Week 2-3-Practical
Week 2-3-Practical
Week 2-3-Practical
ADVANCED
COMPUTER
NETWORKING.
PRACTICAL WORK, SPRING 2021.
2
ET 577 ADVANCED NETWORKING
INTRODUCTION.
1.1 General Instructions.
1. Answer ALL questions for FULL points.
2. Ensure that you are concise and that your explanation is comprehendible. Focus on providing direct
(straight to the point) answers to specific questions, do not “beat around the bush”.
3. Points will be given to answers that are concise, understandable, and clear.
4. For any activity involving calculation or coding, ensure that your steps are neatly done.
5. Ensure that all non-personal contents are cited, and references listed appropriately using the Harvard
citation format.
6. Create a Worksheet with your Name and Practical #. Hand-in a pdf file of your worksheet on Canvas. Note
that worksheet presentation will be awarded points.
7. Always provide appropriate labels and captions for figures and required snips for the practical tasks.
3
ET 577 ADVANCED NETWORKING
Activity 1: FILTERING BASED ON HOST, SUBNET ADDRESS OR CONVERSATION
Introduction
When traffic is captured, the trace file will contain conversations between many hosts (devices) on the
network. However, only the traffic between specific hosts (client and server) maybe of interest. To view such
traffic of interest, a display filter based on host address, subnet address or conversation can be applied.
Objective
• To explore and use the filter function of Wireshark.
Requirements
• Textbook
• Internet connectivity.
• Download and install Wireshark software.
Tasks
• Examine the address resolution details and filter based on the subnet address used by cnn.com.
Answer the activity’s questions.
Step 1: Download and open tr-cnn.pcapng.
Step 2: Examine the name resolution information in the trace file. Select STATISTICS->RESOLVED
ADDRESSES.
2.1. Extract and list the conversations between the client and cnn.com servers. (3 points)
2.2. Take a snip of the Window displayed, paste it on your workbook, click "OK" to close window. (2 points)
Step 3: Open the trace file if it closes and Navigate to the DISPLAY FILTER area, enter
ip.addr==157.166.0.0/16 and click APPLY. Look into the STATUS BAR.
3.1. How many packets matches this filter? (2 points)
3.2. Circle the DISPLAY FILTER section and the area on the STATUS BAR that gives this information. Take a
snip of the Window and paste it on your worksheet. (2 points)
3.3. Give a relevance or use of this information. (4 points)
Step 4: Select FILE, then EXPORT SPECIFIED PACKETS. The DISPLAYED button should be selected by default.
Name the file as “tr-cnntraffic.pcapng“ and save.
4.1. Take a snip of the window and paste it on your worksheet. (2 points)
4.2. Upload this file with your worksheet submission. (3 points)
Step 5: Open “tr-cnn.pcapng" right click on PACKET 3 in the PACKET LIST pane and select CONVERSATION
FILTER, then TCP.
5.1 How many packets matches this filter? (2 points)
Step 6: Select FILE, EXPORT SPECIFIED PACKETS. Name the file "tr- cnncov1pcapng”, click save.
6.1 Upload this file with your worksheet submission. (3 points)
4
ET 577 ADVANCED NETWORKING
Activity 2: FILTERING AN APPLICATION BASED ON PORT NUMBER AND
APPLICATION NAME.
Introduction
A display filter can also filter based on an application's name or the port number in use. For example, filtering
can be done for UDP-based applications using the application name to view UDP traffic. However, if an
application is TCP-based, traffic should be filtered based on port numbers in other to view the TCP overhead
and the application traffic.
Objective
• To explore and use the filter function of Wireshark.
Requirements
• Textbook
• Internet connectivity.
• Download and install Wireshark
Tasks
• Filter traffic based on port number and application name and examine the benefit of port-based
filtering. Answer the activity’s questions.
Step 2: Filter all traffic to and from 192.168.1.119, by entering “ip.addr==192.168.1.119“ in the DISPLAY
FILTER AREA and click APPLY. Look for packet 3959. Expand the FTP section in the PACKET DETAILS pane.
2.1 Which port number is the server listening on for the FTP data? (2 points)
2.2 Circle the port number to identify it and take a snip of the Window that appears and paste it on your
worksheet. (5 points)
Step 4: Filter traffic based on application name. Replace the TCP port filter with “ftp-data” then click APPLY.
4.1 Take a snip of the window that appears and paste it on your worksheet. (5 points)
4.2 Explain your observation? (Hint: Does application name filtering display TCP overhead information?) (3
points)
4.3 Why is application filtering method more applicable for UDP traffic? (5 points)
5
ET 577 ADVANCED NETWORKING
Activity 3: EXAMINING ENCAPSULATION AND PROTOCOL DISTRIBUTION.
Introduction
Encapsulation is the process by which the protocol layers interact and pass information up and down the
protocol stack. Encapsulation is done by creating a wrapper for the PDU of each layer and then appending a
header information to identify and describe it.
Objective
• To explore how encapsulation and view protocol distribution in a network connection using
Wireshark.
Requirements
• Textbook
• Internet connectivity.
• Download and install Wireshark.
Tasks
Step 1: Start a capture on Wireshark.
Step 2: Complete several different Internet transactions from your computer, i.e. browse different websites
for several minutes (the longer the better).
Step 3: Stop the capture and save the file as “Your Initials-Encaps”.
Step 4: Examine the packets captured and find examples of ARP, ICMP, TCP, UDP AND IP.
Step 5: Filter each type of protocol in the file,
a) Take a snip of the filtered protocols (at least 4) and label each snip as “Protocol name (e.g., ARP). Paste
all snips in your worksheet. (8 points)
b) Describe these protocols in terms of their encapsulation and protocol stacks. (12 points)
Step 6: From the statistics menu in Wireshark, select Protocol Hierarchy.
a) Examine and determine the distribution of protocols and the compute the percentage of each generated
protocol (5 points).
b) What is the most common upper layer protocol? (5 points)
c) What caused it (b) to be generated? (5 points)
6
ET 577 ADVANCED NETWORKING