Tutorial:
Part 1: Wireshark. TCP - Transmission Control Protocol
In this practical part we would like to demonstrate how the basic functions of the TCP, namely,
• Linking to the Application Layer
• Segmenting
• Session management
are implemented in practical situations. We also need to know the structure of the TCP segment that you can conveniently access from http://en.wikipedia.org/wiki/Transmission_Control_Protocol#TCP_segment_structure
Download again from Moodle the Wireshark HTTP demo file WiresharkHTTPdemo090402.pcap and place it in a known folder, say, desktop. Invoke wireshark from the folder Start\Programs\Developments and open the demo file.
1. Linking to the Application Layer:
We start at the familiar frame 35. After selecting this frame in the top pane, in the middle pane select and expand the “Transmission Control Protocol” line.
a. Note the values of the source and destination ports.
b. Go to the frame 38 and again record the values of the source and destination port.
c. Describe the meaning of these values.
2. Segmenting
Start with the frame 42 (get Andrew’s photo)
a. How many TCP segments it takes to transmit the photo?
#Line no 112 to 43 = 71 and then ACK are 23. 71-23 = 48 -1 = 47
b. What is the total size of the photo?
66694
c. Read first about the “continuous ARQ” and then answer how many times the transmission of the photo segments have been acknowledged.
23
d. Give the numbers of the acknowledgment frames.
46,49,52,55,58,61,64,67,70,73,76,79,82,85,88,91,94,97,100,103,106,109,112
2-2
3. Session management
a. Identify from which packet or frame the start of TCP session between the
client (192.6168.1.2) and Server (130.194.64.145) is established. List the steps
required for session layer to identify the start and establishment of a session
between the communicating peers.
ip.src == 130.194.64.145 and ip.dst == 192.168.1.2 starts from line number 33
ip.src == 192.168.1.2 and ip.dst == 130.194.64.145 starts from line number 30
Wireshark Queried
3 WAYS HANDSHAKE
b. Identify from which packet or frame the ending of TCP session between the
client (192.6168.1.2) and Server (130.194.64.145) is finished. List the steps
required for session layer to identify the termination and finishing of a session
between the communicating peers.
3 WAYS HANDSHAKE -ACK AND SYN 30,33,34 STEPS PROCESS
4 WAYS ENDING WITH THE KEYOWRD - FIN
4. The length of the Ethernet frame
Verify that the Ethernet II frame does not have any information about its length.
Instead, it is dependent on the information supplied by the IP header:
8000 - IPV4
86DD - IPV6
TOTAL LENGHT - UNDER IP + 14 = 54 IPV4
TOTAL LENGHT - UNDER IP + 14 + 40 = 54 IPV6
1. What does the transport layer do?
Links Application to the network
2. What does the network layer do?
Routing and addressing
3. Compare and contrast the types of addresses used in a network.
Application layer address (www.google.com)Protocol Http
Network layer address (546.45.23.14 four bytes - protocol IP)
Data link layer address (6 bytes hexa decimal addressing 00-55-d4-gf-gg-55) Ethernet addressing
4. What is the function of Transport layer protocols TCP and UDP, Distinguish TCP from UDP protocol?
TCP - A typical TCP segment has 24 beyts or 192 bit header of control information which has information about the sender / receiver 's application layer. The message in receivers end tells in which application program it should be sent to. It also says which application was used at senders end to generate the message. TCP header also has a seq which helps to assemble tcp segments and complete the message. This makes sure no packet gets missed or lost. Requires connection ,Example web surfing.
UDP - TCP / IP has a second type of transport layer protocol which is called User datagram Protocol. It gets used for sending small messages which dont require to be segmented. It holds it has only 4 fields (8 bytes) plus application layer packet. It doesnt check for sequence so occasionally data gets lost. Connection less protocol. Example - IPTV, multilayer online games, satellite cast for an live event.
5. How does TCP establish a connection? Explain the three-way handshake?
Host A sends a TCP SYNchronize packet to Host B
Host B receives A's SYN
Host B sends a SYNchronize-ACKnowledgement
Host A receives B's SYN-ACK
Host A sends ACKnowledge
Host B receives ACK.
TCP socket connection is ESTABLISHED.
Ref - 3 way handshake
6. Explain briefly different classes of networks? What is a subnet and why do networks need them?
Class A from N.H.H.H from 1 to 127
Class B from N.N.H.H from 128 to 127+64 = 191
Class C from N.N.N.H from 192 to 191+32 = 223
Dividing a network or logical partition or distribution of the network to organise and control the network flow is called subnet.
7. What is a subnet mask? And how is it related to different class of networks?
8. How does dynamic addressing work?
9. What benefits and problems does dynamic addressing provide?
10. What is address resolution (translation)? Explain how a DNS server does name resolution.
11. How is address resolution performed for network layer addresses?
12. How is address resolution performed for data link layer addresses?
Monday, March 31, 2014
Thursday, March 27, 2014
Introduction to Data Communication
Topic: Introduction to Data Communications
Review Questions
Use these questions to review the important material from the Topic Notes and Chapter 1 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 2 tutorial.
------------------------------------------------------------------------------------------------------------------------------------------------
1. How do LANs differ from MANs, WANs, and BNs?
2. What is a circuit?
3. What is a client?
4. What is a server?
5. Why are network layers important?
6. Describe the seven layers in the OSI network model and what they do.
7. Describe the five layers in the Internet network model and what they do.
8. Explain how a message is transmitted from one computer to another using layers.
9. Describe the three stages of standardization.
10. How are Internet standards developed?
11. Describe two important data communications standards-making bodies. How do they differ?
12. What is the purpose of a data communication standard?
Lab Preparation
To prepare for the lab in week 2:
1. Via the Web find out about:
a. The hexadecimal number system
b. The ASCII character set
2. Convert the decimal number 90 to a hexadecimal number
3. Convert the hexadecimal number determined in 2 above, to an 8 bit binary byte and then determine what ASCII character this byte represents.
Review Questions
Use these questions to review the important material from the Topic Notes and Chapter 1 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 2 tutorial.
------------------------------------------------------------------------------------------------------------------------------------------------
1. How do LANs differ from MANs, WANs, and BNs?
2. What is a circuit?
3. What is a client?
4. What is a server?
5. Why are network layers important?
6. Describe the seven layers in the OSI network model and what they do.
7. Describe the five layers in the Internet network model and what they do.
8. Explain how a message is transmitted from one computer to another using layers.
9. Describe the three stages of standardization.
10. How are Internet standards developed?
11. Describe two important data communications standards-making bodies. How do they differ?
12. What is the purpose of a data communication standard?
Lab Preparation
To prepare for the lab in week 2:
1. Via the Web find out about:
a. The hexadecimal number system
b. The ASCII character set
2. Convert the decimal number 90 to a hexadecimal number
3. Convert the hexadecimal number determined in 2 above, to an 8 bit binary byte and then determine what ASCII character this byte represents.
Application Layer
Topic: Application Layer
Review Questions
Use these questions to review the important material from the Topic Notes and chapter2 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 3 tutorial.
------------------------------------------------------------------------------------------------------------------------------------------------
1. What are the different types of application architectures?
2. Describe the four basic functions of an application software package.
3. What are the advantages and disadvantages of host-based networks versus client-server networks?
4. What is middleware and what does it do?
5. Suppose your organization was contemplating switching from a host-based architecture to client-server. What problems would you foresee?
6. Compare and contrast two-tiered, three-tiered, and n-tiered client server architectures. What are the technical differences and what advantages and disadvantages do each offer?
7. How does a thin client differ from a thick client?
8. For what is HTTP used? What are its major parts?
9. Describe how a Web browser and Web server work together to send a web page to a user.
10. Describe how mail user agents and message transfer agents work together to transfer mail messages.
11. What roles do SMTP, POP, and IMAP play in sending and receiving e-mail on the Internet?
12. What is FTP and why is it useful?
13. What is Telnet and why is it useful?
Lab Preparation
To prepare for the lab in week 3:
1. Study the structure of the HTTP request and response packets, refer Lecture – Week 2: Application Layer slides 23 to 27, chapter 2 of prescribed textbook and look at other source material on Web.
2. Check out Rex Swain’s HTTP Viewer at www.rexswain.com/httpview.html
Review Questions
Use these questions to review the important material from the Topic Notes and chapter2 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 3 tutorial.
------------------------------------------------------------------------------------------------------------------------------------------------
1. What are the different types of application architectures?
2. Describe the four basic functions of an application software package.
3. What are the advantages and disadvantages of host-based networks versus client-server networks?
4. What is middleware and what does it do?
5. Suppose your organization was contemplating switching from a host-based architecture to client-server. What problems would you foresee?
6. Compare and contrast two-tiered, three-tiered, and n-tiered client server architectures. What are the technical differences and what advantages and disadvantages do each offer?
7. How does a thin client differ from a thick client?
8. For what is HTTP used? What are its major parts?
9. Describe how a Web browser and Web server work together to send a web page to a user.
10. Describe how mail user agents and message transfer agents work together to transfer mail messages.
11. What roles do SMTP, POP, and IMAP play in sending and receiving e-mail on the Internet?
12. What is FTP and why is it useful?
13. What is Telnet and why is it useful?
Lab Preparation
To prepare for the lab in week 3:
1. Study the structure of the HTTP request and response packets, refer Lecture – Week 2: Application Layer slides 23 to 27, chapter 2 of prescribed textbook and look at other source material on Web.
2. Check out Rex Swain’s HTTP Viewer at www.rexswain.com/httpview.html
Tuesday, March 25, 2014
Data Link Layer
###### Possible Assignment Topic from this one....related to wire shirk and Transmission efficiency.
tasks
1. Identify all protocols related to the frames and
Ans - name all the protocals you find under each of the frames , which are as folllows :
a.Ehternet II (2)
b.hTTP
c.Internet protocal
d.Transmission protocal
e.User diagram protocal
f.smb
g.microsoft windows browser protocal
a. Using Wikipedia give a one-sentence description of each protocol you can find in
the recorded frames.
b.hTTP - what is this and where it is used, as an example - http is used in web, ftp for file transfer protocal
c.Internet protocal - The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP established Internet by routing and conveying messages over the network boundries.
d.Transmission protocal - The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. Keeping track of the data/package sent by IP on the internet.
e.User diagram protocal -The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite (the set of network protocols used for the Internet)
. With UDP, computer applications can send messages, in this case referred to as datagrams,
to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths.
b. Expand the Ethernet II frames, and for each determine the value of the “Type”
field. What do these “Type” values mean?
IPV4 IPV6 explained
2. Identify, in all recorded Ethernet II frames, different source (Src) and destination (Dst)
MAC (physical) addresses.
a. How many different addresses have you found?
b. Give their hexadecimal and textual interpretation wherever available.
c. Explain why some addresses are repeated over and over again.
3. What is the shortest and longest Ethernet frame r
***************************************************
***************************************************
***************************************************
***************************************************
Knowledge Base :
IP - IP PROTOCOL DEALS WITH ROUTER, HELPS TWO COMPUTERS TO CONNECT, ITS A ROUTABLE PROTOCAL,
TCP - Tramsmission Control Protocol
If you are connected to a non routable network, then all the computer is connceted to which is a risk.
With IP you can seperate comoputers and then with router you can put a boundary and goes to a sub protocol / sub network. Sub networks using routers are accessable using routable protocol (IP).
IP - is about routing information, communication. when computers are connected / found they starts communication.....here TCP comes in to say what protocol should be used for communication.
Wndowing...is the process by which with the client computer sends the data to the other pc.
cpmputer sends packets in groups.
Computer 1 sends packet 1 to compouter 2. Computer 2 sends ack to computer 1.
Once that is received, comp 1 sends 2 packets to comp 2.
comp2 says - i received packet 3.
comp1 says - i m gonna send packet 4,5,6,7 (it doubles everytime)
comp2 says - i got packet 7!
as long as this keeps happenning, comp1 starts sending double chuncks of information
When it gets to 128 packets and something happens and data gets messed up. Comp 2 only receives only 2 of those in order. THen comp 2 will say, the last packet i recveid was 1023.
Comp 1 will go back and send 1023rd packet
comp 2 says i received 1023rd packet
comp 1 then sends two and so on.....repeates the cycle
Exanping the window and closing that back again.....
small increaments and huge increaments
Why windowing is huge problem...real time communication has to happen real time --IP4 could cause problem with thsi windowing process.
1,2,4,,8 packets are not enough to support a real time communication process.
Ip connects two computers
TCP contorls the transmission once computers are connected.
TCP takes place at the transport layer.
Every device needs an IP address in the network.
Subnet mask is a way to segment a network so that any other computer can not access or could connect to each other. Subnet mask takes care of this.
Default gateway- is the router for the sub network you are on.
Lets say your pc is looking for a website, it will first to to the local network. if it cant find that, it will go to the default gateway. Then to router and the router will direct it to get the website you are looking for.
when my comp looks for www.cnn.com it actually looks for the ip address.
DNS (domain name server) comes in to the pay here.
www.cnn.com = 123.12.124.12
my computer talks to DNS server and DNS tells to my comp , cnn.com is www.cnn.com = 123.12.124.12
then my pc looks for 123.12.124.12 in the loacl network, if it cant find that it goes to the default gateway to look for the IP address.
Domain name > DNS Server > tells the ip address > computer then looks for the website using the IP address
DHCP - dynamic host control protocol
Without an IP address a comp cant do anything.
Static IP address, Dynamic address.
TCP IP IPV4
when computers are communication using TCP IP, data are transmitted in chunks.
Dynamic IP address - means when the pc connects to the net work it will call out DHCP server, DHCP server will give your pc an IP address , DNS server and all the related things to connect in Network with other clients and servers.
DHCP process - pc > calls out > i need an ip address > DHCP > 192.458.125.12 > what is the default gate way > what is the dns server >
DHCP server will give all this to your pc with a lease time, which will say for how long your pc can have the dynamic IP address.
lets say its 4 days.
half way through your pc tries to renew the lease automatically.
DHCP says, no problems
The lease is renewed for anoher 4 days.
Then again PC contact DHCP......so on.
If your computer cant contact before the half life, DHCP waits for the rest half of the time / lease period.
50% mark...
########################################################################################################################################################################
PORTS - Different ports get used for diff purposes -
FTP 21 port no
SMPT 25
DNS 53
Http 80
POP3 110
https 443
Remote port 8080
Wire Shark -
Query:
ip.dst == 192.168.0.195 (my ip add or my friends)
ip.src == 192.168.0.195
APPLY
More query:
tcp port == 80
If a virus is designed for a port , say 7124 you go :
tcp port == 7124 - if you find something - good luck as you are attacked by the virus, lol
if nothing, you are fine
This is how you track down whats happening in the network
Purpose of IP and MAC explained
Purpose of IP and Merc
########################################################################################################################################################################
########################################################################################################################################################################
########################################################################################################################################################################
########################################################################################################################################################################
FIT5135 Data Communications
Review Questions and Lab Preparation – V1.1
Lecture Topic: Data Link Layer
Review Questions
Use these questions to review the important material from the Topic Notes and chapter 4 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 5 tutorial
----------------------------------------------------------------------------------------------------------------------------------------------
1. What are the functions of the data link layer?
The Data Link layer performs a number of separate activities, including:
Data Link Layer Functions
The following are the key tasks performed at the data link layer:
Logical Link Control (LLC): Logical link control refers to the functions required for the establishment and control of logical links between local devices on a network. As mentioned above, this is usually considered a DLL sublayer; it provides services to the network layer above it and hides the rest of the details of the data link layer to allow different technologies to work seamlessly with the higher layers. Most local area networking technologies use the IEEE 802.2 LLC protocol.
Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing.
Data Framing: The data link layer is responsible for the final encapsulation of higher-level messages into frames that are sent over the network at the physical layer.
Addressing: The data link layer is the lowest layer in the OSI model that is concerned with addressing: labeling information with a particular destination location. Each device on a network has a unique number, usually called a hardware address or MAC address, that is used by the data link layer protocol to ensure that data intended for a specific machine gets to it properly.
Error Detection and Handling: The data link layer handles errors that occur at the lower levels of the network stack. For example, a cyclic redundancy check (CRC) field is often employed to allow the station receiving data to detect if it was received correctly.
Source
2. What is media access control and why is it important?
MAC addresses are required to make a local Ethernet (or wifi) network function. They allow a network device to attract the attention of a single directly connected device, even though the physical connection is shared. This can be important when thousands of devices are connected together within a single organisation. They serve no function on the wider internet.
Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification
MAC address is a unique number which is necessary for communication between computers in network.
Media Access Control and is a unique identifier for your network card/interface, aka the "MAC address". These addresses are important because you can configure other devices, like a wireless router, to only allow network interfaces with specific MAC addresses to connect.
This is one way to protect your home wireless network from being used by the neighbors but it is, of course, not foolproof. There are tools you can use to spoof a MAC address, so it's not 100% effective, but its a pretty good start for home networks. There is a link below with more technical info re: MAC addresses.
IP address is like mobile PHONE number(Can change and will contain only numbers)
MAC address is like mobile EMI number(will be fixed and contains alphabets and numbers)
According to IEEE Std 802-2001 section 6.2.3 "MAC sublayer", the primary functions performed by the MAC layer are:[1]
*Frame delimiting and recognition
*Addressing of destination stations (both as individual stations and as groups of stations)
*Conveyance of source-station addressing information
*Transparent data transfer of LLC PDUs, or of equivalent information in the Ethernet sublayer
*Protection against errors, generally by means of generating and checking frame check sequences
*Control of access to the physical transmission medium
Source
3. Under what conditions is media access control unimportant?
4. Compare and contrast roll call polling, hub polling (or token passing), and contention.
5. Which is better, controlled access or contention? Explain.
6. Define two fundamental types of errors.
7. Discuss the distribution of errors on a transmission link.
8. Is there any difference in the error rates of lower speed lines and of higher speed lines?
9. Briefly define noise.
10. Describe four types of noise. Which is likely to pose the greatest problem to network managers? .
11. How do amplifiers differ from repeaters?
12. What are three ways of reducing errors and the types of noise they affect?
13. Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations.
14. Briefly describe how even parity and odd parity work.
15. Briefly describe how checksum works.
16. How does cyclical redundancy checking (CRC) work?
17. How does forward error correction work? How is it different from other error correction methods?
18. Under what circumstances is forward error correction desirable?
19. Using diagrams for illustration compare and contrast stop-and-wait ARQ and continuous ARQ.
20. Describe the frame layouts for HDLC, Ethernet, and PPP.
21. What is transmission efficiency?
22. What is meant by the term “overhead bits’?
23. Are stop bits necessary in asynchronous transmission? Explain using a diagram.
24. Under what conditions does a data link layer protocol need an address?
25. Are large frame sizes better than small frame sizes? Discuss.
26. What media access control technique does your tutorial class use?
27. Show how the word “Hi” would be sent using asynchronous transmission using even parity (make assumptions about the bit patterns needed). Show how it would be sent using Ethernet.
tasks
1. Identify all protocols related to the frames and
Ans - name all the protocals you find under each of the frames , which are as folllows :
a.Ehternet II (2)
b.hTTP
c.Internet protocal
d.Transmission protocal
e.User diagram protocal
f.smb
g.microsoft windows browser protocal
a. Using Wikipedia give a one-sentence description of each protocol you can find in
the recorded frames.
b.hTTP - what is this and where it is used, as an example - http is used in web, ftp for file transfer protocal
c.Internet protocal - The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP established Internet by routing and conveying messages over the network boundries.
d.Transmission protocal - The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. Keeping track of the data/package sent by IP on the internet.
e.User diagram protocal -The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite (the set of network protocols used for the Internet)
. With UDP, computer applications can send messages, in this case referred to as datagrams,
to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths.
b. Expand the Ethernet II frames, and for each determine the value of the “Type”
field. What do these “Type” values mean?
IPV4 IPV6 explained
2. Identify, in all recorded Ethernet II frames, different source (Src) and destination (Dst)
MAC (physical) addresses.
a. How many different addresses have you found?
b. Give their hexadecimal and textual interpretation wherever available.
c. Explain why some addresses are repeated over and over again.
3. What is the shortest and longest Ethernet frame r
***************************************************
***************************************************
***************************************************
***************************************************
Knowledge Base :
IP - IP PROTOCOL DEALS WITH ROUTER, HELPS TWO COMPUTERS TO CONNECT, ITS A ROUTABLE PROTOCAL,
TCP - Tramsmission Control Protocol
If you are connected to a non routable network, then all the computer is connceted to which is a risk.
With IP you can seperate comoputers and then with router you can put a boundary and goes to a sub protocol / sub network. Sub networks using routers are accessable using routable protocol (IP).
IP - is about routing information, communication. when computers are connected / found they starts communication.....here TCP comes in to say what protocol should be used for communication.
Wndowing...is the process by which with the client computer sends the data to the other pc.
cpmputer sends packets in groups.
Computer 1 sends packet 1 to compouter 2. Computer 2 sends ack to computer 1.
Once that is received, comp 1 sends 2 packets to comp 2.
comp2 says - i received packet 3.
comp1 says - i m gonna send packet 4,5,6,7 (it doubles everytime)
comp2 says - i got packet 7!
as long as this keeps happenning, comp1 starts sending double chuncks of information
When it gets to 128 packets and something happens and data gets messed up. Comp 2 only receives only 2 of those in order. THen comp 2 will say, the last packet i recveid was 1023.
Comp 1 will go back and send 1023rd packet
comp 2 says i received 1023rd packet
comp 1 then sends two and so on.....repeates the cycle
Exanping the window and closing that back again.....
small increaments and huge increaments
Why windowing is huge problem...real time communication has to happen real time --IP4 could cause problem with thsi windowing process.
1,2,4,,8 packets are not enough to support a real time communication process.
Ip connects two computers
TCP contorls the transmission once computers are connected.
TCP takes place at the transport layer.
Every device needs an IP address in the network.
Subnet mask is a way to segment a network so that any other computer can not access or could connect to each other. Subnet mask takes care of this.
Default gateway- is the router for the sub network you are on.
Lets say your pc is looking for a website, it will first to to the local network. if it cant find that, it will go to the default gateway. Then to router and the router will direct it to get the website you are looking for.
when my comp looks for www.cnn.com it actually looks for the ip address.
DNS (domain name server) comes in to the pay here.
www.cnn.com = 123.12.124.12
my computer talks to DNS server and DNS tells to my comp , cnn.com is www.cnn.com = 123.12.124.12
then my pc looks for 123.12.124.12 in the loacl network, if it cant find that it goes to the default gateway to look for the IP address.
Domain name > DNS Server > tells the ip address > computer then looks for the website using the IP address
DHCP - dynamic host control protocol
Without an IP address a comp cant do anything.
Static IP address, Dynamic address.
TCP IP IPV4
when computers are communication using TCP IP, data are transmitted in chunks.
Dynamic IP address - means when the pc connects to the net work it will call out DHCP server, DHCP server will give your pc an IP address , DNS server and all the related things to connect in Network with other clients and servers.
DHCP process - pc > calls out > i need an ip address > DHCP > 192.458.125.12 > what is the default gate way > what is the dns server >
DHCP server will give all this to your pc with a lease time, which will say for how long your pc can have the dynamic IP address.
lets say its 4 days.
half way through your pc tries to renew the lease automatically.
DHCP says, no problems
The lease is renewed for anoher 4 days.
Then again PC contact DHCP......so on.
If your computer cant contact before the half life, DHCP waits for the rest half of the time / lease period.
50% mark...
########################################################################################################################################################################
PORTS - Different ports get used for diff purposes -
FTP 21 port no
SMPT 25
DNS 53
Http 80
POP3 110
https 443
Remote port 8080
Wire Shark -
Query:
ip.dst == 192.168.0.195 (my ip add or my friends)
ip.src == 192.168.0.195
APPLY
More query:
tcp port == 80
If a virus is designed for a port , say 7124 you go :
tcp port == 7124 - if you find something - good luck as you are attacked by the virus, lol
if nothing, you are fine
This is how you track down whats happening in the network
Purpose of IP and MAC explained
Purpose of IP and Merc
########################################################################################################################################################################
########################################################################################################################################################################
########################################################################################################################################################################
########################################################################################################################################################################
FIT5135 Data Communications
Review Questions and Lab Preparation – V1.1
Lecture Topic: Data Link Layer
Review Questions
Use these questions to review the important material from the Topic Notes and chapter 4 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 5 tutorial
----------------------------------------------------------------------------------------------------------------------------------------------
1. What are the functions of the data link layer?
The Data Link layer performs a number of separate activities, including:
Data Link Layer Functions
The following are the key tasks performed at the data link layer:
Logical Link Control (LLC): Logical link control refers to the functions required for the establishment and control of logical links between local devices on a network. As mentioned above, this is usually considered a DLL sublayer; it provides services to the network layer above it and hides the rest of the details of the data link layer to allow different technologies to work seamlessly with the higher layers. Most local area networking technologies use the IEEE 802.2 LLC protocol.
Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing.
Data Framing: The data link layer is responsible for the final encapsulation of higher-level messages into frames that are sent over the network at the physical layer.
Addressing: The data link layer is the lowest layer in the OSI model that is concerned with addressing: labeling information with a particular destination location. Each device on a network has a unique number, usually called a hardware address or MAC address, that is used by the data link layer protocol to ensure that data intended for a specific machine gets to it properly.
Error Detection and Handling: The data link layer handles errors that occur at the lower levels of the network stack. For example, a cyclic redundancy check (CRC) field is often employed to allow the station receiving data to detect if it was received correctly.
Source
2. What is media access control and why is it important?
MAC addresses are required to make a local Ethernet (or wifi) network function. They allow a network device to attract the attention of a single directly connected device, even though the physical connection is shared. This can be important when thousands of devices are connected together within a single organisation. They serve no function on the wider internet.
Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification
MAC address is a unique number which is necessary for communication between computers in network.
Media Access Control and is a unique identifier for your network card/interface, aka the "MAC address". These addresses are important because you can configure other devices, like a wireless router, to only allow network interfaces with specific MAC addresses to connect.
This is one way to protect your home wireless network from being used by the neighbors but it is, of course, not foolproof. There are tools you can use to spoof a MAC address, so it's not 100% effective, but its a pretty good start for home networks. There is a link below with more technical info re: MAC addresses.
IP address is like mobile PHONE number(Can change and will contain only numbers)
MAC address is like mobile EMI number(will be fixed and contains alphabets and numbers)
According to IEEE Std 802-2001 section 6.2.3 "MAC sublayer", the primary functions performed by the MAC layer are:[1]
*Frame delimiting and recognition
*Addressing of destination stations (both as individual stations and as groups of stations)
*Conveyance of source-station addressing information
*Transparent data transfer of LLC PDUs, or of equivalent information in the Ethernet sublayer
*Protection against errors, generally by means of generating and checking frame check sequences
*Control of access to the physical transmission medium
Source
3. Under what conditions is media access control unimportant?
4. Compare and contrast roll call polling, hub polling (or token passing), and contention.
5. Which is better, controlled access or contention? Explain.
6. Define two fundamental types of errors.
7. Discuss the distribution of errors on a transmission link.
8. Is there any difference in the error rates of lower speed lines and of higher speed lines?
9. Briefly define noise.
10. Describe four types of noise. Which is likely to pose the greatest problem to network managers? .
11. How do amplifiers differ from repeaters?
12. What are three ways of reducing errors and the types of noise they affect?
13. Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations.
14. Briefly describe how even parity and odd parity work.
15. Briefly describe how checksum works.
16. How does cyclical redundancy checking (CRC) work?
17. How does forward error correction work? How is it different from other error correction methods?
18. Under what circumstances is forward error correction desirable?
19. Using diagrams for illustration compare and contrast stop-and-wait ARQ and continuous ARQ.
20. Describe the frame layouts for HDLC, Ethernet, and PPP.
21. What is transmission efficiency?
22. What is meant by the term “overhead bits’?
23. Are stop bits necessary in asynchronous transmission? Explain using a diagram.
24. Under what conditions does a data link layer protocol need an address?
25. Are large frame sizes better than small frame sizes? Discuss.
26. What media access control technique does your tutorial class use?
27. Show how the word “Hi” would be sent using asynchronous transmission using even parity (make assumptions about the bit patterns needed). Show how it would be sent using Ethernet.
Tuesday, March 18, 2014
BAT
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
@echo off
color 0A
title Site selector by SK MONJUR ALI
:top
echo ***************************************************************
echo.
echo Site Selector application by Sk :-)
echo.
echo ***************************************************************
echo.
echo Key:
echo [1] Google - Search Engine
echo [2] Gmail - Google Mail
echo [3] LDP - CARREER AT DNB
echo [4] ADP - PAYROLL
echo [5] Service Desk
echo [6] BANK ANZ
echo [7] Weather - Weather AU
echo [8] TPG
echo [9] Instructables - A How-To Website
echo [10] YouTube - Online Videos
echo [11] Ebay
echo [12] Essendex
echo [13] TDX
echo [14] News
echo [15] Monash
echo [16] MAS016 LOADING
echo [17] Moneygram
echo.
echo [e] Exit
echo.
echo ***************************************************************
echo Enter the number of the website which you would like to go to:
echo.
set /p udefine=
echo.
echo ***************************************************************
if %udefine%==1 start www.google.com
if %udefine%==2 start www.gmail.com
if %udefine%==3 start https://dnb.ehrpulse.com/client/alternateasp/login.aspx
if %udefine%==4 start https://secure.adppayroll.com.au/
if %udefine%==5 start http://172.19.17.21:81/SMPortal/SitePages/Forms/AllPages.aspx
if %udefine%==6 start https://www.anz.com/INETBANK/bankmain.asp
if %udefine%==7 start http://www.bom.gov.au/
if %udefine%==8 start https://www.tpg.com.au/home/myaccount
if %udefine%==9 start www.instructables.com
if %udefine%==10 start www.youtube.com
if %udefine%==11 start www.ebay.com.au
if %udefine%==12 start www.esendex.com
if %udefine%==13 start https://hermes01.tdxgroup.com.au/human.aspx?r=1315082190
if %udefine%==14 start http://www.news.com.au/
if %udefine%==15 start https://my.monash.edu.au/
if %udefine%==16 call COU-Copy.BAT
if %udefine%== 17 start https://www.moneygram.com/wps/portal/moneygramonline/home/estimator?LC=en-US
if %udefine%==e goto exit
cls
echo ***************************************************************
echo.
echo Thank You for using Site Selector by SK MONJUR ALI
echo.
echo ***************************************************************
echo Type [e] to exit or [b] to go back and select another site.
echo.
set /p udefine=
echo.
echo ***************************************************************
if %udefine%==b goto top
if %udefine%==e goto exit
:exit
cls
echo ***************************************************************
echo.
echo Thank You for using Site Selector by SK MONJUR ALI
echo.
echo ***************************************************************
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
More CMD commands
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Get the cmd screen as a txt file:
c:\folder>dir>filename.txt then again
c:\folder>dir>filename.txt
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
@echo off
color 0A
title Site selector by SK MONJUR ALI
:top
echo ***************************************************************
echo.
echo Site Selector application by Sk :-)
echo.
echo ***************************************************************
echo.
echo Key:
echo [1] Google - Search Engine
echo [2] Gmail - Google Mail
echo [3] LDP - CARREER AT DNB
echo [4] ADP - PAYROLL
echo [5] Service Desk
echo [6] BANK ANZ
echo [7] Weather - Weather AU
echo [8] TPG
echo [9] Instructables - A How-To Website
echo [10] YouTube - Online Videos
echo [11] Ebay
echo [12] Essendex
echo [13] TDX
echo [14] News
echo [15] Monash
echo [16] MAS016 LOADING
echo [17] Moneygram
echo.
echo [e] Exit
echo.
echo ***************************************************************
echo Enter the number of the website which you would like to go to:
echo.
set /p udefine=
echo.
echo ***************************************************************
if %udefine%==1 start www.google.com
if %udefine%==2 start www.gmail.com
if %udefine%==3 start https://dnb.ehrpulse.com/client/alternateasp/login.aspx
if %udefine%==4 start https://secure.adppayroll.com.au/
if %udefine%==5 start http://172.19.17.21:81/SMPortal/SitePages/Forms/AllPages.aspx
if %udefine%==6 start https://www.anz.com/INETBANK/bankmain.asp
if %udefine%==7 start http://www.bom.gov.au/
if %udefine%==8 start https://www.tpg.com.au/home/myaccount
if %udefine%==9 start www.instructables.com
if %udefine%==10 start www.youtube.com
if %udefine%==11 start www.ebay.com.au
if %udefine%==12 start www.esendex.com
if %udefine%==13 start https://hermes01.tdxgroup.com.au/human.aspx?r=1315082190
if %udefine%==14 start http://www.news.com.au/
if %udefine%==15 start https://my.monash.edu.au/
if %udefine%==16 call COU-Copy.BAT
if %udefine%== 17 start https://www.moneygram.com/wps/portal/moneygramonline/home/estimator?LC=en-US
if %udefine%==e goto exit
cls
echo ***************************************************************
echo.
echo Thank You for using Site Selector by SK MONJUR ALI
echo.
echo ***************************************************************
echo Type [e] to exit or [b] to go back and select another site.
echo.
set /p udefine=
echo.
echo ***************************************************************
if %udefine%==b goto top
if %udefine%==e goto exit
:exit
cls
echo ***************************************************************
echo.
echo Thank You for using Site Selector by SK MONJUR ALI
echo.
echo ***************************************************************
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
More CMD commands
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Get the cmd screen as a txt file:
c:\folder>dir>filename.txt then again
c:\folder>dir>filename.txt
Commonly used Terms in IT
*Ping - Way to test whether you are connected to a host or not, test speed. Typing ping www.website.com in CMD gives the details
*SSH -
*Telnet -
*Putty -
*Unix environment -
URL- Unifor Resource Locator
TCL-Tool Command Language
Free Tutorials for Imp topics
Clock speed - 3GHZ ( means your pc can transfer 3 * 10 to the power 9 bits per second)
Bits - 2 bit, 3 bit
Bytes - 1 byte = 8 bits
Fine example to explain BIT and BYTE :
If X say to Y that a connection C can transfer 12 bits per second, it means the C is transfer rate is 1.5 byte. (8 bits + 4 bits (half of a bit))
3 bit means = 2 to the power 3 means 8 combinations of 1 & 0.
Gega - 10*9
Mega - 10*6
Kilo - 10*3
*SSH -
*Telnet -
*Putty -
*Unix environment -
URL- Unifor Resource Locator
TCL-Tool Command Language
Free Tutorials for Imp topics
Clock speed - 3GHZ ( means your pc can transfer 3 * 10 to the power 9 bits per second)
Bits - 2 bit, 3 bit
Bytes - 1 byte = 8 bits
Fine example to explain BIT and BYTE :
If X say to Y that a connection C can transfer 12 bits per second, it means the C is transfer rate is 1.5 byte. (8 bits + 4 bits (half of a bit))
3 bit means = 2 to the power 3 means 8 combinations of 1 & 0.
Gega - 10*9
Mega - 10*6
Kilo - 10*3
Monday, March 17, 2014
Physical Layer - Data Transmission
Chapter 3
Two types of circuit :
#Logical circutit
#Physical circuit(Could have one or more logical circuits)
Two fundamental types of data could follow through a circuit :
*Digital
*Analog
Data convertors :
#Modem (Converts Digital to Analog) e.g. Home modem
#Codec (Converts Analog to Digital)r e.g. Voip telephone lines which converts the voice (which is analog to digital)
Three types of Data flow :
1.Simplex (One way traffic)
2.Half Duplex (One way at a time)
3.Full Duplex (Both ways at the same time)
Multiplexing
Multiplexing - To combine multiple signals (analog or digital) for transmission over a single line or media.
A common type of multiplexing combines several low-speed signals for transmission over a single high-speed connection.
Multiplexing is done by using a device called multiplexer (MUX) that combines n input lines to generate one output line i.e. (many to one). Therefore multiplexer (MUX) has several inputs and one output.
At the receiving end, a device called demultiplexer (DEMUX) is used that separates signal into its component signals. So DEMUX has one input and several outputs.
Types of Multiplexing :
#FDM (Frequency division multiplexing) - Different frequency used in one media which are separated by guard bands.
#TDM (Time Division multiplexing) - Time is the key, each of the pc get a time token or are in a queu and gets their chances to be part of it.
#STDM (Statistical Time Division multiplexing)- IF 4 computers transfer data 64kbps then then you need a multiplexing system with a capability of 64 * 4 = 256 kbps, however if the statistic shows that you could use 128 as only two of the computers use transmission at the same time. This way you save money and use STDM. Problem will occur when all the computer will perform transmission at the same time.
#WDM (Wavelenght Division myltiplexing) - FDM used by optic fiber- Laser sends diff frequencey of ligt in same fiber optic cable. Step index, Graded index, single mode.
Ref for multiplexing photo
Inverse Multiplexing:
IMUX - Reverse process of multiplexing. Multiplexing combines lower speed circuits and transmitt as high speed one. IMUX
Modulation-
Modulation is the process of changing the characterstics of the signal before / after transmitting.
Modulation Explained
#FM - Frequency Modulation
#AM - Amplitude Modulation
#PM - Phase Modulation
Analog Transmission explained
Digital Transmission of Digital data:
-Polar
-Bipolar
#NRZ (Non Return Zero)
#Return Zero
#AMI (Alternate Mark Inversion)
-Manchester
Digital Data Transmission
Analog Transmission of Digital Data:
Easy definition of Analog Transmission
Digital Transmission of Analog data:
Interesting :
Modem - Named from Modulator + Demodulator = MOD + DEM = MODEM
************************************************************************************************************************************************************************
************************************************************************************************************************************************************************
************************************************************************************************************************************************************************
Tutorial 17/03/2014
Http - Hyper Text Transfer Protocol
* Normal Protocal
* Standard Protocal
HTTP is a standard protocal
Http used in World wide web
Client - server (web server) These two communicate via http
Http Request Message (packet) :
#Request line
#Rquest header
#Req body
Response :
Response line (200-ok)
Response Header
Response body(HTML language normally) Hyper text marker language
Things to know about http :
CR - Carriage reun
LF - Line feed
GET
PUT - UPLOAD
POST - ADDITIONAL INFORMAION
RESPONSE MESSAGE :
200 MEANS OK
301 MEANS MOVED PERMANANTLY
404 MEANS NOT FOUND
500 MEANS INTERNAL SERVER ERROR
There are enter keys and has related ASCII
In the querry or filter box of wire shirk to narrow down any specific search you type the following :
# http and ip.addr
# use and or
# do sort
Answer to tutorial questions :
1.Identify HTTP packets, requests and responses related to downloading my web page. Give the related frame numbers.
2. How many HTTP and TCP packets are needed to complete each request?
Frame no 35 http req = Frame 38 tcp res (2 segments)
Frame no 42 http req = Frame 113 tcp res (47 segments)
Frame no 114 http req = Frame 116 tcp res (2 segments)
3. In particular, note that my web page contains a photo. Find the HTTP packets where the photo is being requested and response being completed.
Frame no 42 request for the photo
Frame no 116 response
Wireshark and Ping related Learning
######################################################################################################################################################################
######################################################################################################################################################################
######################################################################################################################################################################
Lecture Topic: Physical Layer
Review Questions
Use these questions to review the important material from the Topic Notes and chapter 3 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 4 tutorial
----------------------------------------------------------------------------------------------------------------------------------------------
1. Describe the three types of data flows.
2. Describe three types of guided media.
3. Describe four types of radiated media.
4. How does analog data differ from digital data?
5. Explain the differences among analog data, analog transmission, digital data,
and digital transmission.
6. Explain the benefits for a telecommunication company circuits to use digital transmission.
7. Describe the ASCII coding scheme.
8. How does bipolar signaling differ from unipolar signaling? Why is Manchester
encoding more popular than either?
9. What are three important characteristics of a sound/electrical signal wave?
10. Describe how data could be transmitted using amplitude, frequency and phase modulation.
11. What is the purpose of multiplexing? Describe and compare FDM, TDM and STDM?
12. Describe Pulse Amplitude Modulation.
Two types of circuit :
#Logical circutit
#Physical circuit(Could have one or more logical circuits)
Two fundamental types of data could follow through a circuit :
*Digital
*Analog
Data convertors :
#Modem (Converts Digital to Analog) e.g. Home modem
#Codec (Converts Analog to Digital)r e.g. Voip telephone lines which converts the voice (which is analog to digital)
Three types of Data flow :
1.Simplex (One way traffic)
2.Half Duplex (One way at a time)
3.Full Duplex (Both ways at the same time)
Multiplexing
Multiplexing - To combine multiple signals (analog or digital) for transmission over a single line or media.
A common type of multiplexing combines several low-speed signals for transmission over a single high-speed connection.
Multiplexing is done by using a device called multiplexer (MUX) that combines n input lines to generate one output line i.e. (many to one). Therefore multiplexer (MUX) has several inputs and one output.
At the receiving end, a device called demultiplexer (DEMUX) is used that separates signal into its component signals. So DEMUX has one input and several outputs.
Types of Multiplexing :
#FDM (Frequency division multiplexing) - Different frequency used in one media which are separated by guard bands.
#TDM (Time Division multiplexing) - Time is the key, each of the pc get a time token or are in a queu and gets their chances to be part of it.
#STDM (Statistical Time Division multiplexing)- IF 4 computers transfer data 64kbps then then you need a multiplexing system with a capability of 64 * 4 = 256 kbps, however if the statistic shows that you could use 128 as only two of the computers use transmission at the same time. This way you save money and use STDM. Problem will occur when all the computer will perform transmission at the same time.
#WDM (Wavelenght Division myltiplexing) - FDM used by optic fiber- Laser sends diff frequencey of ligt in same fiber optic cable. Step index, Graded index, single mode.
Ref for multiplexing photo
Inverse Multiplexing:
IMUX - Reverse process of multiplexing. Multiplexing combines lower speed circuits and transmitt as high speed one. IMUX
Modulation-
Modulation is the process of changing the characterstics of the signal before / after transmitting.
Modulation Explained
#FM - Frequency Modulation
#AM - Amplitude Modulation
#PM - Phase Modulation
Analog Transmission explained
Digital Transmission of Digital data:
-Polar
-Bipolar
#NRZ (Non Return Zero)
#Return Zero
#AMI (Alternate Mark Inversion)
-Manchester
Digital Data Transmission
Analog Transmission of Digital Data:
Easy definition of Analog Transmission
Digital Transmission of Analog data:
Interesting :
Modem - Named from Modulator + Demodulator = MOD + DEM = MODEM
************************************************************************************************************************************************************************
************************************************************************************************************************************************************************
************************************************************************************************************************************************************************
Tutorial 17/03/2014
Http - Hyper Text Transfer Protocol
* Normal Protocal
* Standard Protocal
HTTP is a standard protocal
Http used in World wide web
Client - server (web server) These two communicate via http
Http Request Message (packet) :
#Request line
#Rquest header
#Req body
Response :
Response line (200-ok)
Response Header
Response body(HTML language normally) Hyper text marker language
Things to know about http :
CR - Carriage reun
LF - Line feed
GET
PUT - UPLOAD
POST - ADDITIONAL INFORMAION
RESPONSE MESSAGE :
200 MEANS OK
301 MEANS MOVED PERMANANTLY
404 MEANS NOT FOUND
500 MEANS INTERNAL SERVER ERROR
There are enter keys and has related ASCII
In the querry or filter box of wire shirk to narrow down any specific search you type the following :
# http and ip.addr
# use and or
# do sort
Answer to tutorial questions :
1.Identify HTTP packets, requests and responses related to downloading my web page. Give the related frame numbers.
2. How many HTTP and TCP packets are needed to complete each request?
Frame no 35 http req = Frame 38 tcp res (2 segments)
Frame no 42 http req = Frame 113 tcp res (47 segments)
Frame no 114 http req = Frame 116 tcp res (2 segments)
3. In particular, note that my web page contains a photo. Find the HTTP packets where the photo is being requested and response being completed.
Frame no 42 request for the photo
Frame no 116 response
Wireshark and Ping related Learning
######################################################################################################################################################################
######################################################################################################################################################################
######################################################################################################################################################################
Lecture Topic: Physical Layer
Review Questions
Use these questions to review the important material from the Topic Notes and chapter 3 of the prescribed textbook.
The review should take place in your own time. Where possible you should work with your colleagues.
You can discuss your answers with your tutor in the week 4 tutorial
----------------------------------------------------------------------------------------------------------------------------------------------
1. Describe the three types of data flows.
2. Describe three types of guided media.
3. Describe four types of radiated media.
4. How does analog data differ from digital data?
5. Explain the differences among analog data, analog transmission, digital data,
and digital transmission.
6. Explain the benefits for a telecommunication company circuits to use digital transmission.
7. Describe the ASCII coding scheme.
8. How does bipolar signaling differ from unipolar signaling? Why is Manchester
encoding more popular than either?
9. What are three important characteristics of a sound/electrical signal wave?
10. Describe how data could be transmitted using amplitude, frequency and phase modulation.
11. What is the purpose of multiplexing? Describe and compare FDM, TDM and STDM?
12. Describe Pulse Amplitude Modulation.
Labels:
Chapter 3,
Data communication and Networking,
FIT3550,
Monash
Subscribe to:
Comments (Atom)

