How Does a Network Protocol Analyzer Work?
|
|
- Wilfred Watson
- 6 years ago
- Views:
Transcription
1 A WildPackets Academy Tutorial How Does a Network Protocol Analyzer Work? Protocols A company, school, and even many homes may have a computer network connecting the various computers, printers, and Internet gateways that people use. Even the Internet itself is nothing more than a very big computer network. When the devices attached to a network aren t communicating properly, or they re operating too slowly, a network support engineer may use a protocol analyzer to determine the cause. A network protocol analyzer is a software program that runs in a standard notebook or desktop computer. It tells the computer to read all of the conversations that are flowing across the network and then it shows those conversations to the network engineer in a humanreadable format. Because the engineer can see what the computers, servers, and other devices are saying to each other, the cause of a problem can be isolated and described. To understand how a protocol analyzer works, it s first necessary to understand what is meant by protocol. A network communication protocol is a set of rules that define the capabilities and expectations of the communicating devices on the network. An electronic message is constructed by a computer, in accordance with the rules, and the message is sent from one computer to another. This message is referred to as a packet or a frame of information. Someone starts their web browser (Internet Explorer or NetScape, for example) and the browser program determines the location, on the Internet, of the web service that the user wants. The browser then sends a packet with a message asking the web server for a page of information, and that s what the user sees. When a user accesses a file on a file server, their machine is sending a packet asking the file server to open, and then read, the file. The set of rules that define how these various commands are constructed and used make up a part of the network protocol. Protocol Families There are three major protocol families that are used to manipulate files across computer networks: Server Message Block (SMB) Apple Filing Protocol (AFP) NetWare Core Protocol (NCP) Server Message Block (SMB) is the set of commands and replies that is used by Microsoft Windows. Apple Filing Protocol (AFP) is used by Apple computers (which can also use SMB to access Windows files). NetWare Core Protocol (NCP) is used with Novell s NetWare network operating system. The bit patterns (called fields ) that are constructed into each packet message are different for each family, but the end results are the same: search for a file, open a file, read a file, write to a file, close a file, delete a file, rename a file, and so forth. There are commands and replies associated with surfing the Internet, too. The protocol called HyperText Transfer Protocol (HTTP) allows a client machine to issue a Get command to read a web URL (Universal Resource Locator, such as ). Copyright 2003 WildPackets, Inc. All Rights Reserved.
2 How Does a Network Protocol Analyzer Work? Physical and logical addresses Now, these protocols that we ve discussed so far are called application layer protocols because they allow an application program (like a word processor or a web browser) to issue commands and interpret replies. The commands and replies still have to be carried from the client machine to the server machine across the network, and networks can be very entangled. Physical addresses Every computer attached to a network has networking hardware in it. This is, perhaps, an Ethernet card or built-in Ethernet port. It may also be wireless network hardware, like Intel s Centrino. There is a special numerical address, built into the network hardware, that uniquely identifies every computer and network device in the entire world. That s right, no two devices have the same unique address built into them. This is accomplished by assigning each manufacturer a special identifying address prefix, or range of numerical prefixes. Every Ethernet card and every wireless network device is then manufactured with a unique address. There are enough digits in the number used as an address, so that over 200,000,000,000,000 (two hundred thousand billion) devices can be built before the unique numbers run out! The U.S. census bureau estimates that by the year 2050 there will be slightly over nine billion people in the world. That means that each person on the planet could have over 20 thousand unique addresses assigned to them personally before the number ran out. This unique identifying number is called the hardware address of the device. It is also referred to as the physical address, Ethernet address or MAC address (pronounced mack ). The acronym MAC stands for media access control and refers to the fact that stations take turns talking on a wire or in the air ( accessing the communication medium ) based on certain aspects of communication engineering related to the unique address. Figure 1 Physical addresses, source and destination Logical addresses So, every computer, every web server, every file server, every printer, every device on a network has a unique hardware address. A packet of information contains the source hardware address and the destination hardware address. This is loosely analogous to a letter that has the street address of the recipient and your return street address on it. When your letter gets to the destination city, the mail carrier knows the physical location of your house. Like the mail system, packets of information on a network also contain information regarding the regional location to which the message should be sent. Analogous to the country, state, and city on an envelope, there is an additional aspect to computer network message addressing that helps move packets around in the network or Internet. This additional address is called the logical address. The most widely used scheme for assigning logical addresses is through the use of a set of rules called Internet Protocol (or IP for short; pronounced by saying the two letters, I and P ). A logical IP address consists of four numbers, separated by dots, like this: 2 Physical and logical addresses
3 No individual number may be larger than 255. Analogous to the idea of countries, states, and cities, the IP address may be used to define a large part of a network, then smaller parts (called subnets), and ultimately still smaller parts. For example, all of the computers in the San Francisco Bay area could be assigned addresses that started with 10. San Francisco computers could then have 172 as their second digit while San Jose computers used 173. All of the computers north of Market Street in San Francisco could use.3 as the third number, and those south of Market Street could use.4. Figure 2 Logical addresses, source and destination A central authority, called the Network Information Center, assigns these prefix addresses to companies, schools, and governmental bodies around the world. Now, it turns out that there are only slightly over four billion possible unique combinations of numbers that can be made out of the four-number IP address. A special set of rules called network address translation allow some numbers to be reused without a problem. This is loosely analogous to the fact that there is a city called Dallas not only in Texas but in Iowa, North Carolina, Oregon, Pennsylvania, South Dakota, West Virginia, and Wisconsin, but the post office doesn t get confused. At this point in our discussion we ve described how an application protocol is used to send commands and replies across a network, using a packet of information that has both a physical address uniquely identifying the destination device as well as a logical address that also includes information about the location to which the packet should be sent. Logical addresses allow human network administrators to create groupings of machines that all start with the same initial numbers in the IP address. Routers In a computer network there are interconnect boxes, called routers, that know how to forward packets to specific destination locations based on the IP address. Once the packets arrive at the destination location they are, ultimately, sent to the physical address of the intended recipient through another type of interconnect box called a switch. Although this is a tremendous oversimplification of the process it can be understood that there are two types of interconnect boxes in a network (and in the Internet): routers and switches. Routers make forwarding decisions based on the logical, IP address and switches make forwarding decisions based on the physical, Ethernet or wireless LAN address. Sequence and acknowledgement numbers We re almost ready to reveal how a network protocol analyzer works, but first, there is one more aspect of communication that needs explaining. Packets of information may include a sequence number for individual packet identification. Suppose a client sends five packets to a Routers 3
4 How Does a Network Protocol Analyzer Work? server and each packet has a unique, incrementing sequence number, say, 1, 2, 3, 4, and 5. The server knows that following the receipt of packet #1, it should then get packet #2, and so forth. If something bad happens to a packet and it gets lost or destroyed while it s being sent across the network, the server can know that something s wrong. The server receives packet #1 followed by packet #3; it knows that packet #2 was lost. If a packet is lost then it can be transmitted again to complete the conversation. In addition to the application protocol that carries the commands and replies, and in addition to the physical and logical addressing in a packet, there can be a sequence number and acknowledgement number to guarantee that packets will be sent properly. The part of a packet that does this is called the transport layer, and the most common transport layer protocol is called Transport Control Protocol ( TCP, pronounced by saying the three letters). Some packets don t require guaranteed delivery. They use a transport protocol called User Datagram Protocol (UDP). UDP has no sequence or acknowledgement numbers. That s it: you now know how computers send messages to each other across a network. These digital messages, consisting of long strings of bits (binary digits, 1's and 0's in binary computer code) are represented by electrical signals (or by radio frequency signals in a wireless network) and are transmitted across the network. When something isn t working properly, it s the job of the network support engineer to figure out why. That s where a network protocol analyzer comes into play. The network protocol analyzer A network protocol analyzer which, as mentioned earlier, is simply a special application program running in a computer. It can read the digital messages being sent across the network and can then decode the bits to present the engineer with the physical address, logical address, sequence number, application protocol command and reply, and other pieces of information carried in each packet. The engineer simply reads the conversation, packet-by-packet, to see who said what to whom, and who misspoke or lost packets, or who s packets were delayed. EventFinder Settings Start/Stop Analysis Express Select Header Conversations pane Tabs Supplemental Area (Node Details pane) Figure 3 Expert analysis of conversations by a network protocol analyzer In addition to reading conversations, protocol analyzers keep track of many network statistics relevant to the operation of the network. The number of packets per second, the quantity of traffic, and the number of errors are all recorded and reported. Many protocol analyzers 4 The network protocol analyzer
5 include informative graphic displays showing trends and comparative analysis information with bar and line charts. Advanced protocol analyzers include expert system technology to analyze conversations using sophisticated artificial intelligence software that identifies problems automatically. Some analyzers operate in a distributed mode, so that analysis probes can be installed at many remote locations and analysis can be done from a central point. The protocol analyzer can be configured to capture only conversations between specified devices, or only specific protocols (Windows versus Apple versus Novell, for example). If a user of a computer network complains that the network is slow, the engineer can configure the protocol analyzer with a filter that captures only that user s traffic. The combination of filtering and analysis capabilities gives rise to specialized protocol analyzer tools much like the Carnivore program that s been in the news. Carnivore was a special analysis tool used by law enforcement personnel to read conversations on computer networks and track down bad guys. Of course, bad guys themselves ( hackers ) can use protocol analyzers to read conversations on corporate networks, too. For this reason there is much interest in data encryption: to make it harder for an intruder to see the content of the data being transmitted across the network. Some simple protocol analyzer programs are available as shareware or freeware on the World Wide Web. Vendors such as WildPackets ( EtherPeek and AiroPeek analyzers) and Network Associates ( Sniffer analyzer) produce sophisticated commercial protocol analyzers sometimes costing upwards of $40, (a basic commercial protocol analyzer will cost closer to $ or less). The next time you see a computer support engineer studying a screen with rows of data, you might be seeing the protocol analysis process taking place. That s how a network protocol analyzer works. The network protocol analyzer 5
6 WildPackets Professional Services WildPackets offers a full spectrum of unique professional support services, available on-site, online or through remote dial-in service. WildPackets Academy WildPackets Academy provides the most effective and comprehensive network and protocol analysis training available, meeting the professional development and training requirements of corporate, educational, government, and private network managers. Our instructional methodology and course design centers around practical applications of protocol analysis techniques for Ethernet and wireless LANs. In addition to classroom-taught Network Analysis Courses, WildPackets Academy also offers: Web-Delivered Training On-site and Custom Courseware Delivery The (T.E.N.) Technology, Engineering, and Networking Video Workshop Series On-site and Remote Consulting Services Instruction and testing for the Network Analysis Expert (NAX ) Certification For more information about consulting and educational services, including complete course catalog, pricing and scheduling, please visit NAX examination and certification details are available at Live Online Quick Start Program WildPackets now offers one-hour online Quick Start Programs on using EtherPeek NX/ EtherPeek and AiroPeek NX/AiroPeek, led by a WildPackets Academy Instructor. Please visit for complete details and scheduling information. About WildPackets, Inc. WildPackets, a privately-held corporation, was founded in 1990 with a mission to create software-based tools to simplify the complex tasks associated with maintaining, troubleshooting, and optimizing evolving computer networks. WildPackets' patented, core Peek technology is the development base for EtherPeek, TokenPeek, AiroPeek, and the NX family of expert packet analyzers. All are recognized as the analysis tools of choice for small, medium, and large enterprise customers, allowing IT Professionals to easily maximize network productivity. Information on WildPackets, WildPackets Academy, Professional Services, products, and partners is available at WildPackets, Inc Treat Blvd., Suite 500 Walnut Creek, CA M-T010
CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems
Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...
More informationAssessing Wireless Security with AiroPeek
Assessing Wireless Security with AiroPeek Copyright 2001 WildPackets, Inc. All rights reserved. Intrusion Detection with AiroPeek Joe Bardwell Vice President of Professional Services WildPackets, Inc.
More informationModule 7: Configuring and Supporting TCP/IP
Module 7: Configuring and Supporting TCP/IP Contents Overview 1 Introduction to TCP/IP 2 Examining Classful IP Addressing 10 Defining Subnets 17 Using Classless Inter-Domain Routing 29 Configuring IP Addresses
More informationMonitoring, Troubleshooting and Securing Networks with EtherPeek
Monitoring, Troubleshooting and Securing Networks with EtherPeek Copyright 2001 WildPackets, Inc. All rights reserved. Monitoring, Troubleshooting and Securing Networks with EtherPeek Contents Introduction
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationLecture (02) The TCP/IP Networking Model
Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationLecture (02) The TCP/IP Networking Model
Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationLecture (02) Network Protocols and Standards
Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationWeb Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery
Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers
More informationLecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)
Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda Introduction to networking architecture Historical
More informationNetworking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3
Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Networks II Agenda Introduction to networking architecture Historical
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationIntroduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁
I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 13 THE Internet Protocol Spring 2018 Rachit Agarwal 2 Reflection The events in last few days have left me sad! Such events must be condemned
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationFig (1) client and Server network
2.2 How Does the Internet Work? The international network known as the internet consists of hundreds of thousands of smaller networks linking educational, commercial, nonprofit, and military organizations,
More informationLab 7.1.9b Introduction to Fluke Protocol Inspector
Lab 7.1.9b Introduction to Fluke Protocol Inspector Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network traffic and data frames. This lab
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-511 Title : Network Analysis and Troubleshooting Vendors : Network General
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationNetworking Background
Networking Background CMSC 414 October 30, 2017 General Overview We are going to take a quick look at What a network protocol is The abstract design of the network The 7-Layer network stack Protocols We
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationIT 341: Introduction to System
IT 341: Introduction to System Administration Private IP Addresses and the Internet Using IP Addresses to Communicate Over the Internet Network Address Translation Private IP Addresses and the Internet
More informationLecture - 36 Effect on Higher Layer I
Satellite Communication Systems Prof. Kalyan Kumar Bandyopadhyay Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 36 Effect on Higher
More informationCNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks
Lab Book: Data Transmission Over Digital Networks Contents Data Transmission Over Digital Networks... 3 Lab Objectives... 3 Lab Resources... 3 Task 1 Build the Home Network... 3 Task 2 Configure IP Addresses...
More informationCOMS Introduction to Computers. Networking
COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationSignificance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak
Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet
More information2. Network functions are associated with only one layer of the OSI model. 4. Not all Transport layer protocols are concerned with reliability.
Chapter 2: Network Standards and the OSI Model TRUE/FALSE 1. Standards assist in network design. T PTS: 1 REF: 39 2. Network functions are associated with only one layer of the OSI model. F PTS: 1 REF:
More informationUnit A - Connecting to the Network
Unit A - Connecting to the Network 1 What is a network? The ability to connect people and equipment no matter where they are in the world. telephone computers television How does your body work as a network?
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationHomework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15
ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can
More informationand the Forensic Science CC Spring 2007 Prof. Nehru
and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationTitle Core TIs Optional TIs Core Labs Optional Labs. All None 1.1.6, 1.1.7, and Network Math All None None 1.2.5, 1.2.6, and 1.2.
CCNA 1 Plan for Academy Student Success (PASS) CCNA 1 v3.1 Instructional Update # 2006-1 This Instructional Update has been issued to provide guidance on the flexibility that Academy instructors now have
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-222 Title : Wireless LAN Analysis and Troubleshooting Vendors : Network
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationLocal Area Networks and the Network Protocol Stack
Local Area Networks and the CSC362, Information Security Introduction problems inherent in transmitting packets network topologies network protocol stack Packet Switching Problems packet switching can
More informationChapter 5 OSI Network Layer
Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation
More informationNetworking Fundamentals Tom Brett
Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Adapted by HMC from the supplement to Computer Networking: A Top-Down Approach, 7 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve
More informationChapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number
More informationZENworks for Desktops Preboot Services
3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationch02 True/False Indicate whether the statement is true or false.
ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be
More informationThe Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)
The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to
More informationChapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network
Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationIT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)
IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationnetworks List various types of networks and their
Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationExperiment 2: Wireshark as a Network Protocol Analyzer
Experiment 2: Wireshark as a Network Protocol Analyzer Learning Objectives: To become familiarized with the Wireshark application environment To perform basic PDU capture using Wireshark To perform basic
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationWord Found Meaning Innovation
AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information
More informationCourse 6. Internetworking Routing 1/33
Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationA Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007
A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007 Is It the Application or the Network? If you re a network engineer in an organization that runs
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More information4.2 Virtual Circuit and Datagram Networks
4.2 VIRTUAL CIRCUIT AND DATAGRAM NETWORKS 313 Available bit rate (ABR) ATM network service. With the Internet offering socalled best-effort service, ATM s ABR might best be characterized as being a slightly-better-than-best-effort
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationDKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK
DKT 224/3 DATA COMMUNICATION & NETWORK LAB 2 NETWORK PROTOCOL ANALYZER SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK Lab #2 2 Lab #2 : Network Protocol Analyzer (Sniffing and Identify Protocol used
More information2/29/2012. Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels
Jim Williams HONP-112 Week 7 Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels A Network consists of at least two computers, and other peripherals (like a printer)
More informationPacket: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.
Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).
More informationThe Internet software layers
1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher
More informationLesson 1: Network Communications
Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of
More informationUnit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask
1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe
More informationApplication-Centric Analysis Helps Maximize the Value of Wireshark
Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationLecture A4 Network / Internet. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007
Lecture A4 Network / Internet Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007 Instructor Functionalia Chipp Jansen, chipp@sci.brooklyn.cuny.edu Course Web Page http://www.sci.brooklyn.cuny.edu/~chipp/cc3.12/
More informationTutorial 2 : Networking
Lund University ETSN01 Advanced Telecommunication Tutorial 2 : Networking Author: Emma Fitzgerald Tutor: Farnaz Moradi November 26, 2015 Contents I Before you start 3 II Whole Class Exercise: Networking
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationChapter 6. The Protocol TCP/IP. Introduction to Protocols
Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationEssential Elements of Medical Networks. D. J. McMahon rev cewood
Essential Elements of Medical Networks D. J. McMahon 141004 rev cewood 2018-02-18 Key Points Medical Networks: quick conversion of bits to decimal numbers: 2 10 = 1024 1000 = 10 3 OSI Networking Layers
More informationNetworks: Communicating and Sharing Resources
Networks: Communicating and Sharing Resources 1 Network Fundamentals Networks o Links multiple computer systems and enables them to share data and resources o Types of computer networks: Local area network
More informationNetwork Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4
CSCD 330 Network Superhighway Network Programming Winter 2015 Lecture 13 Network Layer Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007
More informationb) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.
Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationBridge Cable User s Guide
Bridge Cable User s Guide Table of Contents Overview -------------------------------------------------------------------- 2 Driver Installation --------------------------------------------------------
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More information