You are on page 1of 19

INTRODUCTION

Wireshark is a free and open-source packet analyzer, used for network troubleshooting,
software and communication protocol development, etc.

Main Functions of Wireshark

 Capture live packet data from a network interface

 Display the packets with detailed protocol information, occurring time, source, and
destination

 Filter and Search packets on many criteria to get the ones you are looking for

 Open and Save packet data captured

 Import and Export packet data from and to a lot of other capture programs

Theory
Experiment 1
The Open System Interconnection (OSI) model defines a networking framework to
implement protocols in seven layers. Use this handy guide to compare the different layers of
the OSI model and understand how they interact with each other.

The 7 Layers of the OSI

In the OSI model, control is passed from one layer to the next, starting at the application layer
(Layer 7) in one station, and proceeding to the bottom layer, over the channel to the next
station and back up the hierarchy. The OSI model takes the task of inter-networking and
divides that up into what is referred to as a vertical stack that consists of the following 7
layers.

 Layer 7 - Application
 Layer 6 - Presentation
 Layer 5 - Session
 Layer 4 - Transport
 Layer 3 - Network
 Layer 2 - Data Link
 Layer 1 - Physical

Application (Layer 7)

OSI Model, Layer 7, supports application and end-user processes. Communication partners
are identified, quality of service is identified, user authentication and privacy are considered,
and any constraints on data syntax are identified. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-mail, and other network
software services. Telnet and FTP are applications that exist entirely in the application level.
Tiered application architectures are part of this layer.

Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP

Presentation (Layer 6)

This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works
to transform data into the form that the application layer can accept. This layer formats and
encrypts data to be sent across a network, providing freedom from compatibility problems. It
is sometimes called the syntax layer.

Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT,
JPEG, MPEG, MIDI.

Session (Layer 5)

This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between
the applications at each end. It deals with session and connection coordination.

Layer 5 Session examples include NFS, NetBios names, RPC, SQL.

Transport (Layer 4)

OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and
is responsible for end-to-end error recovery and flow control. It ensures complete data
transfer.

Layer 4 Transport examples include SPX, TCP, UDP.

Network (Layer 3)

Layer 3 provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error handling, congestion control and packet
sequencing.

Layer 3 Network examples include AppleTalk DDP, IP, IPX.

Data Link (Layer 2)

At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes
transmission protocol knowledge and management and handles errors in the physical layer,
flow control and frame synchronization. The data link layer is divided into two sub layers:
The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The
MAC sub layer controls how a computer on the network gains access to the data and
permission to transmit it. The LLC layer controls frame synchronization, flow control and
error checking.

Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE
802.3/802.2, HDLC, Frame Relay.

Physical (Layer 1)

OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal —
through the network at the electrical and mechanical level. It provides the hardware means of
sending and receiving data on a carrier, including defining cables, cards and physical aspects.
Fast Ethernet, RS232, and ATM are protocols with physical layer components.

Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Experiment 2

Computer network components

Computer network components include the major parts that are needed to install a network
both at the office and home level. These hardware components include cable, Hub, Switch,
NIC (network interface card), modem and router.

Major computer network components

Computer network requires the following devices (some of them are optional):-

• Network Interface Card (NIC)

• Hub

• Switches

• Cables and connectors

• Router

• Modem

1. Network Interface Card

Network adapter is a device that enables a computer to talk with other computer/network.
Using unique hardware addresses (MAC address) encoded on the card chip, the data-link
protocol employs these addresses to discover other systems on the network so that it can
transfer data to the right destination.

There are two types of network cards: wired and wireless. The wired NIC uses cables and
connectors as a medium to transfer data, whereas in the wireless card, the connection is made
using antenna that employs radio wave technology. All modern laptop computers
incorporated wireless NIC in addition to the wired adapter.

Network Card Speed

Network Interface card, one of the main computer network components, comes with different
speeds, 10Mbps, 100Mbps, and 1000Mbps, so on. Recent standard network cards built with
Gigabit (1000Mbps) connection speed. It also supports to connect slower speeds such as
10Mbps and 100Mbps. However, the speed of the card depends on your LAN speed.

For example, if you have a switch that supports up to 100Mbps, your NIC will also transfer a
data with this same speed even though your computer NIC has still the capability to transfer
data at 1000Mbps (1Gbps). In modern computers, network adapter is integrated with a
computer motherboard. However if you want advanced and fast Ethernet card, you may buy
and install on your computer using the PCI slot found on the motherboard (desktop) and
Express Card slots on laptop .

2. Hub

Hub is a device that splits a network connection into multiple computers. It is like a
distribution center. When a computer request information from a network or a specific
computer, it sends the request to the hub through a cable. The hub will receive the request
and transmit it to the entire network. Each computer in the network should then figure out
whether the broadcast data is for them or not.

Currently Hubs are becoming obsolete and replaced by more advanced communication
devices such as Switchs and Routers.

3. Switch

Switch is a telecommunication device grouped as one of computer network components.


Switch is like a Hub but built in with advanced features. It uses physical device addresses in
each incoming messages so that it can deliver the message to the right destination or port.

Like Hub, switch don’t broadcast the received message to entire network, rather before
sending it checks to which system or port should the message be sent. In other words switch
connects the source and destination directly which increases the speed of the network. Both
switch and hub have common features: Multiple RJ-45 ports, power supply and connection
lights.

4. Cables and connectors

Cable is one way of transmission media which can transmit communication signals. The
wired network typology uses special type of cable to connect computers on a network.
There are a number of solid transmission Media types, which are listed below. - Twisted pair
wire

It is classified as Category 1, 2, 3, 4, 5, 5E, 6 and 7. Category 5E, 6 and 7 are high-speed


cables that can transmit 1Gbps or more. -

Coaxial cable

Coaxial cable more resembles like TV installation cable. It is more expensive than twisted-
pair cable but provide high data transmission speed.

Fiber-optic cable

It is a high-speed cable which transmits data using light beams through a glass bound fibers.
Fiber-optic cable is high data transmission cable comparing to the other cable types. But the
cost of fiber optics is very expensive which can only be purchased and installed on
governmental level.

5. Router

When we talk about computer network components, the other device that used to connect a
LAN with an internet connection is called Router. When you have two distinct networks
(LANs) or want to share a single internet connection to multiple computers, we use a Router.

In most cases, recent routers also include a switch which in other words can be used as a
switch. You don’t need to buy both switch and router, particularly if you are installing small
business and home networks.

There are two types of Router: wired and wireless. The choice depends on your physical
office/home setting, speed and cost.

ADVANTAGES OF PACKET TRACER


1) Packet tracer can be used anywhere; you don’t have to carry it. Once you install it in your
laptop, it can be carried even in USP.
2) The noise level is minimum to none and the consumption of electricity is also less.
3) The major advantage is “sim mode”. This is not available in real gear.

TWO MAJOR MODE OF OPERATION, PACKET TRACER

1. Real-time mode.
2. Simulation mode.
PIN ARRANGEMENT, WHEN BUILDING INTERNET WORKS BASED ON RJ – 45
CONNECTORS. AND THEIR APPLICATION.

There are three types of wiring are used when building internetwork based on RJ – 45
connectors.

1. Straight-Through Wired Cables


2. Crossover Wired Cables
3. Rollover Wired Cables

Straight-Through Wired Cables

Straight-Through refers to cables that have the pin assignments on each end of the cable. In
other words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect. Straight-
Through wired cables are most commonly used to connect a host to client. When we talk
about cat5e patch cables, the Straight-Through wired cat5e patch cable is used to connect
computers, printers and other network client devices to the router switch or hub (the host
device in this instance).
Crossover Wired Cables

Crossover wired cables (commonly called crossover cables) are very much like Straight-
Through cables with the exception that TX and RX lines are crossed (they are at oposite
positions on either end of the cable. Using the 568-B standard as an example below you will
see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on connector A goes to Pin
6 on connector B ect. Crossover cables are most commonly used to connect two hosts
directly. Examples would be connecting a computer directly to another computer, connecting
a switch directly to another switch, or connecting a router to a router.Note: While in the past
when connecting two host devices directly a crossover cable was required. Now days most
devices have auto sensing technology that detects the cable and device and crosses pairs
when needed.
Rollover Wired Cables

Rollover wired cables most commonly called rollover cables, have opposite Pin assignments
on each end of the cable or in other words it is "rolled over". Pin 1 of connector A would be
connected to Pin 8 of connector B. Pin 2 of connector A would be connected to Pin 7 of
connector B and so on. Rollover cables, sometimes referred to as Yost cables are most
commonly used to connect to a devices console port to make programming changes to the
device. Unlike crossover and straight-wired cables, rollover cables are not intended to carry
data but instead create an interface with the device.

Network diagram

You might also like