Вы находитесь на странице: 1из 34

Electronics/PHCET Advanced Network Technology

EXPERIMENT NO.1

Bluetooth Technology
Aim: Study of Bluetooth architecture and working

Theory: Bluetooth is an open wireless technology standard for exchanging data over short
distances (using short wavelength radio transmissions) from fixed and mobile devices, creating
personal area networks (PANs) with high levels of security. Created by telecoms vendor
Ericsson in 1994, it was originally conceived as a wireless alternative to RS232 data cables. It
can connect several devices, overcoming problems of synchronization. Bluetooth is a shortrange
wireless network originally intended to replace the cable(s) connecting portable and/or fixed
electronic devices. Such a network is also sometimes called a PAN (Personal Area Network)
Bluetooth is supposed to got its name from Harald Bluetooth II, King of Denmark 940981

The concept was first patented by Ericsson. Currently the Bluetooth trade mark is owned
by the Bluetooth SIG, a consortium of companies having stake in Bluetooth
Key features are robustness, low power, and low cost.
Protocol Architecture:

SangeethaRajagopal Page 1 of 34
Electronics/PHCET Advanced Network Technology

The Bluetooth specification divides the Bluetooth protocol stack into three logical groups. They
are the Transport Protocol group, the Middleware Protocol group and the Application group, as
shown in Fig
The Transport group protocols allow Bluetooth devices to locate each other, and to manage
physical and logical links with higher layer protocols and applications. Please note that the use
of the word transport in the Transport protocol group does not indicate that it coincides with
the Transport layer of the Open Systems Interconnection Reference Model (OSI) model. Rather,
these protocols correspond to the Data-Link and Physical layers of the OSI model. The Radio,
Baseband, Link Manager, Logical Link Control and Adaptation (L2CAP) layers and the Host
Controller Interface (HCI) are included in the Transport Protocol group. These protocols
support both asynchronous and synchronous transmission. All the protocols in this group are
required to support communications between Bluetooth devices. The Middleware Protocol
group includes third-party and industry-standard protocols, as well as Bluetooth SIG developed
protocols. These protocols allow existing and new applications to operate over Bluetooth links.
Industry standard protocols include Point-to-Point Protocol (PPP), Internet Protocol (IP),
Transmission Control Protocol (TCP), wireless application protocols (WAP), and object
exchange (OBEX) protocols, adopted from Infrared Data Association (IrDA). Bluetooth SIG-
developed protocols include:
1) A serial port emulator (RFCOMM) that enables legacy applications to operate seamlessly
over Bluetooth transport protocols.
2) A packet based telephony control signaling protocol (TCS) for managing telephony
operations, and
3) A service discovery protocol (SDP) that allows devices to obtain information about each
others available services.

The Bluetooth air interface is based on a nominal antenna power of 0dBm (1mW) with
extensions for operating at up to 20dBm (100mW) worldwide. The air interface complies with
most countries' ISM band rules up to 20dBm (America, Europe, and Japan). The radio uses
Frequency Hopping to spread the energy across the ISM spectrum in 79 hops displaced by
1MHz, starting at 2.402GHz and stopping at 2.480GHz. Currently, the SIG is working to
harmonize this 79-channel radio to work globally and has instigated changes within Japan,

SangeethaRajagopal Page 2 of 34
Electronics/PHCET Advanced Network Technology

Spain, and other countries.


The nominal link range is 10 centimeters to 10 meters, but can be extended to more than 100
meters by increasing the transmit power (using the 20dBm option).
As mentioned previously, the basic radio is a hybrid spread spectrum radio. Typically, the
radio operates in a frequency-hopping manner in which the 2.4GHz ISM band is broken
into 79 1MHz channels that the radio randomly hops through while transmitting and
receiving data.

Single slot frame

A piconet is formed when one Bluetooth radio connects to another Bluetooth radio. Both radios
then hop together through the 79 channels. The Bluetooth radio system supports a large number
of piconets by providing each piconet with its own set of random hopping patterns.
Occasionally, piconets will end up on the same channel. When this occurs, the radios will hop
to a free channel and the data are retransmitted (if lost).

The Bluetooth frame consists of a transmit packet followed by a receive packet. Each packet
can be composed of multiple slots (1, 3, or 5) of 625us. A typical single slot frame is
illustrated in Figure , which typically hops at 1,600 hops/second.

Conclusion: ______________________________________

SangeethaRajagopal Page 3 of 34
Electronics/PHCET Advanced Network Technology

Experiment: 2

ATM Network

AIM: find the technical specifications of ATM switch, and then compare the ATM technology
or service with the technology such as Ethernet.

THEORY:
Asynchronous Transfer Mode (ATM) is a technology designed for the high-speed
transfer of voice, video, and data through public and private networks using cell relay
technology. ATM is an International Telecommunication Union Telecommunication
Standardization Sector (ITU-T) standard. Ongoing work on ATM standards is being done
primarily by the ATM Forum, which was jointly founded by Cisco Systems, NET/ADAPTIVE,
Northern Telecom, and Sprint in 1991.

A cell switching and multiplexing technology, ATM combines the benefits of circuit switching
(constant transmission delay, guaranteed capacity) with those of packet switching (flexibility,
efficiency for intermittent traffic). To achieve these benefits, ATM uses the following features:

Fixed-size cells, permitting more efficient switching in hardware than is


possible with variable-length packets
Connection-oriented service, permitting routing of cells through the ATM
network over virtual connections, sometimes called virtual circuits, using
simple connection identifiers
Asynchronous multiplexing, permitting efficient use of bandwidth and
interleaving of data of varying priority and size

The combination of these features allows ATM to provide different categories of service
for different data requirements and to establish a service contract at the time a

SangeethaRajagopal Page 4 of 34
Electronics/PHCET Advanced Network Technology

connection is set up. This means that a virtual connection of a given service category can
be guaranteed a certain bandwidth, as well as other traffic parameters, for the life of the
connection.

ATM Basics

To understand how ATM can be used, it is important to have a knowledge of how ATM
packages and transfers information. The following sections provide brief descriptions of the
format of ATM information transfer and the mechanisms on which ATM networking is
based.
ATM Cell Basic Format

The basic unit of information used by ATM is a fixed-size cell consisting of 53 octets, or
bytes. The first 5 bytes contain header information, such as the connection identifier, while
the remaining

48 bytes contain the data, or payload (see Figure 1). Because the ATM switch does not have to
detect the size of a unit of data, switching can be performed efficiently. The small size of the
cell also makes it well suited for the transfer of real-time data, such as voice and video. Such
traffic is intolerant of delays resulting from having to wait for large data packets to be loaded
and forwarded.

Figure 1 ATM Cell Basic Format

The ATM standards groups have defined two header formats. The User-Network Interface
(UNI) header format is defined by the UNI specification, and the Network-Node Interface
(NNI) header format is defined by the NNI specification.

SangeethaRajagopal Page 5 of 34
Electronics/PHCET Advanced Network Technology

The UNI specification defines communications between ATM endpoints (such as


workstations and routers) and ATM switches in private ATM networks. The format of the UNI
cell header is shown in Figure 2.
Figure 2: UNI Header Format

The UNI header consists of the following fields:

GFC4 bits of generic flow control that can be used to provide local functions, such as
identifying multiple stations that share a single ATM interface. The GFC field is
typically not used and is set to a default value.
VPI8 bits of virtual path identifier, which is used, in conjunction with the VCI, to
identify the next destination of a cell as it passes through a series of ATM switches on its
way to its destination.
VCI16 bits of virtual channel identifier, which is used, in conjunction with the VPI, to
identify the next destination of a cell as it passes through a series of ATM switches on its
way to its destination.
PT3 bits of payload type. The first bit indicates whether the cell contains user data or
control data. If the cell contains user data, the second bit indicates congestion, and the
third bit indicates whether the cell is the last in a series of cells that represent a single
AAL5 frame.
CLP1 bit of congestion loss priority, which indicates whether the cell should be
discarded if it encounters extreme congestion as it moves through the network.

SangeethaRajagopal Page 6 of 34
Electronics/PHCET Advanced Network Technology

HEC8 bits of header error control, which is a checksum calculated only on the header
itself.

The NNI specification defines communications between ATM switches. The format of the
NNI header is shown in Figure 3.
Figure 3: NNI Header Format

The GFC field is not present in the format of the NNI header. Instead, the VPI field occupies the
first 12 bits, which allows ATM switches to assign larger VPI values. With that exception, the
format of the NNI header is identical to the format of the UNI header.

Conclusion: ______________________________________

SangeethaRajagopal Page 7 of 34
Electronics/PHCET Advanced Network Technology

EXPERIMENT NO.3

SONET Frame Format

Aim: Study of SONET frame format structure.

Theory:
SONET uses a basic transmission rate of STS-1 - equivalent to 51.84 Mbps.
Higher-level signals are integer multiples of the base rate. For example, STS-3 is three
times the rate of STS-1 (3 x 51.84 = 155.52 Mbps). An STS-12 rate would be 12 x 51.84 =
622.08 Mbps.
STS-1 Building Block
The frame format of the STS-1 signal is shown in Figure 1. In general, the frame
can be divided into two main areas: Transport Overhead and the Synchronous Payload
Envelope (SPE).

Figure 1. STS-1 frame format


The synchronous payload envelope can also be divided into two parts: the STS path
overhead and the payload. The payload is the revenue-producing traffic being transported
and routed over the SONET network. Once the payload is multiplexed into the synchronous
payload envelope, it can be transported and switched through SONET without having to be
examined and possibly demultiplexed at intermediate nodes. Thus, SONET is said to be
service-independent or transparent.
Transport Overhead is composed of section overhead and line overhead. The STS-1 path
overhead is part of the synchronous payload envelope.
The STS-1 payload has the capacity to transport up to:
28 DS1s
1 DS3
21 2.048 Mbps signals or combinations of above.
SangeethaRajagopal Page 8 of 34
Electronics/PHCET Advanced Network Technology

STS-1 Frame Structure


STS-1 is a specific sequence of 810 bytes (6480 bits), which includes various
overhead bytes and an envelope capacity for transporting payloads. It can be depicted as a
90 column by 9 row structure. With a frame length of 125 s (8000 frames per second),
STS-1 has a bit rate of 51.840 Mbps. The order of transmission of bytes is row-by-row from
top to bottom, left to right (most significant bit first).
As shown in Figure 1, the first three columns of the STS-1 frame are for the Transport
Overhead. The three columns contain nine bytes. Of these, nine bytes are overhead for the
Section Layer (for example, each Section Overhead), and 18 bytes are overhead for the
Line Layer (for example, Line Overhead). The remaining 87 columns constitute the STS-1
Envelope Capacity (payload and path overhead).
As stated before, the basic signal of SONET is the Synchronous Transport Signal level 1,
or STS-1. The STS frame format is composed of 9 rows of 90 columns of 8-bit bytes, or
810 bytes. The byte transmission order is row-by-row, left to right. At a rate of 8000 frames
per second, that works out to a rate of 51.840 Mbps, as the following equation
demonstrates:
9 x 90 bytes/frame x 8 bits/byte x 8000 frames/s = 51,840,000 bps= 51.840 Mbps
This is known as the STS-1 signal rate -- the electrical rate used primarily for transport
within a specific piece of hardware. The optical equivalent of STS-1 is known as OC-1, and
it is used for transmission across the fiber.The STS-1 frame consists of overhead, plus a
Synchronous Payload Envelope (see Figure 2). The first three columns of each STS-1
frame make up the Transport Overhead, and the last 87 columns make up the SPE. SPEs
can have any alignment within the frame, and this alignment is indicated by the H1 and H2
pointer bytes in the line overhead.

Figure 2. STS-1 frame elements

SangeethaRajagopal Page 9 of 34
Electronics/PHCET Advanced Network Technology

STS-1 Envelope Capacity and Synchronous Payload Envelope (SPE)


Figure 3 depicts the STS-1 SPE, which occupies the STS-1 Envelope Capacity. The
STS-1 SPE consists of 783 bytes, and can be depicted as an 87 column by 9 row structure.
Column 1 contains nine bytes, designated as the STS Path Overhead (POH). Two columns
(columns 30 and 59) are not used for payload, but are designated as the "fixed stuff"
columns. The 756 bytes in the remaining 84 columns are designated as the STS-1 Payload
Capacity.

Figure 3. STS-1 SPE example

STS-1 SPE in Interior of STS-1 Frames


The STS-1 SPE may begin anywhere in the STS-1 Envelope Capacity (see Figure
4). Typically, it begins in one STS-1 frame and ends in the next. The STS Payload Pointer
contained in the Transport Overhead designates the location of the byte where the STS-1
SPE begins.STS POH is associated with each payload and is used to communicate various
information from the point where a payload is mapped into the STS-1 SPE to where it is
delivered.

Figure 4. STS-1 SPE Position in the STS-1 Frame


SangeethaRajagopal Page 10 of 34
Electronics/PHCET Advanced Network Technology

STS-N Frame Structure


An STS-N is a specific sequence of Nx810 bytes. The STS-N is formed by byte-
interleaving STS-1 modules (see Figure 5). The Transport Overhead of the individual STS-
1 modules are frame aligned before interleaving, but the associated STS SPEs are not
required to be aligned because each STS-1 has a Payload Pointer to indicate the location of
the SPE (or to indicate concatenation).

Figure 5. STS-N

Conclusion: ______________________________________

SangeethaRajagopal Page 11 of 34
Electronics/PHCET Advanced Network Technology

EXPERIMENT NO.4

ATM Adaptation Layer (AAL) Protocol


Aim: Study of ATM Adaptation Layer (AAL)
Theory:
The ATM Adaption Layer, (AAL), makes the ATM layer services more adaptable to
specific services. The specific services may include user services, control services and
management services. The AAL is the layer above the ATM layer and it is responsible for
converting the information from the higher layers into 48 byte lengths so that the ATM layer
can add the 5 byte header to make the 53 byte cell. The two main functions of this AAL are
to provide functions needed to support applications and to break up information into units
that will fit into cells. The AAL layer is thus divided into two sublayers: the convergence
sublayer (CS) and segmentation and reassembly sublayer (SAR). The convergence sublayer
provides the functions needed to support specific applications, such as handling the cell
delay variation and keeping a track of the clock. Each application accesses the AAL at a
service access point (SAP), which is the address of the application. The SAR sublayer packs
the information from the CS into cells and unpacks the information at the destination. The
SAR maps SAR headers plus CS information into 48 byte cells.
The AAL accommodates all services and in particular adapts both packet switched
and circuit switched services. The CCITT service classification is based upon the timing
relation, bit rate, and connection mode. Figure-1depicts the CCITT service classification
according to these parameters. There are five AAL types that correspond approximately to
the CCITT service classes as shown in Figure 1

Figure 1:CCITT Service Classification


Class A is a constant bit rate connection with a timing relationship between source and
destination and is often called circuit emulation. This could be used to carry voice of 64
kb/s or constant bit rate video. This could also be used for intelligent multiplexing
equipment that needs what is essentially a circuit. The adaption layer that deals with this
SangeethaRajagopal Page 12 of 34
Electronics/PHCET Advanced Network Technology

type of traffic is called AAL 1. AAL 1 operates by placing a 1 byte header on 47 bytes of
user data and then transferring the 48 bytes to the ATM layer. The SAR of the AAL 1 will
be notified of the extistance of the CS sublayer by the CS indicator, (CSI). A sequence
number, (SN), is passed from the CS sublayer to the SAR and this SN can be used to detect
lost of missing SAR loads. Finally the header of the SAR is protected by a sequence
number protection, (SNP), field which can inform the CS sublayer of bit errors. The layout
of the SAR is shown in Figure 2.

Figure 2:AAL 1 Cell Format


Class A is most appropriate for voice transmission that does not incorporate time
assignment speech interpolation (TASI). In TASI speech is only transmitted when the
speaker is active. To incorporate efficiencies that can be achieved with coding and
compression techniques on real time services there is a second class called Class B. Class B
is used for services similar to Class A but which are not constant bit rate. Examples of these
would be variable bit rate audio and video. AAL 2 is the AAL layer responsible for
providing these type of services from the ATM layer to the higher layers. AAL 2 is not yet
fully specified but there is some indication as to the format of the protocol. As the intended
use is for compressed voice and video there will likely be strict bounds on the bit error rate.
To help the system there is likely to be a CRC in the SAR to protect all the data being sent.
As the user field may not be full it is likely that the user amount of information will be
variable length and this will be indicated by the length indicator, (LI).
The remaining CCITT classes of service and AAL's are used for services which have no
relationship of timing between source and destination. These services are esentially variable
bit rate data services and can be differentiated by whether they are connection oriented or
not. Class C is connection oriented data transfer while Class D is connectionless. The
distinction between the conectionless and connection orientated AAL's has been lessened to
such an extent that they now share the same AAL called AAL 3/4. Initially AAL 3 was for
Class C and AAL 4 was for Class B services. The AAL 3/4 takes information from the
higher layer and after the CS sublayer operates on it the SAR breaks the data up into 44
byte sizes and adds 4 bytes of header fields to make a 48 byte information load for the ATM
layer cell. The four bytes of header are made up of a 10 bit CRC, a LI of 6 bits and an SN of
SangeethaRajagopal Page 13 of 34
Electronics/PHCET Advanced Network Technology

4 bits. There is also a 10 bit field reserved for either multiplexing or else are reserved for
future use. There is also a field called the segment type, (ST), which indicated whether the
SAR is the start, middle or end of a message. The CS sublayer also adds a header and trailer
to the data coming from the higher layers. As yet that is not fully defined. Because of the
high overhead of the AAL 3/4, 4 bytes for every 48 bytes of ATM user information, and
because of the complexity of the protocol there has been a simplified AAL proposed called
AAL 5 for data transfer. The AAL 5 basically puts the headers and trailers onto the CS-PDU
rather than the SAR-PDU. This has a large number of advantages like improved efficiency
and better error correction and detection. The format of the AAL 5 is shown in Figure 3.

Figure 3:AAL 5 Cell Format


There is also the possibility of designing an AAL specific to a particular application service
if there is a need. Even if a new AAL is designed to work with an application the overall
system still adheres to ATM standards.

Conclusion: ______________________________________

SangeethaRajagopal Page 14 of 34
Electronics/PHCET Advanced Network Technology

EXPERIMENT NO.5

SNMP Traps
Aim: Receive and handle SNMP traps on a Linux system

Objectives:
To understand concept of SNMP Traps
System Requirements:
2. 3 workstations installed with Unix/Linux Fedora Core/Ubuntu and Windows XP
3. SNMP SNMPD & SNMPTT

Procedure:
1. Install SNMP:
$sudo apt-get install snmp snmpd snmptt
this installs a number of snmp-related tools, including snmptrapd, which is the one we need
to be able to listen for "traps"
snmpbulkget snmpdf snmpnetstat snmptranslate snmpwalk
snmpbulkwalk snmpget snmpset snmptrap
snmpconf snmpgetnext snmpstatus snmptrapd
snmpd snmpinform snmptable snmpusm
snmpdelta snmpkey snmptest snmpvacm

2. To Configure SNMP Trap


snmptrapd does not start up by default, you need to enable it in /etc/defaults/snmp ; it will
then be started by /etc/init.d/snmpd (if /etc/snmp/snmptrapd.conf exists.

Edit /etc/snmp/snmptrapd.conf:
6. To accept all traps
disableAuthorization yes
7. To handle traps with snmptt
traphandle default /usr/sbin/snmptt
Save these changes.

Edit /etc/default/snmpd: change


TRAPDRUN=no
to
TRAPDRUN=yes
and change
SangeethaRajagopal Page 15 of 34
Electronics/PHCET Advanced Network Technology

TRAPDOPTS='-Lsd -p /var/run/snmptrapd.pid'
to
TRAPDOPTS='-On -Lsd -p /var/run/snmptrapd.pid'
The -On parameter tells snmptrapd to log OID numbers. This is needed for snmptt to
recognize the incoming traps.
Next edit /etc/snmp/snmptt.ini
unknown_trap_log_enable = 0
and change to
unknown_trap_log_enable = 1
This enables logging all incoming traps to /var/log/snmptt/snmpttunknown.log.

3. To Test SNMP Trap


Now create a handler for a test trap. To do so edit /etc/snmp/snmptt.conf and paste
the following lines at the end:
#
EVENT test .1.3.6.1.6.3.1.1.5.2 "Status Events" Normal
FORMAT Just a Test
EXEC touch /root/testsuccessful
SDESC
This is a test
EDESC
4. (Re)start the snmp daemons and check SNMP Trap received
/etc/init.d/snmpd
restart /etc/init.d/snmpd
status
should show snmpd and snmptrapd are running. You can try by entering the
following command (best done from another machine to see it s working from other hosts,
change DESTINATIONIP to match yours):
$sudo snmptrap -v 1 -c public DESTINATIONIP "" "" 1 1 ""
Now you should now have the logfile /var/log/snmptt/snmptt.log created and filled
whithyour entry. Also the file /root/testsuccessful should be created so our custom handler
command was also fired.
From this point on you should be able to create your own handlers. Unknown traps will be
logged to /var/log/snmptt/snmpttunknown.log. Take the OID (in brackets), e. g.
Unknown trap (.1.3.6.1.6.3.1.1.5.2) received from
SangeethaRajagopal Page 16 of 34
Electronics/PHCET Advanced Network Technology

to define your own handlers and change the EXEC statement to your needs or comment it
out.

Conclusion: ______________________________________

SangeethaRajagopal Page 17 of 34
Electronics/PHCET Advanced Network Technology

EXPERIMENT NO.6
Connect the Computers In Local Area Network

Aim: To Connect the computers in Local Area Network.


Theory:
On the host computer
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.

2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.

4. Click Network Connections.

5. Right-click the connection that you use to connect to the Internet. For example, if
you Connect to the Internet by using a modem, right-click the connection that you
want under Dial-up / other network available.

6. Click Properties.

7. Click the Advanced tab.

8. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.

9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the Internet.

10. Click OK. You receive the following message:

When Internet Connection Sharing is enabled, your LAN adapter will be set to use
IP address 192.168.0.1. Your computer may lose connectivity with other computers
on your network. If these other computers have static IP addresses, it is a good idea
SangeethaRajagopal Page 18 of 34
Electronics/PHCET Advanced Network Technology

to set them to obtain their IP addresses automatically. Are you sure you want to
enable Internet Connection Sharing?

11. Click Yes.

The connection to the Internet is shared to other computers on the local area network
(LAN). The Network adapter that is connected to the LAN is configured with a static IP
address of 192.168.0.1 and a subnet mask of 255.255.255.0
On the client computer

To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP configuration, and then configure the client computer. To confirm the LAN
adapter IP Configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.

2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.

4. Click Network Connections.

5. Right-click Local Area Connection and then click Properties.

6. Click the General tab, click Internet Protocol (TCP/IP) in the connection
uses the Following items list, and then click Properties.

7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP


address Automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet
mask, and default gateway:

8. IP Address 192.168.31.202
SangeethaRajagopal Page 19 of 34
Electronics/PHCET Advanced Network Technology

9. Subnet mask 255.255.255.0

10. Default gateway 192.168.31.1

11. In the Local Area Connection Properties dialog box, click OK.

12. Quit Control Panel.

Conclusion: ______________________________________

EXPERIMENT NO.7
Network scanning using NMAP.
SangeethaRajagopal Page 20 of 34
Electronics/PHCET Advanced Network Technology

Aim: To Perform an experiment for Port Scanning with nmap, superscan or any other
equivalent software
Objectives:
Port scanning:
Port scanning or scanning is when intruders collect information on the
network services on a target network. Here, the intruder attempts to find open ports
on the
target system.

The different scanning methods that network attackers use are:


1. Vanilla scan/SYNC scan: TCP SYN packets are sent to each address port in an attempt
to connect to all ports. Port numbers 0 65,535 are utilized.
2. Strobe scan: Here, the attacker attempts to connect to a specific range of ports that are
typically open on Windows based hosts or UNIX/Linux based hosts.
3. Sweep: A large set of IP addresses are scanned in an attempt to detect a system that has
one open port.
4. Passive scan: Here, all network traffic entering or leaving the network is captured and
traffic is then analyzed to determine what the open ports are on the hosts within the
network.
5. User Datagram Protocol (UDP) scan: Empty UDP packets are sent to the different
ports of a set of addresses to determine how the operating responds. Closed UDP ports
respond with the Port Unreachable message when any empty UDP packets are
received. Other operating systems respond with the Internet Control Message Protocol
(ICMP) error packet.
6. FTP bounce: To hide the attackers location, the scan is initiated from an intermediary
File Transfer Protocol (FTP) server.
7. FIN scan: TCP FIN packets that specify that the sender wants to close a TCP session
are sent to each port for a range of IP addresses.

Zenmap/Nmap:
Nmap ("Network Mapper") is a free and open source (license) utility for network
exploration or security auditing. Many systems and network administrators also find it
useful for tasks such as network inventory, managing service upgrade schedules, and
monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine
what hosts are available on the network, what services (application name and version) those
SangeethaRajagopal Page 21 of 34
Electronics/PHCET Advanced Network Technology

hosts are offering, what operating systems (and OS versions) they are running, what type of
packet filters/firewalls are in use, and dozens of other characteristics. It was designed to
rapidly scan large networks, but works fine against single hosts.
Nmap runs on all major computer operating systems, and official binary packages are
available for Linux, Windows, and Mac OS X. Nmap is executable in classic command-line
and an advanced GUI results viewer Nmap can recognise five port states such as:
Closed,Filtered, Unfiltered, Open-filtered and Closed-Filtered.

1.Open the terminal and Enter the following command


Nmap -sS 192.168.1.88

2. Scanning range of ip address


SangeethaRajagopal Page 22 of 34
Electronics/PHCET Advanced Network Technology

Nmap -sS 192.168.1.50-90

Procedure:

Working with Nmap/Zenmap:

1. Download the Nmap software from the website www.Nmapdownload.org by accepting

the license agreement.

2. After downloading Nmap setup must be done.

3. By agreeing the license agreement, by selecting components and choose the location

where the Nmap software to be installed.

4. Select Create Desktop icon & Start Menu Folder option.

5. Installation of Nmap Completes.

6. After the installation,click on Nmap icon on desktop.

7. On the Zenmap Window in target option enter the targeted website URL.
SangeethaRajagopal Page 23 of 34
Electronics/PHCET Advanced Network Technology

8. On the profile bar select Intense Scan option.

9. After scanning, it will list the number of ports, types of ports, Protocol used, Service

offered by the ports, Status of port, version of Software using by port etc.,

10. Go to file menu select save option to save these information in some files.

Conclusion: _________________________________________________________

EXPERIMENT NO.8

Simple Network Management Protocol


SangeethaRajagopal Page 24 of 34
Electronics/PHCET Advanced Network Technology

Aim: Simple Network Management Protocol

Theory:
Simple Network Management Protocol (SNMP) is an applicationlayer protocol
defined by the Internet Architecture Board (IAB) in RFC1157 for exchanging management
information between network devices. It is a part of Transmission Control ProtocolInternet
Protocol (TCPIP) protocol suite.
SNMP is one of the widely accepted protocols to manage and monitor network elements.
Most of the professionalgrade network elements come with bundled SNMP agent. These
agents have to be enabled and configured to communicate with the network management
system (NMS).

SNMP basic components and their functionalities

SNMP Manager:

A manager or management system is a separate entity that is responsible to communicate


with the SNMP agent implemented network devices. This is typically a computer that is
used to run one or more network management systems.
SNMP Managers key functions
Queries agents
Gets responses from agents
Sets variables in agents
Acknowledges asynchronous events from agents

Managed Devices:

A managed device or the network element is a part of the network that requires some form
of monitoring and management e.g. routers, switches, servers, workstations, printers, UPSs,
etc...

SNMP Agent:

The agent is a program that is packaged within the network element. Enabling the agent
allows it to collect the management information database from the device locally and makes

SangeethaRajagopal Page 25 of 34
Electronics/PHCET Advanced Network Technology

it available to the SNMP manager, when it is queried for. These agents could be standard
(e.g. Net-SNMP) or specific to a vendor (e.g. HP insight agent)
SNMP agents key functions
Collects management information about its local environment
Stores and retrieves management information as defined in the MIB.
Signals an event to the manager.
Acts as a proxy for some nonSNMP manageable network node.

Management Information database or Management Information Base (MIB)

Every SNMP agent maintains an information database describing the managed device
parameters. The SNMP manager uses this database to request the agent for specific
information and further translates the information as needed for the Network Management
System (NMS). This commonly shared database between the Agent and the Manager is
called Management Information Base (MIB).
Typically these MIB contains standard set of statistical and control values defined for
hardware nodes on a network. SNMP also allows the extension of these standard values
with values specific to a particular agent through the use of private MIBs.
In short, MIB files are the set of questions that a SNMP Manager can ask the agent. Agent
collects these data locally and stores it, as defined in the MIB. So, the SNMP Manager
should be aware of these standard and private questions for every type of agent.

Basic commands of SNMP:-

The simplicity in information exchange has made the SNMP as widely accepted protocol.
The main reason being concise set of commands, here are they listed below:

GET: The GET operation is a request sent by the manager to the managed device. It
is performed to retrieve one or more values from the managed device.
GET NEXT: This operation is similar to the GET. The significant difference is that
the GET NEXT operation retrieves the value of the next OID in the MIB tree.
GET BULK: The GETBULK operation is used to retrieve voluminous data from
large MIB table.
SET: This operation is used by the managers to modify or assign the value of the
Managed device.

SangeethaRajagopal Page 26 of 34
Electronics/PHCET Advanced Network Technology

TRAPS: Unlike the above commands which are initiated from the SNMP Manager,
TRAPS are initiated by the Agents. It is a signal to the SNMP Manager by the Agent on the
occurrence of an event.
INFORM: This command is similar to the TRAP initiated by the Agent, additionally
INFORM includes confirmation from the SNMP manager on receiving the message.
RESPONSE: It is the command used to carry back the value(s) or signal of actions
directed by the SNMP Manager.

Typical SNMP communication:-

Being the part of TCP IP protocol suite, the SNMP messages are wrapped as User
Datagram Protocol (UDP) and intern wrapped and transmitted in the Internet Protocol. The
following diagram will illustrate the fourlayer model developed by Department of Defense
(DoD).

SNMP versions:-
Since the inception SNMP, has gone through significant upgrades. However SNMP v1 and
v2c are the most implemented versions of SNMP. Support to SNMP v3 has recently started
catching up as it is more secured when compare to its older versions, but still it has not
reached considerable market share.

SNMPv1:

This is the first version of the protocol, which is defined in RFCs 1155 and 1157
SNMPv2c:
This is the revised protocol, which includes enhancements of SNMPv1 in the areas of
protocol packet types, transport mappings, MIB structure elements but using the existing
SNMPv1 administration structure ("community based" and hence SNMPv2c). It is defined
in RFC 1901, RFC 1905, RFC 1906, RFC 2578.

SangeethaRajagopal Page 27 of 34
Electronics/PHCET Advanced Network Technology

SNMPv3:

SNMPv3 defines the secure version of the SNMP. SNMPv3 also facilitates remote
configuration of the SNMP entities. It is defined by RFC 1905, RFC 1906, RFC 3411, RFC
3412, RFC 3414, RFC 3415.
Though each version had matured towards rich functionalities, additional emphasis was
given to the security aspect on each upgrade. Here is a small clip on each editions security
aspect.
SNMP v1 Communitybased security

SNMP v2c Communitybased security

SNMP v2u Userbased security

SNMP v2 Partybased security


SNMP v3 Userbased security

Conclusion: ______________________________________

Experiment No. 9
Firewall and NAT

SangeethaRajagopal Page 28 of 34
Electronics/PHCET Advanced Network Technology

Aim: To Study Firewall configuration.

Theory:

GUFW Graphical Inter face

GUFW is a graphical interfac e for ufw. Ubuntu doesnt come with a graph ical
interface, but gufw is included in Ubuntus software repositories. You can install it w
ith the following command:

sudo apt-get install gufw

GUFW appears in the Dash as an application named Firewall Configuration. Like ufw
itself, GUFW provides a simp le, easy-to-use interface. You can easily enab le or disable
the firewall, control the default p olicy for inbound or outbound traffic, and add rules.

Ubuntu includes its own firew all, known as ufw short for uncomplicated firewall.
Ufw is an easier-to-use frontend for the standard Linux iptables commands. You can even
control ufw from a graphical i nterface.

Ubuntus firewall is designed as an easy way to perform basic firewall task s without
learning iptables. It doesnt offer all the power of the standard iptables com mands, but
its less complex.
Terminal Usage

The firewall is disabled by de fault. To enable the firewall, run the following
command from a terminal:
SangeethaRajagopal Page 29 of 34
Electronics/PHCET Advanced Network Technology

sudo ufw enable

You dont necessarily have to enable the firewall first. You can add rules w hile the
firewall is offline, and then enable it a fter youre done configuring it.

Working With Rules

sudo ufw allow 22/tcp (Allows only TCP traffic on this port.)

sudo ufw allow ssh

You can view the rules youve created with the following command:

sudo ufw status

To reset the firewall to its def ault state, run the following command:

sudo ufw reset

SangeethaRajagopal Page 30 of 34
Electronics/PHCET Advanced Network Technology

The rules editor can be used t o add simple rules or more complicated ones.

Remember, you cant do ever ything with ufw for more com plicated firew all tasks,
youll have to get your hands dirty w ith iptables.

NAT
$ sysctl net.ipv4.conf.eth0.forwarding

net.ipv4.conf.eth0.forwarding = 1
$ sudo iptables -t nat -A PRE ROUTING -p tcp -i eth0 --dport 2222 -j DNA T --to-
destination 1.2.3.4:22

$ sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

iptables -t nat -A POSTROUTING -s 10.8.0. 0/24 -j SNAT --to 10.8.0.2/24

SangeethaRajagopal Page 31 of 34
Electronics/PHCET Advanced Network Technology

Conclusion: ------------------------------------------------------------

EXPERIMENT NO.10
Network Management Tools

SangeethaRajagopal Page 32 of 34
Electronics/PHCET Advanced Network Technology

Aim: To Study System Utilities for Network Management

Objectives:
a) To learn the basics of network management tools and utilities.

b) To use status-monitoring, route-monitoring and traffic-monitoring tools.

c) To use different network tools that are available in the Linux and Windows (XP and
other) environments to obtain network parameters or the diagnosis of network problems.

System Requirements:
1. 3 workstations installed with Unix/Linux Fedora Core/Ubuntu and Windows XP
2. Nmap latest version
3. NmapFE latest version
4. Iptables latest version
5. Tcpdump latest version
6. Wireshark latest version

Background: System Utilities for Network Management


A significant amount of network management can be done using operating system (OS)
utilities and some freely downloadable tools. Numerous basic tools are either a part of the
OS or are available as add-on applications that aid in obtaining network parameters or in
diagnosis of network problems. We describe some of the more popular ones here under the
three categories of status-monitoring, route-monitoring and traffic-monitoring.
Procedure:
1. Under Linux:
Go to command line interface (CLI)- Ctl+Alt+ T and use these
commands student@localhost$
2. Under Microsoft Windows:
Go to Start --> run --> cmd C:\
Table-1: Status Monitoring Tools:
Name Operating Description
Systems
mii-tool Unix/Linux View, manipulate media-independent interface status
ifconfig/ Unix/Linux/ Obtains and configures a network interface parameter
ipconfig Windows and status
SangeethaRajagopal Page 33 of 34
Electronics/PHCET Advanced Network Technology

ping Unix/Linux/Wind Send ICMP ECHO_REQUEST to network hosts and


ows check the status.

nslookup Unix/Linux/Wind Query Internet name servers (DNS) interactively


ows
dig Unix/Linux DNS lookup utility (supersedes nslookup)
host Unix/Linux DNS lookup utility
dmesg Linux/Unix Control the kernel ring buffer/log records
nmap Linux/Unix Network exploration tool and security / port scanner
Table-2: Route-Monitoring Tools
Name Operating Description
Systems
route/netstat Unix/Linux Displays the contents of various network-related data
Windows structures
ss Unix/Linux Utility to investigate sockets
arp Linux/Windows ARP stands for Address Resolution Protocol, which is
used to find the media access control address of a
network neighbour for a given IPv4 Address.
traceroute Linux Traces the route to a destination with routing delays
tracert Unix/Windows Traces the route to a destination with routing delays
Table-3: Traffic-Monitoring Tools

Name Operating Description


Systems
ping Linux/Windows Used Interactively dump and analyze network traffic
for measuring round-trip packet loss
bing Unix/Linux Measures point-to-point bandwidth of a link
tcpdump Linux/Unix Dump traffic on a network
Ethereal/ Linux/Windows Interactively dump and analyze network traffic
Wireshark
iptraf Unix/Linux Interactive Colorful IP LAN Monitor

Conclusion: ____________________________________________________

SangeethaRajagopal Page 34 of 34

Вам также может понравиться