UDP-Lab Manual
UDP-Lab Manual
(UDP)
1
© 2021 C-DAC, Hyderabad
Table of Contents
Objective 2
Prerequisites 3
Problem Statement/Case 3
Summary 3
Fundamental concepts 4
References 15
2
© 2021 C-DAC, Hyderabad
1. Objective
2. Prerequisites
Prerequisites Version
3. Problem Statement/Case
The UDP (User Datagram Protocol) is a communications protocol that is primarily used
for establishing connections between applications on the internet.
Here wireshark is used to read the UDP header packet structure. UDP wraps datagram
with a UDP header. The fields in a UDP header are: Source port and destination port of
the device sending the data.
4. Summary
Steps Description
3
© 2021 C-DAC, Hyderabad
Step-4 Analyze UDP Protocol with Domain Name System
● Analyze First DNS Traffic
● Analyze Second DNS Traffic
5. Fundamental concepts
Introduction of UDP:
UDP is simple to analyze because it is having a 8 byte header and also it doesn’t
guarantee the delivery of packets. UDP is a connectionless protocol and the
applications like DHCP, DNS that run on top of the UDP have to provide their own
acknowledging and sequencing, retry timers and timeout values. In order to analyze the
UDP headers, DHCP server is configured in windows server 10 machine and windows
8.1 is acquiring an ip address. And in the process of acquiring the ip address the DHCP
packets flowing through the network use UDP in the transport layer.
Data
To open the wireshark go to the Top left corner, click on the icon to open the list of
the tools available.
4
© 2021 C-DAC, Hyderabad
Then type wireshark in the search bar and click on the launch button.
5
© 2021 C-DAC, Hyderabad
b. Select the network interface
select eth0 interface to start capturing the data and Click on this option to
capture the N packets. This screen is shown below.
6
© 2021 C-DAC, Hyderabad
Once you will click on the capture button, packet capturing will start. The packets
capturing screen is shown below.
7
© 2021 C-DAC, Hyderabad
2. Step-2: Apply nslookup command in Terminal
To open the command prompt go to the top left corner of your screen, click on
“Applications”and then select “Terminal Emulator”. Execute the “nslookup 8.8.8.8”
command in the terminal.
8
© 2021 C-DAC, Hyderabad
In order to save the captured network packets. Go to the top left corner and click
on “File” followed by “save” .
Give any name to your file . Here we have given Traffic1 which is shown below:
9
© 2021 C-DAC, Hyderabad
Now select the extension as pcap by clicking on the drop down beside the
“save as”. Choose the “wireshark/tcpdump- pcap” option and click on the
“save” button.
10
© 2021 C-DAC, Hyderabad
4. Step-4: Analyze UDP Protocol with Domain Name System
Observe the traffic captured in the top Wireshark packet list pane. To view only UDP
traffic related to the DNS type udp.port == 53 (lower case) in the Filter box and press
Enter.
11
© 2021 C-DAC, Hyderabad
Observe the packet details in the middle Wireshark packet details pane. Notice that it is
an Ethernet II / Internet Protocol Version 4 / User Datagram Protocol / Domain Name
System (query) frame.
12
© 2021 C-DAC, Hyderabad
Expand User Datagram Protocol to view UDP details.
● Observe the Source port. Notice that it is a dynamic port selected for this DNS
query.
● Observe the Destination port. Notice that it is domain (53), the DNS server port.
13
© 2021 C-DAC, Hyderabad
Observe the packet details in the middle Wireshark packet details pane. Notice that it is
an Ethernet II / Internet Protocol Version 4 / User Datagram Protocol / Domain Name
System (response) frame.
14
© 2021 C-DAC, Hyderabad
● Observe the Destination port. Notice that it is the same dynamic port used to
make the DNS query in the first packet.
7. References
● https://www.wireshark.org/
15
© 2021 C-DAC, Hyderabad