Lab 1

advertisement
DT008/3
Communications Systems 1
Laboratory 1
Objective
This laboratory is an introduction to communications networks. You will become familiar with
some basic operations that you will perform frequently during the course.
Check that the Windows Firewall is turned off. From the Start menu, select Control Panel, System
& Security, Windows Firewall.
Download the Results sheet from Webcourses and record your results on the sheet. Upload your
results sheet on Webcourses before the next laboratory.
Lab Procedure:
Exercise 1: Collect Network Settings:
From the Start menu, click on the Run command, and then enter the parameter cmd;
alternatively, go to Accessories and start Command Prompt .
In the window that opens, type the command ipconfig (then press enter) and take note of the
IPv4 address that is displayed in the window after Ethernet adapter Local Area Connection.
=> Results
The IP address uniquely identifies a device to make it reachable from any location using the
Internet protocol.
The IP address is described as a sequence of 4 decimal values, representing 4 bytes.
Type the command ipconfig /all and note the Physical Address that is displayed in the window
after Ethernet adapter Local Area Connection.
=> Results
The Physical address uniquely identifies a device, but can be used only to reach it from within a
Local Area Network, using the Ethernet protocol.
The Physical address is described as a sequence of 6 pairs of hexadecimal values, representing
6 bytes.
Page 1/5
Exercise 2: Test Connectivity:
PING (Packet Internet Groper) uses a protocol of the TCP/IP suite, ICMP (Internet Control
Message Protocol), to test the connectivity between 2 computers. When one host ''pings'' another
host on a network, an ''ICMP Echo request'' packet is sent to the destination. If the destination
host receives the request, it will reply with an ''ICMP Echo reply'' packet.
In the command prompt window, type ping address where address can be the IP address of
another PC in the room.
Note how many replies do you get (each reply corresponds to a single request)?
=> Results
Note that some parameters of this test can be adjusted.
Use the following command: Ping –n 1 <address>
What is the effect of this parameter (how many replies)?
=> Results
Use the following command: Ping –l 512 <address>
What is the effect of this parameter (how many bytes of data)?
=> Results
Page 2/5
Exercise 3: Conversions
We frequently will need to convert data between the different formats:
Convert decimal => binary
Convert your IP address into a binary sequence of 4 bytes:
Example:
8.16.4.1 <=> 00001000.00010000.00000100.00000001
=> Results
Convert binary => decimal
Convert the following binary sequence of 4 bytes into an IP address of 4 decimals
11000000.10101000.00101101.01111001
=> Results
Convert Hexadecimal => Decimal
Convert your Physical Address into a decimal sequence, converting Hexadeimal value by pairs.
Example:
A1:3C <=> 161:60
=> Results
Convert binary => hexadecimal
Convert 11001110.01011010 into hexadecimal
=> Results
Convert decimal => hexadecimal
Convert 147.252.127.255 into hexadecimal.
=> Results
Page 3/5
Exercise 4: Wireshark
Wireshark is a network protocol analyser. It captures messages received by or transmitted from
the computer on which it runs. It then analyses the messages to interpret and display their
content.
You can start the Wireshark program from the desktop or the Start menu.
The Wireshark graphical user interface has 4 major elements.
Display Filter
Packet Listing
Packet Header
Details
Packet Contents
- The packet listing window displays a one-line summary for each packet captured. The listed
information usually includes: the packet number (assigned by Wireshark), the time at which the
packet was captured, the packet’s source and destination addresses, the protocol type, and
protocol-specific information contained in the packet. The packet listing can be sorted according
to any of these categories by clicking on a column name.
- The packet header details window provides details about the packet selected (highlighted) in
the packet listing window. (To select a packet in the packet listing window, place the cursor over
the packet’s one-line summary in the packet listing window and click with the left mouse button.).
These details include information about the Ethernet frame and IP datagram that contains this
packet. The amount of details displayed can be expanded or minimized by clicking on the + sign
on the left of the line in the packet details window.
- The packet-contents window displays the entire contents of the captured frame, in both ASCII
and hexadecimal format.
Page 4/5
- The packet display filter window, is used to enter information in order to filter the packets
displayed in the packet-listing window (and hence the packet-header and packet-contents
windows), based on this information (e.g. you may only want to see the packets where your IP
address appears as source or destination).
The File menu allows you to save captured packet data or open a file containing previously
captured packet data.
The Capture menu allows you to begin packet capture.
If you select Options in this menu, you can use most of the default values in this window.
The Interface pull down menu at the top of the Capture Options window shows the
network interfaces (i.e., the physical connections) that the computer has to the network.
Select an interface that is being used to send and receive packets.
Capture Filter can be used to specify conditions to filter the packets to be captured.
Note that the syntax for capture filters and display filters is not the same.
After selecting the network interface (or using the default interface chosen by Wireshark), click
Start. Packet capture will now begin.
Once the capture is started, perform from the command prompt window a ping towards another
ip address. Once you see the completion of the test in the command prompt window (replies
received), stop the capture in Wireshark.
Display Filters
(1) You can build a Display filter by following the instructions:
Click on the button marked “Expression”. In the left panel of the “Filter Expression” window, scroll
down to the value IP. Expand IP.
Scroll down to the expression: ip.src and then highlight it. In the Relation panel, select ==, and in
the value window enter your IP address.
Click on apply and describe the result (what is the source IP address of the messages that are
left?).
=> Results
(2) Clear the display filter.
Enter in the filter window the condition: icmp
Click on apply and describe the result (what is the protocol type of the messages that are
left).
=> Results
(3) Clear the display filter.
Create a display filter that will keep messages containing your IP address as source or
destination.
Write down the expression you entered.
=> Results
Page 5/5
Download