You are on page 1of 16

Computer Networks Laboratory

3rd Grade
: Introduction to Networks Lab
Main topic Sub topics Details
1 Introduction to networks lab Syllabus and content Grading and policy

2 Network modeling TCP/IP layers Application layer: HTTP, FTP


(protocols and layers) (Overview) Viber and Facebook
Transport layer: TCP and UDP
Network layer : IPv4 and IPv6
Data link layer: MAC
Physical layer: Cabling, UTP
3 Cabling (physical layer) Straight-through, Crossover UTP example: RJ45 cabling (Cable-
Rollover Cables colors, send, receive pinout) and tools
4 Network devices overview Network devices based on layers Network devices Examples:
-Hub, switch and router, host, …..
- Ports and Interfaces
5 Network topology example Physical topology Lab topology-Example
Explanation of:
1)Host 2)Media
3)data 4)Protocol
6 Network Addressing IP addressing (overview) IPv4 representation example
using Lab topology example (Net ID and Host ID)
Subletting, Default gateway,
notation of subnet mask (Dotted
Decimal and network prefix)
Computer Networks Laboratory
3rd Grade
: Network Tools Part 1
Main topic Sub topics Details
1 Introduction to physical  Physical network layers  Physical network layer 1:
network (Physical & Data link) medium, signal …etc.
 Examples: Ethernet & Wi-Fi  Physical network layer 2:
 Ethernet Evolution physical addressing, access
method, flow control, error
detection …etc.
 Half duplex vs Full duplex
 Ethernet vs Fast Ethernet vs
Giga Ethernet
2 IP address Configuration  Manual Assignment  IP address configuration
 Automatic Assignment (via parameters (IP address, subnet
DHCP) mask, default gateway, DNS
server and DHCP Server)
 DHCP parameters (DHCP pool
and lease time)
3 Hands on Network Tools and commands Displaying IP address configuration
using:
 GUI (Network and Sharing
Center)
 CMD (ipconfig & ipconfig /all)
4 Hands on Introduction to CISCO packet  Cabling (Cross, straight)
tracer  UP and down links
Simulation (drawing) of LAB  MAC address
Topology  Ports and Interfaces
Computer Networks Laboratory
3rd Grade
: Network Tools Part 2 (ICMP protocol and Lab topology)

Main topic Sub topics Details


1 Network IP Connectivity  ICMP  Describe ICMP and its functionality.
 Echo Request & Echo Reply  Test the network IP connectivity by
 Packet size & delay sending echo request then receiving echo
 Trace route reply.
 The content of echo message: destination
IP address, packet size, delay and TTL

2 Layer 2&3 header  Source & Destination IP  Difference between frame and packet.
address  MTU as physical network characteristics.
 TTL  Fragmentation for giant frames with size
 MTU larger than MTU.
 Fragmentation  TTL (Time-To-Live) and its purpose to
prevent layer 3 loop.

3 Hands on  Ping (-n, -t, -l, -f)  Use ping command (ping [par]
 Tracert (-d) [dest_ip_add]) with different parameters:
1. –n for finite number of requests
2. –t for infinite number of requests
3. –l for specific packet size
4. –f for setting do not fragment flag
 Use (tracert [par] [dest_ip_add]) to trace
the packet path.
4 Homework  Ping  Try using your home network:
 Tracert 1. Ping google.com
2. Ping facebook.com
3. Tracert google.com
4. Tracert facebook.com

Definitions and Terminologies:


ICMP: The Internet Control Message Protocol (ICMP) is a network-layer Internet protocol that provides
message packets to report errors and other information regarding IP packet processing back to the source. The
version of ICMP for Internet Protocol version 4 is also known as ICMPv4, as it is part of IPv4. Best known for its
use by the "ping" and "traceroute" programs on IP enabled hosts/devices.

MTU: the maximum transmission unit (MTU) is the size of the largest network layer protocol data unit that
can be communicated in a single network transaction.

TTL: The time-to-live (TTL) is the number of hops that a packet is permitted to travel before being discarded
by a router (to avoid layer 3 loop).

IP fragmentation: is an Internet Protocol (IP) process that breaks datagrams into smaller pieces
(fragments), so that packets may be formed that can pass through a link with a smaller maximum
transmission unit (MTU) than the original datagram size.
Fig: The Physical Network-Lab topology
(3rd Grade network Lab topology)
Computer Networks Laboratory
3rd Grade
: Network Tools Part 4

Main topic Sub topics Details


1 DHCP Server  Manual vs Dynamic IP  Physical location of DHCP
address Configuration server
 DHCP Pool  Manual vs Dynamic IP address
 Lease Time Configuration
 DHCP pool address range
 Lease time of DHCP offer
 Releasing and renewing IP
address configuration
2 DNS Server  IP address vs Domain name  Physical location of DNS server
 DNS cache  IP address vs Domain name
 DNS cache advantages
 DNS cache content (Record
Name, Record Type, Time to
live …etc.)
 Explain why public services
like google.com, …etc. have
multiple IP addresses
3 Hands on  ipconfig [/release, /renew,  Display IP address
/dnsdisplay, /dnsflush] configuration using ipconfig/all
 nslookup command
 Release IP address
configuration using ipconfig/
release
 Renew IP address
configuration using ipconfig/
renew command
4 Homework  ipconfig [/release, /renew,  Try:
/dnsdisplay, /dnsflush] 1. nslookup google.com
 nslookup 2. nslookup google.com 8.8.8.8
3. ipconfig /displaydns to display
DNS cache
4. ipconfig /flushdns to flush
DNS cache then ipconfig/
dispalydns
 What is(are) the IP address(es)
of google.com?
 What is the difference
between 1 and 2?
 What is the difference
between 3 and 4?
Computer Networks Laboratory
3rd Grade
: Network Tools Part 5

Main topic Sub topics Details


1 MAC address  MAC address format  MAC address as the physical
 MAC address purpose address of the physical
 ARP table network (i.e. physical
 MAC address attacks networks like Ethernet or Wi-
Fi do not use IP addresses) and
is burnt in NIC.
 MAC address format (6 Bytes,
hexadecimal)
 Source and destination MAC
addresses in layer 2 header
2 ARP  ARP table  ARP table for MAC-to-IP
 Dynamic vs Static ARP mapping for local subnet only,
entries. anything outside local subnet
 ARP request and ARP reply will use the gateway MAC
for dynamic entries. address as the destination
 Some types of MAC attack MAC address
 Dynamic vs Static ARP entries
 ARP request and ARP replay
messages for dynamic ARP
entries.
 Some types of MAC attacks:
MAC spoofing, man-in-the-
middle, DoS)
3 Hands on  arp [-a, -s, -d]  use ping command to check
the IP connectivity with some
destinations inside and outside
your subnet
 check if these destinations are
added in the ARP table using
arp –a command
 delete arp table using arp –d
then display it using arp –a
 add one reachable destination
(inside local subnet) as a static
entry in ARP table using arp –s
command then display ARP
table using arp –a command
 check if the above destination
is still reachable. Why?
(Note: arp –d and arp –s must be run
as administrator)
4 Homework  Source and destination IP  Fill Table 1 according to Fig. 1
addresses vs MAC addresses
Fig.1

Table 1

Link Src. MAC add. Dst. MAC add. Src. IP add. Dst. IP add.
Link 1
Link 2
Link 3
Link 4
Computer Networks Laboratory
3rd Grade
: Network Tools Part 6

Main topic Sub topics Details


1 Transport Layer  Transport layer purposes  Transport layer main purpose
 Transport layer protocols: is to provide end-to-end
TCP and UDP connection between the
 Differences and similarities source and the destination.
between TCP and UDP  Main protocols of Transport
layer are: TCP (most
applications) and UDP (some
applications).
 Source and destination port
numbers as a similarity
between TCP and UDP.
 Port number ranges (well-
known, registered, dynamic or
private).
 Source port to open the
connection and destination
port number as the service
number.
2 UDP  Format of UDP  UDP as a connectionless
 Applications that use UDP protocol.
 UDP is lightweight compared
to TCP.
 Advantages of UDP over TCP
like: UDP is faster and has
much lower overhead.
 Applications that use UDP are:
delay sensitive applications
(live voice and video) and
small data applications (DHCP,
DNS, …etc.)
3 TCP  Format of TCP  TCP as a connection-oriented
 Applications that use TCP protocol (using three way
handshakes).
 TCP is slower and has much
more overhead.
 Advantages of TCP over UDP
like: sequencing the out-of-
order segments (using seq.
no.), error detection and
retransmitting (using ack. no.),
flow control (using window
size), …etc.
 Applications that uses TCP are
the applications with the data
loss is more important than
the delay.
 Most applications use TCP
(HTTP, FTP, TELNET, SSH,
…etc.).
4 Hands on  netstat [-n]  First, check the IP connectivity
with the multi-app. (FTP, SSH,
TELNET) server which has IP
address 192.168.10.254 using
ping command.
 Open FTP connection with this
server using ftp command.
 Open TELNET connection with
it using telnet command.
 Open SSH connection using
with it putty program.
 Check the established
connections with this server
using netstat command.
 Repeat the above step using
netstat –n command to display
IP addresses and port numbers
in numerical forms instead of
names.
5 Homework  netstat  Try netstat and netstat –n
 List of TCP and UDP port commands while downloading
numbers a file from the Internet (mark
the desired connection).
 Search the Internet for the list
or table of TCP and UDP port
numbers.
Computer Networks Laboratory
3rd Grade
: Wireshark

Main topic Sub topics Details


1 Introduction  Wireshark  What is Wireshark?
 Packet capture  Wireshark as a tool for packet
 Encapsulation & capture.
decapsulation  Understanding the different
 Headers of data windows of Wireshark (packet
list, details and bytes)
 How to use filter in
Wireshark?
 Data encapsulation with
different headers from top to
down.
 Data decapsulation out of
headers from down to top.
2 Headers  Ethernet header  Ethernet header (Src. MAC,
 IP header and other layer 3 Dst. MAC, Type).
headers (ICMP and ARP)  IP header (Version, Flag,
 UDP header Protocol, checksum, Src. IP,
 TCP header Dst. IP).
 UDP header (Src. port, Dst.
Port, Length, Checksum).
 TCP header (Src. port, Dst.
Port, Seq. number, Ack.
number, Window size,
Checksum).
3 Hands on  Plaintext  After checking the fields of all
 Ciphertext headers as explained above,
then:
1. Check the content of the
application in plaintext (like:
TELNET or FTP). Can we get
the password?
2. Check the content of the
application in plaintext (like:
SSH). Can we get the
password?

You might also like