The Capture and Reduction Technology of Image Data based on HTTP Protocol 1

Size: px
Start display at page:

Download "The Capture and Reduction Technology of Image Data based on HTTP Protocol 1"

Transcription

1 1, 2, 3 The Capture and Reduction Technology of Image Data based on HTTP Protocol 1 Wu yan lun, 2 Zhang xiao hong, 3 Peng cui School of Information Engineering, Southwest University of Science and Technology, Mianyang, SiChuan, China ABSTRACT This article is built on the basis of the network protocol, to restore the original network data information, mainly for the network users to access the network, the transmission of image resources and data reduction. This article relates to the original network packet capture, packet parsing, TCP fragment reassembly, pictures restored four aspects. The whole system is based on VS platform combined with MFC and MySql database of network data reduction system. In the packet capture module uses Winpcap capture network packets to the maximum to avoid packet loss occurs. Through data parsing module for TCP protocol SEQ field and ACK,and other important fields and categorize all of the data packets, and then use the SEQ and ACK value to complete the restructuring of the TCP data flow divided. Finally in collecting the data of all the restructuring good TCP data flow information, eventually achieve the reduction of image. Keywords: network packet; TCP fragment reassembly; Image Restore; database 1. INTRODUCTION HTTP (Hypertext Transfer Protocol) is a mode based on the request and response, stateless, application layer protocol, often based on the TCP connection, HTTP1.1 version gives a constant connection mechanism, the vast majority of Web development is built on Web applications over HTTP. HTTP protocol supports double mode-client and server. When a client requests a service to the server, they can simply send the request method and path. Request method generally be GET, HEAD, POST. And each method defined the different types of connection between client and the server. Owing to the simplification of HTTP protocol, the HTTP server program scale could be smaller, and also speed up communication at the same time. HTTP protocol transfer process is very flexible; it allows the transmission of any type of data object. The type is being transmitted by the Content-Type to be labeled. HTTP in each time the connection to handle a request, only when the server finished processing the customer's request and after receiving the customer s reply, immediately disconnect. In order to save transmission time. HTTP protocol is stateless protocol. Stateless protocol for transaction processing is no memory. The lack of state means that if the information in front of the subsequent processing need, then it must be the retransmission, so that each connection may result in increasing the amount of data transferred. On the other hand,when the server does not require the information previously it faster response. 2. NETWORK PACKET CAPTURE AND PACKET ANALYSIS 2.1 Network Packet Capture Original network packet capture modules by calling the open source of the packet capture library WinPcap to achieve. Winpcap is a free and open software system. It is used for the direct network programming under the windows system. WinPcap is used for network packet capture a set of tools, suitable for 32-bit operating platforms parse network packets, is a Win32 platform for packet capture and analysis systems. Contains the core of the packet filter driver, an underlying dynamic link library Packet.dll and a high level of system libraries Libpcap library structure, and can be used to directly access the packet application interface. But it does not depend on the host, such as a TCP / IP protocol to send and receive data packets. This means that it cannot be blocked,, can t deal with the same host program the communication between the data. It can only "sniffer" to the physical line datagram. WinPcap consists of three parts: The first module is Net group Packet Filter, NPF, which is a virtual device driver files. Its function is to filter data packets, and put these packets to the user mode module intact. The second module packet.dll, it is for win32 platform provides a common interface. Call Packet.dll of programs can run on different versions of Windows platforms without recompilation. The third module Winpcap.dll, it is not dependent on the operating system. It provides a more high-level, abstract function. Packet.dll and Winpcap.dll: Packet.dll direct mapping the kernel call directly. Winpcap.dll provide a more friendly, more powerful function call. WinPcap advantage is to provide a standard set of capture interface is compatible with libpcap, can make many of the original UNIX platform network analysis tools ported to facilitate rapid development of a variety of network analysis tools, full account of the various performance and efficiency optimization, including the NPF kernel-level filter support, support for core state statistical model, providing the ability to send a packet. 2.2 HTTP Protocol Network Packet Extractions By Winpcap capture raw network data packet parsing layer by layer, separated HTTP packet fragmentation. Shown in Figure 1, for the original 670

2 network data packets from the top to bottom in this segmentation, filtering, to obtain the last HTTP data fragmentation. Original network packet header is the Ethernet frame header, the packet contains the sender and the receiver's MAC address: The destination MAC address, source MAC address, and the packet length field. Accounted for 14 bytes. Through the analysis of the key fields for data link layer section,data types, retain data type for 0800 packets, IP packet fragmentation (network layer). According to Figure 2 shows the IP packet message format, at its head (20 bytes) parse out the packet transmission sender and receiver IP address: source IP address, destination IP address. Again through the key word of IP data packets judgment protocol type, keep TCP protocol packet, namely the TCP packet fragmentation (transport layer). According to Figure 3 shows the TCP packet message format, at its head (20 bytes) isolated key fields: source port, destination port, serial number (SEQ) and the acknowledgment number (ACK). And by judging whether the packet transmission associated with the 80-port, retain the packets associated with 80-port, namely HTTP packets. Fig 1: Original Network Packet Parsing Process At this point, through the original layer by layer network packet parsing, packet transmission separating the important field information: source MAC address, destination MAC address, source IP address, destination IP address, source port, destination port, serial number and acknowledgment number. Remove the original network packet of 54 bytes of the head, and the rest is what we need is based on the HTTP protocol to transmit the data part of the picture. 2.3 Related Fields and Data Storage Section In order to facilitate subsequent data reorganization, here using MYSQL database tool to store each data packet in an important field information. By the MAC address and IP address to determine the client and server-side network location, the source port number and destination port number to determine the data transmission on the server side and the client opened up the port number. Through SEQ value and ACK value to mark the packet transmission properties. Through the MYSQL database access, you can quickly find out what the client sent to the server different requests. By judging the properties of the request, isolated from database from in the server in response to the request of all packets. Finally, we need the data part of the HTTP protocol in the form of a hard disk file stored in the response file, so that when doing the data behind the reorganization and reduction, can be directly done by reading the form of a binary file to complete. Fig 2: IP Packet Format 671

3 Fig 3: TCP Packet Format 3. PACKETS RESTRUCTURING AND RESTORE IMAGES 3.1 Extraction GET Request Packet After the first resolution of network packets to finish, deposited the important fields in the corresponding form in the MYSQL database. Part of the data stored in the hard segment binary file. the information, you can determine the contents of the second request is a picture: logo4w.png; through Referrer field behind the string can clearly see that the request to access the network address: For packet reorganization, you first need to do is extract the client sends a request to the server packets. HTTP-based environment, where the main use of the GET request packets. By judging whether there is "GET" field in the raw network packet of information, to determine whether the packet is a request packets from the client. Through the TCP packet contents in hexadecimal display (Figure 4), pairs of hexadecimal content analysis, you can clearly find the HTTP protocol GET request packet contains a URI, Referrer, HOST three important identification field. And these three important TCP packet identification in the data area is fixed at a very characteristic values and formats exist. Uniform resource identifier URI, wherein the fingerprint information is "0x47, 0x45, 0x54, 0x20, (***), 0x20", wherein (***) indicates the request URI of the specific resource request; Referrer identifies the current Resource URI reference source URI, that fingerprint information is "0x52, 0x65, 0x66, 0x65, 0x72, 0x65, 0x72, 0x3a, 0x20 (***) 0x0d, 0x0a", the same token, where the (*** ) is a specific reference Referrer URI address; requested resource network host and port number that is the HOST used to locate the network location of resources and its fingerprint information is "0x48, 0x6f, 0x73, 0x74, 0x3a, 0x20 (***) 0x0d, 0x0a ", wherein (***) indicates the specific location of the HOST. As shown in Figure 4 content, GET 54 bytes before the field content is the packet header information, all of the important fields in which information is stored into the MYSQL database. For a GET request, you can derive a lot of information: protocol version, browser version, fonts language and so on. By "GET" field behind Fig 4: Hexadecimal display of packet 3.2 Extraction Response Packet Determines whether they GET request in the requested content is an image, the access MYSQL database to extract the key fields of the packet information, as an access parameter, the access database tables, extracts the server responds to the request issued by all packets. Separation standards are: request packet six vectors <source IP, source MAC address, source port, destination IP, destination MAC address, destination port> and response packets six vectors is reversed. By request packet SEQ serial number plus the request packet data length to obtain the response packet ACK confirmation number. Because the server in response to a request issued by the same all the response packets are used in the same ACK confirmation number. So here through six vectors and calculated ACK confirmation 672

4 number can extract all the response to the request of reply packets. Figure 5 shows the client to the server sends a. GET request packet list. Through to the captured the 535th packet parsing, judge it as a GET request packet, the requested content as a picture: logo4w.png. The packet fragment SEQ sequence number is: , packet length of 755 bytes. By the above formula, calculate the server in response to the request, sent to the client all the ACK response packet confirmation number is: = Figure 6 below shows the server sends to the client in response to the request of all the response packet. 3.3 TCP Fragment Reassembly Since data packet transmission process will be repeatedly transmitted packets and drain case. So first need to these response packets do restructuring. First, these packets sorted according to SEQ serial number, which is the order of packet transmission. We assume that current TCP fragment SEQ value seq1 = 100, the value of the data length datalen len1 = 100. Then the packet transmission process, the next message may appear many cases, we need a very responsive handling. We next packet is defined as SEQ seq2, the data length is defined as the value datalen len2. If seq2 = 200, then this is a normal expected subsequent packets; if seq2 = 100, len2 = 100, it shows the description of the packets and a packets on a full repeat, you should choose to drop the packet; if seq2 = 100, len2 = 50, illustrate the packets on a fragment of a packet, it should also be discarded; if seq2 = 150, len2 = 30, instructions on the packet and a packet with some duplication, so simply behind that duplicate packets that part removed, update the packet data length of the current packet, and it is ok to update the packet. Fig 5: GET request packet important field Fig 6: Important filed response packet 3.4 Restore Image Files Restructuring after the packet via TCP divided according to the SEQ values before and after the arrangement, and each packet SEQ value and the packet length and connected to the next packet SEQ values, forming a set of packet fragmentation, and the sum of each shard in the collection of data is the picture of all the data. When a TCP connection is disconnected, indicating that the server for the client's request this time to response, all packets have been sent, then will be out of 673

5 the front, and finished processing TCP packet fragmentation data part, completes the file data, the request of restructuring. The server responds to the GET request, the identity of the end of sending packets can be divided into two categories. This could be determined by the field information query GET request : "transfer-encoding" and "content-length" field, completion of the former data transmission identification is the string "Ox0D, Ox0A, Ox0D, Ox0A"; while the latter in the GET the request, "content-length" field is followed by a number will follow, so when the data length to the length of time,show that all the data has been sent out. Part of the whole process of merging the data are carried out in a binary file. By "GET" field at the back of the image information,the name and type of the image are extracted, named for the picture. Then all of the data part according to the order written in the form of binary the image file, finally complete the reduction of the image file. Figure 7 and Figure 8 shows when accessing restore image file. 4. CONCLUSION By capturing library WinPcap to capture raw network packets, fast, high success rate, almost no packet loss. According to the format of the IP protocol, TCP protocol and HTTP protocol packet to parse the original network packet, extract relevant important fields of information, stored in MYSQL database, greatly reducing the burden on the back of data reorganization and increased restructuring efficiency. Through the data portion of the response packet detailed analysis, based on important field information to complete the TCP segment reorganization, effectively removes duplicate data section, and improve the accuracy of the data merge. Again after the reorganization of the TCP shard of all packets of data written to the binary file, in accordance with the order it was received successfully completed the image file reduction, further reducing the network user s behavior. REFERENCES [1] RFC791, Internet protocol DARPA Internet program protocol [S].Virginia,DARPA,1981. [2] RFC815, IP datagram reassembly algorithm[s].boston:mit,1982. Fig 7: logo4w.png [3] WinPcap Documentation [Z, oup NPF.html [4] S.Boccaletti, V.Latora, Y.Moreno, M.Chavez,D.-U.Hwang, Complex networks: Structure and dynamics [J], Physics Reports, 2006, 424(2006): [5] Yang Guohai,Tan Shunhua,Chen Miao,Wang Yizhi,The research on the t hree-layer mining of data packet [A], ICCRD2011 [C],NJ,IEEE Computer Society,2011: s. Fig 8: nav_logo143.png 674

Muhammad Farooq-i-Azam CHASE-2006 Lahore

Muhammad Farooq-i-Azam CHASE-2006 Lahore Muhammad Farooq-i-Azam CHASE-2006 Lahore Overview Theory Existing Sniffers in action Switched Environment ARP Protocol and Exploitation Develop it yourself 2 Network Traffic Computers and network devices

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Lab: 2. Wireshark Getting Started

Lab: 2. Wireshark Getting Started Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.

More information

Summary of Data Communications

Summary of Data Communications Summary of Data Communications Nixu Oy PL 21 A REFRESHING TOUR - INCLUDES PICTURES (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Network

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Ethereal Lab: Getting Started

Ethereal Lab: Getting Started Ethereal Lab: Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Lecture 9: Internetworking

Lecture 9: Internetworking Lecture 9: Internetworking CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes,

More information

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Abstract The Office of Navel Research Network Team actively

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis

Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis Analysis of Redundant Flow in Network 1 Yan Liu, 2 Yulong Yang 1, 2 Southwest University of Science and Technology ABSTRACT It is information society nowadays, with the rapidly growing popularity of the

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

CS 4390 Computer Networks. Transport Services and Protocols

CS 4390 Computer Networks. Transport Services and Protocols CS 4390 Computer Networks UT D data Session 07 Transport Layer Overview and UDP Adapted from Computer Networking a Top-Down Approach 1996-2012 by J.F Kurose and K.W. Ross, All Rights Reserved Transport

More information

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS SNIFFING AND ANALYSING NETWORK PACKETS 1. OBJECTIVE To further understand how the Internet really works and how the concept of encapsulation is being implemented in the different layers of the TCP/IP protocol

More information

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-6 SYSTEM 1 2 Large Scale Networking No Single Technology can Adequately Serve Every One s Need. Each LAN/ WAN has specific

More information

Business Data Networks and Security 10th Edition by Panko Test Bank

Business Data Networks and Security 10th Edition by Panko Test Bank Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:

More information

Ethereal Lab: Getting Started

Ethereal Lab: Getting Started Ethereal Lab: Getting Started Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Tell me and I forget. Show

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Lab Two Using Wireshark to Discover IP NAME:

Lab Two Using Wireshark to Discover IP NAME: Lab Two Using Wireshark to Discover IP NAME: In this lab, we ll investigate the IP protocol, focusing on the IP datagram. We ll do so by analyzing a trace of IP datagrams sent and received by an execution

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Internet Protocol (IP)

Internet Protocol (IP) CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Local Area Networks and the Network Protocol Stack

Local Area Networks and the Network Protocol Stack Local Area Networks and the CSC362, Information Security Introduction problems inherent in transmitting packets network topologies network protocol stack Packet Switching Problems packet switching can

More information

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer

More information

Wireshark Lab: Getting Started v7.0

Wireshark Lab: Getting Started v7.0 Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols.

Lab Assignment 4 ECE374 Spring Posted: 03/22/18 Due: 03/29/18. In this lab, we ll take a quick look at the ICMP and IP protocols. Lab Assignment 4 ECE374 Spring 2018 Posted: 03/22/18 Due: 03/29/18 In this lab, we ll take a quick look at the ICMP and IP protocols. Whenever possible you should hand in Wireshark screenshots that you

More information

University of Maryland Baltimore County Department of Information Systems Spring 2015

University of Maryland Baltimore County Department of Information Systems Spring 2015 University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary

More information

Experiment 2: Wireshark as a Network Protocol Analyzer

Experiment 2: Wireshark as a Network Protocol Analyzer Experiment 2: Wireshark as a Network Protocol Analyzer Learning Objectives: To become familiarized with the Wireshark application environment To perform basic PDU capture using Wireshark To perform basic

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-2019, J.F Kurose and K.W. Ross, All Rights Reserved Introduction to Wireshark

More information

COMP2330 Data Communications and Networking

COMP2330 Data Communications and Networking COMP2330 Data Communications and Networking Dr. Chu Xiaowen (Second semester, 2009-2010 academic year) Laboratory 3 Last update: Feb-3-2009 Use Wireshark to Analyze IP Packet Objectives: (1) Use Wireshark

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Wireshark intro. Introduction. Packet sniffer

Wireshark intro. Introduction. Packet sniffer Wireshark intro Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

1. (10 points): For each of the following, choose exactly one best answer.

1. (10 points): For each of the following, choose exactly one best answer. IS 450/650 Final Exam Martens 20 December 2010 Answer all twelve questions. Write your name on the first sheet. Short answers are better than long ones. No electronics. 1. (10 points): For each of the

More information

Wireshark Lab: Getting Started v7.0

Wireshark Lab: Getting Started v7.0 Wireshark Lab: Getting Started v7.0 Adapted by HMC from the supplement to Computer Networking: A Top-Down Approach, 7 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve

More information

ECE 358 Project 3 Encapsulation and Network Utilities

ECE 358 Project 3 Encapsulation and Network Utilities ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities

More information

New York University Computer Science Department Courant Institute of Mathematical Sciences

New York University Computer Science Department Courant Institute of Mathematical Sciences New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:

More information

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes Internetworking Contents Overview Functions Issues Basic Delivery Unit Addressing Datagram Delivery ARP IPv4 Header Adapting Datagram Size Notes 2 Overview - Example 3 Direct Delivery 4 Indirect Delivery

More information

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Information Network 1 TCP 1/2

Information Network 1 TCP 1/2 Functions provided by the transport layer Information Network 1 TCP 1/2 Youki Kadobayashi NAIST! Communication between processes " designation of process " identification of inter-process channel! Interface

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Project points. CSE422 Computer Networking Spring 2018

Project points. CSE422 Computer Networking Spring 2018 Project 1 100 points Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management CSE/EE 461 Lecture 13 Connections and Fragmentation Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2 TCP Connection Management Setup assymetric 3-way handshake Transfer sliding window; data and

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

Data Transport over IP Networks

Data Transport over IP Networks Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA

More information

Set of IP routers. Set of IP routers. Set of IP routers. Set of IP routers

Set of IP routers. Set of IP routers. Set of IP routers. Set of IP routers Smart Sensor Application Sensor Framework Source End IP Address Set of IP routers IoT Application Layer TCP/IP Appl. Protocols Transport Layer TCP/IP IoT Comm. Framework Application Framework IoT Comm.

More information

Overview of Ethernet Networking

Overview of Ethernet Networking Overview of Ethernet Networking Renesas Electronics America Inc. 1/31/2011 Rev. 0.02 00000-A Agenda This course contains an overview of Ethernet technology and its advantages and limits. Contained in this

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 4: September 16, 2003 Internet Layers and the Web Layering in the IP Protocols HTTP (Web) Telnet Domain Name Service Simple Network

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

McGraw-Hill The McGraw-Hill Companies, Inc., 2000 !! McGraw-Hill The McGraw-Hill Companies, Inc., 2000 "#$% & '$# )1 ) ) )6 ) )* )- ). )0 )1! )11 )1 )1 )16 )1 3'' 4", ( ( $ ( $ $$+, $$, /+ & 23,4 )/+ &4 $ 53" Network Layer Position of network layer Figure

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage Lecture 11: Fragmentation & Addressing CSE 123: Computer Networks Stefan Savage So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes, how to

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Transport: How Applications Communicate

Transport: How Applications Communicate Transport: How Applications Communicate Week 2 Philip Levis 1 7 Layers (or 4) 7. 6. 5. 4. 3. 2. 1. Application Presentation Session Transport Network Link Physical segments packets frames bits/bytes Application

More information

Each ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields.

Each ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields. IP address ICMP Each ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields. The TYPE field identifies the ICMP message, the CODE field

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information