CN Practicals in Detail
CN Practicals in Detail
Objective: To make the students aware about the IT/Network infrastructure of their parent
institute. Introduction to the lab infrastructure, the cabling/cable type and
specifications/switch/topology/router/network infrastructure, Internet Connectivity, Wi-fi
Connectivity of your department (labs and lecture halls) and how it is connected with the
overall institute level IT infrastructure, How the institute obtains Internet Connectivity from
its ISP, The Bandwidth and other specifications, Visit to the Computer Center of the Institute,
Introduction to various Enterprise Servers/Servers of Licensed Software, Server hardware
configuration, Server Management Tools, Enterprise Level Firewall, etc. So, lab 1 is intended
as an in-campus IT infrastructure industrial visit for students. Students are supposed to
prepare a report of this visit. Students are also supposed to note down the model/make of
various network interface devices (NIC card, switch, router) used in their
lab/department/institute, download their technical specifications from their respective web-
site and attach those specifications in the report. The significance and interpretation of these
specifications may be discussed by the faculty member during the corresponding lab/lecture
hours pertaining to that particular device.
Shielded Twisted Pair (STP) Cable Although UTP cable is the least expensive cable, it may be susceptible
to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent
lights, etc.). If you must place cable in environments with lots of potential interference, or if you must
place cable in extremely sensitive environments that may be susceptible to the electrical current in the
UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum
distance of the cables. Shielded twisted pair cable is available in three different configurations: Each pair
of wires is individually shielded with foil. There is a foil or braid shield inside the jacket covering all wires
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between
the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside
interference from fluorescent lights, motors, and other computers. Fig. 3. Coaxial cable Although coaxial
cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater
cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are
thick coaxial and thin coaxial. Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the
specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum
segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin
coaxial cable has been popular in school networks, especially linear bus networks. Thick coaxial cable is
also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet
signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra
protective plastic cover that helps keep moisture away from the center conductor. This makes thick
coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick
coaxial is that it does not bend easily and is difficult to install.
Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus topology may have
problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other devices. But failure of the
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point
connection. That is, there exists a point to point connection between hosts and hub. The hub device can
be any of the following: Layer-1 device such as hub or repeater Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway As in Bus topology, hub acts as single point of failure. If hub
fails, connectivity of all hosts to all other hosts fails. Every communication between hosts, takes place
through only the hub.Star topology is not expensive as to connect one more host, only one cable is
required and configuration is simple.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-
point connection with every other host or may also have hosts which are in point-to-point connection to
few hosts only. Hosts in Mesh topology also work as relay for other hosts which do not have direct
point-to-point links. Mesh technology comes into two types: Full Mesh: All hosts have a point-to-point
connection to every other host in the network. Thus for every new host n(n-1)/2 connections are
required. It provides the most reliable network structure among all network topologies. Partially Mesh:
Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some
arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies. The above picture
represents an arbitrarily hybrid topology. The combining topologies may contain attributes of Star, Ring,
Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology networks. Internet is the best example of largest
Hybrid topology
Network Infrastructure
Network infrastructure is the hardware and software resources of an entire network that enable
network connectivity, communication, operations and management of an enterprise network. It
provides the communication path and services between users, processes, applications, services and
external networks/the internet. ork Infrastructure Definition - What does Network Infrastructure mean?
Network infrastructure is the hardware and software resources of an entire network that enable
network connectivity, communication, operations and management of an enterprise network. It
provides the communication path and services between users, processes, applications, services and
external networks/the internet. Techopedia explains Network Infrastructure Network infrastructure is
typically part of the IT infrastructure found in most enterprise IT environments. The entire network
infrastructure is interconnected, and can be used for internal communications, external communications
or both. A typical network infrastructure includes: Networking Hardware: Routers Switches LAN cards
Wireless routers Cables Networking Software: Network operations and management Operating systems
Firewall Network security applications Network Services: T-1 Line DSL Satellite Wireless protocols IP
addressing
Every computer that is connected to the Internet is part of a network, even the one in your home. For
example, you may use a modem and dial a local number to connect to an Internet Service Provider (ISP).
At work, you may be part of a local area network (LAN), but you most likely still connect to the Internet
using an ISP that your company has contracted with. When you connect to your ISP, you become part of
When you connect to the Internet, your computer becomes part of a network.
Internet Network Example Here's an example. Imagine that Company A is a large ISP. In each major city,
Company A has a POP. The POP in each city is a rack full of modems that the ISP's customers dial into.
Company A leases fiber optic lines from the phone company to connect the POPs together (see, for
example, this UUNET Data Center Connectivity Map). Imagine that Company B is a corporate ISP.
Company B builds large buildings in major cities and corporations locate their Internet server machines
in these buildings. Company B is such a large company that it runs its own fiber optic lines between its
buildings so that they are all interconnected. In this arrangement, all of Company A's customers can talk
to each other, and all of Company B's customers can talk to each other, but there is no way for Company
A's customers and Company B's customers to intercommunicate. Therefore, Company A and Company B
both agree to connect to NAPs in various cities, and traffic between the two companies flows between
the networks at the NAPs. In the real Internet, dozens of large Internet providers interconnect at NAPs
in various cities, and trillions of bytes of data flow between the individual networks at these points. The
Internet is a collection of huge corporate networks that agree to all intercommunicate with each other
at the NAPs. In this way, every computer on the Internet connects to every other
In computing, a server is a computer program or a device that provides functionality for other programs
or devices, called "clients". This architecture is called the client–server model, and a single overall
computation is distributed across multiple processes or devices. Servers can provide various
functionalities, often called "services", such as sharing data or resources among multiple clients, or
performing computation for a client. A single server can serve multiple clients, and a single client can
use multiple servers. A client process may run on the same device or may connect over a network to a
Server management can be defined as the tasks and services that are done on a server in order to
manage it. This usually entails: Monitoring of the server and apps running on the server. Checking their
status, uptime, and monitoring for any new or recurring issues.
Some of the Server Management tools are:
Wireshark / Tshark.
iPerf / JPerf
Nmap / Zenmap
Paessler SNMP Tester
Angry IP Scanner
This is a no-brainer for most but needs to be mentioned for integrity’s sake. Wireshark is an unparalleled
network protocol analyzer, and honestly, one of the best free network tools ever made. When you’re
troubleshooting an issue and actually need to get into the weeds to find out what’s going on – this is
your microscope. Never leave home without it! If you’re looking for some command-line capturing, or
maybe you want to programmatically trigger packet captures, don’t forget to check out TShark. It’s
included with Wireshark, and totally awesome.
iPerf / JPerf Between any two nodes is a network – be it vast or small. A simple ping between the two
nodes is only good for general reachability and understanding the round-trip time for the small packets.
If you want to measure actually achievable bandwidth, you need another tool such as iPerf. iPerf3 is the
latest iteration of this tool. You run the client on two ends of a network, configuring the parameters
needed to measure performance. It supports tuning of many parameters related to timing, buffers, and
protocols (TCP, UDP, SCTP with IPv4 and IPv6). Upon execution, it actively measures and reports on
bandwidth, loss, latency, jitter, and so on. You can initiate multiple simultaneous connections to truly
Nmap / Zenmap
I personally use Nmap at least once a week. Almost verbatim from their website: Nmap (Network
Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating
a “map” of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host
and then analyzes the responses. Nmap provides an incredible number of features for probing networks,
including host discovery, service discovery and operating system detection. These features are
extensible by scripts that provide more advanced service detection, vulnerability detection, and other
features. In fact, Nmap is used in the backend for various security assessment tools such as Nexpose.
Again, if you’re more a fan of GUIs, make sure the download the bundle with Zenmap.
Paessler SNMP Tester SNMP can be hard. This is why you need a good tester. There are a few out there,
but I’ve found great success with Paessler’s SNMP tester. The idea of this program is to have a tool that
Paessler SNMP
Tester SNMP can be hard. This is why you need a good tester. There are a few out there, but I’ve found
great success with Paessler’s SNMP tester. The idea of this program is to have a tool that enables the
user to debug SNMP activities in order to find communication and/or data problems in SNMP
monitoring configurations. Are your devices configured properly? Are you using the correct keys? Use
this tool to validate if your SNMP configuration will function with programs like PRTG Network Monitor.
Angry IP Scanner: Angry IP scanner is an open-source, multi-threaded IP address and port scanner.
Similar to Nmap, and used by millions, it’s become a standard tool for network admins. Angry IP Scanner
first rapidly pings, then checks port status, then starts resolving hostnames, gathering MAC addresses,
OSs and whatever it can discern based on the data gathered. It can collect NetBIOS info like workgroup
and domain names, as well as logged-in users if you happen to have to privileged rights to retrieve this
Enterprise Network Firewall: A network firewall is a device that acts as a barrier to keep destructive
forces away from computers on a network behind the firewall. A network firewall is similar to a physical
firewall that keeps a fire from spreading from one area to the next. Firewalls can help protect against a
wide range of security threats, including unauthorized remote logins, denial of service attacks, and
viruses and worms that are spread over a network. Enterprise Network Firewalls are managed by Pitt
Information Technology and help protect sensitive information, research data, and support critical
University operations. Departments may request changes to firewall rules in order to provide access to
departmental resources or new systems. All network ports at the Pittsburgh campus and the four
regional campuses are protected behind Enterprise Network Firewalls. Firewalls can prevent the
following security threats: Remote login by unauthorized users (such as hackers). Backdoors, which are
programs that establish features that allow for hidden access. Denial of service, where a network is
inundated with generated network traffic, causing computers on the network to slow down or crash.
Network-spread viruses and worms, which are small programs that can spread over the network to
other unprotected computers. Firewalls, however, cannot prevent the following security threats:
Viruses, worms and Trojan horses from emails and downloaded files Spam Spyware The Enterprise
Security Controls policy requires all University departments and units to use Enterprise Network
Firewalls. Other security controls may be needed to complement the protection a network firewall
provides. For example, individuals are also encouraged to enable the Microsoft Windows Personal
Firewall on their PCs. While firewalls can stop network-spreading viruses, antivirus software should also
still be installed on computers.
Network Interface Devices: Hardware devices that are used to connect computers, printers, fax
machines and other electronic devices to a network are called network devices. These devices transfer
data in a fast, secure and correct way over same or different networks. Network devices may be inter-
network or intra-network. Some devices are installed on the device, like NIC card or RJ45 connector,
whereas some are part of the network, like router, switch, etc.
Modem
Modem is a device that enables a computer to send or receive data over telephone or cable lines. The
data stored on the computer is digital whereas a telephone line or cable wire can transmit only analog
data. Analog-Digital Waveform The main function of the modem is to convert digital signal into analog
and vice versa. Modem is a combination of two devices − modulator and demodulator. The modulator
converts digital data into analog data when the data is being sent by the computer. The demodulator
converts analog data signals into digital data when it is being received by the computer. Types of
RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by devices to physically
connect to Ethernet based local area networks (LANs). Ethernet is a technology that defines protocols
for establishing a LAN. The cable used for Ethernet LANs are twisted pair ones and have RJ45 connector
pins at both ends. These pins go into the corresponding socket on devices and connect the device to the
network.
Ethernet Card Ethernet card, also known as network interface card (NIC), is a hardware component used
by computers to connect to Ethernet LAN and communicate with other devices on the LAN. The earliest
Ethernet cards were external to the system and needed to be installed manually. In modern computer
systems, it is an internal hardware component. The NIC has RJ45 socket where network cable is
physically plugged in.
Router
A router is a network layer hardware device that transmits data from one LAN to another if both
networks support the same set of protocols. So a router is typically connected to at least two LANs
and the internet service provider (ISP). It receives its data in the form of packets, which are data frames
with their destination address added. Router also strengthens the signals before transmitting them. That
is why it is also called repeater. Router Routing Table A router reads its routing table to decide the best
available route the packet can take to reach its destination quickly and accurately. The routing table may
be of these two types − Static − In a static routing table the routes are fed manually. So it is suitable only
for very small networks that have maximum two to three routers. Dynamic − In a dynamic routing table,
the router communicates with other routers through protocols to determine which routes are free. This
is suited for larger networks where manual feeding may not be feasible due to large number of routers.
Wi-Fi Card
Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless connection to any
network. Wi-Fi card is a card used to connect any device to the local network wirelessly. The physical
area of the network which provides internet access through Wi-Fi is called Wi-Fi hotspot. Hotspots can
be set up at home, office or any public space. Hotspots themselves are connected to the network
through wires. A Wi-Fi card is used to add capabilities like teleconferencing, downloading digital camera
images, video chat, etc. to old devices. Modern devices come with their in-built wireless network
adapter.
Ping: The ping command is a command prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually used as a simple way
to verify that a computer can communicate over the network with another computer or network device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request
messages to the destination computer and waiting for a response. How many of those responses are
returned, and how long it takes for them to return, are the two major pieces of information that the
ping command provides.
Ipcofig:
Ipconfig is a DOS utility that can be used from MS-DOS and the Windows Command Line to display the
network settings currently assigned and given by a network. This command can be utilized to verify a
network connection as well as to verify your network settings.
Eg.
C:\Users\maulik>ipconfig /all
Windows IP Configuration
C:\Users\maulik>
arp:
arp displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains one or
more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical
addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your
computer. Used without parameters, arp [displays help.
You can use the arp command to view and modify the ARP table entries on the local computer. This may
display all the known connections on your local aream network segment (if they have been active and in
the cache). The arp command is useful for viewing the ARP cache and resolving address resolution
problems.
Syntax (Inet means Internet address)
arp [-a [InetAddr] [-NIfaceAddr]] [-g [InetAddr] [-NIfaceAddr]] [-dInetAddr [IfaceAddr]] [-sInetAddr
EtherAddr [IfaceAddr]]
Here are the switch definitions:
-a [InetAddr] [-NIfaceAddr] : Displays current ARP cache tables for all interfaces. To display the ARP
cache entry for a specific IP address, use arp -a with the InetAddr parameter, where InetAddr is an IP
address. To display the ARP cache table for a specific interface, use the -NIfaceAddr parameter where
IfaceAddr is the IP address assigned to the interface. The -N parameter is case-sensitive.
-dInetAddr [IfaceAddr] : Deletes an entry with a specific IP address, where InetAddr is the IP address. To
delete an entry in a table for a specific interface, use the IfaceAddr parameter where IfaceAddr is the IP
address assigned to the interface. To delete all entries, use the asterisk (*) wildcard character in place of
InetAddr. So "arp -d *" will flush your ARP cache.
-sInetAddr EtherAddr [IfaceAddr] : Adds a static entry to the ARP cache that resolves the IP address
InetAddr to the physical address EtherAddr. To add a static ARP cache entry to the table for a specific
interface, use the IfaceAddrparameter where IfaceAddr is an IP address assigned to the interface.
/?: Displays help at the command prompt.
Using arp on Windows
To run the arp command in Windows click START> RUN> CMD. Now enter 'arp -a' at the > prompt:
Netstat:
Execute the netstat command alone to show a relatively simple list of all active TCP connections which,
for each one, will show the local IP address (your computer), the foreign IP address (the other
computer or network device), along with their respective port numbers, as well as the TCP state.
The tracert command is a Command Prompt Command that's used to show several details about the
path that a packet takes from the computer or device you're on to whatever destination you specify.
You might also sometimes see the tracert command referred to as the trace route command or
traceroute command.
Tracert Command Syntax:
To connect to a Telnet server, you need to enter a command that follows this syntax:
Telnet host portnumber
t elnet
hostname port
Code:
(1)Client.py
import socket
host='localhost'
port = 5555
sok = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
sok.connect((host,port))
msg = sok.recv(1024) #1024 size of buffer
while msg:
print(msg.decode())
msg = sok.recv(1024)
sok.close()
(2)Server.py
import socket
host = "localhost"
port =5555
sok = socket.socket()#also valid instead of following statement
#sok = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sok.bind((host,port))
print("server start")
sok.listen(1)
client,addr = sok.accept()
print("client address: ", addr)
msg = "Hello client how are you?"
client.send(msg.encode())
client.send(b'Bye')
client.close()
print("Close")
output :-
(1)server.py
import socket
sock.bind((udp_host,udp_port))
while True:
print ("Waiting for client...")
data,addr = sock.recvfrom(1024) #receive data from client
print ("Received Messages:",data," from",addr)
(2)client.py
import socket
WIRESHARK INSTALLATION –
STEP 1: Download Wireshark as per the OS and its version. In the image below, wireshark has
been installed for Windows 32-bit compuer.
Click I Agree.
STEP 8: If installation of WinPcap is left than install it otherwise unclick the box and Click
Next.
STEP 10: The installation for the Wireshark will start along with the installation of WinPcap.
STEP 14: This box appears when installation completes. Click Finish.
Now the traffic automatically hits the start and continues till we stop it. To stop the Red Square
on the top left corner is clicked.
Capture Options-
The capture options field will be found on the Capture Menu list with Options as the Menu Item.
The Promiscuous Check Box should be checked if we want to see the traffic of the device also
from with the connectivity is provided. If unchecked it will only display the traffic of our PC.
To Store the data in different format, the save as menu item is selected from the File Menu.
To open the stored capture data file select the name of the file to be opened from the Open menu
item from the File menu and Click Open.
ETHERNET
ARP
TCP
DNS
Ans: ARP:-
Address Resolution Protocol (ARP) is a predominant protocol for finding a host’s hardware address when
only its network layer address is known. This protocol operates below the network layer as a part of the
interface between the OSI network and OSI link layer. The format of ARP packet can be discussed as
follows:-
HARDWARE TYPE: - Each data link layer protocol is assigned a number used in this field. For Ethernet it
is 1.
PROTOCOL TYPE: -Each protocol is assigned a number used in this field. For example, IPv4 is 0x0800.
HARDWARE LENGTH: - Length in bytes of a hardware address. Ethernet addresses are 6 bytes long.
PROTOCOL LENGTH: - Length in bytes of a logical address. IPv4 addresses are 4 bytes long.
OPERATION: - It specifies the operation the sender is performing: 1 for request, and 2 for reply. There
are actually four types of ARP messages that may be sent by the ARP protocol. These are identified by
four values in the “operation” field of an ARP message. The types of message are:-
1. ARP request
2. ARP reply
3. RARP request
4. RARP reply
TARGET HARDWARE ADDRESS: - Hardware address of the intended receiver. This field is zero on
request.
Output:-
Ethernet:-
An Ethernet frame is made up of five fields: the Destination and the Source MAC address field, the Ether
type field that contains some control information, a Payloadfield, and a trailing Frame Check Sequence
field that holds a checksum for the frame. The Ethernet frame starts with preamble and start frame
delimiter, followed by an Ethernet header containing MAC address of source and destination devices.
The middle section of the frame consists of payload data includingheaders for other protocols such as
internet protocol, carried in the frame. The end part of the frame consist a 32-bit cyclic redundancy
check which detects the errors in transmission. The standard data frame has a maximum length of 1518
bytes, and contains a Payload field of at least 46 and up to 1500 bytes.
Start of frame delimiter (SFD): – This is a 1-Byte field which is always set to 10101011. SFD indicates
that upcoming bits are starting of frame, which is destination address. Sometimes SFD is considered the
part of PRE, this is the reason Preamble is described as 8 Bytes in many places.
Destination Address: – This is 6-Byte field which contains the MAC address of machine for which data is
destined.
Source Address: – This is a 6-Byte field which contains the MAC address of source machine. As Source
Address is always an individual address (Unicast), the least significant bit of first byte is always 0.
Length: – Length is a 2-Byte field, which indicates the length of entire Ethernet frame. This 16-bit field
can hold the length value between 0 and 65534, but length cannot be larger than 1500 because of some
own limitations of Ethernet.
Data: – This is the place where actual data is inserted, also known as Payload. Both IP header and data
will be inserted here, if Internet Protocol is used over Ethernet. The maximum data present may be as
long as 1500 Bytes. In case data length is less than minimum length i.e. 46 bytes, then padding 0’s is
added to meet the minimum possible length.
Cyclic Redundancy Check (CRC): – CRC is 4 Byte field. This field contains 32-bits hash code of data, which
is generated over Destination Address, Source Address, Length and Data field. If the checksum
computed by destination is not same as sent checksum value, data received is corrupted.
ANS:-
IP
PayLoad
Header
PayLoad
Ans: HTTP:-
The Hypertext Transfer Protocol (HTTP) is a wildly successful protocol. However, the way HTTP/1.1 uses
the underlying transport has several characteristics that have a negative overall effect on application
performance today.All frames begin with a fixed 9-octet header followed by a variable-length payload.
Furthermore, HTTP header fields are often repetitive and verbose, causing unnecessary network traffic
as well as causing the initial TCP congestion window to quickly fill. This can result in excessive latency
when multiple requests are made on a new TCP connection.
Type: - The 8-bit type of the frame. The frame type determines the format and semantics of the frame.
Implementations MUST ignore and discard any frame that has a type that is unknown.
Flags: - An 8-bit field reserved for Boolean flags specific to the frame type. Flags are assigned semantics
specific to the indicated frame type. Flags that have no defined semantics for a particular frame type
MUST be ignored and MUST be left unset (0x0) when sending.
R: - A reserved 1-bit field. The semantics of this bit are undefined, and the bit MUST remain unset (0x0)
when sending and MUST be ignored when receiving.
Stream Identifier: - A stream identifier (see Section 5.1.1) expressed as an unsigned 31-bit integer. The
value 0x0 is reserved for frames that are associated with the connection as a whole as opposed to an
individual stream.
The structure and content of the frame payload is dependent entirely on the frame type.
DNS:-
The client/server information exchange in DNS is facilitated using query/response
messaging. Both queries and responses have the same general format, containing up to five individual
sections carrying information. All DNS packets have a structure that is:-
RA Recursion Available: - this be is set or cleared in a response, and denotes whether recursive query
support is available in the name server. Recursive query support is optional. You must exit and return
an error if you receive a response that indicates the server does not support recursion.
0 No error condition
1 Format error - The name server was unable to interpret the query.
2 Server failure - The name server was unable to process this query due to a problem with the name
server.
3 Name Error - Meaningful only for responses from an authoritative name server, this code signifies that
the domain name referenced in the query does not exist.
4 Not Implemented - The name server does not support the requested kind of query.
5 Refused - The name server refuses to perform the specified operation for policy reasons.
QDCOUNT: - an unsigned 16 bit integer specifying the number of entries in the question section. You
should set this field to 1, indicating you have one question.
ANCOUNT: - an unsigned 16 bit integer specifying the number of resource records in the answer section.
You should set this field to 0, indicating you are not providing any answers.
NSCOUNT: - an unsigned 16 bit integer specifying the number of name server resource records in the
authority records section. You should set this field to 0, and should ignore any response entries in this
section.
ARCOUNT: - an unsigned 16 bit integer specifying the number of resource records in the additional
records section. You should set this field to 0, and should ignore any response entries in this section.
Output:-
1.FTP
Lab 13:
Objective: Capture Wi-FI and Bluetooth Traffic and Interpret/ Analyze the corresponding
header and payload using Wireless Traffic Sniffing tools like WireShark-USB/AirCrack-
ng/Kismet, etc.
1.wifi
2.Bluetooth
POP: Post Office Protocol (POP) is an application layer protocol used by email systems to retrieve mail
from email servers. The email client uses POP commands such as LOGIN, LIST, RETR, DELE, QUIT to
access and manipulate (retrieve or delete) the email from the server. POP3 uses TCP port 110 and wipes
the mail from the server once it is downloaded to the local client.
POP communications
IO graph of POP
SMTP Communication
IO graph of SMTP
802.11 Communication
IO graph of 802.11