Network Protocol Analyzer by CC12

Tuesday, September 22, 2009

NETWORK PROTOCOL ANALYZER

The packet analyzer (also known as a network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.

USES:

The versatility of packet sniffers means they can be used to:

Analyze network problems

Detect network intrusion attempts

Gain information for effecting a network intrusion

Monitor network usage

Gather and report network statistics

Filter suspect content from network traffic

Spy on other network users and collect sensitive information such as passwords (depending on any content encryption methods which may be in use)

Reverse engineer proprietary protocols used over the network

Debug client/server communications

Debug network protocol implementations

    NOTABLE PACKET ANALYZERS:

WIRESHARK:

Wireshark is a free packet analyzer computer application. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues.

Wireshark is a network packet analyzer. A network packet analyzer will try to capture network

packets and tries to display that packet data as detailed as possible.

You could think of a network packet analyzer as a measuring device used to examine what's going

on inside a network cable, just like a voltmeter is used by an electrician to examine what's going on

inside an electric cable (but at a higher level, of course).

In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed.

Wireshark is perhaps one of the best open source packet analyzers available today.

SOME INTENDED PURPOSES:

Here are some examples people use Wireshark for:

• network administrators use it to troubleshoot network problems.

• network security engineers use it to examine security problems.

• developers use it to debug protocol implementations.

• people use it to learn network protocol internals.

The following are some of the many features Wireshark provides:

• Available for UNIX and Windows.

• Capture live packet data from a network interface.

• Display packets with very detailed protocol information.

• Open and Save packet data captured.

• Import and Export packet data from and to a lot of other capture programs.

• Filter packets on many criteria.

• Search for packets on many criteria.

• Colorize packet display based on filters.

• Create various statistics.

By CC-12
Raksha.J
Sahana.P.Shankar
Sai Janaki tejaswi p
Shruthi raghavan

Stop & Wait by CC3

STOP AND WAIT

Design and Implementation

Assumption: Error free communication channel

The sender in this protocol simply retrieves a packet from the network layer, copies it into a frame, and then transmits it. After transmission, the sender busy waits until an acknowledgement is received from the receiver, then the loop starts over again.

The receiver simply busy waits until a frame is received. Once a frame is received it passes the data packet to the network layer and sends an acknowledgement for the frame it just received. It then loops back to busy waiting and the process continues until the End of File is reached.

In this protocol, there can only be one outstanding frame at a time so no sequence numbers are required and the acknowledgement the receiver sends back to the sender is nothing more than an empty frame, as there is no other possibility then acknowledging the only frame sent. Another frame will not be sent until this acknowledgement is received.

Performance

The Stop and Wait protocol was very easy to implement and runs very quickly and efficiently. It solves the problem of congestion, as only one frame is outstanding at any time, frames cannot be lost due to congestion and the receiver will not be swamped by the sender.

Point of failure

The problem with it is that it assumes an error free communication channel and in the real world, such a channel does not exist. It is easy to see that if a frame or an acknowledgement gets lost or damaged, a deadlock situation will occur where neither the sender or receiver can advance, and they will be thrown into infinite loops.

Arpith Uttarkar

Proxy Servers by CC09

Proxy Servers

In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.

A proxy server has two purposes:

To keep machines behind it anonymous (mainly for security).
To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

A proxy server can be placed in the user's local computer or at various points between the user and the destination servers or the Internet. A reverse proxy is a proxy used as a front-end to accelerate and cache in-demand resources (such as a web page).

Team CC09:
Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh

Remote Login- CC4

What is Remote login?

Hello friends in this post i am going to tell you one of the most important concepts of networking that is Remote Login. Here in this post i will tell you what the Remote Login is, how it works and many other things related to it.

In simple words Remote Login means to access other computers on the network or on the other network by the use of telnet or rlogin command. In other words we can also say that Remote Login means to access native computer from the other computer on the network when you are connected to the internet. Generally there are two protocols that are used for Remote Login:
1.RLOGIN Protocol Overview
2.TELNET Protocol Overview

For using the TELNET command for remote login the syntax is:

-->telnet hostname

After connecting with the remote host, you will be prompted for your login id and your password just as if you were logging on via a terminal on that system.


For using the RLOGIN command for remote login the syntax is:

-->rlogin hostname

This command provides an advantage over the telnet command that is here in this command you can specify a username on the command line, and can set it up so that when you rlogin to a host you will not be prompted for a password. Rlogin assumes you wish to login to an account with the same name as the account you are presently logged in as. If you wish to change this, use the -l option.

How Desktop Sharing Works

*

Remote Login

Let's say you're preparing a huge PowerPoint presentation for a big meeting on Friday. All of the PowerPoint files and PDFs and images that you want to use in your presentation are saved on the hard drive of your work computer. Thursday rolls around and you wake up with a nasty stomach virus. You don't feel well enough to go to the office, but you need to finish that presentation. Here's where remote login can help.

Until recently, virtual private networks (VPN) were the only way to remotely access work files from home. But VPN access isn't the same as accessing the hard drive of your work computer. VPN gives you access to the local area network (LAN) at your office. With VPN, you're only able to access your PowerPoint presentation files if you've saved them on the network, not just on your computer's hard drive.

Remote login, however, uses simple desktop sharing software to give you a "remote control" for accessing your computer -- and all of its software and hard drive files -- from any Internet-connected device anywhere in the world.

Remote login works exactly the same way as desktop sharing. In desktop sharing, there are two separate parties: the host computer and the remote user. To share a desktop, the host computer allows a remote user to view the contents of the host computer's desktop over the Internet. The host computer can also hand over keyboard and mouse controls to the remote user. With remote log-in, your home or work computer is the host and you (in this case) are the remote user.

Remote login requires three basic components:

1. Software download

2. Internet connection

3. Secure desktop sharing network

Proxy Servers by CC7

Proxy servers have two main purposes:

  • Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.
  • Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.
  • by group CC7

    Question For Wireshark

    QUESTION:

    1. how ethernet helps in this wireshark? what is the purpose of using this?


    TEAM MEMBERS:
    1.Swetha.M
    2.Shruthi.K.N
    3.Baharan
    4.Malihe

    Question for transmission media:

    QUESTIONS:
    1. how the cross talk is done? reason for crosstalk?
    2.what is repeater? what is purpose of using it?


    TEAM MEMBERS:
    Swetha.M
    Shruthi.K.N
    Baharan
    Malihe

    Protocol Stack & Addressing

    Monday, September 21, 2009
    Layer 1: Physical Layer
    The Physical Layer defines the electrical and physical specifications for devices. In particular, it defines the relationship between a device and a physical medium. This includes the layout of pins, voltages, cable specifications, Hubs, repeaters, network adapters, Host Bus Adapters (HBAs used in Storage Area Networks) and more.

    To understand the function of the Physical Layer in contrast to the functions of the Data Link Layer, think of the Physical Layer as concerned primarily with the interaction of a single device with a medium, where the Data Link Layer is concerned more with the interactions of multiple devices (i.e., at least two) with a shared medium. The Physical Layer will tell one device how to transmit to the medium, and another device how to receive from it (in most cases it does not tell the device how to connect to the medium). Standards such as RS-232 do use physical wires to control access to the medium.

    The major functions and services performed by the Physical Layer are:

    * Establishment and termination of a connection to a communications medium.
    * Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.
    * Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

    Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a Transport Layer protocol that runs over this bus. Various Physical Layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the Data Link Layer. The same applies to other local-area networks, such as Token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.


    Layer 2: Data Link Layer


    The Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work, in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in modern data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on Ethernet, and, on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the Transport Layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages.

    The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete Data Link Layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.

    Both WAN and LAN services arrange bits, from the Physical Layer, into logical sequences called frames. Not all Physical Layer bits necessarily go into frames, as some of these bits are purely intended for Physical Layer functions. For example, every fifth bit of the FDDI bit stream is not used by the Layer.

    Layer 3: Network Layer

    The Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer. The Network Layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is hierarchical.

    The best-known example of a Layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of errored packets so they may be discarded. When the medium of the next hop cannot accept a packet in its current length, IP is responsible for fragmenting the packet into sufficiently small packets that the medium can accept.

    A number of layer management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the Network Layer. These include routing protocols, multicast group management, Network Layer information and error, and Network Layer address assignment. It is the function of the payload that makes these belong to the Network Layer, not the protocol that carries them.

    Layer 4: Transport Layer


    The Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.

    Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

    Of the actual OSI protocols, there are five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least error recovery) to class 4 (TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the Session Layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries, both of which TCP is incapable.


    Layer 5: Session Layer


    The Session Layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls.


    Layer 6: Presentation Layer


    The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them. The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack.

    This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

    The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML.

    Layer 7: Application Layer


    The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application layer implementations include Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and X.400 Electronic Mail.


    BY:

    CC01

    Questions from team CC09

    Question for Wireshark:
     
    How is the security of the sniffed packets maintained? How is malicious use prevented?
     
    Question for Transmission Media:
     
    Why are microwaves used in wireless networks even though they are known to be harmful for human health?
     
    Team members:
     
    Rajavardhan
    Rishikesh
    Siddharth
    Sriniketan
    Rishabh

    Info on SoftPerfect Network Protocol Analyzer by CC13

    Info on SoftPerfect Network Protocol Analyzer

    The SoftPerfect Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the data passing through your dial-up connection or network Ethernet card, analyzes this data and then represents it in an easily readable form. The SoftPerfect Network Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network.

    The SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable format. It also allows you to defragment and reassemble network packets into streams. The program can easily analyze network traffic based on a number of different Internet protocols as listed below.

    The SoftPerfect Network Protocol Analyzer features full decoding of the following low level protocols: AH, ARP, BOOTP, DHCP, DNS, ESP, GRE, ICMP, ICMPv6, IGMP, IP, IPv6, IPX, LLC, MSG, REVARP, RIP, SAP, SER, SNAP, SPX, TCP, UDP and VLAN. It also performs full reconstruction of top-level protocols such as HTTP, SMTP, POP, IMAP, FTP, TELNET and others.

    The flexible system of fully configurable filters can be used to discard all network traffic except the specific traffic patterns you are interested in. The SoftPerfect Network Protocol Analyzer also has a special packet builder. This tool allows you to build your own custom network packets and send them into the network. You could use this packet builder feature to check your network for robustness against attacks and intruders.

    The software supports Windows 95/98/ME and NT/2000/XP/2003/Vista/2008/Seven. It also requires a network connection which could be a wireless connection or a modem that conforms to the NDIS standard.


    Key Features

    • This network sniffer can work in promiscuous mode to capture all network packets.
    • This network sniffer decodes packets and displays them in an easy to read format.
    • This network sniffer can build custom packets and send them into the network.
    • This network sniffer has a flexible system of traffic filtering. Any filter can be inclusive or exclusive.
    • This network sniffer can reconstruct packets into flows so you can easily see a complete data exchange following the Telnet, POP3, SMTP, IMAP, FTP, HTTP and other TCP based protocols.
    • This network sniffer is able to monitor loop back connections

    Submitted by: CC-13

    1.Alireza khakpour

    2.Mohammad askari.j

    3.Shahab sadeghi

    4.Hamidreza habibi

    Some More Information On Transmission Media by CC19

    GROUP- CC19 (Sudhanshu's Group)
    SOME MORE INORMATION ON TRANSMISSION MEDIA
    1. THE TRANSMISSION MODEL OF COMMUNICATION

    Introduction

    Here I will outline and critique a particular, very well-known model of communication developed by Shannon and Weaver (1949), as the prototypical example of a transmissive model of communication: a model which reduces communication to a process of 'transmitting information'. The underlying metaphor of communication as transmission underlies 'commonsense' everyday usage but is in many ways misleading and repays critical attention.

    Shannon and Weaver's model is one which is, in John Fiske's words, 'widely accepted as one of the main seeds out of which Communication Studies has grown' (Fiske 1982: 6). Claude Shannon and Warren Weaver were not social scientists but engineers working for Bell Telephone Labs in the United States. Their goal was to ensure the maximum efficiency of telephone cables and radio waves. They developed a model of communication which was intended to assist in developing a mathematical theory of communication. Shannon and Weaver's work proved valuable for communication engineers in dealing with such issues as the capacity of various communication channels in 'bits per second'. It contributed to computer science. It led to very useful work on redundancy in language. And in making 'information' 'measurable' it gave birth to the mathematical study of 'information theory'. However, these directions are not our concern here. The problem is that some commentators have claimed that Shannon and Weaver's model has a much wider application to human communication than a purely technical one.

    C & W's original model consisted of five elements:

    1. An information source, which produces a message.
    2. A transmitter, which encodes the message into signals
    3. A channel, to which signals are adapted for transmission
    4. A receiver, which 'decodes' (reconstructs) the message from the signal.
    5. A destination, where the message arrives.

    A sixth element, noise is a dysfunctional factor: any interference with the message travelling along the channel (such as 'static' on the telephone or radio) which may lead to the signal received being different from that sent.

    For the telephone the channel is a wire, the signal is an electrical current in it, and the transmitter and receiver are the telephone handsets. Noise would include crackling from the wire. In conversation, my mouth is the transmitter, the signal is the sound waves, and your ear is the receiver. Noise would include any distraction you might experience as I speak.

    Although in Shannon and Weaver's model a speaker and a listener would strictly be the source and the destination rather than the transmitter and the receiver, in discussions of the model the participants are commonly humanised as the sender and the receiver. My critical comments will refer less specifically to Shannon and Weaver's model than to the general transmission model which it reflects, where communication consists of a Sender passing a Message to a Receiver. So when I am discussing transmission models in general I too will refer to the participants as the Sender and the Receiver.

    Shannon and Weaver's transmission model is the best-known example of the 'informational' approach to communication. Although no serious communication theorist would still accept it, it has also been the most influential model of communication which has yet been developed, and it reflects a commonsense (if misleading) understanding of what communication is. Lasswell's verbal version of this model: 'Who says what in which channel to whom with what effect ?' was reflected in subsequent research in human communication which was closely allied to behaviouristic approaches.

    Levels of problems in the analysis of communication

    Shannon and Weaver argued that there were three levels of problems of communication:

    • A The technical problem: how accurately can the message be transmitted?
    • B The semantic problem: how precisely is the meaning 'conveyed'?
    • C The effectiveness problem: how effectively does the received meaning affect behaviour?

    Shannon and Weaver somewhat naively assumed that sorting out Level A problems would lead to improvements at the other levels.

    Although the concept of 'noise' does make some allowance for the way in which messages may be 'distorted', this frames the issue in terms of incidental 'interference' with the sender's intentions rather than in terms of a central and purposive process of interpretation. The concept reflects Shannon and Weaver's concern with accuracy and efficiency.

    Advantages of Shannon and Weaver's model

    Particular models are useful for some purposes and less useful for others. Like any process of mediation a model foregrounds some features and backgrounds others. The strengths of Shannon and Weaver's model are its

    • simplicity,
    • generality, and
    • quantifiability.

    Such advantages made this model attractive to several academic disciplines. It also drew serious academic attention to human communication and 'information theory', leading to further theory and research.

    Weaknesses of the transmission model of communication

    The transmission model is not merely a gross over-simplification but a dangerously misleading misrepresentation of the nature of human communication. This is particularly important since it underlies the 'commonsense' understanding of what communication is. Whilst such usage may be adequate for many everyday purposes, in the context of the study of media and communication the concept needs critical reframing.

    Metaphors

    Shannon and Weaver's highly mechanistic model of communication can be seen as being based on a transport metaphor. James Carey (1989: 15) notes that in the nineteenth century the movement of information was seen as basically the same as the transport of goods or people, both being described as 'communication'. Carey argues that 'it is a view of communication that derives from one of the most ancient of human dreams: the desire to increase the speed and effect of messages as they travel in space' (ibid.) Writing always had to be transported to the reader, so in written communication the transport of letters, books and newspapers supported the notion of the transport of meaning from writer to readers. As Carey notes, 'The telegraph ended the identity but did not destroy the metaphor' (ibid.).

    Within the broad scope of transport I tend to see the model primarily as employing a postal metaphor. It is as if communication consists of a sender sending a packet of information to a receiver, whereas I would insist that communication is about meaning rather than information. One appalling consequence of the postal metaphor for communication is the current reference to 'delivering the curriculum' in schools, as a consequence of which teachers are treated as postal workers. But the influence of the transmission model is widespread in our daily speech when we talk of 'conveying meaning', 'getting the idea across', 'transferring information', and so on. We have to be very alert indeed to avoid falling into the clutches of such transmissive metaphors.

    Michael Reddy (1979) has noted our extensive use in English of 'the conduit metaphor' in describing communicative acts. In this metaphor, 'The speaker puts ideas (objects) into words (containers) and sends them (along a conduit) to a hearer who takes the idea/objects out of the word/containers' (Lakoff & Johnson 1980: 10). The assumptions the metaphor involves are that:

    • Language functions like a conduit, transferring thoughts bodily from one person to another;
    • in writing and speaking, people insert their thoughts or feelings into the words;
    • words accomplish the transfer by containing the thoughts or feelings and conveying them to others;
    • in listening or reading, people extract the thoughts and feelings once again from the words. (Reddy 1979: 290)

    As Reddy notes, if this view of language were correct, learning would be effortless and accurate. The problem with this view of language is that learning is seen as passive, with the learner simply 'taking in' information (Bowers 1988: 42). I prefer to suggest that there is no information in language, in books or in any medium per se. If language and books do 'contain' something, this is only words rather than information. Information and meaning arises only in the process of listeners, readers or viewers actively making sense of what they hear or see. Meaning is not 'extracted', but constructed.

    In relation to mass communication rather than interpersonal communication, key metaphors associated with a transmission model are those of the hypodermic needle and of the bullet. In the context of mass communication such metaphors are now largely used only as the targets of criticism by researchers in the field.

    Linearity

    The transmission model fixes and separates the roles of 'sender' and 'receiver'. But communication between two people involves simultaneous 'sending' and 'receiving' (not only talking, but also 'body language' and so on). In Shannon and Weaver's model the source is seen as the active decision-maker who determines the meaning of the message; the destination is the passive target.

    It is a linear, one-way model, ascribing a secondary role to the 'receiver', who is seen as absorbing information. However, communication is not a one-way street. Even when we are simply listening to the radio, reading a book or watching TV we are far more interpretively active than we normally realize.

    There was no provision in the original model for feedback (reaction from the receiver). Feedback enables speakers to adjust their performance to the needs and responses of their audience. A 'feedback loop' was added by later theorists, but the model remains linear.

    Content and meaning

    In this model, even the nature of the content seems irrelevant, whereas the subject, or the way in which the participants feel about it, can shape the process of communication. Insofar as content has any place (typically framed as 'the message'), transmission models tend to equate content and meaning, whereas there may be varying degrees of divergence between the 'intended meaning' and the meanings generated by interpreters.

    According to Erik Meeuwissen (e-mail 26/2/98) Shannon himself was well aware of the fact that his theory did not address meaning. He offers these supportive quotations from Shannon and Weaver:

      The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point. Frequently the messages have meaning; that is they refer to or are correlated according to some system with certain physical or conceptual entities. These semantic aspects of communication are irrelevant to the engineering problem (Shannon 1948).

      The word information, in this theory, is used in a special sense that must not be confused with its ordinary usage. In particular, information must not be confused with meaning. In fact, two messages, one of which is heavily loaded with meaning and the other of which is pure nonsense, can be exactly equivalent, from the present viewpoint, as regards information. It is this, undoubtedly, that Shannon means when he says that 'the semantic aspects of communication are irrelevant to the engineering aspects. (Weaver 1949)

    Weaver also noted that the theory

      ...has so penetratingly cleared the air that one is now, perhaps for the first time, ready for a real theory of meaning. An engineering communication theory is just like a very proper and discreet girl accepting your telegram. She pays no attention to the meaning whether it be sad, or joyous, or embarrassing. But she must be prepared to deal with all that come to her desk (Weaver 1949).

    However, the important point here is that meaning-making is not central in transmission models. It is widely assumed that meaning is contained in the 'message' rather than in its interpretation. But there is no single, fixed meaning in any message. We bring varying attitudes, expectations and understandings to communicative situations. Even if the receiver sees or hears exactly the same message which the sender sent, the sense which the receiver makes of it may be quite different from the sender's intention. The same 'message' may represent multiple meanings. The word 'message' is a sort of microcosm of the whole postal metaphor, so I'm not happy with even using that label.

    Transmission models treat decoding as a mirror image of encoding, allowing no room for the receiver's interpretative frames of reference. Where the message is recorded in some form 'senders' may well have little idea of who the 'receivers' may be (particularly, of course, in relation to mass communication). The receiver need not simply accept, but may alternatively ignore or oppose a message. We don't all necessarily have to accept messages which suggest that a particular political programme is good for us.

    Instrumentalism

    The transmission model is an instrumental model in that it treats communication as a means to a predetermined end. Perhaps this is the way in which some people experience communication. However, not all communication is intentional: people unintentionally communicate a great deal about their attitudes simply through body language. And, although this idea will sound daft to those who've never experienced it, when some of us write something, we sometimes find out what we want to say only after we've finished writing about it.

    Some critics argue that this model is geared towards improving a communicator's ability to manipulate a receiver. Carey notes that 'the centre of this idea of communication is the transmission of signals or messages over distance for the purposes of control... of distance and people' (Carey 1989: 15).

    In an instrumental framework the process involved is intended to be 'transparent' to the participants (nothing is intended to distract from the sender's communicative goal). Such a conception is as fundamental to the rhetoric of science as it is alien to that of art. 'Perfectly transparent communication' is impossible.

    Context

    Nor is there any mention in the transmission model of the importance of context: situational, social, institutional, political, cultural, historical. Meaning cannot be independent of such contexts. Whilst recorded texts (such as letters in relation to interpersonal communication and newspapers, films, radio and television programmes in relation to mass communication) allow texts to be physically separated from their contexts of production, this is not to say that meaning can be 'context-free'. Whilst it is true that meaning is not wholly 'determined' by contexts of 'production' or 'reception' (texts do not mean simply what either their producers or their interpreters choose for them to mean), meanings may nevertheless be radically inflected by particular contexts of 'writing' and 'reading' in space and time. The 'same' text can be interpreted quite differently within different contexts.

    Social contexts have a key influence on what are perceived as appropriate forms, styles and contents. Regarding situational context, it makes a lot of difference if the sender is an opinionated taxi-driver who drives aggressively, and the receiver is a passenger in the back seat whose primary concern is to arrive at the destination in one piece.

    Relationships and purposes

    In the transmission model the participants are treated as isolated individuals. Contemporary communication theorists treat communication as a shared social system. We are all social beings, and our communicative acts cannot be said to represent the expression of purely individual thoughts and feelings. Such thoughts and feelings are socio-culturally patterned. Even what we call 'our' language isn't our own: we are born into it; we can't change the rules. Words have connotations which we don't choose for them. An emphasis on creative individuality is itself a culturally-shaped myth which had a historically 'modern' origin in Western Europe.

    Transmission models of communication reduce human communication to the transmission of messages, whereas, as the linguists tell us, there is more to communication than this. They refer, for instance, to phatic communication, which is a way of maintaining relationships. In Britain, talking about the weather is far more a matter of phatic communication than of 'transmitting information'.

    No allowance is made in the transmission model for differing purposes. The same TV images of a football match would have very different meanings for the fans of opposing sides.

    In models such as Shannon and Weaver's no allowance is made for relationships between people as communicators (e.g. differences in power). We frame what is said differently according to the roles in which we communicate. If a friend asks you later what you thought of this lecture you are likely to answer in a somewhat different way from the way you might answer the same question from the undergraduate course director in his office. The interview is a very good example of the unequal power relationship in a communicative situation.

    People in society do not all have the same social roles or the same rights. And not all meanings are accorded equal value. It makes a difference whether the participants are of the same social class, gender, broad age group or profession. We need only think of whose meanings prevail in the doctor's surgery. And, more broadly, we all know that certain voices 'carry more authority' than others, and that in some contexts, 'children are to be seen and not heard'. The dominant directionality involved in communication cannot be fixed in a model but must be related to the situational distribution of power.

    Time

    Furthermore, Shannon and Weaver's model makes no allowance for dynamic change over time. People don't remain frozen in the same roles and relationships, with the same purposes. Even within the course of a single conversation, such relationships may continuously shift. Also, adopting a more 'historical' perspective, however stable the text may seem to be, the ways in which a recorded text may be interpreted depends also on circumstances at that time of its interpretation.

    Medium

    Finally, the model is indifferent to the nature of the medium. And yet whether you speak directly to, write to, or phone a lover, for instance, can have major implications for the meaning of your communication. There are widespread social conventions about the use of one medium rather than another for specific purposes. People also differ in their personal attitudes to the use of particular media (e.g. word processed Christmas circulars from friends!).

    Furthermore, each medium has technological features which make it easier to use for some purposes than for others. Some media lend themselves to direct feedback more than others. The medium can affect both the form and the content of a message. The medium is therefore not simply 'neutral ' in the process of communication.

    Conclusion

    In short, the transmissive model is of little direct value to social science research into human communication, and its endurance in popular discussion is a real liability. Its reductive influence has implications not only for the commonsense understanding of communication in general, but also for specific forms of communication such as speaking and listening, writing and reading, watching television and so on. In education, it represents a similarly transmissive model of teaching and learning. And in perception in general, it reflects the naive 'realist' notion that meanings exist in the world awaiting only decoding by the passive spectator. In all these contexts, such a model underestimates the creativity of the act of interpretation.

    Alternatives to transmissive models of communication are normally described as constructivist: such perspectives acknowledge that meanings are actively constructed by both initiators and interpreters rather than simply 'transmitted'. However, you will find no single, widely-accepted constructivist model of communication in a form like that of Shannon and Weaver's block diagram. This is partly because those who approach communication from the constructivist perspective often reject the very idea of attempting to produce a formal model of communication. Where such models are offered, they stress the centrality of the act of making meaning and the importance of the socio-cultural context.

    2. TRANSMISSION MEDIA SECURITY

    Proxy servers by CC10

    Proxy Servers

    During a HTTP connection, the IP address of the client machine is necessarily transmitted in order to get the information back. This allows a server to identify the source of the web request. Any web resource you access can gather personal information about you through your unique IP address - your ID in the Internet. They can monitor your reading interests, spy upon you and log your requests for third parties. Also, owners of the Internet resources may impose some restrictions on users from certain countries or geographical regions.

    An anonymous proxy serves as a middleman between your web browser and an end server. Instead of contacting the end server directly to get a Web page, the browser contacts the proxy, which forwards the request on to the end server. When the end server replies to the proxy, the proxy sends the reply on to the browser. No direct communication occurs between the client and the destination server, therefore it appears as if the HTTP request originated from the intermediate proxy server. The only way to trace the connection to the originating client would be to access the logs on the anonymous web proxy (if it keeps any). So an anonymous proxy server can protect your identity by stripping a request of all identifying information.




    Another common use of anonymous proxies is to access sites which are normally blocked by your upstream ISP. For instance, web proxies are often used by people to access sites which have been censored by their companies, organizations or governments.

    An anonymous web proxy is a type of proxy server that works through a web form (also often called a CGI proxy). Instead of configuring the address of the server in the browser as is done for HTTP proxies, you simply navigate to the home page of the Web proxy. Web proxies hide users identity from the sites they visit, keep cookies at their site, and delete them after each session and selectively remove scripts, images, etc.

    There are some downsides to anonymous proxy servers. Because each incoming and outgoing page needs to be processed by the proxy server, this can often result in slow page loading times. And since the proxy server attempts to delete or bypass any suspicious elements on the returning Web page, a lot of pages will load with errors.


    Srikanth.V.Goutham
    Surakshith.B
    Shreyas.V
    Amith Nayaka T E


    Question on transmission media by CC2

    from cc2:

    1.how the cross talk is done ? reasons for crosstalk?

    2.what is repeater? what is purpose of using it?

    Question

    How We Can See The Data Of Each Packet?

    CC2 group
    • Baharan Asghari: 1MS07IS123
    • Malihe Alimohamadi: 1MS07IS127
    • Shruthi K.N : 1MS07IS095
    • Swetha.M:1MS08IS411

    Info on windump- one utility which can be used to analyze networking processes by CC16

    WINDUMP

    WinDump is the Windows version of tcpdump, the command line network analyzer for UNIX. WinDump is fully compatible with tcpdump and can be used to watch, diagnose and save to disk network traffic according to various complex rules. It can run under Windows 95, 98, ME, NT, 2000, XP, 2003 and Vista.

    WinDump captures using the WinPcap library and drivers, which are freely downloadable from the WinPcap.org website. WinDump supports 802.11b/g wireless capture and troubleshooting through the CACE Technologies AirPcap adapter.

    BEST FEATURE IS WinDump is FREE

    Software requirement:

    • Microsoft Visual C++ compiler, at least version 6.0.
    • You need to have the Microsoft Platform SDK installed and registered within Visual Studio 6. The Platform SDK contains some defnintions required to compile WinDump properly
      More details on where to find the Platform SDK can be found in section "compiling wpcap.dll" in the WinPcap documentation (see http://www.winpcap.org/docs/).

    • The winpcap source tree must be in the same directory of the windump source tree

    In order to compile WinDump, you need to have a directory structure like this

    windump <-- WinDump sources
    winpcap <-- Winpcap sources

    In particular, the winpcap sources folder should be named exactly "winpcap".

    Project files are in the directory windump\win32\prj of the WinDump source code distribution. Load the project from the Visual C++ 6.0 IDE and build the program. The release version of the WinDump.exe executable file will be generated in the directory windump\win32\prj\release. The debug version of the executable file will be generated in the directory windump\win32\prj\debug.

    The project can be compiled indifferently under any Win32 platform. The executable file generated is system-independent.


    Submitted by: CC16

    Satchidanand Das

    Priya M.S.

    Darshan Thappa.

    Karthik K.

    TCP/IP tutorial


    This is the tutorial on TCP/IP protocol

    http://www.w3schools.com/tcpip/default.asp

    by Hitesh uttamani,
    Yeshwant Singh Shekhawat,
    Yukteshwaraditya Singh Parihar,
    Zeshta Bhat

    Transmission Media

    By Sudhanshu & team
    Sunday, September 20, 2009
    QUESTIONS from CC19 (Sudhanshu's Team)


     For Reza Team , on WIRESHARK


    1.  What devices can Wireshark use to capture packets?