documents

Premium Essay

Computer Networks

...security. Finally, two detailed case studies are given: UNIX/Linux and Windows 2000. Structured Computer Organization, 4th edition This widely-read classic, now in its fourth edition, provides the ideal introduction to computer architecture. It covers the topic in an easy-to-understand way, bottom up. There is a chapter on digital logic for beginners, followed by chapters on microarchitecture, the instruction set architecture level, operating systems, assembly language, and parallel computer architectures. Operating Systems: Design and Implementation, 2nd edition This popular text on operating systems, co-authored with Albert S. Woodhull, is the only book covering both the principles of operating systems and their application to a real system. All the traditional operating systems topics are covered in detail. In addition, the principles are carefully illustrated with MINIX, a free POSIX-based UNIX-like operating system for personal computers. Each book contains a free CD-ROM containing the complete MINIX system, including all the source code. The source code is listed in an appendix to the book and explained in detail in the text. About the Author Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of California at Berkeley. He is currently a Professor of Computer Science at the Vrije Universiteit in Amsterdam, The Netherlands, where he heads the Computer Systems Group. He is also Dean of the Advanced School for Computing and Imaging, an......

Words: 292171 - Pages: 1169

Premium Essay

Computer Network

...Week 2 – Case Study SEC-280 11-9-2013 The first point that I will address consist on the multiple dangers that computer networks are exposed, that are in majority done by perpetrators that get access to servers of Windows and Linux to explode their vulnerabilities.. The use of these codes or malware in the form of viruses, worms, time bombs or any peculiar name this individuals use to give to their destructive toys, are a major concern to the protection of confidential information. Data so sensitive that in their majority is composing of identity, credit, and property information so well collected and compiler that is plenty for the creation of a clone of a company or a person. These identity theft atrocities are not limit to the software and information appropriation; also the attacks diminish computer performance, affecting their velocity and cause computers to crash. The CIO should possess a compendium of way’s to defend his network, and a rapid decision capability to take decisions in a short time period. Furthermore, in general terms security; as we can define “ the act of provide a sense or protection against lost, attack or harm”, can use or integrate a complete protection plan. Depending on the resources of the company the integration of a security plan that can integrate “the five pillars of security IT security operation: policy and audit management, access management, infrastructure and hardware security and incident response.” The real world presents to us a...

Words: 591 - Pages: 3

Premium Essay

Computer Networks

...computer networks Table of Contents DECLARATION 2 INTRODUCTION 5 PURPOSE 5 NETWORK CRITERIA 6 Performance 6 Reliability 6 Security 6 TYPES OF NETWORK CONNECTION 6 NETWORK CLASSIFICATION 7 Connection method 7 Wired technologies 7 Wireless technologies 8 Scale 9 Personal Area Network 9 Local Area Network 9 Metropolitan Area Networks 10 Wide Area Network 10 Network Architecture 10 BASIC HARDWARE COMPONENTS 14 Network interface cards 14 Repeaters 14 Hubs 14 Bridges 15 Switches 15 Routers 15 Modem 16 CABLE STANDARD 16 Connectors and other information 16 Conductors required 17 Characteristics 17 ACCESS CONTROL METHODS 19 Token Based Access 19 Token priority 19 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 20 Collision detected procedure 20 INTRODUCTION A computer network, often simply referred to as a network, is a group of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the World.  Development of the......

Words: 5343 - Pages: 22

Premium Essay

Computer Network

...Computer Network A computer network is a group of computers that are interconnected by electronic circuits or wireless transmissions of various designs and technologies for the purpose of exchanging data or communicating information between them or their users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network. Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network. Purpose Facilitating communications Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing. Sharing hardware In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser are connected to a network, the personal computers users each can access the laser printer on the network, as they......

Words: 3658 - Pages: 15

Free Essay

Cis 534 - Lab Manual

...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment......

Words: 48147 - Pages: 193

Premium Essay

Lab Network+

...Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow Protocols through the Layers of the TCP/IP Model 1. Read though the section of this lesson titled “How the Layers Work Together.” 2. Carefully study Figure 2-11. [pic] 3. In a word processing document, list the layers of the TCP/IP Model and then the protocols that the discussion you read says are used on each layer to move the data from one location on the network to another. The following is what your answer should look like: • Application layer: HTTP • Transport layer: TCP • Internet layer: IP • Network Interface layer: Ethernet 4. List the protocols as they correspond to the TCP/IP......

Words: 791 - Pages: 4

Premium Essay

Computer Network

...TRADEMARK LAW AND CYBERSPACE Paras Nath Singh M.Tech. Cyber Security Centre for Computer Science & Technology Central University of Punjab, Bathinda (Punjab). Abstract—Trademark law aids consumers who use trademarks in the marketplace to identify swiftly and without problems a product they liked or disliked in the past, distinguishing among the different competing manufacturers of a product. No one is entitled to sell or deliver commodities under the appearance that the commodities derive from someone else. The importance of consumer protection cannot be overemphasized and the average consumer standard should remain the central point of the inquiry, even under domain name litigation. Replacing the initial interest confusion doctrine is one decisive step, along with the introduction of a doctrine representing the fact that there should be no confusion at the point the sale, and this doctrine would intervene to allow for the capacity of the consumer to choose freely the products they want. Keywords: - trademarks; cyberspace; generic; domain names I. INTRODUCTION Trademarks have been used to designate the source or origin of products for years and a trademark is “any word, name, symbol, or device, or any combination thereof”1 used by a company to identify itself as the source of particular goods and distinguish its goods from those manufactured or sold by competitors. Section 2 of the Canadian Trademark Act2 considers “trademarks” as: * a mark that......

Words: 2830 - Pages: 12

Premium Essay

Computer Network

...EENG30002/EENGM0007 Networks and Protocols - 2015 Graduates have told me that the material we're going to cover is very useful in their careers Textbook-based teaching at the request of previous students - book is available free electronically Wetherill also posts video lectures online Important to keep up with reading (200 pages) - nightmare if left until two weeks before the exam Do answer the in-class questions Visit pollev.com/mike99 and log in with your UoB username - initial password is: Networking28976 but please change it as soon as possible by visiting polleverywhere.com Lectures (screen activity & audio) will be recorded and uploaded to Blackboard soon afterwards. Support is provided via piazza.com Assessment: EENG30002: 2-hour exam in January; EENGM0007: Lab-based coursework (10%) plus 2-hour exam in January (90%) NPP Lectures 2015 Page 2 NPP Lectures 2015 Page 3 NPP Lectures 2015 Page 4 NPP Lectures 2015 Page 5 NPP Lectures 2015 Page 6 NPP Lectures 2015 Page 7 NPP Lectures 2015 Page 8 NPP Lectures 2015 Page 9 NPP Lectures 2015 Page 10 1 Networks, Protocols and the Internet Read 1.1 (esp. 1.1.3) and 1.2 Classify applications as wireless or mobile or both. Describe the attributes of Personal Area Networks, Local Area Networks, Metropolitan Area Networks, Wide Area Networks, and the Internet. http://pollev.com/mike99 Bookmark this. (a) Q1 The book says that the iPhone is an example of… Q2 A......

Words: 1984 - Pages: 8

Free Essay

Lab Manual

...ncmeet io / n . v s H ns nn out n ad- I rdc o o t i tD tA qit n o a cu io a si w tLb I i aVE h W ncmu io / . k ncmi l d io /e n . ra ncmu/ nsn io / h do . ka Introduction to LabVIEW and Computer-Based Measurements Hands-On Seminar 1 Company Profile • Leaders in Computer-Based Measurement and Automation • Long-term Track Record of Growth and Profitability • $660M Revenue in 2006 • $184.4M in Q3 2007 (12% YOY) • More than 4,300+ employees; operations in 40+ countries • Fortune’s 100 Best Companies to Work For 8th Consecutive Year • FT 50 Best Workplaces UK 2006 & 2007 2 National Instruments Vision “To do for test and measurement what the spreadsheet did for financial analysis.” Virtual Instrumentation The software is the instrument 3 Hands-on Introduction to Data Acquisition with LabVIEW 1 The NI Approach – An Integrated Platform PXI Modular Instrumentation Multifunction High-Resolution Data AcquisitionDigitizers and DMMs Digital I/O High-Speed Digitizers Acoustics RF Signal Keypad LCD Sound Instrument Control Dynamic Signal Acquisition Temperature Monitoring Process Control Battery Laptop PC Desktop PC Counter/ Timers Machine Vision Waste Monitoring PDA Distributed I/O and Embedded Control Motion Control Body & Chassis Audio Engine Durability Motor and Valve......

Words: 7242 - Pages: 29

Premium Essay

Computer Forensics Operational Manual

...COMPUTER FORENSICS OPERATIONAL MANUAL 1. Policy Name: Imaging Removable Hard Drives 2. Policy Number/Version: 1.0 3. Subject: Imaging and analysis of removable evidence hard drives. 4. Purpose: Document the procedure for imaging and analyzing different types of evidence hard drives removed from desktop or laptop computers. 5. Document Control:Approved By/Date: Revised Date/Revision Number: 6. Responsible Authority: The Quality Manager (or designee). 7. Related Standards/Statutes/References: A) ASCLD/LAB Legacy standards 1.4.2.5, 1.4.2.6, 1.4.2.7, 1.4.2.8, 1.4.2.11, and 1.4.2.12. B) ASCLD/LAB International Supplemental requirements: 3 (Terms and Definitions), 4.13.2.4, 5.4.1.1, 5.4.1.2, 5.4.2.1. C) ISO/IEC 17025:2005 clauses: 4.1.5 (a, f, g, h, and i), 4.2.1, 4.2.2 (d), 4.2.5, 4.3.1, 4.15.1, 5.3.2, 5.4.1, 5.4.4, 5.4.5.2, 5.4.7.2 (a - c), all of 5.5, all of 5.8, and 5.9.1 (a). 8. Scope: Imaging and examining different types of hard drives (SATA, SCSI, and IDE) removed from desktops and laptops. 9. Policy Statement: A) No analysis will be performed without legal authority (search warrant or consent form). If not submitted, the examiner must contact the investigator to obtain the necessary legal authority. B) Forensic computers are not connected to the Inter-net. C) All forensic archives created and data recovered during examinations are considered evidence. D) Changes to this procedure can be made if approved by the Quality Manager, who will document the changes...

Words: 731 - Pages: 3

Free Essay

Network Opnet Manual

...Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru’s user-friendly interface with drag-and-drop features enable students to effectively model, manage, and troubleshoot real-world network infrastructures. We investigate application performance and capacity planning, by changing the link speed between a home LAN and its ISP. Overview OPNET’s IT Guru provides a Virtual Network Environment that models the behavior of networks, including its routers, switches, protocols, servers, and individual applications. The Virtual Network Environment allows IT managers, network and system planners, and operation’s staff to more effectively diagnose difficult problems, validate changes before they are implemented, and plan for future scenarios such as traffic growth and network failures. You can do “what if” analyses (called scenarios in IT Guru) on network designs, just as you can on spreadsheets with financial business models. However, instead of looking at “bottom line” financial numbers, you will be looking at how response times, latency (delays) and other network performance measures will change under different network design approaches. To create a network simulation (called a project in IT Guru), you specify the nodes (computers, switches, routers, etc.) in your network, the links between nodes, and the applications that will be running on the nodes. In this exercise, the initial......

Words: 5307 - Pages: 22

Premium Essay

Computer Networks

... | Computer Networks | By:Yaafiz Mohamed (S12425216)Zimna Ahmed (S12465436)Shahuma Abdulla (S12465351)Najudha Adam (S12465351)Sama Ali (S12465333) | | | | | Table of Contents Introduction 3 Computer and Networking. 3 Characteristics of Computer Networks. 3 Types of Computer Networks. 4  PAN (Personal Area Network) 4  LAN (Local Area Network) 5  MAN (Metropolitan Area Network) 5  WAN (Wide Area Network) 5  CAN (Campus Area Network) 5  SAN (Storage Area Network) 5 Why do we network our computers? 6 Peer-to-peer networking. 6 Computer Network Technologies 7 Conclusion: 8 Reference: 9 Introduction The purpose of the report is to survey and monitor the current state of computer network and the types of computer networks. This report is written by examining a range of recent published articles, magazine articles, and internet sites on the topic of computer networks used which are used commonly. The report is mainly about the types of computer network and their functions. Computer and Networking. A computer is a programmable machine, which is designed to sequentially and arithmetically carry out a sequence of logical operations. The particular sequence of operation allowing to solve more than one kind of problem. It responds to a specific set of instructions in a well defined manner. It can execute a pre-recorded list of instructions. Main components of computers are input, output and process. (Thakur) According to (Mitchell, What is......

Words: 1669 - Pages: 7

Free Essay

Computer Network

...I. Computer Dynamics Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in building the new network. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Be sure to include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. Because we are considering the company present needs and over the next 3 years and not adding any addition investments, I would design the network using the traditional network design process. Computer Dynamics is centrally located in three adjacent five-story buildings, however there is no network connectivity amongst the buildings, which means we have to build a backbone to connect all three LANs. Before addressing the connectivity issues amongst the......

Words: 460 - Pages: 2

Premium Essay

Computer Networks

...  North South University  School of Business MIS 105 Introduction to the Computer  Group Presentation   Summer 2012  Presentation Date:  05‐Aug‐2012 Sunday    Venue: Classroom         Time: Normal Class time       Out of: 30    Topic: Computer networks    Scenario: You work in the mid‐level management position of a large multinational  corporation handling millions of records per month. The corporation has about 10  different concerns with around 50 branches countrywide. The corporation has recently  decided to overhaul their computer network system in order to tune up their data  communication system. You, as in charge of the project, are to design a new networking  plan that will improve the performance of their existing data communication system.    What to do:  • Prepare a Multimedia presentation (Power Point) in your group that clearly  explains your plan. If you are planning to use any software/hardware you must  be very specific with their names and the way they work along with their success  history. You are required to perform an extensive online research for this  purpose. You may assume any other parameter that has not been mentioned in  the above scenario.  • You must reference every page (in‐text referencing) of your presentation in  Harvard style. Remember, your work do not have any value without appropriate  referencing. Your presentation must include at least 6 in‐text references; at least ......

Words: 531 - Pages: 3

Premium Essay

Network and Computers

...to a server in a network of computers that use the Windows NT Operating System. (Domain controller) Windows NT uses the thought of a domain to manage access to a set of network resources for a group of users. (Domain controller) The person only needs to log in, to gain access to the resources connected to the domain; but could be on any number of different servers in a network. The primary domain controller (which is one server) manages the master user database for the domain. (Domain controller) Backup domain controllers are one or more servers. The primary domain controller will send copies of the database periodically to the backup domain controllers. The backup domain controllers also steps in as the primary domain controller, when the primary domain controller server fails; to help keep the balance of the work if the network is busy. “In Windows NT, a domain combines some of the advantages of a workgroup (a group of users who exchange access to each other’s resources on different computers) and a directory (a group of users who are managed centrally by an administrator).” (Domain controller) The domain concept not only lets a person to obtain access to different resources that are on different servers, but it lets one domain to be given access to another domain in a trusted relationship. In this relationship, the person only needs to log into the first domain to gain access to the second domain. (Domain controller) “In a Windows NT network, not all......

Words: 1064 - Pages: 5