0% found this document useful (0 votes)
3 views

Module 01

Module 01 of the Absolute Beginners lab guide introduces basic networking concepts, focusing on the process of computing communication and the OSI reference model, which consists of seven layers responsible for various tasks in data transmission. It explains the roles of each layer, including application, transport, and network layers, and highlights important protocols like HTTP, TCP, and IP. The module also covers encapsulation and decapsulation processes, emphasizing the significance of headers in data communication.

Uploaded by

srevuelta.es
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Module 01

Module 01 of the Absolute Beginners lab guide introduces basic networking concepts, focusing on the process of computing communication and the OSI reference model, which consists of seven layers responsible for various tasks in data transmission. It explains the roles of each layer, including application, transport, and network layers, and highlights important protocols like HTTP, TCP, and IP. The module also covers encapsulation and decapsulation processes, emphasizing the significance of headers in data communication.

Uploaded by

srevuelta.es
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Absolute Beginners lab guide

Module 01

Module 01 – Basic Networking Concepts

Being online in today’s world is nearly a universal assumption. Today you see computers,
smartphones, tablets, printers, automobiles, refrigerators and a growing number of other
devices already able to connect to digital networks. There is almost no limit to what you can
do remotely now.

What is networking?

Taking high-definition pictures from your smartphone is a good thing but it worth nothing if
you cannot share them with the world. The action to move data out of your smartphone is an
example of computing communication.
Computing communication is then the process of sending or receiving data from other
computing entities. Network computing is the engineering that makes this happen.
Network computing is all the infrastructure – both physical hardware and virtual software - all
working together to create bridges, paths, and highways where data is transport.

How networking works?

Humans use implicit rules and procedures to communicate. Consider the following example.
Alice meets Bob for the first time, and starts the conversation by saying “Good morning, my
name is Alice”. Bob replies “Good morning Alice, my name is Bob”
This brief conversation is a procedure. Notice that Alice starts the communication with a
greeting and then she identifies herself. Bob’s reply is also a procedure. He acknowledges
Alice, and then he identifies himself by name.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
1
Absolute Beginners lab guide
Module 01

The implicit rules in this conversation help to establish and maintain a conversation. Likewise
computing devices use rules or protocols to exchange data.

Communication layers

Humans express their ideas when they speak by generating sounds, using tongue and throat
muscles. In this example, you can clearly distinguish two levels or layers. First, the brain
formulates the message, and second the muscles move to create sounds. These two levels
inside your body have a different purpose but they work together as a team to make
communication happen.
This layered concept is powerful because it enables engineers to break down the entire
communication into different phases. It also enables engineers to assign specific tasks that
run only at a certain level. All layers then work together as a team to process a message to
be sent, or to interpret a message that has been received.

OSI reference model

The Open Systems Interconnection (OSI model) is a reference model used to define how
data communications occur on computer networks. It is divided into layers that provide
services to layers above and below.
The OSI model is made up of seven complementary but distinctly different layers, each
tasked with carrying out a discrete group of operations.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
2
Absolute Beginners lab guide
Module 01

To explain this reference model, look at this example, where a user attempts to upload a
picture into their social networking account.

• Application Layer – This layer is responsible for interacting with end users. In our
example this is the application itself that runs in the smartphone. The App provides
options to select a picture from your library or maybe to use your camera to take a
new one.

• Presentation Layer – It is responsible for coding data. In the example, this means
that the picture must be modified somehow. Maybe it is reduced in size by applying a
compression technique (such as zip).

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
3
Absolute Beginners lab guide
Module 01

• Session Layer – This is responsible for maintaining communication sessions. A


session is a conversation that includes several individual messages referring to the
same participants. In our example the App maintains a conversation with the remote
infrastructure. This conversation might permit user recognition - not all sessions
perform this task. This enables the App to present your profile with your personal
content.

• Transport Layer – This is responsible for breaking data into segments and properly
transmitting them over the network. The picture that you want to share might be a few
Megabytes long, but your smartphone will break down this file into little pieces called
segments, then sends them using the network. The other side receives the pieces
and rebuild the picture - a bit like building a puzzle.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
4
Absolute Beginners lab guide
Module 01

• Network Layer – Provides a logical addressing end to end. The sender and the
receiver must use an address. In the example your smartphone needs an address so
the network will know which device sourced the data. Also, the smartphone must
know the destination address (social network). This information is used by the
network infrastructure so it can make routing decisions - to select the best path. This
is very similar to what the postal service does. Using the address information on the
envelope, the postal service knows the identity of both sender and receiver.

• Data Link Layer – This layer is responsible for transmitting information on computers
connected to the same network. It uses a new type of addressing, different from the
one used in the network layer. This concept of using a second address could be
confusing, so let’s use an analogy to clarify some concepts.
When you send a letter to a different country or city, the postal office is involved. You
must write down the entire address. But to send a note to someone that lives in the
same building as you, there is no need to involve the postal office in the process nor
to use the whole address. You can simply use apartment numbers as source and
destination, this could be an example of local communication.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
5
Absolute Beginners lab guide
Module 01

Similarly this layer uses new addressing to communicate with devices that are part of
the same network. In our example, your smartphone uses this new address to
communicate to your modem since, both devices belong to the same network.

• Physical Layer – This is responsible for the physical operation of the network. Your
smartphone uses radio frequency to send data wirelessly to the modem. This may be
hard to imagine but wireless tech has been around for decades, Radio, TV and
cellular devices use this “magic medium” to send and receive data. This is not the
only technology used. When copper cables are used, devices translate computer data
into electrical pulses. In the case of fiber optics, it must translate the data into bursts
of light.

Note. The OSI reference model is not the only model that is used to detail computing
communication.

Headers

You have learned that computing communication is broken down into seven layers or
phases, and that each layer has a specific task. This means that each layer generates
information to be shared with the receiver. The receiver uses that information to know how to

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
6
Absolute Beginners lab guide
Module 01

process this received information. To accomplish this, computing devices uses the header
concept.
The next figure illustrates how the header process works.
The communication process starts on Layer 7. The App running in the smartphone selects
the picture to upload into the social networking. Then Layer 6 comes in and appends specific
information using its own header (Layer 6 header). The payload in this phase is referring to
the data computed by the above layer (the picture itself in this case). The next layer does a
similar process, Layer 5 appends specific information using the L5 header. The payload in
this phase refers to the L6 header plus its payload.
As you can infer, the process continues in each layer until it reaches Layer 2. In this layer
your smartphone includes a Layer 2 header and a L2 trailer. This trailer is used to verify if
the information received is complete and was not modified in transit.

Note. The combination of headers and Payload take specific names for Layers 2 through 4.
• Segment is the term that refers to L4 Header and Payload.
• Packet is the term that refers to L3 Header and Payload.
• Frame is the term that refers to L2 header, Payload and L2 trailer.

Encapsulation and Decapsulation


It is time to put all the concepts together. In the next figure you can see the Sender and the
Receiver. The communication process starts when the user selects a picture to share from
the App. Then Layer 6 compress the image, Layer 5 maintains the session, and Layer 4
divides the picture into segments. Layer 3 provides addressing end to end, Layer 2 provides
a local addressing, and finally the information is sent using the physical media. The process
used to add headers on each layer is known as encapsulation.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
7
Absolute Beginners lab guide
Module 01

When the message is received by the destination it will start the decapsulation process,
which refers to header analysis. As opposed to the encapsulation process, decapsulateion
starts from Layer 1 and moves up, through the layers, to Layer 7.
The receiver receives data from the physical media. Then it analyzes the Layer 2 header and
trailer to verify the destination of this information. It also determines if the payload has
changed somehow during transmission. Then Layer 3 analyzes the addressing and accepts
the information if it is the destination. Then Layer 4 reassembles the segments, thus
rebuilding the original photo. Layer 5 keeps track of all the individual messages and
maintains the running session. Layer 6 then knows that this photo has been compressed. It
might perform some decompression process. Finally, Layer 7 could bring up a message
indicating that the transaction has been completed.

The image also includes another important consideration. Layers from 3 to 7 maintain an
end-to-end communication. On the other hand, Layers 1 and 2 are local - the information
that is exchanged is only relative to the network that they are part of.

Important protocols

The previous lab activity introduced some of the most important protocols that are used in
networking. The next figure presents some frequently-used protocols and the associated
layer where each one works.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
8
Absolute Beginners lab guide
Module 01

Application Layer Protocols

• Hyper text Transfer Protocol (HTTP) – This protocol is the foundation for the World
Wide Web (www), where hypertexts documents include hyperlinks to other resources
that the user can easily access - for example by a mouse click or by tapping the
screen in a browser. Every time you load a web page from the Internet in your
smartphone, you are using HTTP.
• File Transfer Protocol (FTP) – This is a traditional protocol, used to transfer files
between computing entities in both directions (upload and download). This protocol
is still in use in the networking world, but typical, non-technical people do not use it
anymore1.
• Real Time Protocol (RTP) – This protocol is used to transfer voice and video data
between computing entities. Every time you start a video call with your friend, you are
using RTP to share your voice and your image.
• Trivial File Transfer Protocol (TFTP) – This is considered a light variant of the FTP
protocol; it is used to transfer files. The primary difference between these two
protocols is the Transport protocol that FTP uses TCP while TFTP uses UDP. You will
learn about these two concepts in the next section.

1 Nowadays non-technical people can use other technologies and protocols to transfer files, some
examples include HTTP, HTTPS (secure version of HTTP) and Bluetooth.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
9
Absolute Beginners lab guide
Module 01

Transport Layer Protocols

There are two main protocols used in this Layer - TCP and UDP.

• Transmission Control Protocol (TCP) – This protocol makes sure that the remote
entity receives all the segments (pieces of a file). If one segment is missed, the
receiver can ask to resend that segment.
To understand this concept, the next figure illustrates the TCP message flow.

The figure shows how the picture is broken down into 9 segments. The sender then
starts the process, informing the receiver about how many segments it should expect
to receive - nine in this case. Then the first segment is sent. The receiver processes
the data, but it must respond back to the sender that segment number 1 was
received. This message is known as the acknowledgment message. The sender
then proceeds to send the next segment and the process continues. For each
segment, the receiver must send back an acknowledgement.
You might notice that TCP uses the sequence number to keep track of individual
segments during the communication process.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
10
Absolute Beginners lab guide
Module 01

Assume now that the network experienced a brief problem, and segment number 5
could not reach the receiver. In this case the receiver asks the sender to resend the
missing segment. The sender resends segment number 5, and expects to receive an
acknowledgement, which indicates that this time, the segment was properly received.
Application Protocols such as HTTP and FTP use TCP to make sure that all data is
received.

• User Datagram Protocol (UDP) – Unlike TCP, this protocol does not contain a
mechanism to resend missing segments. You might think that this is an awful
protocol, but there are some communications that take advantage of this behavior.

Consider the following situation. During an online call, the network experienced some
brief problems, and a few segments were lost. For example, the receiver might miss
the word “morning” in the sentence “Good morning everyone, welcome to this
meeting”. Missing that information was not critical to understand what the speaker
said, and as long that a small percentage of segments are lost (typically less than 1
percent) your brain can fill in the gaps.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
11
Absolute Beginners lab guide
Module 01

Let’s analyze what would happen if the voice call used TCP as the transport
mechanism. Your device could ask for missing segments, the word “morning” in this
example. But this action will not help much, because reproducing that missed word in
the wrong time will make the message unintelligible or confusing. For example, “Good
everyone, welcome morning to this meeting”.
Application protocols such as RTP (voice and video) and TFTP use UDP as a
transport mechanism.

Network Protocols

• Internet Protocol (IP) – This protocol provides addressing functions to the network.
In the telephony system, the carrier assigns a unique number to your smartphone.
You share this telephone number to your contacts. Anytime they need to reach you
they simply use that number. Also, when you call a friend, your number is used as the
source for that call. In this system every phone that wants to join the system to send
and receive calls needs a phone number.
Similarly, in the computing world, each connected device requires a unique identifier.
You refer to this number as the IP address. In the figure, you can see how each
device has a unique IP address number.

IP uses two versions - IP version 4 and version 6. The big difference between the two
version is the length of the address. Version 4 (IPv4) uses a 32-bit length which
accommodates 4 billion unique addresses. Meanwhile, version 6 (IPv6) uses a 128-bit
length, for 3.4 x 1038 unique addresses.

Note. In module 4, you will learn more about IP addresses their notation.

Data Link and Physical Protocols

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
12
Absolute Beginners lab guide
Module 01

• Ethernet – The goal of this protocol is to provide unique addressing to Network


Interface Cards (NIC) in a local network. These addresses are called MAC
addresses.
The MAC address number is composed of two sections. The first section identifies the
manufacturer of the adapter, and the second section indicates the serial number.

Devices that are part of the same local network use the MAC address to locally
request a communication. This is like sending a note to the neighbor that lives next
door. You use apartment numbers as source and destination in that note.

Note: The idea that the MAC address helps you to locally communicate with other
device does not mean that your devices will not need the IP address. Remember that
the communication works in layers and those layers work as a team.

Lab Activity 1

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
13
Absolute Beginners lab guide
Module 01

The Aruba Training Lab environment provides the necessary equipment to reinforce your
understanding of recent topics.

Lab Equipment

Your lab environment includes the following devices:


• Three virtual switches running Aruba AOS-CX version Virtual.10.06.0001
• Three PCs running Microsoft Windows 10
• One server running Microsoft Windows Server

Lab Topology

Task 1: Analyze a Computing Communication

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
14
Absolute Beginners lab guide
Module 01

Objective

In this task you will initiate a computing communication between PC1 and the Server. Then
you will explore the OSI layers using Wireshark.

Note. Wireshark is a well-known, open-source packet analyzer tool. It is capable of capturing


traffic. It is supported on main desktop Operating Systems such as Microsoft Windows,
MacOS and many Linux Distributions. You can visit www.wireshark.org for more information.

Network Topology for this Task

Steps

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
15
Absolute Beginners lab guide
Module 01

1. After you made your initial remote lab reservation, you should have received an email
from [email protected]. This email contains a unique-to-you link that you
will use to access Aruba Training Lab environment.
2. In your lab reservation email, click on the text that says “Use this link to access the lab
at your scheduled date/time”

Note. Chrome or Firefox are the recommended browsers to use.

Recommendation. Open the access link in an incognito or private browsing session.

3. Once your lab time has begun, your link will take you to the following screen.

Insert image of the topology

4. Right click on the PC1 icon. A menu should appear.


Insert image
5. Select Open Desktop. A new tab will open.
6. Move to the new tab, you should see a Windows 10 desktop.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
16
Absolute Beginners lab guide
Module 01

Note. Be patient the first time you open this desktop, it could take a minute to completely
load the operating system.

7. Open Wireshark, you will find a shortcut on the Desktop.

8. Double click on the “Direct Server NIC” entry.

Note. Wireshark sections and buttons:

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
17
Absolute Beginners lab guide
Module 01

9. On Filter Toolbar type “ip.addr==10.250.1.21”


This command will instruct Wireshark to display packets to and from your server.

10. On PC1, open a web browser, on the URL field type: “http://10.250.1.21”
11. Hit Enter, a web page should load.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
18
Absolute Beginners lab guide
Module 01

12. Click on stop capture button, but do not close the Wireshark window.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
19
Absolute Beginners lab guide
Module 01

TIP: You can use the magnifying glass to increase the size of the packets.

13. Move back to Wireshark, select the entry that lists “GET / HTTP/1.1” in the info column.
In the “Packet Details” section you should see five entries, these entries represent four
communication layers and there is one that is used in Wireshark for summary purposes.

Analyzing the Wireshark Capture

Your first impression of the capture would be that there are three layers that are missed in
the output, but the information presented is collapsed. Let’s analyze each entry.

14. Expand the “Ethernet II” entry.


Ethernet II is the protocol that runs in the Data Link Layer or Layer 2

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
20
Absolute Beginners lab guide
Module 01

15. Answer the following questions:


What is the value of the Source field?
_______________________________________________________________
What is the value of the Destination field?
_______________________________________________________________
16. Expand the “Internet Protocol Version 4” entry.
Internet Protocol version 4 is the protocol that runs in the Network Layer or Layer 3

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
21
Absolute Beginners lab guide
Module 01

17. Answer the following questions:


What is the value of the Source field?
_______________________________________________________________
What is the value of the Destination field?
_______________________________________________________________
Are these fields the same used in Ethernet II entry? (Y/N)
_______________________________________________________________
18. Expand the “Transmission Control Protocol” entry.
Transmission Control Protocol is the protocol that runs in the Transport Layer or
Layer 4

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
22
Absolute Beginners lab guide
Module 01

19. Answer the following question:


What is the value of the sequence number?
_______________________________________________________________

Note. The Transmission Control Protocol (TCP) uses sequence numbers to keep a
record of all the segments exchanged between endpoints.

20. Expand the “Hypertext Transfer Protocol” entry


Hypertext Transfer Protocol is the protocol that runs in the Application Layer or
Layer 7

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
23
Absolute Beginners lab guide
Module 01

Layers 5 to 7 work very close together. Typically the information of these three layers is
collapsed and presented on Wireshark in a single entry.

21. Answer the following question:


What is the HTTP command (GET, PUSH, PUT or DELETE) used?
_______________________________________________________________

Note. HTTP commands are used by this protocol to execute an action:


• GET command asks for certain data
• PUSH command modifies existing data
• PUT command creates new data
• DELETE command removes data

The only Layer that is not included in the Wireshark capture is the Physical Layer.
Remember that Layer 1 handles how data physically travels from device to device. The
software limitation to display this layer does not mean that you are not using it. Packets listed
in Wireshark are proof that Layer 1 has been used by your PC1 to send and receive data.
22. Close the Wireshark capture on PC1.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
24
Absolute Beginners lab guide
Module 01

23. A new window will ask to save the capture. Select Quit without Saving option.

24. Close the web browser.

Task 2: Find the IP address and MAC address on PC1

In this task you will learn how to obtain the IP address (Layer 3 address) and MAC address
(Layer 2 address) from a Windows device.

1. From the Aruba Training Lab environment (https://arubatraininglab.computerdata.com)


2. Connect to PC1.
3. Open the “command line” window. You will find a shortcut on the Desktop.

4. Enter the ipconfig command

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
25
Absolute Beginners lab guide
Module 01

Note: PC1 uses three adapters named Do Not Touch!, Lab NIC, and Direct Server
NIC. Each adapter uses its own IP and MAC address.

Informational: In Unix and Linux operating systems you will use the ifconfig
command.
5. Scroll down and locate the information for the Direct Server NIC adapter.

6. Answer the following questions:

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
26
Absolute Beginners lab guide
Module 01

What is the IP address assigned to the Direct Server NIC adapter?


__________________________________________________________________
Does the ipconfig command display information about the MAC address? (Y/N)
__________________________________________________________________

7. Enter the ipconfig /all command

8. Scroll down and locate the information for the Direct Server NIC adapter.
9. Answer the following questions:
What is the Physical Address (MAC address) of the Direct Server NIC adapter?
__________________________________________________________________

Task 3: Analyzing a TCP connection

In this task you will analyze a TCP connection - downloading a file from an FTP server.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
27
Absolute Beginners lab guide
Module 01

1. Open Wireshark. You will find a shortcut on the Desktop.


2. Double click on the Direct Server NIC entry.

3. On Filter Toolbar type “ip.addr==10.250.1.21”


This command will instruct Wireshark to display packets to and from your server.

4. On PC1 open a web browser, and in the URL field type: “ftp://10.250.1.21”

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
28
Absolute Beginners lab guide
Module 01

5. Download the “island.jpg” file.


6. Move back to Wireshark.
7. Click on stop capture button.
8. On Wireshark, pay attention to the Info column. Scroll down and find the “Data
Connection already open; Transfer starting” message.

9. Pay attention to the following messages, and answer the following questions:

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
29
Absolute Beginners lab guide
Module 01

Do you see any Acknowledgment (look for [ACK]) message listed? (Y/N)
________________________________________________________________
In any Acknowledgment message, what is the source IP address?
________________________________________________________________
Is this PC1 IP address? (Y/N)
________________________________________________________________

Remember that in a TCP connection, PC1 (10.250.1.1) responds back to the server
(10.250.1.21) that the information was successfully received.

10. Scroll up and select the first packet on the list.


11. On the “Packet Detail” section, expand the Ethernet II entry.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
30
Absolute Beginners lab guide
Module 01

12. Answer the following question:


Does the MAC address obtained in the previous task match the source address in this
capture?
________________________________________________________________
13. Expand the Transfer Control Protocol entry

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
31
Absolute Beginners lab guide
Module 01

14. Answer the following question:


Does the header contain an acknowledgement field? (Y/N)
________________________________________________________________
15. Do not close Wireshark.

Task 4: Analyzing a UDP connection

In this task you will analyze a UDP connection - downloading a file from a TFTP server.

1. In Wireshark click the restart button.

2. Select “Continue without Saving”


3. Open “Tftpd64” software. There should be a shortcut on the Desktop.

4. Click on the “Tftp Client” tab

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
32
Absolute Beginners lab guide
Module 01

5. Enter the following information:


TFTP Server Address: 10.250.1.21
Port: 69
Local File: [click the … button, select the Desktop as destination directory and type
lake.png as file name, click Open]
Remote File: lake.png
Block Size: Default

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
33
Absolute Beginners lab guide
Module 01

6. Click Get button. Wait for the transfer to complete.

7. Move to Wireshark.
8. Open the first TFTP packet (Read Request).

9. Select and expand the “User Datagram Protocol” entry in the Packet details section.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
34
Absolute Beginners lab guide
Module 01

10. Answer the following questions:


What is your first impression of the UDP header?
_________________________________________________________________
Does the UDP header contain any acknowledgment field? (Y/N)
_________________________________________________________________

11. Scroll down and select an Acknowledgement packet.


12. Select and expand the “User Datagram Protocol” entry.

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
35
Absolute Beginners lab guide
Module 01

13. Answer the following question:


Does the UDP header contain any acknowledgment field? (Y/N)
_________________________________________________________________
14. Expand now the Trivial File Transfer Protocol entry.

15. Answer the following question:

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
36
Absolute Beginners lab guide
Module 01

What is the Opcode field value?


_________________________________________________________________

Note. The acknowledgement is not contained in the UDP header. Instead, it is in the
Application layer header. TFTP compensates for UDP’s lack of reliability by using its own
acknowledgement messages in Layer 7.

16. Close Wireshark.


17. Select “Continue without Saving”.
18. Close the TFTP clients and the web browser.

Congratulations, you have completed Module 1!

Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
37

You might also like