Network Protocol Analyzer

Thursday, November 26, 2009
Check out this SlideShare Presentation:

Network Protocol Analyzer

By Bobby and group

Tcpdump

Wednesday, November 25, 2009
Check out this SlideShare Presentation:

About CC

http://www.2privacy.com/www/privacy-protection/ip-check-privacy-test.html#004

Questions for Sessions on 24th November by CC6

Monday, November 23, 2009
# IP UTILITIES: CC-16
1)WHAT IS ICMP ?

#  IP UTILITIES: CC-17
1)WHAT IS SELECTIVE ARQ?HOW IT IS WORK?

# Questions by-
Team Noesis (CC 6)

# Members-
  • Sourav
  • Renuka
  • Siddesh
  • Masoud

Questions for CC16 and CC17 from CC5

1.what is the difference between nslookup and PING?
2.what is Lpr?

Questions by CC-12

Which is a better IP monitor tool and why?

By CC-12

Questions for CC16 and CC17

1.what is the difference between nslookup and PING?
2.what is Lpr?

Question for group cc-16 & cc-17

Question for group cc-16
In which layer of osi model  IP  utilities works


Question for group cc-17
Why information of  NASA is not shown by NSLOOKUP

Questions

question for cc-16
1. what is trouble shooting? how it is rectified in your software?
2. what is TTL? how it works?

question for 17
1.waht is ARQ function? how it works?
2. what are the application?

Team mambers:
swetha.m
padma.b.s
shilpa.s
shruthi.k.n

Fwd: Questions from CC-8

Question for CC-17 group
1. how is round trip time is calculated ?

Question for CC-16 group:
1. why was IP-5 not introduced ?

By:
CC-8
GroupName:Proxymity


Questions from CC-8

Tuesday, November 10, 2009
Question for Network Analyzer:
1.What is ARQ and what is the purpose of using ARQ ?

Question for TCPDump:
1.what is UDP ? and give more information on commands using in TCPDUMP ?

BY:CC-8
group name:PROXYMITY

Proxy Servers

Check out this SlideShare Presentation:

Questions for Sessions on 10th November by CC6

Monday, November 9, 2009
# Network Analyzers :
1)What is meant & what is the use of Standard Template?
2) What leads to ARP attack? What are the risks of ARP attack?

# TCPDUMP :
1)How do I capture only tcp
traffic (no udp or icmp?

# Questions by-
Team Noesis (CC 6)

# Members-

  • Sourav
  • Renuka
  • Siddesh
  • Masoud

Questions for CC15 from CC5

Can TCPdump be used in windows platform n how does it protect hacking?


Add whatever you love to the Yahoo! India homepage. Try now!

question for CC13 from CC5

what is ARP attack.? how does the tool works against this?


Keep up with people you care about with Yahoo! India Mail. Learn how.

Network Protocol Analyzer

Saturday, November 7, 2009
By Janaki and Group

Questions for network protocol analysers

Thursday, November 5, 2009
Q1. What is the main application of this concept (where exactly this can be used)?
Q2. How much secure is the software (softperfect) is over others(like wireshark)?

By
Rajani
Priyonath Banarjee
Bhavnani Poonam
Masudur Rahaman

Questions From CC-8

Tuesday, November 3, 2009
Question to shreyas group:
1.How to calculate Round Trip time ?

Question to CC-12
2.how do effectively maintain Network Traffic ?

From CC-8
PROXYMITY GROUP

Network Protocol Analysers

Monday, November 2, 2009
@ CC-11

Can SoftPerfect filter application layer protocol protocols such as HTTP, telnet, ssh etc...??
@ CC-12

What does DHCP do?


From CC-10

Questions for cc-11

Is there any way we can convert the data of the packet captured from hexadecimal format to user readable format?


from CC-12

Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J

Questions on proxy server!!

@ Siddharth and group
1.What are dangerous urls?

@ Srikanth and group
2.In your presentation you told that you could block facebook, but it was not accessible before also. Explain the same.

--
Sahana

Questions by group CC 15

for cc 11

What kind of information will a protocol analyzer provide to help troubleshoot or maintain the overall health of LAN ?

for cc 12

can a protocol analyzer work over a WAN ?

TO CC11 and CC12

>what is the main difference between wire shark and soft perfect and how each is better than other?
>what is STM?

  

Question

Which operating system supports network protocol analyzer the best?

Group CC 17:
Uttamani Hitesh
Yeshwant Singh
Yukteshwaraditya Singh Parihar
Zeshta Bhat

Questions from CC 19

NETWORK PROTOCOL ANALYZER

for CC 11
Difference between Hardware and Software Network Analyzer?

for CC 12
What are the benefits and drawbacks of  Network Protocol Analyzer?

Q's by CC3

To CC11

In which layer of the OSI reference model does the software work? Because it filters packets on different protocols which are from different layers eg: IP, TCP, ARP etc...

To CC12
Where should the software reside whether in user's system, routers or gateway to get the best result?


Questions posted on topic "Network analyzer" by CC3
group members:
Pratik Vasani
Arpith U.K
Prashant Maski
Sagar K.V

Questions for Sessions on 3rd November by CC6

# Network Analyzers (Both Teams, Please Answer Sprarately):
1) Elaborate the differences between essential & critical protocol.
2) Does a network analyzer exist which can manipulate/ block the data transfer? 


# Questions by-
Team Noesis (CC 6)

# Members-

  • Sourav
  • Renuka
  • Siddesh
  • Masoud

Question for cc12

What is the difference between low level protocol and high level protocol?

By CC5

Questions for cc11 from cc5

What is virtual network (VLAN) ?

Questions by CC19

for   CC 09
Give five advantages and disadvantages of proxy server?

for   CC10
Where to get fast proxy servers?

Questions on FTP:

Thursday, October 29, 2009

@srikanth
---- how do i set up an ftp server? can this cause serious security problems?
questions submitted by: cc 16
priya m.s
karthik k
darshan thappa
satchidanand das

CC-12 questions

Wednesday, October 28, 2009
for CC-9

Does using the proxy server slow down the web browser?

By:
Sahana.P.Shankar
Raksha.J
Shruthi Raghavan
Sai Janaki Tejaswi P

CC-12 questions

for CC-10

Is it safe to use proxy servers from public lists on the web?

By CC-12

Sahana.P.Shankar
Shruthi Raghavan
Sai Janaki Tejaswi P
Raksha.j

To CC9 and CC10

Tuesday, October 27, 2009
1)How do you forward µTorrent file?

BY CC4


Question on proxy servers

for group CC09
What are dangerous URLs ?

for group CC10
What are the ways in which filezilla can check attacks from the errors handled on SSL/TLS secured data transfers.

Questions from CC20

Questions on proxy sever:-
1.does the IP Address of a computer changes frequently?If yes/no,plz give the reasons behind it.
2.What is IP filtering ?

from:cc20

QUESTIONS BY TEAM CC 19

To Vishal's Team

on PROXY SERVER

Questions!!!!

@srikanth :

1. How to unblock a blocked site?
2. I have downloaded a free proxy server, but proxy doesn't work, though it's a successfully tested. What could be the reason?

@ siddharth :

1. Where to get and how to check proxy lists?


QUESTIONS BY TEAM CC 19

To VISHAL'S TEAM
 
ON  PROXY SERVER
 

Questions from CC06

Questions for cc10
1)is there any way that i can enter the website without revealing my real ip address??
2)can a proxy server be used as a firewall?

by CC06
Renuka Jadhav
Sourav Roy
Siddesh
Massoud

CC-12 questions

for CC-10

Is it safe to use proxy servers from public lists on the web?

By CC-12
Sahana.P.Shankar
Shruthi Raghavan
Sai Janaki Tejaswi P
Raksha.j

CC-12 questions

for CC-9

Does using the proxy server slow down the web browser?

By:
Sahana.P.Shankar
Raksha.J
Shruthi Raghavan
Sai Janaki Tejaswi P

Questions on proxy server

Tuesday, October 20, 2009
What is the difference between open proxy server and transparent proxy server?

by CC5

Question on proxy server

What are open proxy servers? Why open proxy servers are considered dangerous for your network and to the internet at large?

question posted by:
cc 16
darshan thappa
satchidanand das
priya m.s
karthik k.

Question for proxymity group:

Q1.Can the ip address be detected or traced back  if you are using anonymous proxy server? if yes in what situations and how (in brief)..

By
group no CC7- cite seer

Rajani.B.V
Priyonath Banerjee
Masudur Rahaman
Poonam R Bhawnani

Proxy Servers

Check out this SlideShare Presentation:

Q's for CC8

1) Diffentiate open and transparent proxies.
2) Explain how to configure proxy using s/w or h/w. How will it work??

By CC3
Arpith
Prashant
Prateek
Sagar

Questions by CC10

How can proxy act as a gateway?

--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E

CC7 questions

Monday, October 19, 2009
How can i get the user log information, to access to the system using remote login for windows XP?

By CC-12:

Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J

Questions from CC18

Questions for CC8:
1.If there's a hit in cache then the time duration is less, in case there's a miss won't it take a longer time than directly accessing the main server??
2.How can we recognize a failure in the proxy server??

Team:
  1. Rakshita Shetty
  2. Vatsal Doshi
  3. Sharath Babu
  4. Sushma Rao
  5. Sahana P

Questions for Sessions on 13th & 20th October by CC6

# Proxy Servers:
1) Elaborate Private & Public ip address.
2) How is proxy different from DNS?
3) Proxy will be slow for session based & random websites which are not cached. The combined effect of caching & dynamic web addressing will result in slow performance. Then how does it improve performance? Justify. 

# Remote Login (for Nithin & group): 
1) How does WINSCP support Remote Login?
 


# Questions by-
Team Noesis (CC 6)

# Members-

  • Sourav
  • Renuka
  • Siddesh
  • Masoud

CC8 questions

Can I use Web Proxy Server to protect my network from viruses and other dangerous programs?

By CC-12

Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J

CC6 questions

How do I remote login to my friends computer using telnet?

By CC-12

Sahana.P.Shankar
Sai Jankai Tejaswi P
Shruthi Raghavan
Raksha J

Questions!!!!!

@ sourav n group

how does file share work?



@nitin n group

what is difference between file transfer n file share?

By cc1

Question for CC8

1. Why open proxies are used if we can access all web pages directly?

by cc4

Questions!!!!!

@ sagar n group

How do we speed up http tunneling?


@Ahmed n group

How do we increase web logic server memory?


@Vijeta n group

How to change proxy server password?

By cc1

Questions by CC19

REMOTE LOGIN


Nitin's group:


What is difference between local and in remote log-in?


Sourav's group:


We can not connect remote pc without admin right how to connect remote pc without admin right ?

By Nithin & group

Wednesday, October 14, 2009
Check out this SlideShare Presentation:

Remote Login- Noesis (CC06)

Tuesday, October 13, 2009
By Team NoesisRemote Login- Noesis
View more presentations from sourav894.

This is a program we made to connect a server & a client system-
SERVER
Imports System
Imports System.IO
Imports System.Net
Imports System.Net.Sockets
Imports System.Text
Imports Microsoft.VisualBasic
Module Module1

    Sub Main()
        Dim server As TcpListener
        server = Nothing
        Try
            ' Set the TcpListener on port 13000.
            Dim port As Int32 = 13000
            Dim localAddr As IPAddress = IPAddress.Parse("127.0.0.1")

            server = New TcpListener(localAddr, port)

            ' Start listening for client requests.
            server.Start()

            ' Buffer for reading data
            Dim bytes(1024) As Byte
            Dim data As String = Nothing

            ' Enter the listening loop.
            While True
                Console.Write("Waiting for a connection... ")

                ' Perform a blocking call to accept requests.
                ' You could also user server.AcceptSocket() here.
                Dim client As TcpClient = server.AcceptTcpClient()
                Console.WriteLine("Connected!")

                data = Nothing

                ' Get a stream object for reading and writing
                Dim stream As NetworkStream = client.GetStream()

                Dim i As Int32

                ' Loop to receive all the data sent by the client.
                i = stream.Read(bytes, 0, bytes.Length)
                While (i <> 0)
                    ' Translate data bytes to a ASCII string.
                    data = System.Text.Encoding.ASCII.GetString(bytes, 0, i)
                    Console.WriteLine("Received: {0}", data)

                    ' Process the data sent by the client.
                    Dim msg As Byte() = System.Text.Encoding.ASCII.GetBytes("Your request has been syccesfully recieved")

                    ' Send back a response.
                    stream.Write(msg, 0, msg.Length)
                    Console.WriteLine("Sent: {0}", data)

                    i = stream.Read(bytes, 0, bytes.Length)

                End While

                ' Shutdown and end connection
                client.Close()
            End While
        Catch e As SocketException
            Console.WriteLine("SocketException: {0}", e)
        Finally
            server.Stop()
        End Try

        Console.WriteLine(ControlChars.Cr + "Hit enter to continue....")
        Console.Read()

    End Sub

End Module


CLIENT
Imports System.Net.Sockets
Module Module1

    Sub Main()
        Console.WriteLine("Enter server IP Address and then press Enter... " & vbCrLf)
        Dim IP As String = Console.ReadLine()
        Console.Write("Eneter your message and press Enter..." & vbCrLf)
        Dim message As String
        message = Console.ReadLine
        Connect(IP, message)
    End Sub
    Private Sub Connect(ByVal server As [String], ByVal message As [String])
        Try
            ' Create a TcpClient.
            ' Note, for this client to work you need to have a TcpServer
            ' connected to the same address as specified by the server, port
            ' combination.
            Dim port As Int32 = 13000
            Dim client As New TcpClient(server, port)

            ' Translate the passed message into ASCII and store it as a Byte array.
            Dim data As [Byte]() = System.Text.Encoding.ASCII.GetBytes(message)

            ' Get a client stream for reading and writing.
            '  Stream stream = client.GetStream();
            Dim stream As NetworkStream = client.GetStream()

            ' Send the message to the connected TcpServer.
            stream.Write(data, 0, data.Length)

            Console.WriteLine("Sent: {0}", message)

            ' Receive the TcpServer.response.
            ' Buffer to store the response bytes.
            data = New [Byte](256) {}

            ' String to store the response ASCII representation.
            Dim responseData As [String] = [String].Empty

            ' Read the first batch of the TcpServer response bytes.
            Dim bytes As Int32 = stream.Read(data, 0, data.Length)
            responseData = System.Text.Encoding.ASCII.GetString(data, 0, bytes)
            Console.WriteLine("Received: {0}", responseData)

            ' Close everything.
            stream.Close()
            client.Close()
        Catch e As ArgumentNullException
            Console.WriteLine("ArgumentNullException: {0}", e)
        Catch e As SocketException
            Console.WriteLine("SocketException: {0}", e)
        End Try

        Console.WriteLine(ControlChars.Cr + " Press Enter to continue...")
        Console.Read()
    End Sub 'Connect

End Module


Connecting Sourav's & Masoud's Systems. Live Demo

Question by group 15

Are the ports used in the remote login application forwarded through the firewall?

Vivek (Visit My Site)
Rohit
Raunak
Preetham

For remote login session on 13th October

What is redirection?
How remote login achieves File, printer and other redirection??


BY CC3
Arpith
Prashant
Prateek
Sagar

Questions on Remote login by Ahmed's group

How to remote login redhat system?

Question goes to CC6

Monday, October 12, 2009
Please give more info on "FILE REDIRECTION"


by CC8
Tejus
Chaitra
Vishal
Vijetha

Question by CC10

Why is the client response slower when remote login is used?
--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E

Questions by CC19

on   REMOTE LOGIN


for Ahmad's  Team

Q.  What port to forword to router and configure to access pc from a remote internet connection.




for Arpith's Team


 Q. I am using ShowMyPC to remote into my computer at home. My brother is logged in as a  User I need to log in as an admin and/or change his account permission to either "Power User" or "Network Configurator."   Is there any command I can type to log into my admin account e/o giving him my password?


Remote Login

By Ahmed & group

SSH And Rlogin

By Ahmed & group

Question by CC10

How do you configure a remote login software on a network that has dynamic ip's for every system (assuming that you don't have privileges to set static ips on any machine on the network)?

--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E

QUESTIONS ON REMOTE LOGIN

Sunday, October 11, 2009
How to remote login to linux from windows?

question submitted by:

priya m.s
satchidanand das
karthik k
darshan thapa

Questions on Remote login

Wednesday, October 7, 2009
@ Arpith and group :
Do we get administrative privileges of the remote computer??

@Syed ahmed and group:
Can two people login to a remote computer simultaneously?? If yes, how?
 

Questions by CC18:
  1. Sharath Babu
  2. Sushma Rao
  3. Vatsal Doshi
  4. Rakshita Shetty
  5. Sahana. P

Remote Login

Tuesday, October 6, 2009
By Sagar & group

Http Proxy Server

By Priyonath & group.

Questions by CC12


1. Sometimes I get a 'File Transfer permission denied: disabled or unknown user version incompatibility' message while using the 'File Transfer' option in the Remote Access Viewer application. Why?
2. How does the address resolution protocol stack map the logicl IP address to the physical MAC address of the LAN????
3. How does sky propagation differ from line-of-straight propagation??

CC12
RAKSHA.J
SAHANA.P.SHANKAR
SAI JANAKI THEJASWI
SHRUTHI .RAGHAVAN

Question on remote login

1. Is there a privacy breach in remote login and how can you prevent this privacy breach?

2.Why doesn't the firewall block the remote login?

Group CC8

Chaithra T R
Tejus R
Vijetha P C
Vishal agarwal

Questions for Sessions on 6th October by CC6

# Remote Login (Both teams) :
1) What is DNS spoofing?
2) What is loop back addressing?
3) How are two different systems with different OS connected? What is the interface seen if a Linux system logs into a Windows system? Is it Windows or Linux interface?
4) Why is Telnet not safe?


# Questions by-
Team Noesis (CC 6)

# Members-
  • Sourav
  • Renuka
  • Siddesh
  • Masoud

Questions from cc5

1) Is it possible to remotely login multiple systems from the host ?justify .
2) What is DNA Spoofing?

Questions by CC09

Question 1:
Can we login remotely to the same system to login as two different users?

Question 2:
How can we bypass anti-remote login measures set up by some companies?


Team members:
Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh

Questions

How can we access files without using firewall?
which is the tool which does that?
What is a heterogeneous network?

posted by:-
Hitesh
Yeshwant singh
Yukteshwaraditya
Zeshta bhat

Questions on cc from cc20

Monday, October 5, 2009
Question on remote login:

1. What are sockets?
2. What is PuTTY?
3.How security is provided in your software?


Team members:
swetha.m
shilpa.s
padma.b.s
shruthi.k.n

Questions by CC8

Http ProxyServer:

1.Why do FTP specific features over Http proxy fail?


Protocal Stack:
2.How does the Address resolution protocol stack map the logical IP address to the physical MAC address on a LAN?

by cc8:
Chaithra
Tejus
vijetha
vishal

Questions By CC12

Saturday, October 3, 2009
How can one setup the browser to use proxy?
 
By CC12:
Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J

Qs from CC3(Sagar, Arpit, Prashant, Prateek)



Q's for CC7(Rishi and Group)

What is the need of using the proxy, if the IP is transparent(was mentioned in types of proxy)?
What Tunnel/IRC and SSL Proxy?? How they help security??

Q's for CC1(Soumya and Group)
Think that i have to send a mail what are the protocols involved? and explain the work of each layer in transmission of mail.


Team
Arpith
Prashant
Prateek
Sagar

PROTOCOL STACK AND ADDRESSING

Thursday, October 1, 2009
BY
CC01

Questions!!

@ Sowmya and group:
 
1. How is IP a connectionless protocol? Agreed that data can be transmitted without the consent of the reciever, but its not a rule which it follows always.
 
@ Rajani and group :
 
1.How secure is reverse proxy mechanisim? Consider google itself , if they use a combination of servers under same ip to handle the requests anybody else can do the same and pretend to be google right? This applies for any scenario where we can pretend to be some other standard servers? Is it possible? How secure is proxy mechanism?



--
Sahana

Video of protocol stack data transmission

Group cc01:
rashmi kamat
roopavani.r
soumya.v.n
suma.p

video of protocol stack data transmission:

Questions on 29th september presentations

Wednesday, September 30, 2009
question on proxy server:
 what is PAC (proxy auto config) file?

question for protocol stacking?
how different are transport layers of TCP and UDP?

submitted by CC16
darshan thappa
priya m.s.
satchidanand das
karthik k.

Questions by CC10

Tuesday, September 29, 2009
HTTP Proxy Server:
How did the proxyfire select the 17 proxies?

Protocol Stack and Addressing:
Consider a system with a DSL modem/router and a wifi router. The modem connects to the router through the WAN port on the router. Assume that DHCP is enabled on both. The ip range for DHCP is 192.168.0.X to 192.168.0.Y on the modem and on the router. There is a machine which is connected to the router through the LAN port and a system that accesses the internet wirelessly. If the two machines want to access the network resources simultaneously, will there be a conflict? If yes, why and how to resolve it. If no, why not?

--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E

Questions by CC4

What is the difference between wan IP and local IP?
How HTTP is different from SOCKS?

BY CC4

Presentation by CC15

To view the pdf or download please follow the link below:
http://www.keepandshare.com/doc/view.php?id=1419143&da=y

QUESTIONS by CC19

HTTP PROXY SERVER
1)How to block some IP addresses of users so that they cann't access some defined sites by use of Webmin in Squid Server(access contol) ?
2)What is Proxy Chaining?
PROTOCOL STACK
1)What is ISDN protocol stack?

2)What Network Management Protocol does the OSI Protocol Stack use?

Question:CC20

QUESTIONS:- HTTP PROXY SERVER:

1. what is inbound/netbound traffic and how is it recognised in reverse proxy?


QUESTION:-IP ADDRESSING AND PROTOCOL STACK:

1. what is cataloging in enterprise ip address manager
a.what is hop?
b.what is classless addressing

TEAM MEMBERS:- CC20
1.swetha.m
2.shilpa.s
3.padma.b.s
4.shruthi.k.n

Question on http proxy server

Explain more about transparent server?

from cc11
Shreyas.H.D
Prabhakara.S.H
Vijay.S.S
Sharath.S

Questions by CC9

Question for Proxy Servers:

Why use a proxy server to get a different IP when you can simply mask it?

Question for Protocol Stack:

How does Real Hide IP protect from hackers?


Team members:

Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh

Questions for Sessions on 29th September by CC6

Monday, September 28, 2009
# HTTP Proxy Server :
1) How HTTP proxy server keeps system as anonymous?
2) What is secure socket layer (SSL)?
3) How is Proxy Server different from Open DNS?

# Protocol Stack:
1)Wat is the role of presentation layer in transfer of data?
2) How does routing selection happen in network layer?

# Questions by-
Team Noesis (CC 6)

# Members-
  • Sourav
  • Renuka
  • Siddesh
  • Masoud

An introduction to TCP/IP utilities

 

Transmission Control Protocol/Internet Protocol is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.

TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.

TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)

Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."

Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.

Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).
 
The common TCP/IP utilities are as follows:
 
  • ARP
ARP stand for Address Resolution Protocol. This provides IP to Ethernet addresses. Each hardware card has an address coded in. This allows deletion and addition to the ARP cache.
 
  • Nbtstat
This is a very useful little tools if networked and/or using Win servers or Lmhost file. It displays TCP/IP connections using netbios.  The switches to be used will be shown if typing nbtstat from the command prompt.
 
  • Netstat
This utility provides the connection both the local and remote, ports and the state of the connection. It has several switches which maybe found by typing netstat /? from the command prompt. It provides the IP addresses and the ports of the remote computer(S) to which the socket is connected. It shows the the port numbers as well as IP address for the local computer.
 
  • Ping
This is a simple diagnostic tool to verify connection and also used quite frequently as a troubleshooting tools. The available switches can be obtained by typing ping from command prompt.
 
  • Route
This command is very useful if using networking. It allows you to view and manipulate the routing tables. It is a very useful tool for diagnosing and modifying networking routing issues.
 
  • Tracert
This is a utility which allows you to see the route taken by packages from yourself to a destination. It also show the time it takes. It can also be used to determined the IP address of a service were you only know the name.
 
  • Winipcfg
A very useful little utility. Use Start ---->Run and type in winipcfg. It will tell you your present IP address and your subnet mask.
 
By-CC 18
1.Sharath babu
2.Vatsal. Doshi
3.Sushma Rao
4.Rakshita shetty
5.Sahana. P
 

Network Protocol Analyzer by CC12

Tuesday, September 22, 2009

NETWORK PROTOCOL ANALYZER

The packet analyzer (also known as a network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.

USES:

The versatility of packet sniffers means they can be used to:

Analyze network problems

Detect network intrusion attempts

Gain information for effecting a network intrusion

Monitor network usage

Gather and report network statistics

Filter suspect content from network traffic

Spy on other network users and collect sensitive information such as passwords (depending on any content encryption methods which may be in use)

Reverse engineer proprietary protocols used over the network

Debug client/server communications

Debug network protocol implementations

    NOTABLE PACKET ANALYZERS:

WIRESHARK:

Wireshark is a free packet analyzer computer application. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues.

Wireshark is a network packet analyzer. A network packet analyzer will try to capture network

packets and tries to display that packet data as detailed as possible.

You could think of a network packet analyzer as a measuring device used to examine what's going

on inside a network cable, just like a voltmeter is used by an electrician to examine what's going on

inside an electric cable (but at a higher level, of course).

In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed.

Wireshark is perhaps one of the best open source packet analyzers available today.

SOME INTENDED PURPOSES:

Here are some examples people use Wireshark for:

• network administrators use it to troubleshoot network problems.

• network security engineers use it to examine security problems.

• developers use it to debug protocol implementations.

• people use it to learn network protocol internals.

The following are some of the many features Wireshark provides:

• Available for UNIX and Windows.

• Capture live packet data from a network interface.

• Display packets with very detailed protocol information.

• Open and Save packet data captured.

• Import and Export packet data from and to a lot of other capture programs.

• Filter packets on many criteria.

• Search for packets on many criteria.

• Colorize packet display based on filters.

• Create various statistics.

By CC-12
Raksha.J
Sahana.P.Shankar
Sai Janaki tejaswi p
Shruthi raghavan

Stop & Wait by CC3

STOP AND WAIT

Design and Implementation

Assumption: Error free communication channel

The sender in this protocol simply retrieves a packet from the network layer, copies it into a frame, and then transmits it. After transmission, the sender busy waits until an acknowledgement is received from the receiver, then the loop starts over again.

The receiver simply busy waits until a frame is received. Once a frame is received it passes the data packet to the network layer and sends an acknowledgement for the frame it just received. It then loops back to busy waiting and the process continues until the End of File is reached.

In this protocol, there can only be one outstanding frame at a time so no sequence numbers are required and the acknowledgement the receiver sends back to the sender is nothing more than an empty frame, as there is no other possibility then acknowledging the only frame sent. Another frame will not be sent until this acknowledgement is received.

Performance

The Stop and Wait protocol was very easy to implement and runs very quickly and efficiently. It solves the problem of congestion, as only one frame is outstanding at any time, frames cannot be lost due to congestion and the receiver will not be swamped by the sender.

Point of failure

The problem with it is that it assumes an error free communication channel and in the real world, such a channel does not exist. It is easy to see that if a frame or an acknowledgement gets lost or damaged, a deadlock situation will occur where neither the sender or receiver can advance, and they will be thrown into infinite loops.

Arpith Uttarkar

Proxy Servers by CC09

Proxy Servers

In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.

A proxy server has two purposes:

To keep machines behind it anonymous (mainly for security).
To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

A proxy server can be placed in the user's local computer or at various points between the user and the destination servers or the Internet. A reverse proxy is a proxy used as a front-end to accelerate and cache in-demand resources (such as a web page).

Team CC09:
Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh

Remote Login- CC4

What is Remote login?

Hello friends in this post i am going to tell you one of the most important concepts of networking that is Remote Login. Here in this post i will tell you what the Remote Login is, how it works and many other things related to it.

In simple words Remote Login means to access other computers on the network or on the other network by the use of telnet or rlogin command. In other words we can also say that Remote Login means to access native computer from the other computer on the network when you are connected to the internet. Generally there are two protocols that are used for Remote Login:
1.RLOGIN Protocol Overview
2.TELNET Protocol Overview

For using the TELNET command for remote login the syntax is:

-->telnet hostname

After connecting with the remote host, you will be prompted for your login id and your password just as if you were logging on via a terminal on that system.


For using the RLOGIN command for remote login the syntax is:

-->rlogin hostname

This command provides an advantage over the telnet command that is here in this command you can specify a username on the command line, and can set it up so that when you rlogin to a host you will not be prompted for a password. Rlogin assumes you wish to login to an account with the same name as the account you are presently logged in as. If you wish to change this, use the -l option.

How Desktop Sharing Works

*

Remote Login

Let's say you're preparing a huge PowerPoint presentation for a big meeting on Friday. All of the PowerPoint files and PDFs and images that you want to use in your presentation are saved on the hard drive of your work computer. Thursday rolls around and you wake up with a nasty stomach virus. You don't feel well enough to go to the office, but you need to finish that presentation. Here's where remote login can help.

Until recently, virtual private networks (VPN) were the only way to remotely access work files from home. But VPN access isn't the same as accessing the hard drive of your work computer. VPN gives you access to the local area network (LAN) at your office. With VPN, you're only able to access your PowerPoint presentation files if you've saved them on the network, not just on your computer's hard drive.

Remote login, however, uses simple desktop sharing software to give you a "remote control" for accessing your computer -- and all of its software and hard drive files -- from any Internet-connected device anywhere in the world.

Remote login works exactly the same way as desktop sharing. In desktop sharing, there are two separate parties: the host computer and the remote user. To share a desktop, the host computer allows a remote user to view the contents of the host computer's desktop over the Internet. The host computer can also hand over keyboard and mouse controls to the remote user. With remote log-in, your home or work computer is the host and you (in this case) are the remote user.

Remote login requires three basic components:

1. Software download

2. Internet connection

3. Secure desktop sharing network

Proxy Servers by CC7

Proxy servers have two main purposes:

  • Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.
  • Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.
  • by group CC7

    Question For Wireshark

    QUESTION:

    1. how ethernet helps in this wireshark? what is the purpose of using this?


    TEAM MEMBERS:
    1.Swetha.M
    2.Shruthi.K.N
    3.Baharan
    4.Malihe

    Question for transmission media:

    QUESTIONS:
    1. how the cross talk is done? reason for crosstalk?
    2.what is repeater? what is purpose of using it?


    TEAM MEMBERS:
    Swetha.M
    Shruthi.K.N
    Baharan
    Malihe

    Protocol Stack & Addressing

    Monday, September 21, 2009
    Layer 1: Physical Layer
    The Physical Layer defines the electrical and physical specifications for devices. In particular, it defines the relationship between a device and a physical medium. This includes the layout of pins, voltages, cable specifications, Hubs, repeaters, network adapters, Host Bus Adapters (HBAs used in Storage Area Networks) and more.

    To understand the function of the Physical Layer in contrast to the functions of the Data Link Layer, think of the Physical Layer as concerned primarily with the interaction of a single device with a medium, where the Data Link Layer is concerned more with the interactions of multiple devices (i.e., at least two) with a shared medium. The Physical Layer will tell one device how to transmit to the medium, and another device how to receive from it (in most cases it does not tell the device how to connect to the medium). Standards such as RS-232 do use physical wires to control access to the medium.

    The major functions and services performed by the Physical Layer are:

    * Establishment and termination of a connection to a communications medium.
    * Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.
    * Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

    Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a Transport Layer protocol that runs over this bus. Various Physical Layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the Data Link Layer. The same applies to other local-area networks, such as Token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.


    Layer 2: Data Link Layer


    The Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work, in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in modern data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on Ethernet, and, on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the Transport Layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages.

    The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete Data Link Layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.

    Both WAN and LAN services arrange bits, from the Physical Layer, into logical sequences called frames. Not all Physical Layer bits necessarily go into frames, as some of these bits are purely intended for Physical Layer functions. For example, every fifth bit of the FDDI bit stream is not used by the Layer.

    Layer 3: Network Layer

    The Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer. The Network Layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is hierarchical.

    The best-known example of a Layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of errored packets so they may be discarded. When the medium of the next hop cannot accept a packet in its current length, IP is responsible for fragmenting the packet into sufficiently small packets that the medium can accept.

    A number of layer management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the Network Layer. These include routing protocols, multicast group management, Network Layer information and error, and Network Layer address assignment. It is the function of the payload that makes these belong to the Network Layer, not the protocol that carries them.

    Layer 4: Transport Layer


    The Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.

    Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

    Of the actual OSI protocols, there are five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least error recovery) to class 4 (TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the Session Layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries, both of which TCP is incapable.


    Layer 5: Session Layer


    The Session Layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls.


    Layer 6: Presentation Layer


    The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them. The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack.

    This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

    The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML.

    Layer 7: Application Layer


    The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application layer implementations include Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and X.400 Electronic Mail.


    BY:

    CC01