CS 206 Final Term Notes by AC 03222254114
CS 206 Final Term Notes by AC 03222254114
4
Topic 73: Digital Subscriber Line (DSL)
11
"Digital subscriber line (DSL) is an alternative technology for sending and
receiving data to and from an ISP, using the same old phone line, but running at
54
much faster speeds."
22
"Also, you can make phones calls and surf (send IP packets) at the same time."
"DSL allows the same old analog voice signal to be sent over the line by a phone.
22
At the same time, DSL allows a separate digital signal to go over the same phone
line."
03
"The DSLAM splits out the digital signal and analog signal from the local loop."
"Fiber optics connects the cable head end to neighborhood-level junctions, from
ns
frequency bands."
"The second 'A' in AAA is for Authorization. It refers to the process of figuring out
what a particular user is allowed to do."
ca
"The last 'A' in AAA is accounting. The same servers that perform authentication
A
"ISPs authenticate users before they can even use the network."
"Password Authentication Protocol (PAP) and Challenge Handshake
Authentication Protocol (CHAP) are used by ISPs."
4
"To protect against password theft, CHAP does not send the password as clear-
11
text."
54
"CHAP uses six steps to authenticate the user."
2
22
"Encryption allows a computer to apply a mathematical formula to data."
32
"These days, it is common for users to encrypt data before sending it over the
0
Internet."
nt
"VPNs create a private network, but they do so logically, or virtually."
lta
"For Barney to use the VPN, he must encrypt the packet as he creates it."
"A VPN device inside the corporate network is called a VPN concentrator."
su
"When you connect an enterprise network to the Internet, one of the first things
you must decide is what you want to allow to pass to and from the Internet."
ic
"To secure Fredsco's network, two things have to be kept in mind: Between which
m
two hosts do packets need to flow? Which host begins that communication?"
de
"Traffic that is typically not allowed between an enterprise and the Internet."
A
"A network engineer configures the firewall with a set of rules that tells it what's
V
"The firewall allows some packets to pass through it and discards others to
enforce the rules."
"As a firewall watches the traffic entering the network, it knows the nature of the
4
traffic that is allowed to flow through it."
11
"A host who is initiating a new flow can be recognized by looking at: The first TCP
54
segment used to create a TCP connection SYN flag bit =1, and source IP address
of the packet."
2
"Firewalls are like routers. They forward packets based on destination IP
22
address."
32
"They have at least two physical interfaces. They can have more than two
interfaces. Outside interface connects to Internet. Inside interface connects to
0
internal network."
nt
"A third interface connected to a LAN called a demilitarized zone (DMZ),
somewhere between inside & outside interfaces."
lta
"With a DMZ, Internet-accessible servers can be placed on a different LAN."
su
"A stronger firewall rule: No TCP connections can be initiated from outside to the
inside. The only flows allowed are for servers in the DMZ."
n
Co
"They look for things in the packets to determine if someone is cheating the
ic
"Some IDS devices sit in the network, watching packets that pass over a LAN and
de
"Those IDS software that sit on the servers are called host-based IDSs."
ca
For Topic 80: Introduction to Wireshark, here are some important lines:
A
U
4
"Features of Wireshark: available for UNIX and Windows, live packet data capture,
11
detailed protocol information display, packet filtering, and saving captured packet
data."
54
"Installation components of Wireshark: Wireshark (the analyzer), TShark
(command-line analyzer), plugins & extensions, tools, and user's guide."
2
22
Description and features of the main window in Wireshark.
0 32
"A service is not running on a server or perhaps a firewall is preventing the
connection." nt
"TCP connection refusals may also be due to a closed port."
lta
"Connection Blocked by a Host-Based or Network Firewall"
su
m
de
"Content Redirection"
4
"Asymmetric Routing"
11
"Packet Loss"
54
"High Path Latency"
2
22
"Lousy Routing Path"
"Bandwidth Throttling"
32
"Delayed ACK"
0
"Queued Packets (Overloaded Router)"
"Switch Loop"
n
Co
"Client Misconfiguration"
U
"Slow Application"
Topic 87: A Four-Part Analysis Methodology:
4
11
Task 3: Capture and analyze packet flows
54
Topic 88: Using a Troubleshooting Checklist:
2
Verify Trace File Integrity and Basic Communications
22
Focus on Complaining User's Traffic
32
Detect and Prioritize Delays
0
Look for Throughput Issues
nt
Check Miscellaneous Traffic Characteristics
lta
Determine TCP Connection Issues/Capabilities for TCP-Based Applications
Setting the time display format to measure delta time between packets
4
11
Applying a display filter based on a host address, subnet address, or
conversation
54
Extracting and saving specific conversations to separate trace files
2
Topic 93: Wireshark Lab 5 - Applying a Filter Using Port Number:
22
Defining a display filter based on an application name or port number
32
Filtering traffic based on port numbers or application names
0
Identifying packets containing specific field values using display filters
nt
Applying a filter based on field names (e.g., HTTP request method)
lta
Using right-click to apply a filter based on a field value
su
Topic 95:
n
Wireshark Lab 7 focuses on locating buffer problems using the Calculated Window Size
Co
Step 2: Expand any TCP header in the Packet Details pane. Right-click on the Calculated
window size field and select "Prepare a Filter | Selected."
de
Step 3: Change the display filter value to "tcp.window_size < 1000" and click Apply. This
ca
filter will display Packet 374, where the client is advertising a 536-byte receive buffer.
The purpose of this exercise is to understand the impact of a low Window Size value on
V
data transmission. When the Window Size value reaches zero, the host cannot accept
any more data, leading to a Zero Window condition. In Packet 374, the client's window
size is only 536 bytes, which means it can't accept more data. Consequently, data
transmission is halted until the client's buffer size increases.
Topic 96:
4
Wireshark. Here are the steps:
11
54
Step 1: Open the file "tr-general.pcapng" in Wireshark.
2
Step 2: In the display filter area, type "! tcp && !arp" and click Apply. This filter excludes
22
TCP and ARP traffic, displaying 40 packets that match the filter.
Step 3: To remove DNS and DHCP from view, expand the filter by adding "&& !dns &&
32
!bootp." This will further narrow down the displayed packets to eight.
By applying these filters, you can isolate and analyze specific types of traffic, allowing
0
you to focus on anomalies or specific network behavior.
nt
lta
Topic 97:
su
Wireshark Lab 9 demonstrates how to create filter expression buttons in Wireshark. The
steps involved are:
n
Co
Step 2: Right-click on the TCP header of Packet 11 (the first SYN packet) and select
ic
Step 3: Right-click on the "SYN: Set" line and select "Prepare a Filter | Selected."
de
Wireshark will place the first part of the filter in the display filter area.
Step 4: Scroll down to the TCP Options area and click on the "TCP SACK Permitted
ca
Option: True" line. This will display "tcp.options.sack_perm" in the Status Bar area.
A
Step 6: Add "|| !tcp.options.wscale.multiplier" and put parentheses around the options.
V
Step 7: Click the Save button, name your new button "TCP-HS," and click OK.
Step 8: Click your new TCP-HS button to display the 38 packets that match the filter.
By creating filter expression buttons, you can quickly apply display filters to your traffic,
allowing you to identify common network problems or specific packet characteristics.
4
Topic 98:
11
Wireshark Lab 10 explains how to launch and navigate through the Expert Infos in
54
Wireshark. The steps are as follows:
2
22
Step 1: Open the file "tr-twohosts.pcapng" in Wireshark.
Step 2: Click the Expert Infos button in the bottom left corner of the Status Bar. This will
32
open the Expert Infos window.
Step 3: The Expert Infos window is divided into six tabs: Errors, Warnings, Notes, Chats,
0
Details, and Packet Comments. Explore these.
"The Time Since Request (http.time) field indicates the HTTP response time was
n
"To find the actual HTTP response time, in the Packet Details pane of any packet,
right-click the TCP header, select Protocol Preferences and toggle off the Allow
subdissector to reassemble TCP streams preference setting."
ic
"Now click the Go to First Packet button. Notice we see that Packet 6 actually
m
contains the 200 OK response. Examine the HTTP response time value in Packet
de
"We are interested in the most active TCP conversation (in bytes) in this trace file.
A
Click the TCP tab and then click the Bytes column heading twice to sort from
high to low."
U
"Right-click on this top conversation and select Apply as Filter | Selected A <- >B.
Wireshark applies the filter and displays the 123 packets of this conversation."
"By default, Wireshark displays the packets per second rate (packet per tick with
4
a default tick rate of one second)."
11
"Click on the first drop in throughput in the graph. Wireshark jumps to that point
54
in the trace file so we can investigate the problem further."
"Click on the second problem point in the graph. From Wireshark’s window, we
2
can see what is happening at this point in the file download process."
22
Topic 102: Wireshark Lab 14
32
"Let’s build a coloring rule to highlight DNS errors."
"When the Reply Code field inside the Flags section contains a 0, the DNS
0
response was successful. If it contains any other value, the response indicates
there is a DNS error."
nt
lta
"Right-click on the Reply Code field and select Colorize with Filter | New Coloring
Rule."
su
"Enter DNS Errors as the name of your new coloring rule. Change the String value
to dns.flags.rcode > 0."
n
Co
"Your new coloring rule appears at the top of the list of color filters. Packets are
processed in order through this list. Now, DNS errors will appear with an orange
background."
ic
"With dns filter still in place, scroll through the packets to see if you notice the
m
two DNS errors in the trace file. Packets 83 & 84 appear with orange."
de
"In order to capture the traffic between the client and the upstream switch (and
ultimately a remote host), you need to either (a) Install Wireshark or another
U
capture tool on the user's machine, (b) Make the switch send a copy of the traffic
down your analyzer port, or (c) Tap in and obtain a copy of the traffic between the
V
"Use a Test Access Port ('Tap'): A tap is a simple device that copies all the traffic
4
flowing through it (including those corrupt packets) out to a monitor port."
11
Topic 104: Wireshark Lab 15
54
"You are lucky if your native WLAN adapter can capture WLAN Management and
Control traffic. In Monitor Mode, you should be able to see traffic from any
network as well."
2
22
"To test the capture capabilities of your WLAN Native Adapter, follow the given
steps."
32
"If your native adapter is suitable for network capture, you should see some
WLAN management and Control traffic (such as Beacon packets and Probe
0
Request/Probe Response packets)."
nt
"Also, when you look at the data packets you should see an 802.11 header on the
data packets. If your adapter strips off the 802.11 header, Wireshark will apply an
lta
Ethernet header. In case, you do not see these traffic types or characteristics,
consider another solution for WLAN capture."
su
"Capturing to file sets is an important task when you are working in high traffic
Co
situations."
"File sets are groups of trace files that are linked based on their file name."
ic
"In this lab exercise, we will use an autostop condition to only capture three files."
m
"Capture filters can reduce the traffic that you need to examine."
ca
"Here, we will create and use a capture filter based on the MAC address."
A
"This will enable us to see all of the traffic to or from our machine."
"The first step of any analysis process is to verify that the hosts are able to
V
communicate and you can see their traffic in the trace file."
"If hosts are not able to communicate, there can be several reasons for this."
"Check Your Capture Process: If you do not see any traffic, something may have
gone wrong during the capture process."
4
basic resolution process to build the packet to communicate with another host
11
on a TCP/IP network."
54
"If a client does not know the IP address of a target (either in cache or a local
hosts file), the client can send a DNS query to obtain this information."
2
22
"Step 2: Type dns in the display filter area and click Apply."
"You can observe from the Status Bar that 32 packets match this filter."
32
"From the Info column, you can see a number of No Such Name responses
0
indicating the name resolution process failed."
"If the client does not have the MAC address information in cache, the client
sends out an Address Resolution Protocol (ARP) request."
n
Co
"If no response is received when trying to acquire the local target's MAC address,
the client is done."
"Step 2: Scroll through this trace file. Look at the ARP requests sent to discover
ic
"There are several reasons why a server may not respond to a TCP connection
attempt."
ca
"The TCP handshake request packet (SYN) may not arrive at the server."
A
"A firewall along the path dropped the SYN packet, or a host-based firewall on the
server blocked access to the port."
V
"Step 2: Scroll through this trace file. This trace file contains only SYN packets
from 192.168.1.72 to 192.168.1.66. None of the SYN packets have received
SYN/ACK responses."
4
11
"The client requests the default file from the web site's root directory in Packet
4."
54
"Packet 5 contains acknowledgment no. 288, which indicates that the server has
received every sequence no. up to 287, and it expects sequence no. 288 next."
2
22
"The client's browser appears to time out and sends a FIN/ACK after almost 8
seconds."
32
"The client waits almost 120 seconds before sending a RST/ACK."
0
"The symptoms indicate the application has failed at the server side."
nt
Topic 112: Do not Focus on Acceptable Delays
lta
"You can safely ignore some delays in your trace files."
su
"A large delay before the SYN/ACK is an indication of a high round trip time
between the hosts."
ic
"Time between SYN/ACK and client’s ACK to finish TCP handshake can be used
m
"If you observe that a server quickly sent an ACK to a client's request, but there is
de
a long delay before the server’s response, then this is not a path latency issue."
ca
"There can be several reasons for delays that occur during a file download or file
upload process."
A
"This situation arises when ACKs from a receiver get delayed because of the path
U
"A host must wait for a Window Update before sending a packet if it finds that
the Window Size advertised is too small to fit a full-sized data segment."
"UDP conversation statistics such as packet rate, bps rate, etc. can be obtained
4
with Conversations Window."
11
Topic 115: Wireshark Lab 23
54
"In Wireshark, the default Time column setting is Seconds Since Beginning of
Capture."
2
"It becomes easier to locate delays when a time column displays delta times."
22
"We can locate the largest delays in a trace file by sorting the delta time column."
32
Topic 116: Wireshark Lab 24
0
time column."
nt
"Let’s create such a time column to show the delta times of DNS traffic only."
lta
"Cause for Delays: If a local DNS server does not have these names in its cache,
it needs to perform recursive queries to obtain the data."
su
Step 5: Select the MAX(*) Graph 1 Calc option and enter frame.time_delta_displayed in
Co
Step 6: Click the Graph 1 button to plot the results. If your trace file contains both UDP
ic
and TCP-based traffics and you want to plot UDP delays, then enter udp in the Graph 1
filter area before you click the Graph 1 button.
m
There is a sudden increase in the delta time at approx. 1.2 seconds of the trace file. On
de
clicking these points, Wireshark jumps to that point in the trace file and enables to do
additional analysis.
ca
A
Step 4: Right-click on the top entry and select Apply as Filter | Selected | A <–> B.
Wireshark creates a filter based on the source/destination address and
V
Step 5: Click Clear to remove your filter when you are finished. If there are many TCP
conversations contained in your trace file, the method we learned in this topic can be
used to find the most active conversation and then quickly apply a filter on that
conversation.
4
11
Topic 119: Wireshark Lab 27 (Filtering TCP Conversations by Stream Index)
54
Step 3: Right-click on the [Stream index: 7] field in the TCP header. Select Apply as Filter
| Selected.
2
We can see that Wireshark creates a filter for tcp.stream==7 in the filter display area
22
and applies it to the trace file. There are 66 packets matching this filter as indicated on
the Status Bar.
0 32
Topic 120: Wireshark Lab 28 (Adding TCP Stream Index Column)
nt
Step 2: Expand the TCP header in Packet 1. Right-click on the [Stream index: 0] line and
select Apply as Column.
lta
Step 3: Click on your Stream index column once to sort the trace file by conversations.
su
Jump to the end of the trace file and you find that there are 23 TCP conversations.
Counting TCP streams starts at 0.
n
Co
Step 2: Expand the TCP header in Packet 1. Right click anywhere on the TCP header,
ic
enabled.
de
Step 3: At the end of the TCP header, go to the [Timestamps] section, locate and right-
click on the Time since previous frame in this TCP stream field. Select Apply as Column.
ca
Step 6: Click the new TCP Delta column heading twice to sort from high to low. The
packets with the largest delays before them in a TCP conversation appear at the top of
A
the list.
U
Step 2: In the display filter area, enter the following filter: tcp.time_delta > 1
Step 3: Click the Save button on the display filter toolbar. Enter TCP Delay as the
label when prompted. Click OK to save your new button.
Step 4: Click your new TCP Delay button. You will find that 37 packets match the
filter.
4
Step 5: Select Edit | Preferences | Filter Expressions, update TCP Delay filter
11
expression to: tcp.time_delta > 1 && tcp.flags.fin==0 && tcp.flags.reset==0 and
then click OK.
54
Step 6: Click your TCP Delay button again. 23 packets are displayed because TCP
FIN and RST packets have been removed. Let’s further remove HTTP GET
2
requests from the TCP Delay button. Add the following string to the end of your
22
filter: && !http.request.method=="GET". The highest TCP Delta delay is under 6
seconds and is a SYN retransmission pkt. There are 12 SYN retransmissions
32
between the client and 184.73.250.227. There is one SYN/ACK as the RTT is
1.28957 seconds.
0
Topic 123: Wireshark Lab 31: nt
Step 2: Enter tcp.flags.syn==1 in the display filter area and then click Apply.
lta
Step 3: Click your TCP Delta column heading twice to sort from high to low. We
are interested in the delays preceding SYN/ACK packets.
su
We can see that there are three packets that are marked as Retransmissions.
n
The SYN/ACK packet can be detected by applying the filter: tcp.flags.syn==1 &&
tcp.flags.ack==1.
m
Step 2: Enter the filter tcp.flags.syn==1 in the display filter area and then click
Apply.
V
The first two packets are sent from the client port 35,621. Packet 3 and Packet 4
are the first two packets of a new TCP connection.
The RTT is about 17 ms between the TCP SYN from port 35,622 and the
SYN/ACK to that same port.
4
tcp.ack==1) and click Apply.
11
Step 4: Enhance the filter with the conditions (tcp.flags.syn==1 &&
tcp.flags.ack==1) || (tcp.seq==1 && tcp.ack==1) && tcp.len==0 &&
54
tcp.flags.fin==0.
2
22
Step 2: Select Statistics | IO Graph.
32
Step 4: Select the MAX(*) Graph 1 Calc option and enter tcp.time_delta in the
0
Calc area.
nt
Step 5: Click the Graph 1 button to graph the results.
lta
From the graph, a spike in the RTT values around 25 seconds can be observed.
Step 2: Packet 3 is the first DNS response packet in the trace file. Expand the
Domain Name System (response) section.
ic
Step 3: Right-click on the [Time: 0.107083000 seconds] line and click Apply as
Column.
m
Step 4: The newly created column appears to the left of the Info column. Drag the
de
Step 5: Right-click on the new column heading, select Edit Column Details, and
rename the new column to DNS Delta.
A
Step 6: Click the DNS Delta column heading twice to sort it from high to low.
U
Step 2: Type dns.time > 1 in the display filter area and click Save.
4
11
Step 3: In the Y Axis Unit area, select Advanced...
Step 4: Select the MAX(*) Graph 1 Calc option and enter dns.time in the Calc area.
54
Step 5: Click the Graph 1 button to plot the results.
2
Step 6: Click on the highest point in the graph to locate the corresponding packet
22
(in this case, packet 3).
32
Topic 130: Wireshark Lab 37:
Step 2: Right-click on the TCP header in Packet 5 and select Protocol Preferences.
0
Uncheck "Allow subdissector to reassemble TCP streams" to disable it.
"Expand Subtrees".
Step 3: Right-click on the "[Time since request: 0.026416000 seconds]" line and
n
select "Apply as Column".
Co
Step 5: Right-click on the column heading, select "Edit Column Details", and
ic
rename it to "HTTP Delta".
m
Step 6: Click the "HTTP Delta" column heading twice to sort HTTP responses
de
Step 2: Type "http.time > 1" in the display filter area and click Save. Name the
A
4
Topic 134: Wireshark Lab 41:
11
Step 2: The first SMB response packet is Packet 5 (Negotiate Protocol
54
Response).
Step 3: Expand the SMB section and the SMB Header section of Packet 5. Right-
2
click on the "[Time from request: 0.000766000 seconds]" line and click "Apply as
22
Column".
32
Step 5: Right-click on the column heading, select "Edit Column Details", and
0
rename it to "SMB Delta".
low.
nt
Step 6: Click the "SMB Delta" column heading twice to sort packets from high to
lta
Topic 135: Wireshark Lab 42:
n su
Step 2: Select Statistics | Service Response Time | SMB. Click "Create Stat"
Co
The SMB Service Response Time statistics window shows the minimum,
maximum, and average Service Response Time (SRT).
ic
Step 2: Type "smb.time > 1 || smb2.time > 1" in the display filter area and click
ca
Step 4: Select the MAX(*) Graph 1 Calc option and enter "smb.time" in the Calc
area.
Step 5: Click the Graph 1 button to plot the SMB response times.
Step 7: Clicking on the highest points in the graph will take you to the
corresponding packets for further analysis.
4
Topic 138: Wireshark's Expert Infos System:
11
Wireshark's Expert Infos System provides alerts and packet comments for
54
network concerns seen in the trace file.
The Expert Infos button in the Status Bar opens the Expert Infos window.
2
22
Expert infos are classified into categories: Errors, Warnings, Notes, Chats, Details,
and Packet Comments.
32
Topic 139: Wireshark's Packet Loss Detection:
0
switches or routers.
nt
Wireshark uses the TCP sequencing process to detect lost packets.
lta
The nextseq value is used to determine the next expected sequence number, and
Wireshark detects lost packets when the sequence number jumps beyond
su
nextseq.
n
TCP provides packet loss recovery mechanisms, while UDP does not.
The columns help determine the number of lost packets when Wireshark
4
displays "Previous Segment Not Captured."
11
The mismatch between SEQ# and NEXTSEQ# values indicates lost packets.
54
Topic 143: Wireshark Lab 47:
A bad TCP filter expression is built in Wireshark to view key TCP problems.
2
22
The expression is tcp.analysis.flags && !tcp.analysis.window_update.
The Bad TCP button is created to apply the filter and view packets matching the
32
expression.
0
Expert Infos in Wireshark are used to find packet loss counts.
nt
The Warnings tab shows 5 packet losses due to a sudden jump in sequence
lta
numbers.
su
The Expert Infos window can be expanded to analyze specific packet problems.
Duplicate ACKs indicate Fast Recovery and request sequence number 9,164,761.
m
Duplicate ACKs inform the sender about packet loss or indicate out-of-order
packets.
A
Duplicate ACKs are generated if Fast Recovery is supported and a packet arrives
with a sequence number beyond the calculated next sequence number.
U
Out-of-Order packets are marked if the missing sequence number packet arrives
within 3 ms.
4
11
Wireshark detects 1,019 Duplicate ACKs.
The Duplicate ACKs are requests for a single missing packet with sequence
54
number 9,164,761.
2
Topic 148: Wireshark Lab 51:
22
The Expert Infos window is used to find Duplicate ACKs.
32
Duplicate ACKs are grouped based on their number.
Fast Recovery process is launched multiple times, and recovery occurs with
0
varying numbers of Duplicate ACKs.
nt
The TCP receiver requested the missing packet 809 times, indicating a
significant recovery time.
lta
Topic 149: Wireshark Lab 52:
su
SACK Left Edge (SLE) and SACK Right Edge (SRE) information can be found in
ic
TCP cannot pass received data to the application layer until all bytes are in the
correct order.
ca
the sequence number value, and arrives within 3 ms of the highest sequence
number seen.
U
4
identified as out-of-order packets and the remaining 6 packets as a group of out-
11
of-order packets in close proximity.
Multiple out-of-order packets in close proximity suggest a set of lost packets that
54
are retransmissions arriving within 3 ms.
2
22
The Expert Infos window is used to find out-of-order packets in Wireshark.
The Out-of-Order segment section is expanded to locate the first entry and
32
examine the packet.
0
Sequence number (SEQ#) and Next Sequence Number (NSEQ#) columns are
created to analyze the order of packets. nt
The out-of-order packet arrived 85 microseconds after the previous packet.
lta
Topic 153: Causes of Fast Retransmissions:
su
Fast retransmissions occur when three identical ACKs (original ACK and two
Duplicate ACKs) arrive at the receiving host.
n
Co
Fast retransmissions are a sign of packet loss and are part of the Fast Recovery
m
process.
de
packets in Wireshark.
Wireshark has detected two Fast Retransmissions in the provided trace file.
U
Expert Infos in Wireshark mark the Fast Retransmission packet and indicate it as
V
a Retransmission.
The first entry (Packet 12,035) in the Fast Retransmissions section is examined.
There are 808 Duplicate ACKs before the Fast Retransmission packet.
4
11
The Fast Retransmission occurred within 20 ms of the last Duplicate ACK.
54
Wireshark considers a packet to be a Retransmission if it meets certain criteria,
2
such as containing data or having the SYN/FIN bits set.
22
Retransmissions can be triggered by a Retransmission Time Out (RTO) at the
sender.
32
The RTO timer is used to ensure data delivery continues even if the TCP peer
stops communicating.
0
The sender retransmits the unacknowledged data packet if the RTO timer expires
nt
without receiving an ACK.
lta
Topic 157: Wireshark Lab 57:
su
Wireshark detected 580 Retransmissions in the trace file, including two Fast
ic
Retransmissions.
m
ACKed Unseen Segments occur when Wireshark sees an ACK but did not see the
U
4
Topic 161: Wireshark Lab 60:
11
Expert Infos in Wireshark are used to find ACKed Unseen Segment indications.
54
The first entry, Packet 15, is examined in the Warnings tab.
2
Topic 162: Causes of Keep Alives:
22
Keep Alives are TCP packets used to detect dead connections, dead TCP peers,
and prevent connection termination when idle.
32
Wireshark detects Keep Alives by tracking the Sequence Number field values in
TCP streams.
0
Applications written to use Keep Alives generate them, and three parameters are
nt
defined: Keep Alive Time, Keep Alive Interval, and Keep Alive Probes.
lta
Topic 163: Wireshark Lab 61:
su
Only two packets match the filter in the provided trace file.
Co
Expert Infos in Wireshark are used to find Keep Alive/Keep Alive ACK packets.
ic
m
Keep Alives and Keep Alive ACKs are used to check for dead TCP peers and
avoid timeouts of idle connections.
de
Keep Alive Packets used in Zero Window Conditions are identified in Wireshark.
TCP hosts can send Keep Alives when the peer is advertising a Zero Window
U
condition.
V
Wireshark marks SYN packets with the Reused Ports Expert Analysis definition
4
when it detects a previous SYN packet with the same IP address/port number
11
combination.
54
The filter tcp.analysis.reused_ports is used to count reused port packets in
Wireshark.
2
22
Wireshark detects one reused port in the provided trace file.
The [SEQ/ACK analysis] section of the reused port packet (number 317) is
32
expanded and colored cyan.
0
Topic 168: Wireshark Lab 75:
nt
Expert Infos in Wireshark are used to find reused port packets.
lta
Packet 317 is identified as a SYN packet with a reused port.
The sequence number field is used to determine if the SYN packet belongs to a
su
Faulty Network Interface Cards (NICs) or devices that alter packet content can
ic
Checksum validation for IPv4, TCP, and UDP can be enabled in Wireshark's
Preferences.
A
Packets with bad IPv4, TCP, and UDP checksums are highlighted in the Packet
U
List pane.
V
Expert Infos in Wireshark display the number of bad checksums for each
protocol.
Topic 171: Wireshark Lab 77:
DNS errors include server failure (Reply Code 2) and name error (Non-Existent
Domain, Reply Code 3).
4
Creating a button in Wireshark can help identify DNS errors.
11
The filter dns.flags.rcode > 0 is used to locate DNS error packets.
54
DNS error responses can be due to a server upstream from the local server not
responding to recursive DNS queries.
2
22
Topic 172: Wireshark Lab 78:
A button is created to identify HTTP errors in trace files using the filter
32
http.response.code >= 400.
Clicking the button identifies the two HTTP error responses in the trace file (404
0
"Not Found" errors).
nt
Packet 61 is analyzed using the Follow TCP Stream option to determine the item
lta
that was not found on the server.
Packet Tracer is a network simulator from Cisco that allows users to simulate
n
Packet Tracer has two operating modes: real-time mode and simulation mode.
ic
The latest version of Packet Tracer can be downloaded for free from the given
m
website.
de
The layout of Packet Tracer includes components like the menu bar, main toolbar,
ca
The user-created packet box and network component box are used to create
U
Steps are provided for creating a simple topology in Packet Tracer, including
selecting end devices, connecting them using Copper Cross-Over, configuring IP
addresses, and testing connectivity.
4
"Routers, switches are used to Interconnect end devices such as PCs, laptops,
11
servers."
54
Description of various Cisco routers and their specifications.
2
22
Explanation of Bridge PT, Generic Switch PT, Hub PT, Repeater PT, and Coaxial
Splitter PT.
32
Topic 177: Customizing Devices with Modules
0
Tracer.
Description of accessing CLI through the CLI Tab and Console port.
n
Co
Explanation of configuring routers and switches using the Config tab in Packet
Tracer.
ic
m
"End devices (PCs, servers) are the ones that use this core."
U
4
"DNS service: resolves domain names to IP addresses."
11
"AAA service: Authentication, Authorization, and Accounting and supports
54
RADIUS and TACACS authentication protocols."
"NTP: Network Time Protocol ensures that the clocks of all devices are
2
synchronized properly."
22
"EMAIL services: SMTP and POP3 services are supported."
32
"FTP Services: Users can be created and permissions can be granted to them."
0
source/destination port numbers."
"IP Configuration: With this utility, you can assign a dynamic or static IP address
to an end device."
n
"Dial-up: End devices such as PC-PT and Laptop-PT have the PC-HOST-NM-1AM.
Co
"Terminal: This utility can be used for accessing the CLI through the console
ic
port."
m
"VPN: Virtual private network (VPN) is used to create a connection for secure
communication."
ca
"Email: You can send and receive emails with the help of this utility."
A
"Text Editor: You can use this utility to create, edit, and save text files."
U
"In Packet Tracer’s simulation mode, you can observe packets flowing from one
device to another."
"Step 5: Click on the real time/simulation tab and switch to the simulation mode."
"Step 6: Click on the Auto Capture / Play button. Packet capture begins."
"To view a packet’s TCP/IP layers information, click on a packet (the envelope
icon)."
4
"The simulation mode has control buttons: Back, Auto Capture / Play,
11
Capture/Forward."
54
Topic 183: Connecting Devices and Link Status
"In Packet Tracer, there are a number of cables available to connect devices."
2
22
"Console: The console port of a network device can be connected to the RS-232
port on a PC/laptop."
32
"Copper straight-through: It is a standard Ethernet cable that connects devices
operating in different layers of the OSI model."
0
"Copper cross-over: This Ethernet cable connects devices such as hub to hub, PC
to PC, PC to router, and PC to printer."
nt
lta
"Fiber: Connects Fast Ethernet and Gigabit Ethernet ports of a fiber port."
"Link status: Once you have connected devices together, you will find a light, at
n
"Simple PDU: The Add Simple PDU tool relies on Internet Control Message
Protocol (ICMP)."
de
Complex PDU."
"Clustering combines several devices that you choose into a single cloud icon."
U
"Upon double-clicking the cluster, it will get expanded and will display the devices
V
normally."
"Step 1: Let’s create a topology that consists of three switches and nine PCs."
"Step 2: Combine PC0, PC1, PC2 and Switch0."
"Step 4: Repeat the same procedure done in Steps 2 and 3 for combining PC6,
4
PC7, PC8 and Switch2."
11
"Double-clicking on a cluster expands it and displays only the devices within it."
54
Topic 186: Creating Cities, Offices & Wiring Closets
2
"Packet Tracer can simulate the required environment logically and physically."
22
"There are 4 environments available in the physical workspace: Intercity, City,
Building, and Wiring closet."
32
"1-Intercity: Being the largest environment, it consists of cities. You can create
cities, buildings, and wiring closets in this layer."
0
"2-Cities: Buildings and wiring closets are part of it."
nt
"3-Buildings: It contains only wiring closets."
lta
"4-Wiring closet: This layer contains only devices."
su
"Step 2: As Ethernet has distance restrictions, switch off both the PCs and
Co
"Step 3: Connect both of the PCs with a fiber cable and assign IP addresses."
ic
"Step 4: Switch to the physical view, and click on the New City button. Rename it
m
Lahore."
"Step 5: Use the NAVIGATION button and go to Home City | Corporate Office |
de
Main Wiring Closet. Both the PCs we inserted in the logical workspace are
located here."
ca
"Step 6: Use the Move Object button and move one of the PCs to Lahore| Office
A
"In physical view, we can measure a cable’s distance by placing the pointer on the
cable."
"The length of Standard copper Ethernet cables can extend up to 100 meters."
"Step 1: Create a topology consisting of two PCs in the logical workspace."
"Step 2: Connect both of the PCs with a copper cable and assign IP addresses."
"Step 3: Switch to the physical view, and click on the New City button. Rename it
4
Lahore."
11
"Step 6: Check the distance between them. In case the distance is less than 100
54
meters, move them further apart, so that the distance becomes greater than 100
meters."
2
Topic 188: Static Routing with GUI
22
"In static routing algorithms, routes change very slowly over time, often as a
result of human intervention."
32
"Step 1: Drag and drop 4 routers in the workspace."
0
"Step 2: Click on a router icon, go to the Config tab, select an interface, and
configure the IP address."
nt
lta
"Step 3: Now go to the ROUTING section, and click on Static."
"Step 4: Test the connectivity between all of the routers with the help of simple
su
PDU."
n
"Step 5: Let’s view the routing table of a router. Go to the Common tools bar, click
Co
on the inspect icon. Select a router and click on it. Then select Routing Table."
"Step 2: Click on a router icon, go to the CLI tab. As the device boots up, then you
will see the prompt."
de
"Step 5: Test the connectivity between all of the routers with the help of simple
PDU."
U
"Dynamic Routing Protocols: A) Form 'neighbor ship' with other routers. B) Send
them the directly-connected routes and other received routes."
"A GUI to configure a dynamic routing protocol called Routing Information
Protocol (RIP) is available in Packet Tracer."
4
"Step 2: Click on a router icon, go to the Config tab, select an interface, and
11
configure the IP address."
54
"Step 3: Click on RIP. Enter Network IP of its own interfaces."
"Step 4: Once the topology is configured, use the simple PDU to check for
2
connectivity."
22
"Step 5: Use the delete tool and remove one link. Let’s say we remove the link
between R1 and R2. Use the simulation mode and test connectivity with the
32
simple PDU. The packet takes the alternate, longer route and succeeds in
reaching the destination."
0
Topic 191: Configuring RIP with CLI nt
"Let’s assume a network consisting of four routers in a ring topology, with no PCs
lta
or loopback interfaces."
su
"Step 2: Click on a router icon, go to the CLI tab. As the device boots up, then you
n
"Repeat Step 3 for the remaining routers with the following configurations for
ic
their interfaces:"
m
"Step 6: Test the connectivity between all of the routers with the help of simple
PDU."
A
"When a source router has multiple paths to a target path, then it can load
balance traffic across them."
V
"Assume a network that consists of four routers in a ring topology with no PCs."
"Step 1: Drag and drop 4 routers in the workspace."
14
"Step 4: On Router 4, let’s add a loopback interface (a virtual interface that works
41
like a real interface and needs IP address)."
"Step 5: Go to the RIP config mode and enter the network IP for this loopback
5
interface."
22
"Step 6: Create a complex PDU that is sent every two seconds."
2
"Step 7: Turn on the simulation mode. You will find that the first packet takes the
32
R1-R2-R4 route while the second takes the R1-R3-R4 route."
0
Topic 185: Clustering a Topology nt
ta
Topic 186: Creating Cities, Offices & Wiring Closets
ul
4
11
9. Topic 81: Five Common Network Problems
54
11. Topic 83: Next 6 Common Network Problems
2
12. Topic 84: Next 4 Common Network Problems
22
13. Topic 85: Next 5 Common Network Problems
32
14. Topic 86: Next 8 Common Network Problems
0
15. Topic 87: A Four-Part Analysis Methodology
nt
16. Topic 88: Using a Troubleshooting Checklist
lta
17. Topic 89: Wireshark Lab 1
4
11
34. Topic 106: Wireshark Lab 17
54
36. Topic 108: Wireshark Lab 18
2
37. Topic 109: Wireshark Lab 19
22
38. Topic 110: Wireshark Lab 20
32
39. Topic 111: Wireshark Lab 21
0
40. Topic 112: Do not Focus on Acceptable Delays
nt
41. Topic 113: Watch for the Delays that DO Matter
lta
42. Topic 114: Wireshark Lab 22
4
11
2 54
22
0 32
nt
lta
n su
Co
ic
m
de
ca
A
U
V