New Creators

21
NEW CREATERS Team members: Naveen Kumar Murgesh Kalyani Faculty Incharge: Rajaram Sir

description

 

Transcript of New Creators

Page 1: New Creators

NEW CREATERS

Team members:

Naveen Kumar

Murgesh Kalyani

Faculty Incharge:

Rajaram Sir

Page 2: New Creators

Network Protocol Analysis

2

Page 3: New Creators

INDEX: Title……………………………………………………3 Abstract………………………………………..……..4 What is Network…………………………………….5 Types of Topology…………………………………...6 The tool’s Utility…………………………………….7 List of other tools……………………………………8 What is Protocol? Types of Protocol………………9 How ICMP Protocol works………………………..13 ICMP General Operation…………………………15 Acknowledgment…………………...…………...…19 Reference…………………………………………….20

3

Page 4: New Creators

ABSTRACT:

Decode network protocol headers and trailers.

Understand the data and information inside the packet encapsulated by the protocol. (Dawn of the Net)

A brief intro on various protocol types. Implementation via “Colasoft Caspa”

tool.

4

Page 5: New Creators

WHAT IS NETWORK?

Series of points or nodes interconnected by communication paths.

5

Page 6: New Creators

MOST COMMONLY USED NETWORK TOPOLOGIES ARE

6

Page 7: New Creators

The tool Colasoft Caspa is mainly employed to:

Analyze network problems Gain information for effecting a network

instruction Monitor network usage Gather and report network statistics Filter suspect content from network traffic Spy on network Debug client/server communications Debug network protocol implementations

7

Page 8: New Creators

Other than Caspa: Carnivore dSniff Ettercap Fluke Lanmeter Microsoft Network Monitor OPNET Technologies ACE Analyst NetScout Sniffer Global Analyzer NetScout Sniffer Portable Professional Analyzer Network Instruments Observer NetworkMiner packet analyzer PacketTrap pt360 Tool Suite snoop (part of Solaris) tcpdump WildPackets OmniPeek (old name AiroPeek, EtherPeek) Wireshark (formerly known as Ethereal) NetworkActiv PIAFCTM Cain and abel Clarified Analyzer

8

Page 9: New Creators

WHAT IS PROTOCOL? TYPES OF NETWORK PROTOCOLS Rules determining the format and

transmission of data.There are mainly five network protocols: IPv4: internet protocol version 4. IPv6: internet protocol version 6 (next

generation protocol). Advantages of IPv6 over IPv4 a) Large address spaceb) Better header formatc) Provision for extensiond) Resource allocation (“flow label”)e) Security features 9

Page 10: New Creators

Continued…. CLNP: connectionless network protocol. IPsec: internet protocol security,this

enables encryption and authentication of every IP packet that moves in the data stream.

ICMP: internet control message protocol.

10

Page 11: New Creators

IPsec authentication header (AH) AH provides authentication of contents of

datagrams by adding header. The calculation of header is based on values

in datagram. Operation of AH protocol: Uses hashing algorithm & specific key A security association between two devices is

set up. On tne source side AH performs computation,

calculated result Integrity Check Value (ICV). Puts the ICV into a special header with other

fields for transmission. Destination does the same calculation to

retrieve data.11

Page 12: New Creators

12

Page 13: New Creators

HOW ICMP PROTOCOL WORKS???

Step 1: understanding the ICMP protocola) Can u imagine a world with no traffic signal

no stop signal to control daily life? No rightb) Same way, just imagine internet without

ICMP protocol, it will become unwieldy mess without it.

Step 2: what is ICMP and what it stands for? well ICMP stands for “internet control

message protocol”. It is unheralded hero of the four core

protocol. 13

Page 14: New Creators

ICMP general operation

14

Page 15: New Creators

consider a client host A sending a message to server host B,

with a problem detected in the datagram by router R3.

Even if R3 suspects that the problem was caused by one of the preceding routers that handled the message, such as R2.

it cannot send a problem report to R2. It can only send an ICM

Because it is only A's address in the datagram. Thus, R3 must send a problem report back to A

and A must decide what to do with it. Device A may decide to change the route it uses, or to

generate an error report that an administrator can use to troubleshoot the R2 router. P message back to host A.

15

Page 16: New Creators

ICMP Message Classes At the highest level, ICMP messages are

divided into two classes:i. Error Messages: These messages are

used to provide feedback to a source device about an error that has occurred.

ii. Informational (or Query) Messages: These are messages that are used to let devices exchange information, implement certain IP-related features, and perform testing.

16

Page 17: New Creators

ICMP Message Types: Each individual kind of message in ICMP is given its

own unique Type value, which is put into the field of that name in the ICMP common message format.

This field is 8 bits wide, so a theoretical maximum of 256 message types can be defined.

A separate set of Type values is maintained for each of ICMPv4 and ICMPv6.

In ICMPv4, Type values were assigned sequentially, to both error and informational messages, on a “FCFS” basis (sort of)

In IPv6, errormessages have Type values from 0 to 127, and informational messages have values from 128 to 255.

17

Page 18: New Creators

Message ClassType Value

Message NameSummary Description of Message Type

Defining RFC

Number

ICMPv4 Error Messages

3 Destination UnreachableIndicates that a datagram could not be delivered to its destination.

792

4 Source QuenchLets a congested IP device tell a device that is sending it datagram's .

792

5 RedirectAllows a router to inform a host of a better route to use for sending datagram's.

792

ICMPv4 Informational

Messages(part 1 of 2)

0 Echo Reply Sent in reply to an Echo . 792

8 Echo (Request)Sent by a device to test connectivity to another device on the internetwork.

792

9 Router AdvertisementUsed by routers to tell hosts of their existence and capabilities.

1256

ICMPv6 Error Messages

1 Destination UnreachableIndicates that a datagram could not be delivered to its destination. 

2463

2 Packet Too BigSent when a datagram cannot be forwarded .

2463

3 Time ExceededSent when a datagram has been discarded .

2463

ICMPv6 Informational

Messages

128 Echo RequestSent by a device to test connectivity to another device on the internetwork.

2463

129 Echo ReplySent in reply to an Echo (Request) message; used for testing connectivity.

2463

18

Page 19: New Creators

ACKNOWLEDGMENT:

Firstly we would like to thank “Mydili Ma’am” for giving us a great opportunity to represent our skills.

Secondly to “Rajaram sir” who supported us in doing this project.

Thirdly to “All OUR DEAR FRIENDS” who listened to this seminar quietly.

19

Page 20: New Creators

REFERENCES:

http://www.youtube.com/watch?v=mn6A0Y5aroc

http://www.colasoft.com/help/Capsa6.9help.html

http://www.javvin.com/protocolanalysis.html http://www.chappellseminars.com/ http://www.dodear.com/images/

TorrentOperation.gif

20

Page 21: New Creators

Thank you…

Any Questions?

21