Академический Документы
Профессиональный Документы
Культура Документы
EXPERIMENT NO.1
Bluetooth Technology
Aim: Study of Bluetooth architecture and working
Theory: Bluetooth is an open wireless technology standard for exchanging data over short
distances (using short wavelength radio transmissions) from fixed and mobile devices, creating
personal area networks (PANs) with high levels of security. Created by telecoms vendor
Ericsson in 1994, it was originally conceived as a wireless alternative to RS232 data cables. It
can connect several devices, overcoming problems of synchronization. Bluetooth is a shortrange
wireless network originally intended to replace the cable(s) connecting portable and/or fixed
electronic devices. Such a network is also sometimes called a PAN (Personal Area Network)
Bluetooth is supposed to got its name from Harald Bluetooth II, King of Denmark 940981
The concept was first patented by Ericsson. Currently the Bluetooth trade mark is owned
by the Bluetooth SIG, a consortium of companies having stake in Bluetooth
Key features are robustness, low power, and low cost.
Protocol Architecture:
SangeethaRajagopal Page 1 of 34
Electronics/PHCET Advanced Network Technology
The Bluetooth specification divides the Bluetooth protocol stack into three logical groups. They
are the Transport Protocol group, the Middleware Protocol group and the Application group, as
shown in Fig
The Transport group protocols allow Bluetooth devices to locate each other, and to manage
physical and logical links with higher layer protocols and applications. Please note that the use
of the word transport in the Transport protocol group does not indicate that it coincides with
the Transport layer of the Open Systems Interconnection Reference Model (OSI) model. Rather,
these protocols correspond to the Data-Link and Physical layers of the OSI model. The Radio,
Baseband, Link Manager, Logical Link Control and Adaptation (L2CAP) layers and the Host
Controller Interface (HCI) are included in the Transport Protocol group. These protocols
support both asynchronous and synchronous transmission. All the protocols in this group are
required to support communications between Bluetooth devices. The Middleware Protocol
group includes third-party and industry-standard protocols, as well as Bluetooth SIG developed
protocols. These protocols allow existing and new applications to operate over Bluetooth links.
Industry standard protocols include Point-to-Point Protocol (PPP), Internet Protocol (IP),
Transmission Control Protocol (TCP), wireless application protocols (WAP), and object
exchange (OBEX) protocols, adopted from Infrared Data Association (IrDA). Bluetooth SIG-
developed protocols include:
1) A serial port emulator (RFCOMM) that enables legacy applications to operate seamlessly
over Bluetooth transport protocols.
2) A packet based telephony control signaling protocol (TCS) for managing telephony
operations, and
3) A service discovery protocol (SDP) that allows devices to obtain information about each
others available services.
The Bluetooth air interface is based on a nominal antenna power of 0dBm (1mW) with
extensions for operating at up to 20dBm (100mW) worldwide. The air interface complies with
most countries' ISM band rules up to 20dBm (America, Europe, and Japan). The radio uses
Frequency Hopping to spread the energy across the ISM spectrum in 79 hops displaced by
1MHz, starting at 2.402GHz and stopping at 2.480GHz. Currently, the SIG is working to
harmonize this 79-channel radio to work globally and has instigated changes within Japan,
SangeethaRajagopal Page 2 of 34
Electronics/PHCET Advanced Network Technology
A piconet is formed when one Bluetooth radio connects to another Bluetooth radio. Both radios
then hop together through the 79 channels. The Bluetooth radio system supports a large number
of piconets by providing each piconet with its own set of random hopping patterns.
Occasionally, piconets will end up on the same channel. When this occurs, the radios will hop
to a free channel and the data are retransmitted (if lost).
The Bluetooth frame consists of a transmit packet followed by a receive packet. Each packet
can be composed of multiple slots (1, 3, or 5) of 625us. A typical single slot frame is
illustrated in Figure , which typically hops at 1,600 hops/second.
Conclusion: ______________________________________
SangeethaRajagopal Page 3 of 34
Electronics/PHCET Advanced Network Technology
Experiment: 2
ATM Network
AIM: find the technical specifications of ATM switch, and then compare the ATM technology
or service with the technology such as Ethernet.
THEORY:
Asynchronous Transfer Mode (ATM) is a technology designed for the high-speed
transfer of voice, video, and data through public and private networks using cell relay
technology. ATM is an International Telecommunication Union Telecommunication
Standardization Sector (ITU-T) standard. Ongoing work on ATM standards is being done
primarily by the ATM Forum, which was jointly founded by Cisco Systems, NET/ADAPTIVE,
Northern Telecom, and Sprint in 1991.
A cell switching and multiplexing technology, ATM combines the benefits of circuit switching
(constant transmission delay, guaranteed capacity) with those of packet switching (flexibility,
efficiency for intermittent traffic). To achieve these benefits, ATM uses the following features:
The combination of these features allows ATM to provide different categories of service
for different data requirements and to establish a service contract at the time a
SangeethaRajagopal Page 4 of 34
Electronics/PHCET Advanced Network Technology
connection is set up. This means that a virtual connection of a given service category can
be guaranteed a certain bandwidth, as well as other traffic parameters, for the life of the
connection.
ATM Basics
To understand how ATM can be used, it is important to have a knowledge of how ATM
packages and transfers information. The following sections provide brief descriptions of the
format of ATM information transfer and the mechanisms on which ATM networking is
based.
ATM Cell Basic Format
The basic unit of information used by ATM is a fixed-size cell consisting of 53 octets, or
bytes. The first 5 bytes contain header information, such as the connection identifier, while
the remaining
48 bytes contain the data, or payload (see Figure 1). Because the ATM switch does not have to
detect the size of a unit of data, switching can be performed efficiently. The small size of the
cell also makes it well suited for the transfer of real-time data, such as voice and video. Such
traffic is intolerant of delays resulting from having to wait for large data packets to be loaded
and forwarded.
The ATM standards groups have defined two header formats. The User-Network Interface
(UNI) header format is defined by the UNI specification, and the Network-Node Interface
(NNI) header format is defined by the NNI specification.
SangeethaRajagopal Page 5 of 34
Electronics/PHCET Advanced Network Technology
GFC4 bits of generic flow control that can be used to provide local functions, such as
identifying multiple stations that share a single ATM interface. The GFC field is
typically not used and is set to a default value.
VPI8 bits of virtual path identifier, which is used, in conjunction with the VCI, to
identify the next destination of a cell as it passes through a series of ATM switches on its
way to its destination.
VCI16 bits of virtual channel identifier, which is used, in conjunction with the VPI, to
identify the next destination of a cell as it passes through a series of ATM switches on its
way to its destination.
PT3 bits of payload type. The first bit indicates whether the cell contains user data or
control data. If the cell contains user data, the second bit indicates congestion, and the
third bit indicates whether the cell is the last in a series of cells that represent a single
AAL5 frame.
CLP1 bit of congestion loss priority, which indicates whether the cell should be
discarded if it encounters extreme congestion as it moves through the network.
SangeethaRajagopal Page 6 of 34
Electronics/PHCET Advanced Network Technology
HEC8 bits of header error control, which is a checksum calculated only on the header
itself.
The NNI specification defines communications between ATM switches. The format of the
NNI header is shown in Figure 3.
Figure 3: NNI Header Format
The GFC field is not present in the format of the NNI header. Instead, the VPI field occupies the
first 12 bits, which allows ATM switches to assign larger VPI values. With that exception, the
format of the NNI header is identical to the format of the UNI header.
Conclusion: ______________________________________
SangeethaRajagopal Page 7 of 34
Electronics/PHCET Advanced Network Technology
EXPERIMENT NO.3
Theory:
SONET uses a basic transmission rate of STS-1 - equivalent to 51.84 Mbps.
Higher-level signals are integer multiples of the base rate. For example, STS-3 is three
times the rate of STS-1 (3 x 51.84 = 155.52 Mbps). An STS-12 rate would be 12 x 51.84 =
622.08 Mbps.
STS-1 Building Block
The frame format of the STS-1 signal is shown in Figure 1. In general, the frame
can be divided into two main areas: Transport Overhead and the Synchronous Payload
Envelope (SPE).
SangeethaRajagopal Page 9 of 34
Electronics/PHCET Advanced Network Technology
Figure 5. STS-N
Conclusion: ______________________________________
SangeethaRajagopal Page 11 of 34
Electronics/PHCET Advanced Network Technology
EXPERIMENT NO.4
type of traffic is called AAL 1. AAL 1 operates by placing a 1 byte header on 47 bytes of
user data and then transferring the 48 bytes to the ATM layer. The SAR of the AAL 1 will
be notified of the extistance of the CS sublayer by the CS indicator, (CSI). A sequence
number, (SN), is passed from the CS sublayer to the SAR and this SN can be used to detect
lost of missing SAR loads. Finally the header of the SAR is protected by a sequence
number protection, (SNP), field which can inform the CS sublayer of bit errors. The layout
of the SAR is shown in Figure 2.
4 bits. There is also a 10 bit field reserved for either multiplexing or else are reserved for
future use. There is also a field called the segment type, (ST), which indicated whether the
SAR is the start, middle or end of a message. The CS sublayer also adds a header and trailer
to the data coming from the higher layers. As yet that is not fully defined. Because of the
high overhead of the AAL 3/4, 4 bytes for every 48 bytes of ATM user information, and
because of the complexity of the protocol there has been a simplified AAL proposed called
AAL 5 for data transfer. The AAL 5 basically puts the headers and trailers onto the CS-PDU
rather than the SAR-PDU. This has a large number of advantages like improved efficiency
and better error correction and detection. The format of the AAL 5 is shown in Figure 3.
Conclusion: ______________________________________
SangeethaRajagopal Page 14 of 34
Electronics/PHCET Advanced Network Technology
EXPERIMENT NO.5
SNMP Traps
Aim: Receive and handle SNMP traps on a Linux system
Objectives:
To understand concept of SNMP Traps
System Requirements:
2. 3 workstations installed with Unix/Linux Fedora Core/Ubuntu and Windows XP
3. SNMP SNMPD & SNMPTT
Procedure:
1. Install SNMP:
$sudo apt-get install snmp snmpd snmptt
this installs a number of snmp-related tools, including snmptrapd, which is the one we need
to be able to listen for "traps"
snmpbulkget snmpdf snmpnetstat snmptranslate snmpwalk
snmpbulkwalk snmpget snmpset snmptrap
snmpconf snmpgetnext snmpstatus snmptrapd
snmpd snmpinform snmptable snmpusm
snmpdelta snmpkey snmptest snmpvacm
Edit /etc/snmp/snmptrapd.conf:
6. To accept all traps
disableAuthorization yes
7. To handle traps with snmptt
traphandle default /usr/sbin/snmptt
Save these changes.
TRAPDOPTS='-Lsd -p /var/run/snmptrapd.pid'
to
TRAPDOPTS='-On -Lsd -p /var/run/snmptrapd.pid'
The -On parameter tells snmptrapd to log OID numbers. This is needed for snmptt to
recognize the incoming traps.
Next edit /etc/snmp/snmptt.ini
unknown_trap_log_enable = 0
and change to
unknown_trap_log_enable = 1
This enables logging all incoming traps to /var/log/snmptt/snmpttunknown.log.
to define your own handlers and change the EXEC statement to your needs or comment it
out.
Conclusion: ______________________________________
SangeethaRajagopal Page 17 of 34
Electronics/PHCET Advanced Network Technology
EXPERIMENT NO.6
Connect the Computers In Local Area Network
5. Right-click the connection that you use to connect to the Internet. For example, if
you Connect to the Internet by using a modem, right-click the connection that you
want under Dial-up / other network available.
6. Click Properties.
8. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use
IP address 192.168.0.1. Your computer may lose connectivity with other computers
on your network. If these other computers have static IP addresses, it is a good idea
SangeethaRajagopal Page 18 of 34
Electronics/PHCET Advanced Network Technology
to set them to obtain their IP addresses automatically. Are you sure you want to
enable Internet Connection Sharing?
The connection to the Internet is shared to other computers on the local area network
(LAN). The Network adapter that is connected to the LAN is configured with a static IP
address of 192.168.0.1 and a subnet mask of 255.255.255.0
On the client computer
To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP configuration, and then configure the client computer. To confirm the LAN
adapter IP Configuration, follow these steps:
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection
uses the Following items list, and then click Properties.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet
mask, and default gateway:
8. IP Address 192.168.31.202
SangeethaRajagopal Page 19 of 34
Electronics/PHCET Advanced Network Technology
11. In the Local Area Connection Properties dialog box, click OK.
Conclusion: ______________________________________
EXPERIMENT NO.7
Network scanning using NMAP.
SangeethaRajagopal Page 20 of 34
Electronics/PHCET Advanced Network Technology
Aim: To Perform an experiment for Port Scanning with nmap, superscan or any other
equivalent software
Objectives:
Port scanning:
Port scanning or scanning is when intruders collect information on the
network services on a target network. Here, the intruder attempts to find open ports
on the
target system.
Zenmap/Nmap:
Nmap ("Network Mapper") is a free and open source (license) utility for network
exploration or security auditing. Many systems and network administrators also find it
useful for tasks such as network inventory, managing service upgrade schedules, and
monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine
what hosts are available on the network, what services (application name and version) those
SangeethaRajagopal Page 21 of 34
Electronics/PHCET Advanced Network Technology
hosts are offering, what operating systems (and OS versions) they are running, what type of
packet filters/firewalls are in use, and dozens of other characteristics. It was designed to
rapidly scan large networks, but works fine against single hosts.
Nmap runs on all major computer operating systems, and official binary packages are
available for Linux, Windows, and Mac OS X. Nmap is executable in classic command-line
and an advanced GUI results viewer Nmap can recognise five port states such as:
Closed,Filtered, Unfiltered, Open-filtered and Closed-Filtered.
Procedure:
3. By agreeing the license agreement, by selecting components and choose the location
7. On the Zenmap Window in target option enter the targeted website URL.
SangeethaRajagopal Page 23 of 34
Electronics/PHCET Advanced Network Technology
9. After scanning, it will list the number of ports, types of ports, Protocol used, Service
offered by the ports, Status of port, version of Software using by port etc.,
10. Go to file menu select save option to save these information in some files.
Conclusion: _________________________________________________________
EXPERIMENT NO.8
Theory:
Simple Network Management Protocol (SNMP) is an applicationlayer protocol
defined by the Internet Architecture Board (IAB) in RFC1157 for exchanging management
information between network devices. It is a part of Transmission Control ProtocolInternet
Protocol (TCPIP) protocol suite.
SNMP is one of the widely accepted protocols to manage and monitor network elements.
Most of the professionalgrade network elements come with bundled SNMP agent. These
agents have to be enabled and configured to communicate with the network management
system (NMS).
SNMP Manager:
Managed Devices:
A managed device or the network element is a part of the network that requires some form
of monitoring and management e.g. routers, switches, servers, workstations, printers, UPSs,
etc...
SNMP Agent:
The agent is a program that is packaged within the network element. Enabling the agent
allows it to collect the management information database from the device locally and makes
SangeethaRajagopal Page 25 of 34
Electronics/PHCET Advanced Network Technology
it available to the SNMP manager, when it is queried for. These agents could be standard
(e.g. Net-SNMP) or specific to a vendor (e.g. HP insight agent)
SNMP agents key functions
Collects management information about its local environment
Stores and retrieves management information as defined in the MIB.
Signals an event to the manager.
Acts as a proxy for some nonSNMP manageable network node.
Every SNMP agent maintains an information database describing the managed device
parameters. The SNMP manager uses this database to request the agent for specific
information and further translates the information as needed for the Network Management
System (NMS). This commonly shared database between the Agent and the Manager is
called Management Information Base (MIB).
Typically these MIB contains standard set of statistical and control values defined for
hardware nodes on a network. SNMP also allows the extension of these standard values
with values specific to a particular agent through the use of private MIBs.
In short, MIB files are the set of questions that a SNMP Manager can ask the agent. Agent
collects these data locally and stores it, as defined in the MIB. So, the SNMP Manager
should be aware of these standard and private questions for every type of agent.
The simplicity in information exchange has made the SNMP as widely accepted protocol.
The main reason being concise set of commands, here are they listed below:
GET: The GET operation is a request sent by the manager to the managed device. It
is performed to retrieve one or more values from the managed device.
GET NEXT: This operation is similar to the GET. The significant difference is that
the GET NEXT operation retrieves the value of the next OID in the MIB tree.
GET BULK: The GETBULK operation is used to retrieve voluminous data from
large MIB table.
SET: This operation is used by the managers to modify or assign the value of the
Managed device.
SangeethaRajagopal Page 26 of 34
Electronics/PHCET Advanced Network Technology
TRAPS: Unlike the above commands which are initiated from the SNMP Manager,
TRAPS are initiated by the Agents. It is a signal to the SNMP Manager by the Agent on the
occurrence of an event.
INFORM: This command is similar to the TRAP initiated by the Agent, additionally
INFORM includes confirmation from the SNMP manager on receiving the message.
RESPONSE: It is the command used to carry back the value(s) or signal of actions
directed by the SNMP Manager.
Being the part of TCP IP protocol suite, the SNMP messages are wrapped as User
Datagram Protocol (UDP) and intern wrapped and transmitted in the Internet Protocol. The
following diagram will illustrate the fourlayer model developed by Department of Defense
(DoD).
SNMP versions:-
Since the inception SNMP, has gone through significant upgrades. However SNMP v1 and
v2c are the most implemented versions of SNMP. Support to SNMP v3 has recently started
catching up as it is more secured when compare to its older versions, but still it has not
reached considerable market share.
SNMPv1:
This is the first version of the protocol, which is defined in RFCs 1155 and 1157
SNMPv2c:
This is the revised protocol, which includes enhancements of SNMPv1 in the areas of
protocol packet types, transport mappings, MIB structure elements but using the existing
SNMPv1 administration structure ("community based" and hence SNMPv2c). It is defined
in RFC 1901, RFC 1905, RFC 1906, RFC 2578.
SangeethaRajagopal Page 27 of 34
Electronics/PHCET Advanced Network Technology
SNMPv3:
SNMPv3 defines the secure version of the SNMP. SNMPv3 also facilitates remote
configuration of the SNMP entities. It is defined by RFC 1905, RFC 1906, RFC 3411, RFC
3412, RFC 3414, RFC 3415.
Though each version had matured towards rich functionalities, additional emphasis was
given to the security aspect on each upgrade. Here is a small clip on each editions security
aspect.
SNMP v1 Communitybased security
Conclusion: ______________________________________
Experiment No. 9
Firewall and NAT
SangeethaRajagopal Page 28 of 34
Electronics/PHCET Advanced Network Technology
Theory:
GUFW is a graphical interfac e for ufw. Ubuntu doesnt come with a graph ical
interface, but gufw is included in Ubuntus software repositories. You can install it w
ith the following command:
GUFW appears in the Dash as an application named Firewall Configuration. Like ufw
itself, GUFW provides a simp le, easy-to-use interface. You can easily enab le or disable
the firewall, control the default p olicy for inbound or outbound traffic, and add rules.
Ubuntu includes its own firew all, known as ufw short for uncomplicated firewall.
Ufw is an easier-to-use frontend for the standard Linux iptables commands. You can even
control ufw from a graphical i nterface.
Ubuntus firewall is designed as an easy way to perform basic firewall task s without
learning iptables. It doesnt offer all the power of the standard iptables com mands, but
its less complex.
Terminal Usage
The firewall is disabled by de fault. To enable the firewall, run the following
command from a terminal:
SangeethaRajagopal Page 29 of 34
Electronics/PHCET Advanced Network Technology
You dont necessarily have to enable the firewall first. You can add rules w hile the
firewall is offline, and then enable it a fter youre done configuring it.
sudo ufw allow 22/tcp (Allows only TCP traffic on this port.)
You can view the rules youve created with the following command:
To reset the firewall to its def ault state, run the following command:
SangeethaRajagopal Page 30 of 34
Electronics/PHCET Advanced Network Technology
The rules editor can be used t o add simple rules or more complicated ones.
Remember, you cant do ever ything with ufw for more com plicated firew all tasks,
youll have to get your hands dirty w ith iptables.
NAT
$ sysctl net.ipv4.conf.eth0.forwarding
net.ipv4.conf.eth0.forwarding = 1
$ sudo iptables -t nat -A PRE ROUTING -p tcp -i eth0 --dport 2222 -j DNA T --to-
destination 1.2.3.4:22
SangeethaRajagopal Page 31 of 34
Electronics/PHCET Advanced Network Technology
Conclusion: ------------------------------------------------------------
EXPERIMENT NO.10
Network Management Tools
SangeethaRajagopal Page 32 of 34
Electronics/PHCET Advanced Network Technology
Objectives:
a) To learn the basics of network management tools and utilities.
c) To use different network tools that are available in the Linux and Windows (XP and
other) environments to obtain network parameters or the diagnosis of network problems.
System Requirements:
1. 3 workstations installed with Unix/Linux Fedora Core/Ubuntu and Windows XP
2. Nmap latest version
3. NmapFE latest version
4. Iptables latest version
5. Tcpdump latest version
6. Wireshark latest version
Conclusion: ____________________________________________________
SangeethaRajagopal Page 34 of 34