Sunteți pe pagina 1din 5

ComputerNetworks

Assignment2

Assignment2

PartI:Multimediaapplicationsoverthenetwork

Theory:
Multimediaapplicationsarealwaysappealingtotheusersandwiththeemergence
ofmorepowerfulcomputersitwaspossibletoplaymoviesorotherkindsofmultimedia
onthecomputer.However,whenitcomestohavingmultimediaapplicationsoverthe
Internet,thebandwidthrestrictionsmakethingsbeingdifferent.Applicationsthatinclude
voiceandvideorequirelargebandwidthandusuallycannottoleratelargedelaysor
variationsinthedelay(jitter).Onthecontrary,theyarenotsosensitivetolimitedpacket
loss.
However,Internetwasnotdevelopedtocarrymultimediatraffic.Themaingoalin
theearlydayswastoconnectcomputersfromdifferentmanufacturers,provide
underlyingnetworkinwhichresourcescanbesharedanddevelopapplicationsfor
exchangeofdata.Thebesteffortservicedidnotmakeanyguaranteethatthepackets
willbedeliveredinorderorintime.TheclassicapplicationsontheInternet(email,telnet,
FTP,WWW)havecompletelydifferentnaturethanthemultimediatraffic.Theyare
primarilyconcernedaboutreliabledatatransferandthereforetheyuseTCPasatransport
protocol.

Taskstodo:
1. PerformsomeresearchaboutthemultimediaapplicationsontheInternetand
answerthefollowingquestions.
Whichtransportprotocolismainlyusedforthemultimediaapplicationsandwhy?
_________________________________________________________________________
_______________________________________________________________________
_________________________________________________________________________

WhatarethemaincharacteristicoftheUDPprotocolandhowisitdifferentfrom
TCP?
________________________________________________________________________
________________________________________________________________________

Summer2006

1/5

ComputerNetworks

Assignment2

PartII:DistributedNatureoftheInternet

Theory
TheInternetisnotasinglenetwork,butavastnetworkofnetworksthat
voluntarilychoosetointerconnectwitheachother.Theprotocolthatgluesthenetworks
togetherisIP(Internetprotocol).TheheartoftheInternetisnotaplaceoranorganization,
butaprinciple:cooperation.Itisbuiltonopenstandards:technicalspecification
documentsthatarepublishedbytechnicalstandardsbodies.Thekeystandardshavebeen,
andarestill,developedthroughopenprocesses,byteamsoftechnicalexpertswhowork
togethertoidentify,study,andsolvecommonengineeringproblems.Afteranexhaustive
processofpeerreviewwithinthecommunityofInternetengineersandarchitects
(including,essentially,anyonewhochoosestoparticipateandcontribute),theresulting
documentsthestandardsthemselvesarepublishedopenly.Atthatpoint,itisupto
thenetworkoperatorsandsoftwarewriterstouseornotuseanewlypublishedstandard.
BecausetheInternetisaglobalnetworkofvoluntarilyinterconnectednetworks,thereis
noorganizationthatcanforceittoadoptanewstandardortechnicalprotocol.

Taskstodo:
1. Visitthefollowingwebsitesandreadabouttheroleofthedifferentbodiesin
thedevelopmentandstandardizationprocessoftheInternet.
www.ietf.org,www.ican.org,www.iana.org,www.rfceditor.org/,www.w3.org
Writethefullnamesforthefollowingorganizations:IETF,IANA,ICCAN,and
W3C.Describeshortlythemainfocusofinterestforeachofthem.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
WhatisthemeaningoftheacronymRFC?
_________________________________________________________________________
FindtheRFCthatcontainsthewellknownportsfortheapplicationsandwrite
downtheapplicationsthatuseports21,25and80.

Summer2006

2/5

ComputerNetworks

Assignment2

_________________________________________________________________________
_________________________________________________________________________

PartIII:EtherealNetworkAnalyzer
1. GotothehomepagefortheEtherealnetworkanalyzer,
http://www.ethereal.com.Downloadthelatestversionforyourplatform.Read
therequirementsforthesystembeforeyouinstalltheprograms.Followthe
linkDocumentationandthesiteclosesttoyoutodownloadtheuserguide.Get
acquaintedwiththeinstructionsaboutinstallingtheprogramandthemain
featuresofEthereal.Installtheanalyzerandthepackageforcapturingpackets.
YoucanalsodownloadthefileAboutEtherealthatcontainsshortdescription
aboutEtherealnetworkanalyzer.
2. FromthepagewiththisassignmentontheWebCTserverdownloadthefile
packets.Thisfilecontainsframescapturedbythepacketcapturingprogram.
YoushouldbeabletoopenthisfilewiththeEtherealpacketanalyzerprogram.
3. Inspectframe1andanswerthefollowingquestions.
WhatistheMACsourceandMACdestinationaddressandinwhichheaderdid
youfindthem?
_________________________________________________________________________
WhatisthesourceanddestinationIPaddressandinwhichheaderdidyoufind
them?
_________________________________________________________________________
Whichtypeoftransportprotocolisused?Whatarethesourceanddestination
port?
_________________________________________________________________________
Whatistheapplicationprotocolused?
_________________________________________________________________________
4. Inspectpackets5,6,7and36,37,38,39.ObservetheTCPheader.Payattention
tothelengthofthesegmentsandtotheflags.Answerthefollowingquestions.
WhatisthevalueoftheSYNflagintheTCPheaderforpackets5,6and7?
_________________________________________________________________________
Whatisthepurposeofpackets5,6and7?
_________________________________________________________________________
WhatisthevalueoftheFINflagintheTCPheaderforpackets36,37,38and39?
_________________________________________________________________________
Whatisthepurposeofpackets36,37,38and39?
_________________________________________________________________________

Summer2006

3/5

ComputerNetworks

Assignment2

5. Inspectpackets23to35.Answerthefollowingquestions.
Whatkindofapplicationprotocolisused?
_________________________________________________________________________
Canyouexplicitlyseetheusernameandthepassword?
_________________________________________________________________________
Areyouawareofwhatkindsofmeasuresaretakenforthis?(Wedidnotstudy
theseissuesduringthiscourse,butperhapsyouknowsomethingaboutthe
securitymeasuresimplementedtoday).Thisquestionisoptionalandyoudont
needtoanswerit.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
6. Createacapturefilterthatwillfilterpacketscomingandgoingthroughthe
interfacecardonyourcomputerandusingport80andstartcapturingpackets.
Afterawhilestopcapturing.Answerthefollowingquestions.
WhatarethetwokindsoffiltersthatcanbecreatedinEthereal?Whatisthe
purposeforeachofthem?
_________________________________________________________________________
_________________________________________________________________________
Whichactionsyouhavemade(wheredidyouclick)inordertobeabletocapture
packetsthatuseport80?
_________________________________________________________________________
Showthefirst10packetsyouhavecapturedandexplainthepurposeofeach
packet.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

7. FromthepagewiththisassignmentontheWebCTserverdownloadthefile
actions.zipandcaptures.zip.Thefileactions.zipcontainssixpicturesthatshowsix
actionsorcommandsgivenattheWindowscommandpromptwindow.These
commandsareconcernedwiththeTCP/IPprotocolstackonthemachine.Each
commandgeneratesaflowofcertainpacketsonthenetworkinterfacethrough
whichthemachineisconnectedtothenetwork.Thefileswithsixactionsare
named:cmd1.jpg,cmd2.jpg,cmd3.jpg,...,cmd6.jpg.Thefilecaptures.zipcontains

six files with captured packets. They have been captured after some of the
Summer2006

4/5

ComputerNetworks

Assignment2

actions described above. Use the Ethereal network analyzer to be able to look at
the packets captured. The name of the files are capture1.cap, capture2.cap, ....,
capture6.cap. Match each action with the packets captured.
cmd1.jpg
cmd2.jpg

cmd3.jpg

cmd4.jpg

cmd5.jpg

cmd6.jpg

Summer2006

5/5

S-ar putea să vă placă și