CCN Lab Assign 3
CCN Lab Assign 3
Computer communication
& networks
(lab)
Submitted to:
Sir shoiab
Submitted by:
Sana faiz
Reg # sp17-bcs-064
Question No 1: Define the different protocols used in all layers of OSI models. Following
are the elements which you must cover of each protocol: -
Name and short description - Practical application (i.e. Networks type) - Pros and cons.
Implement three routing protocols which are: RIP, OSPF and EIGRP on any network
topology.
ANS:
Several protocols overlap the session, presentation, and application layers of networks. There
protocols listed below are a few of the more well-known:
DNS - Domain Name System - translates network address (such as IP addresses) into terms
understood by humans (such as Domain Names) and vice-versa
DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses
to computers and users
FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the
Internet
HTTP – Hyper Text Transfer Protocol - An Internet-based protocol for sending and receiving
webpages
IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet
IRC - Internet Relay Chat - a protocol used for Internet chat and other communications
POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages
from remote servers
SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet
Question No 2: What is the purpose of network traffic analysis? Capture ten different
types of packets which implementing application and network layer protocols.
Complete the given Lab manual with your implemented networks results.
ANS:
Network traffic analysis is the process of recording, reviewing and analysing network traffic for the
purpose of performance, security and/or general network operations and management.
Network security staff uses network traffic analysis to identify any malicious or suspicious
packets within the traffic. Similarly, network administrations seek to monitor
download/upload speeds, throughput, content, etc. to understand network operations.
Network traffic analysis helps in monitoring all activities within the network, not just at the
perimeter, but also between endpoints and servers.
Network traffic analysis is an effective tool in making extracting data harder for hackers. It
helps the company detect cyber threats with a higher degree of certainty, thereby enabling
them to eliminate security threats better and faster.
Question No 3:
i. What is Network programming? Define fundamentals of socket programming
with diagrams. What is Web Scrapping and why we need to scrap data. How
HTTP requests are used to access web pages?
ii. Scrap any two websites data including title, paragraphs, headings, links and
image sources. Then store the scraped data into permanent storage like Json or
CSV. Implement using python to read this data and clean the whole data for
further analysis.
ANS:
Network programming: It involves writing programs that communicate with other programs
across a computer network.
Automation of data
Retrieval of dynamic and static web pages
Transformation of page contents
Quick recognition of semantic annotation
Collection of accurate & reliable data
Easy price analysis
Develop business intelligence