Wire Shark Lab1. Intro
|
|
- Clyde Neal
- 6 years ago
- Views:
Transcription
1 Jae Sook Lee FA16 CSIT Dr. Constantine Coutras Wire Shark Lab1 Intro 1. List 3 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 above. : 1) TCP 2) ARP 3) DNS 2. How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packetlisting window is the amount of time, in seconds, since Wireshark tracing began. To display the Time field in time-of-day format, select the Wireshark View pull down menu, then select Time Display Format, then select Time-of-day.) GET: 02:48: OK: 02:48: It took 02:48: HTTP GET message was sent until the HTTP OK reply was received 3. What is the Internet address of the gaia.cs.umass.edu (also known as wwwnet. cs.umass.edu)? What is the Internet address of your computer? Destination: Source: Print the two HTTP messages (GET and OK) referred to in question 2 above. To do so, select Print from the Wireshark File command menu, and select the Selected Packet Only and Print as displayed radial buttons, and then click OK.
2 GET 16 02:48: HTTP 660 GET / HTTP/1.1 Frame 16: 660 bytes on wire (5280 bits), 660 bytes captured (5280 bits) on interface 0 Ethernet II, Src: Giga Byt_52:49:84 (40:8d:5c:52:49:84), Dst: Tp LinkT_e6:67:2c (10:fe:ed:e6:67:2c) Internet Protocol Version 4, Src: , Dst: Transmission Control Protocol, Src Port: 57766, Dst Port: 80, Seq: 1, Ack: 1, Len: 606 Hypertext Transfer Protocol GET / HTTP/1.1\r\n Host: User Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:51.0) Gecko/ Firefox/51.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept Language: en US,en;q=0.5\r\n Accept Encoding: gzip, deflate\r\n [truncated]cookie: utma= ; utmz= utmcsr=google utmccn=(organic) utmcmd=organic utmctr=(not%20provided); l2_pv11724=3; _ga=ga ; utm Connection: keep alive\r\n Upgrade Insecure Requests: 1\r\n \r\n [Full request URI: [HTTP request 1/3] [Response in frame: 28] [Next request in frame: 39] OK 28 02:48: HTTP 60 HTTP/ OK (text/html) Frame 28: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on interface 0 Ethernet II, Src: Tp LinkT_e6:67:2c (10:fe:ed:e6:67:2c), Dst: Giga Byt_52:49:84 (40:8d:5c:52:49:84) Internet Protocol Version 4, Src: , Dst: Transmission Control Protocol, Src Port: 80, Dst Port: 57766, Seq: 9209, Ack: 607, Len: 1 [8 Reassembled TCP Segments (9209 bytes): #19(448), #20(1460), #21(1460), #23(1460), #24(1460), #26(1460), #27(1460), #28(1)] Hypertext Transfer Protocol HTTP/ OK\r\n Date: Sat, 01 Oct :48:27 GMT\r\n Server: Apache/ (Red Hat)\r\n X Powered By: PHP/5.3.3\r\n X Pingback: Link: < json/>; rel=" Link: < rel=shortlink\r\n Keep Alive: timeout=15, max=100\r\n Connection: Keep Alive\r\n Content Type: text/html; charset=utf 8\r\n Vary: Accept Encoding\r\n Content Encoding: gzip\r\n Content Length: 8761\r\n \r\n [HTTP response 1/3] [Time since request: seconds] [Request in frame: 16] [Next request in frame: 39] [Next response in frame: 54] Content encoded entity body (gzip): 8761 bytes > bytes File Data: bytes Line based text data: text/html
3 Jae Sook Lee FA16 CSIT Dr. Constantine Coutras Lab#1 Wire Shark HTTP Wire Shark Lab1 HTTP 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? : It is running HTTP browser version What languages (if any) does your browser indicate that it can accept to the server? : Accept-Language is en-us, en;q=0.5\r\n 3. What is the IP address of your computer? Of the gaia.cs.umass.edu server? Computer IP address: gaia.cs.umass.edu IP address: What is the status code returned from the server to your browser? : 200 OK 5. When was the HTML file that you are retrieving last modified at the server? : Last-Modified: Sat, 01 Oct :59:01 GMT\r\n (I had cleaned cache right before I this answer this question and reload the website. Due to Intro Lab assignment, I already visit the website several times It was 304 Not Modified.)
4 6. How many bytes of content are being returned to your browser? Content-Length: 128\r\n Content-Type: text\html; charset=utf-8\r\n 7. By inspecting the raw data in the packet content window, do you see any headers within the data that are not displayed in the packet-listing window? If so, name one. : Host, User-Agent and etc. 8. Inspect the contents of the first HTTP GET request from your browser to the server. Do you see an IF-MODIFIED-SINCE line in the HTTP GET? : No. After cleaned up cache, it doesn t have IF-MODIFIED-SINCE 9. Inspect the contents of the server response. Did the server explicitly return the contents of the file? How can you tell? : Yes. Server response correctly. 1) HTTP / OK received 2) Content-Length and type of data information included. 10. Now inspect the contents of the second HTTP GET request from your browser to the server. Do you see an IF-MODIFIED-SINCE: line in the HTTP GET? If so, what information follows the IF-MODIFIED-SINCE: header? : Yes. If-Modified-Since: Sat, 01 Oct :59:01 GMT\r\n 11. What is the HTTP status code and phrase returned from the server in response to this second HTTP GET? Did the server explicitly return the contents of the file? Explain. : HTTP/ Not Modified In order to refreshed the browser, 2 nd times, cache already stored destination file. In this case, GET request is allowed, but the browser hasn t been modified which means already in exist in my computer server.
5 12. How many HTTP GET request messages did your browser send? Which packet number in the trace contains the GET message for the Bill or Rights? 3 HTTP GET messages send to destination browser HTTP/ OK contains GET message for the Bill or Rights 13. Which packet number in the trace contains the status code and phrase associated with the response to the HTTP GET request? HTTP/ OK contain the status code and Response phrase 14. What is the status code and phrase in the response? Status code: 200 Response Phrase: OK 15. How many data-containing TCP segments were needed to carry the single HTTP response and the text of the Bill of Rights? It contains 3 Reassembled Segments (4863 bytes) [Frame: 6, payload: (1460 bytes)] [Frame: 7, payload: (1460 bytes]] [Frame: 9, payload: (1460 bytes)] [Frame: 10, payload: (483 bytes)] 16. How many HTTP GET request messages did your browser send? To which Internet addresses were these GET requests sent? 4 HTTP GET request messages 1) GET /wireshark-labs/http-wireshark-file4.html HTTP/1.1\r\n (Host: gaia.cs.umass.edu\r\n) 2) GET /pearson.png HTTP/1.1\r\n (Host: gaia.cs.umass.edu\r\n) 3) GET /~kurose/cover_5th_ed.jpg HTTP/1.1\r\n (Host: manic.cs.umass.edu\r\n) 4) GET /~kurose/cover_5th_ed.jpg HTTP/1.1\r\n (Host: caite.cs.umass.edu\r\n)
6 17. Can you tell whether your browser downloaded the two images serially, or whether they were downloaded from the two web sites in parallel? Explain. The browsers download serially downloaded 1) GET peasron.png file requested (23:23: ), HTTP/ OK (PNG) responded (23:23: ) 2) GET /~kurose/cover_5th_ed.jpg(23:23: ), HTTP/ OK (JPEG JFIF image) responded (23:23: ) 18. What is the server s response (status code and phrase) in response to the initial HTTP GET message from your browser? 1) Initial GET: GET /wireshark-labs/protected_pages/http-wireshark-file5.html HTTP/1.1\r\n 2) Status code: 401 Unauthorized 19. When your browser s sends the HTTP GET message for the second time, what new field is included in the HTTP GET message? Authorization: Basic d2lyzxnoyxjrlxn0dwrlbnq6bmv0d29yaw==\r\n Credentials: wireshark-student:network
Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2
Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram
More informationWireshark Lab: HTTP SOLUTION
Wireshark Lab: HTTP SOLUTION Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross 2005-2012, J.F Kurose and K.W. Ross, All Rights Reserved The following screen shots
More informationWireshark HTTP. Introduction. The Basic HTTP GET/response interaction
Wireshark HTTP Introduction Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. In this lab, we
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)
More informationCS 43: Computer Networks. HTTP September 10, 2018
CS 43: Computer Networks HTTP September 10, 2018 Reading Quiz Lecture 4 - Slide 2 Five-layer protocol stack HTTP Request message Headers protocol delineators Last class Lecture 4 - Slide 3 HTTP GET vs.
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
More informationProject points. CSE422 Computer Networking Spring 2018
Project 1 100 points Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationDesign and Evaluation of HTTP Protocol Parsers for IPFIX Measurement
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement Petr Velan, Tomáš Jirsík, Pavel Čeleda {velan jirsik celeda}@ics.muni.cz 19th EUNICE Workshop on Advances in Communication Networking
More informationCS 43: Computer Networks. Layering & HTTP September 7, 2018
CS 43: Computer Networks Layering & HTTP September 7, 2018 Last Class: Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network:
More informationWireshark Lab: HTTP v6.1
Wireshark Lab: HTTP v6.1 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb
More informationWireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction
Wireshark Lab: HTTP Version: 2.0 (June 2007) 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Having gotten our feet wet with the Wireshark packet
More informationCSE 333 Lecture HTTP
CSE 333 Lecture 19 -- HTTP Hal Perkins Department of Computer Science & Engineering University of Washington Administrivia Server-side programming exercise due Wed. morning HW4 due a week later - How s
More informationApplication Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017
CSC 401 Data and Computer Communications Networks Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network applications 2.2
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationCSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP
Objectives CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP To get familiar with capturing network packets using Wireshark. To explore the HTTP message formats and basic operations of HTTP protocol.
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-2019, J.F Kurose and K.W. Ross, All Rights Reserved Introduction to Wireshark
More informationDepartment Of Computer Science
Department Of Computer Science Laboratory Manual Prepared By: Muhammad Nouman Farooq Lecturer and Course Coordinator Course: Network Security (CS-242) Page 1 of 47 Table of Contents Lab 1- Introduction
More informationCSE 333 Lecture HTTP
CSE 333 Lecture 19 -- HTTP Hal Perkins Paul G. Allen School of Computer Science & Engineering University of Washington Administrivia HW4 due a week from Thursday - How s it look? Today: http; finish networking/web
More information/tmp/dump/dump02_arp_dns-weather_syn_fin complete-session - Ethereal Page 1
/tmp/dump/dump02_arp_dns-weather_syn_fin complete-session - Ethereal Page 1 9 0.001967 192.168.1.28 205.156.51.200 TCP 54940 > www [S YN] Seq=0 Ack=0 Win=5840 Len=0 MSS=1460 TSV=743824 TSER=0 WS=7 Frame
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationLecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol
More informationTCP/IP Networking Basics
TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationLecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa
NET 331 Computer Networks Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth
More informationMuhammad Farooq-i-Azam CHASE-2006 Lahore
Muhammad Farooq-i-Azam CHASE-2006 Lahore Overview Theory Existing Sniffers in action Switched Environment ARP Protocol and Exploitation Develop it yourself 2 Network Traffic Computers and network devices
More informationWireshark Lab: Ethernet and ARP v6.01
Wireshark Lab: Ethernet and ARP v6.01 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationObjectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.
Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and
More informationEthereal Lab: Getting Started
Ethereal Lab: Getting Started Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Tell me and I forget. Show
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Adapted by HMC from the supplement to Computer Networking: A Top-Down Approach, 7 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve
More informationLab: 2. Wireshark Getting Started
Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationCSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
CSC358 Week 2 Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Logistics Tutorial this Friday Assignment 1 will be out shortly
More informationComputer communication EDA343/DIT420 Lab 1
Computer communication EDA343/DIT420 Lab 1 Packet and Traffic Analysis Using Network Sniffing Software 1. There are three assignments in this course. First two assignments are in form of programming or
More informationChapter 2 Application Layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Some network apps e-mail web text messaging remote
More informationGetting Started. 1 Earlier versions of these labs used the Ethereal packet analyzer. In May 2006, the developer of Ethereal
Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages exchanged between
More information9. Wireshark I: Protocol Stack and Ethernet
Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the
More informationUniversity of Maryland Baltimore County Department of Information Systems Spring 2015
University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),
More informationLab Assignment 3 for ECE374
Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you
More informationWireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark
More informationTCP/IP Networking An Example
TCP/IP Networking An Example Complexity of networking: an example Review: Layered communication architecture The TCP/IP protocol suite Jörg Liebeherr, 1998,1999 1 A simple TCP/IP Example A user at Cerf
More informationHomework 2 50 points. CSE422 Computer Networking Spring 2018
Homework 2 50 points ATM Application-Level Protocol (10 points) Design and describe an application-level protocol to be used between an automatic teller machine and a bank s centralized computer. Your
More informationIntroduction to Internet, Web, and TCP/IP Protocols SEEM
Introduction to Internet, Web, and TCP/IP Protocols SEEM 3460 1 Local-Area Networks A Local-Area Network (LAN) covers a small distance and a small number of computers LAN A LAN often connects the machines
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application
More information4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative
1. What is the IP address and TCP port number used by your client computer (source) to transfer the file to spinlab.wpi.edu? My computer is at 10.211.55.3. The source port is 49247. See screenshot below.
More informationComputer Systems and Networks
University of the Pacific LECTURE 12: PYTHON BYTES, TCP/IP (LAB 08) Computer Systems and Networks Dr. Pallipuram (vpallipuramkrishnamani@pacific.edu) Today s Agenda Python exercises to simulate network
More informationCOSC4377. Chapter 2: Outline
Lecture 5 Chapter 2: Outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket
More informationProblem Set 9 Due: Start of class, December 4
CS242 Computer Networks Handout # 18 Randy Shull November 27, 2017 Wellesley College Problem Set 9 Due: Start of class, December 4 Reading: Kurose & Ross, Sections 6.1 through 6.5 Wireshark Lab [16] In
More informationEthereal Lab: Getting Started
Ethereal Lab: Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationApplication Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app
Application Layer e- web instant messaging remote login PP file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationSubmit your captured trace file from the TCP lab exercise (Section 1 describes how this can be done).
TCN 5030 - Project 2 Overview: This project will give you hands-on experience with the Wireshark network protocol analyzer, by investigating the behavior of TCP. Wireshack is a popular open-source tool
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve
More informationBrowser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred.
Lab Exercise HTTP Objective HTTP (HyperText Transfer Protocol) is the main protocol underlying the Web. HTTP functions as a request response protocol in the client server computing model. A web browser,
More informationEECS 3214: Computer Network Protocols and Applications
EECS 3214: Computer Network Protocols and Applications Suprakash Datta Course page: http://www.eecs.yorku.ca/course/3214 Office: LAS 3043 Email: datta [at] cse.yorku.ca These slides are adapted from Jim
More informationChapter 2: Application layer
Chapter 2 Application Layer A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students, readers). Theyre in PowerPoint form so you can add, modify, and delete
More informationName Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2015
Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2015 9:10-11:10 Wednesday November 4, 2015 Prohibited 1. You are not allowed to write down
More informationLab Exercise Protocol Layers
Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in 1.3 and 1.4 of your text. Review
More informationApplication Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app
Application Layer e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network
More informationWireshark intro. Introduction. Packet sniffer
Wireshark intro Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationThe HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1
The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images
More informationComputer Network Midterm Explain Internet protocol stack (1% each layer s name, 1% each layer s functions, 10% total)
1. Explain Internet protocol stack (1% each layer s name, 1% each layer s functions, 10% total) 2. Describe detailed operations of HTTP cookie, web caching and conditional GET. (6*3=18%)( 說明其用處, 並畫圖加解釋每步驟
More informationLab 2: Network Troubleshooting NET311 - Computer Networks Management
Lab 2: Network Troubleshooting NET311 - Computer Networks Management Instructor: Dr. Mostafa Dahshan Objectives 1. Use protocol analyzers, such as Wireshark, to inspect the packet contents. 2. Use basic
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.
More informationExploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018
Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP Description Capturing a bulk TCP transfer from your computer to a remote server. In
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationWeb Architecture and Technologies
Web Architecture and Technologies Ambient intelligence Fulvio Corno Politecnico di Torino, 2015/2016 Goal Understanding Web technologies Adopted for User Interfaces Adopted for Distributed Application
More informationKaazing Gateway: An Open Source
Kaazing Gateway: An Open Source HTML 5 Websocket Server Speaker Jonas Jacobi Co-Founder: Kaazing Co-Author: Pro JSF and Ajax, Apress Agenda Real-Time Web? Why Do I Care? Scalability and Performance Concerns
More information15-441: Computer Networks Homework 3
15-441: Computer Networks Homework 3 Assigned: Oct 29, 2013 Due: Nov 12, 2013 1:30 PM in class Name: Andrew ID: 1 TCP 1. Suppose an established TCP connection exists between sockets A and B. A third party,
More informationHypertext Transport Protocol
Hypertext Transport Protocol CSE 333 Summer 2018 Instructor: Hal Perkins Teaching Assistants: Renshu Gu William Kim Soumya Vasisht Administriia Section tomorrow: pthread tutorial/demo Followup exercise
More information162 HW2. David Culler, Arka Bhattacharya, William Liu. September 2014
162 HW2 David Culler, Arka Bhattacharya, William Liu September 2014 Contents 1 Introduction 2 1.1 Setup Details........................................... 2 1.2 Structure of HTTP Request...................................
More informationHow to work with HTTP requests and responses
How a web server processes static web pages Chapter 18 How to work with HTTP requests and responses How a web server processes dynamic web pages Slide 1 Slide 2 The components of a servlet/jsp application
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More informationWireshark Lab: TCP v7.0
Wireshark Lab: TCP v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb
More informationCS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationApplication layer. Some network apps. Client-server architecture. Hybrid of client-server and P2P. Pure P2P architecture. Creating a network app
Application layer Some network apps e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationBefore beginning this lab, you ll probably want to review sections 3.5 and 3.7 in the text. 1
Wireshark Lab: TCP Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. In this lab, we ll investigate the behavior of TCP in detail. We
More informationHomework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15
ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can
More informationNetworking. INFO/CSE 100, Spring 2006 Fluency in Information Technology.
Networking INFO/CSE 100, Spring 2006 Fluency in Information Technology http://www.cs.washington.edu/100 Apr-3-06 networks @ university of washington 1 Readings and References Reading Fluency with Information
More informationNotes beforehand... For more details: See the (online) presentation program.
Notes beforehand... Notes beforehand... For more details: See the (online) presentation program. Topical overview: main arcs fundamental subjects advanced subject WTRs Lecture: 2 3 4 5 6 7 8 Today: the
More informationApplications & Application-Layer Protocols: The Web & HTTP
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationUNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12
UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols
More informationChapter II: Application Layer
Chapter II: Application Layer UG3 Computer Communications & Networks (COMN) MAHESH MARINA mahesh@ed.ac.uk Slides thanks to Myungjin Lee, and copyright of Kurose and Ross First, a review Web and HTTP web
More information2- Application Level Protocols HTTP 1.0/1.1/2
2- Application Level Protocols HTTP 1.0/1.1/2 HTTP, (HyperText Transfer Protocol) Basis for fetching Web pages request Network CSE 461 University of Washington 2 Sir Tim Berners-Lee (1955 ) Inventor of
More informationCSE434 Computer Networks (FALL, 2009) Programming Assignment 2 Due: Wed, October 7, 2009
CSE434 Computer Networks (FALL, 2009) Programming Assignment 2 Due: Wed, October 7, 2009 Submission Procedure: No late submissions will be accepted. Submit a softcopy before the class to su.kim.asu@gmail.com.
More informationCapturing & Analyzing Network Traffic: tcpdump/tshark and Wireshark
Capturing & Analyzing Network Traffic: tcpdump/tshark and Wireshark EE 122: Intro to Communication Networks Vern Paxson / Jorge Ortiz / Dilip Anthony Joseph 1 Some slides added from Fei Xu's slides, Small
More informationGoals - to become acquainted with Wireshark, and make some simple packet captures and observations
CSCI 395: Networks Lab 2: Introductory Wireshark Lab, Current state of the Internet, and Transmission/ Delay Due: 2/19/16 at the beginning of class 20 Points Part I Goals - to become acquainted with Wireshark,
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationApplication Layer: HTTP
Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic
More informationProtocols. Application Layer FTP, HTTP, SSH, IMAP. Transport Layer TCP, UDP. Internet Layer IP. Link Layer Ethernet, WiFi
HTTP Protocols Application Layer FTP, HTTP, SSH, IMAP Transport Layer TCP, UDP Internet Layer IP Link Layer Ethernet, WiFi TCP/IP Transmission Control Protocol. Connection-Oriented Reliable source address
More informationThe key networking element that are typically used in an analysis of network traffic are:
9 Network Forensics 8 On-line lecture: http://asecuritysite.com/subjects/chapter09 9.1 Objectives The key objectives of this unit are to: Understand some of the methodologies used in network forensics.
More informationWeb, HTTP and Web Caching
Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects
More informationHTTP Reading: Section and COS 461: Computer Networks Spring 2013
HTTP Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2013 1 Recap: Client-Server Communication Client sometimes on Initiates a request to the server when interested E.g., Web browser
More informationLecture 3. HTTP v1.0 application layer protocol. into details. HTTP 1.0: RFC 1945, T. Berners-Lee HTTP 1.1: RFC 2068, 2616
Lecture 3. HTTP v1.0 application layer protocol into details HTTP 1.0: RFC 1945, T. Berners-Lee Lee,, R. Fielding, H. Frystyk, may 1996 HTTP 1.1: RFC 2068, 2616 Ascii protocol uses plain text case sensitive
More informationNetwork concepts introduction & wireshark
Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity
More informationWEB TECHNOLOGIES CHAPTER 1
WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960
More informationSession 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes
Session 8 Deployment Descriptor 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/_status_codes
More informationKTH ROYAL INSTITUTE OF TECHNOLOGY. Remote Invocation. Vladimir Vlassov and Johan Montelius
KTH ROYAL INSTITUTE OF TECHNOLOGY Remote Invocation Vladimir Vlassov and Johan Montelius Middleware Application layer Remote invocation / indirect communication Socket layer Network layer 2 Request / Reply
More informationNetworking Fundamentals
ECPE 170 Jeff Shafer University of the Pacific Networking Fundamentals 2 Lab Schedule This Week AcEviEes Network programming Lab 8 Network Programming Lab 8 Assignments Due Due by Oct 26 th 5:00am Lab
More information