Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Similar documents
Packet Tracer - Investigating the TCP/IP and OSI Models in Action (Instructor Version Optional Packet Tracer)

Introduction to the Packet Tracer Interface using a Hub Topology

Packet Tracer - Explore a Network

Packet Tracer Simulation - TCP and UDP Communications

Experiment 3: Protocol Visualization with Packet Tracer

Network II Lab 03 Part 01: Ping command in simula on mode

Department Of Computer Science

Cisco Interconnecting Cisco Networking Devices Part 1.

GAME100 Lab 5. Before beginning the lab, please download and install Cisco Packet Trace

Lab - Configure the Firewall in Windows 8

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

Lab - Configure the Firewall in Windows 7 and Vista

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Packet Tracer: Novice Session. Packet Tracer: Novice Session 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

NET323 D: NETWORKS PROTOCOLS

CNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks

Lab Using Wireshark to Examine Ethernet Frames

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab Using Wireshark to Examine Ethernet Frames

Lab - Using Wireshark to Examine a UDP DNS Capture

Packet Tracer: Novice Session 2007 Cisco Systems, Inc. All rights reserved. Cisco Public. Packet Tracer: Novice Session

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Lab#01 - Introduction to Packet Tracer

CCRI Networking Technology I CSCO-1850 Spring 2014

Lab - Using Wireshark to Examine TCP and UDP Captures

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Cisco 1: Networking Fundamentals

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

Network Reference Models

Lab Applying a Logical Layered Model to a Physical Network

NET323 D: NETWORKS PROTOCOLS

User Manual Electronic Systems Protection, Inc. / Technical Support: / espei.com

PT Activity: Configuring a Zone-Based Policy Firewall (ZPF)

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]

Access Switch VLAN Y Y.1 /24

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

NET323 D: NETWORKS PROTOCOLS

TCP/IP Protocol Suite and IP Addressing

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Lab Capturing and Analyzing Network Traffic

TCP/IP Networking Basics

Defining Networks with the OSI Model. Module 2

Review of Important Networking Concepts

Chapter 7. Local Area Network Communications Protocols

ICS 351: Networking Protocols

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

Network Analyzer :- Introduction to Wireshark

Lab I: Using tcpdump and Wireshark

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

TCP/IP THE TCP/IP ARCHITECTURE

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

2. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? A. NAT B.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Interconnecting Networks with TCP/IP

Unit 28 Website Production ASSIGNMENT 1

MODUL 7 DATA LINK LAYER

TCP/IP and the OSI Model

1. Which OSI layers offers reliable, connection-oriented data communication services?

AT&T Digital Subscriber Line Service

CCNA Exploration Network Fundamentals

Communicating over the Network

NETWORK PACKET ANALYSIS PROGRAM

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Lab Catalyst 2950 and 3550 Series Intra-VLAN Security

User Manual AMETEK Electronic Systems Protection, Inc. / Technical Support: / espei.com / UM-Remote-Portal-Rev-D

CCNA Discovery 3 Chapter 8 Reading Organizer

CS356 Lab NIL (Lam) In this lab you will learn: Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore!

PT Activity 5.6.1: Packet Tracer Skills Integration Challenge Topology Diagram

Lab 1: Packet Sniffing and Wireshark

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

6. Correspondence relationship between Educational goals and Course goals

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.

Enabling and Using EtherTalk for Mac OS 9.x. If you use EtherTalk, Macintosh computers do not require IP addresses.

Firewall Policy. Edit Firewall Policy/ACL CHAPTER7. Configure a Firewall Before Using the Firewall Policy Feature

Hands-On TCP/IP Networking

Lab - Connect to a Router for the First Time

9. Wireshark I: Protocol Stack and Ethernet

Computer Networks Security: intro. CS Computer Systems Security

IP Protocols. ALTTC/Oct

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OSI Model with Protocols. Layer Name PDU Address Protocols Device

Internetworking with Packet Tracer

Cisco Cisco Certified Network Associate (CCNA)

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Fundamentals of Computer Networking AE6382

Transcription:

Communication Networks [Netw501] Spring 2018 Tutorial 3 Packet Tracer Activity 3 Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Introduction: In Packet Tracer simulation mode, detailed information about packets and how they are processed by networking devices may be viewed. Common TCP/IP Protocols are modeled in Packet Tracer, including DNS, HTTP, TFTP, DHCP, Telnet, TCP, UDP, ICMP, and IP. How these protocols are used by networking devices in creating and processing packets is displayed, in Packet Tracer, using a representation of the OSI Model. The term protocol data unit, or PDU, is a generic description of what are known as segments at the transport layer, packets at the network layer, and frames at the data link layer. Objectives: 1. Explore how PT uses the OSI Model and TCP/IP Protocols. Creating a Simple PDU (test packet) Switching from Real-time to Simulation Mode 2. Examine Packet Processing and Contents Accessing the PDU Information Window, OSI Model View Investigating Device algorithms in the OSI Model View Inbound and Outbound PDUs Animations of packet Flow Task 1: Create Network Topology [web server connected to a web client] and explore the PT interface Step 1 Using the correct Ethernet cable, connect a workstation with a server. Which cable was used for the connection between the two end devices? Use the following chart to apply a Layer 3 address to the end devices and give them the perspective names End Device Name IP Address Subnet Mask Web Server 192.168.1.254 255.255.255.0 Web Client 192.168.1.1 255.255.255.0

Step 2 Switching from Real-time to Simulation Mode In the far lower right of the PT interface is the toggle between Real-time and Simulation mode. PT always starts in real-time mode, in which networking protocols operate with realistic timings. However, a powerful feature of Packet Tracer is it lets the user "stop time" by switching to simulation mode. In simulation mode, packets are displayed as animated envelopes, time is event driven, and the user can step through networking events. Click on Simulation mode. Task 2: Examine Packet Contents and Processing Step 1 Creating a Packet and Accessing the PDU Information Window Click on the Web Client PC. Choose the Desktop tab. Open the Web Browser. Enter the IP address of the Web Server into the browser, 192.168.1.254. Clicking on Go will initiate a web server request. Minimize the Web Client configuration window. Since time in simulation is event driven, you must use the Capture/Forward button to display network events. Two packets appear in the event list, one of which has an eye next to it. An eye next to a packet means it is displayed as an envelope on the logical topology. Find the first HTTP packet in the Event List, and click on the colored square in the Info column. Step 2 Investigating device algorithms in the OSI Model view When you click on the Info square for a packet in the event list (or equivalently, you click on a packet envelope displayed on the logical topology, the PDU Information window opens). The OSI model organizes this window. In the case of the first packet we are viewing, notice the HTTP request (at Layer 7) is then encapsulated, successively, at Layers 4, 3, 2, and 1. If you click on these layers, the algorithm used by the device (in this case, the PC) is displayed. View what is going on at each layer. Step 3 Inbound and Outbound PDUs When opening the PDU Information window, the default is the OSI Model view. Now click on the Outbound PDU Details tab. Scroll down to the bottom of this window. There you will see that HTTP (the web page request that started this series of events) is encapsulated as data in a TCP segment, which in turn is encapsulated in an IP packet, which in turn is encapsulated in an Ethernet frame, which in turn is transmitted as bits on the medium. If a device is the first device involved in a series of events, packets at that device will only have an Outbound PDU Details tab; if a device is the last device in a series of events, packets at that device it has only an Inbound PDU Details tab. In general, you will see both Outbound and Inbound PDU details, which give details about how Packet Tracer is modeling that device.

Step 4 Packet tracing: animations of packet flow The first time through a packet animation, you are actually capturing the packets, as in a protocol sniffer. Hence, the Capture/Forward button means "Capture" one set of events at a time. Step through the web page request. Note that you are only displaying HTTP-related packets; but other protocols like TCP and ARP also have packets that are not being displayed. At any time in your packet capture, you can open the PDU Information window. Run through the entire animation until the "No More Events" message is reached. Experiment with this packet tracing process -- running the animation again, examining packets, predicting what will happen next, and investigating your predictions.

Tutorial 3 Packet Tracer Activity 4 Using Packet Tracer to View Protocol Data Units Introduction: Simulation mode in Packet Tracer captures all network traffic flowing through the entire network but only supports a limited number of protocols. To come as close as possible to approximating Lab 2.6.2 we will use a network consisting of a PC that is directly connected to a web server and capture a ping to the server from the PC's command prompt and a request for a web page using a URL. Objectives: 1. Capture a ping from a PC command prompt. Run the simulation and capture the traffic. Examine the captured traffic. 2. Capture a web request using a URL from a PC. Run the simulation and capture the traffic. Examine the captured traffic. Task 1: Capture a ping from a PC command prompt. Step 1 Run the simulation and capture the traffic. You will find the network setup in the attached file (pka4.pkt). Open it and follow the following steps. In the far lower right of the PT interface is the toggle between Real-time and Simulation mode. Click on Simulation mode. Click on the PC. Choose the Desktop tab. Open the Command Prompt. Enter the command ping 192.168.1.2, the IP address of the server. Pressing the Enter key will initiate four ICMP echo requests. Minimize the PC configuration window. Two packets appear in the Event List, the first ICMP echo request and an ARP request needed to resolve the IP address of the server to its hardware MAC address. Click the Auto Capture / Play button to run the simulation and capture events. Click OK when the "No More Events" message is reached. Step 2 Examine the captured traffic. Find the first packet in the Event List, and click on the colored square in the Info column. When you click on the Info square for a packet in the event list the PDU Information window opens. The OSI model organizes this window. In the case of the first packet we are viewing, notice the ICMP echo request (at Layer 3) is encapsulated at Layer 2. If you click on these layers, the algorithm used by the device (in this case, the PC) is displayed. View what is going on at each layer. When opening the PDU Information window, the default is the OSI Model view. Now click on the Outbound PDU Details tab. Scroll down to the bottom of this window, and you will see that the

ICMP echo request is encapsulated as data in an IP packet. Examine the PDU information for the remaining events in the exchange. Close the PDU information window and reset the simulation by clicking the Reset Simulation button. Task 2: Capture a web request using a URL from a PC. Step 1 Run the simulation and capture the traffic. Click on the PC. Close the Command Prompt window. Open the Web Browser. Enter www.example.com into the browser. Clicking on Go will initiate a web server request. Minimize the Web Client configuration window. A packet appears in the Event List, a DNS request needed to resolve the URL to the IP address of the server. Click the Auto Capture / Play button to run the simulation and capture events. Click OK when the "No More Events" message is reached. Step 2 Examine the captured traffic. Examine the PDU information for the events in this exchange. Locate the DNS Query, TCP connection setup and HTTP request & response in the event list Check the encapsulation by investigating one of the HTTP messages and clicking on the info colored square next to it. o Identify the protocol type used in each layer. Switch to the Inbound/Outbound detail tab o Investigate the Ethernet frame. Check the MAC source and destination addresses. Are they as expected? o Inspect the IP Packet. Check the IP source and destination addresses. Are they as expected? o Look into the TCP segment. Check the port numbers used for source and destination. o Check the HTTP message content.