Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Week 2-3-Practical

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ET 577

ADVANCED
COMPUTER
NETWORKING.
PRACTICAL WORK, SPRING 2021.

Instructor: Dr. Oladayo Bello.


Department of Engineering Technology.
TABLE OF CONTENTS.
1. INTRODUCTION.
1.1 General Instructions
1.2 Grading: Points Allocation.
2. Activity 1: FILTERING BASED ON HOST, SUBNET
ADDRESS OR CONVERSATION.
3. Activity 2: FILTERING AN APPLICATION BASED ON
PORT NUMBER AND APPLICATION NAME.
4. Activity 3: EXAMINING ENCAPSULATION AND
PROTOCOL DISTRIBUTION.
5. Optional Activity: EXPLORING CRC MECHANISM.

2
ET 577 ADVANCED NETWORKING
INTRODUCTION.
1.1 General Instructions.
1. Answer ALL questions for FULL points.
2. Ensure that you are concise and that your explanation is comprehendible. Focus on providing direct
(straight to the point) answers to specific questions, do not “beat around the bush”.
3. Points will be given to answers that are concise, understandable, and clear.
4. For any activity involving calculation or coding, ensure that your steps are neatly done.
5. Ensure that all non-personal contents are cited, and references listed appropriately using the Harvard
citation format.
6. Create a Worksheet with your Name and Practical #. Hand-in a pdf file of your worksheet on Canvas. Note
that worksheet presentation will be awarded points.
7. Always provide appropriate labels and captions for figures and required snips for the practical tasks.

1.2 Grading: Points Allocation.

Activity Answers to questions


Activity 1 Q2.1 3
Activity 1 Q2.2 2
Activity 1 Q3.1 2
Activity 1 Q3.2 2
Activity 1 Q3.3 4
Activity 1 Q4.1 2
Activity 1 Q4.2 3
Activity 1 Q5.1 2
Activity 1 Q6.1 3
Activity 2 Q1.1 5
Activity 2 Q2.1 2
Activity 2 Q2.2 5
Activity 2 Q3.1 3
Activity 2 Q3.2 4
Activity 2 Q4.1 5
Activity 2 Q4.2 3
Activity 2 Q4.3 5
Activity 3 Q5 20
Activity 3 Q6 15
Referencing (citing and listing) 5
Work sheet presentation. 5

Final point 100

3
ET 577 ADVANCED NETWORKING
Activity 1: FILTERING BASED ON HOST, SUBNET ADDRESS OR CONVERSATION

Introduction
When traffic is captured, the trace file will contain conversations between many hosts (devices) on the
network. However, only the traffic between specific hosts (client and server) maybe of interest. To view such
traffic of interest, a display filter based on host address, subnet address or conversation can be applied.
Objective
• To explore and use the filter function of Wireshark.
Requirements
• Textbook
• Internet connectivity.
• Download and install Wireshark software.
Tasks
• Examine the address resolution details and filter based on the subnet address used by cnn.com.
Answer the activity’s questions.
Step 1: Download and open tr-cnn.pcapng.
Step 2: Examine the name resolution information in the trace file. Select STATISTICS->RESOLVED
ADDRESSES.
2.1. Extract and list the conversations between the client and cnn.com servers. (3 points)
2.2. Take a snip of the Window displayed, paste it on your workbook, click "OK" to close window. (2 points)
Step 3: Open the trace file if it closes and Navigate to the DISPLAY FILTER area, enter
ip.addr==157.166.0.0/16 and click APPLY. Look into the STATUS BAR.
3.1. How many packets matches this filter? (2 points)
3.2. Circle the DISPLAY FILTER section and the area on the STATUS BAR that gives this information. Take a
snip of the Window and paste it on your worksheet. (2 points)
3.3. Give a relevance or use of this information. (4 points)
Step 4: Select FILE, then EXPORT SPECIFIED PACKETS. The DISPLAYED button should be selected by default.
Name the file as “tr-cnntraffic.pcapng“ and save.
4.1. Take a snip of the window and paste it on your worksheet. (2 points)
4.2. Upload this file with your worksheet submission. (3 points)
Step 5: Open “tr-cnn.pcapng" right click on PACKET 3 in the PACKET LIST pane and select CONVERSATION
FILTER, then TCP.
5.1 How many packets matches this filter? (2 points)
Step 6: Select FILE, EXPORT SPECIFIED PACKETS. Name the file "tr- cnncov1pcapng”, click save.
6.1 Upload this file with your worksheet submission. (3 points)

4
ET 577 ADVANCED NETWORKING
Activity 2: FILTERING AN APPLICATION BASED ON PORT NUMBER AND
APPLICATION NAME.
Introduction
A display filter can also filter based on an application's name or the port number in use. For example, filtering
can be done for UDP-based applications using the application name to view UDP traffic. However, if an
application is TCP-based, traffic should be filtered based on port numbers in other to view the TCP overhead
and the application traffic.

Objective
• To explore and use the filter function of Wireshark.

Requirements
• Textbook
• Internet connectivity.
• Download and install Wireshark

Tasks
• Filter traffic based on port number and application name and examine the benefit of port-based
filtering. Answer the activity’s questions.

Step 1: Download and open "tr-twohosts pcapng".


1.1 Examine the trace file and do an internet search. List all information that could constitute or contribute
to TCP overhead. (5 points)

Step 2: Filter all traffic to and from 192.168.1.119, by entering “ip.addr==192.168.1.119“ in the DISPLAY
FILTER AREA and click APPLY. Look for packet 3959. Expand the FTP section in the PACKET DETAILS pane.
2.1 Which port number is the server listening on for the FTP data? (2 points)
2.2 Circle the port number to identify it and take a snip of the Window that appears and paste it on your
worksheet. (5 points)

Step 3: Enter “tcp.port == 39757” in the DISPLAY FILTER, click APPLY.


3.1 How many packets matches this filter? (3 points)
3.2 View the trace file. What can you observe about the FTP data channel traffic? (Hint: what does port-based
filtering enable us to view?) (4 points)

Step 4: Filter traffic based on application name. Replace the TCP port filter with “ftp-data” then click APPLY.
4.1 Take a snip of the window that appears and paste it on your worksheet. (5 points)
4.2 Explain your observation? (Hint: Does application name filtering display TCP overhead information?) (3
points)
4.3 Why is application filtering method more applicable for UDP traffic? (5 points)

5
ET 577 ADVANCED NETWORKING
Activity 3: EXAMINING ENCAPSULATION AND PROTOCOL DISTRIBUTION.
Introduction
Encapsulation is the process by which the protocol layers interact and pass information up and down the
protocol stack. Encapsulation is done by creating a wrapper for the PDU of each layer and then appending a
header information to identify and describe it.
Objective
• To explore how encapsulation and view protocol distribution in a network connection using
Wireshark.
Requirements
• Textbook
• Internet connectivity.
• Download and install Wireshark.
Tasks
Step 1: Start a capture on Wireshark.
Step 2: Complete several different Internet transactions from your computer, i.e. browse different websites
for several minutes (the longer the better).
Step 3: Stop the capture and save the file as “Your Initials-Encaps”.
Step 4: Examine the packets captured and find examples of ARP, ICMP, TCP, UDP AND IP.
Step 5: Filter each type of protocol in the file,
a) Take a snip of the filtered protocols (at least 4) and label each snip as “Protocol name (e.g., ARP). Paste
all snips in your worksheet. (8 points)
b) Describe these protocols in terms of their encapsulation and protocol stacks. (12 points)
Step 6: From the statistics menu in Wireshark, select Protocol Hierarchy.
a) Examine and determine the distribution of protocols and the compute the percentage of each generated
protocol (5 points).
b) What is the most common upper layer protocol? (5 points)
c) What caused it (b) to be generated? (5 points)

Optional Activity: EXPLORING CRC MECHANISM.


Answer the following questions for 20 extra credit.
• Assuming the generator polynomial x 5 + x 3 + x0, what is the CRC code for the following bit sequence:
0110111001111011110111111010111?
1. Manually compute the solution for the question show your steps. (5 points)
2. Manually encode the message bits 10010011011 with a Cyclic Redundancy Check (CRC) scheme using
polynomial 𝑥 4 + 𝑥 + 1. Show your steps. (5 points)
3. If an error pattern of 100010000000000 is introduced. Manually compute the bits received. Show your
steps. (4 points). Will the error be detected? (1 points)
4. If an error pattern of 100110000000000 is introduced. Manually compute the bits received. Show your
steps (4 points). Will the error be detected? (1 points)

6
ET 577 ADVANCED NETWORKING

You might also like