没有合适的资源?快使用搜索试试~ 我知道了~
首页2019计算机网络实验指南:协议层至Socket编程
《计算机网络实验手册2019 (1)》是一本专为软件工程学院学生设计的教材,旨在通过实践操作帮助他们理解计算机网络的基本原理和协议工作方式。该手册共包含七个核心实验,每个实验都专注于网络协议的不同层面,从底层协议到应用层通信,以提升学生的理论知识与实践技能。 实验一:Protocol Layer(协议层) 本实验的目标是让学生了解协议如何在数据包中表示,这是网络结构化设计的基础。学生被要求在进行实验前复习课本中第1.3和1.4章节的内容,这些章节详细介绍了网络层次模型和协议的重要性。实验工具是Wireshark,一个广泛使用的网络数据包捕获和分析软件。Wireshark支持多种操作系统,它提供了一个图形用户界面,清晰地展示出数据包的序列以及各个部分的协议头和数据内容。学生将学习如何分析和过滤数据包,以便深入探究网络行为。 实验二至实验七分别涉及Ethernet(以太网)、IPv4(互联网协议版本4)、ARP(地址解析协议)、UDP(用户数据报协议)和TCP(传输控制协议),这些都是互联网通信的关键组成部分。在实验过程中,学生会亲手操作并观察这些协议如何协同工作,确保数据的可靠传输。 附录部分包括实验报告模板,指导学生如何撰写清晰、规范的实验报告,这对于学术交流和自我评估至关重要。 通过这些实验,学生不仅能够掌握网络协议的运作机制,还能提高网络故障排查和性能优化的能力,为未来的软件工程实践打下坚实基础。同时,对网络工具的熟练运用也能提升他们在实际工作中的效率和问题解决能力。
资源详情
资源推荐
实验一 Protocol Layer
- 9 -
“demultiplexing key” to determine the higher layer.
Look at the Ethernet and IP headers of a download packet in detail to answer the following
questions:
1. Which Ethernet header field is the demultiplexing key that tells it the next higher
layer is IP? What value is used in this field to indicate “IP”?
2. Which IP header field is the demultiplexing key that tells it the next higher layer is
TCP? What value is used in this field to indicate “TCP”?
Turn-in: Hand in your answers to the above questions.
Explore on your own
We encourage you to explore protocols and layering once you have completed this lab. Some
ideas:
• Look at a short TCP packet that carries no higher-layer data. To what entity is this
packet destined? After all, if it carries no higher-layer data then it does not seem
very useful to a higher layer protocol such as HTTP!
• In a classic layered model, one message from a higher layer has a header appended
by the lower layer and becomes one new message. But this is not always the case.
Above, we saw a trace in which the web response (one HTTP message comprised of
an HTTP header and an HTTP payload) was converted into multiple lower layer
messages (being multiple TCP packets). Imagine that you have drawn the packet
structure (as in step 2) for the first and last TCP packet carrying the web response.
How will the drawings differ?
• In the classic layered model described above, lower layers append headers to the
messages passed down from higher layers. How will this model change if a lower
layer adds encryption?
• In the classic layered model described above, lower layers append headers to the
messages passed down from higher layers. How will this model change if a lower
layer adds compression?
[END]
实验二 Ethernet
- 10 -
实验二 Ethernet
Objective
To explore the details of Ethernet frames. Ethernet is a popular link layer protocol that is covered
in §4.3 of your text; modern computers connect to Ethernet switches (§4.3.4) rather than use
classic Ethernet (§4.3.2). Review section §4.3 before doing this lab.
Requirements
Wireshark: This lab uses the Wireshark software tool to capture and examine a packet trace. A
packet trace is a record of traffic at a location on the network, as if a snapshot was taken of all the
bits that passed across a particular wire. The packet trace records a timestamp for each packet,
along with the bits that make up the packet, from the lower-layer headers to the higher-layer
contents. Wireshark runs on most operating systems, including Windows, Mac and Linux. It
provides a graphical UI that shows the sequence of packets and the meaning of the bits when
interpreted as protocol headers and data. It color-codes packets by their type, and has various ways
to filter and analyze packets to let you investigate the behavior of network protocols. Wireshark is
widely used to troubleshoot networks. You can download it from www.wireshark.org
if it is not
already installed on your computer. We highly recommend that you watch the short, 5 minute
video “Introduction to Wireshark” that is on the site.
ping: This lab uses “ping” to send and receive messages. ping is a standard command-line
utility for checking that another computer is responsive. It is widely used for network
troubleshooting and comes pre-installed on Window, Linux, and Mac. While ping has various
options, simply issuing the command “ping www.bing.com” will cause your computer to send
a small number of ICMP ping requests to the remote computer (here www.bing.com), each of
which should elicit an ICMP ping response.
Step 1: Capture a Trace
Proceed as follows to capture a trace of ping packets; alternatively you may use a supplied trace.
We will use ping simply as an easy way to collect a small trace. Perhaps surprisingly, you can
capture a trace for this lab from a computer connected to the Internet using either wired Ethernet
or wireless 802.11.
1. Pick a remote web server or other publicly reachable Internet host and use ping to
send some ping messages and check that it sends replies. For example, “ping
实验二 Ethernet
- 11 -
www.bing.com”. You should see several replies indicating that the pings reached
the remote host and were returned. The figure below shows a successful example.
Note that some versions of ping will continue to bounce messages off of a remote
server until you tell the program to stop by signaling it with ^C. If your ping test does
not succeed then try another server.
Figure 6: Using ping to bounce messages off a remote host
2. Launch Wireshark and start a capture of Ethernet frames with a filter of “icmp”,
making sure that “enable MAC name resolution” is checked. The latter will
translate Ethernet (MAC) addresses to provide vendor information. Also check that
the Link-layer header type pulldown says “Ethernet”. Your capture window should
be similar to the one pictured below, other than our highlighting. Select the
interface from which to capture as the main wired or wireless interface used by your
computer to connect to the Internet. If unsure, guess and revisit this step later if
your capture is not successful. Uncheck “capture packets in promiscuous mode”.
This mode is useful to overhear packets sent to/from other computers on broadcast
networks. We only want to record packets sent to/from your computer. Leave other
options at their default values. The capture filter, if present, is used to prevent the
capture of other traffic your computer may send or receive. On Wireshark 1.8, the
capture filter box is present directly on the options screen, but on Wireshark 1.9,
you set a capture filter by double-clicking on the interface.
剩余57页未读,继续阅读
首席程序IT
- 粉丝: 39
- 资源: 305
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- JDK 17 Linux版本压缩包解压与安装指南
- C++/Qt飞行模拟器教员控制台系统源码发布
- TensorFlow深度学习实践:CNN在MNIST数据集上的应用
- 鸿蒙驱动HCIA资料整理-培训教材与开发者指南
- 凯撒Java版SaaS OA协同办公软件v2.0特性解析
- AutoCAD二次开发中文指南下载 - C#编程深入解析
- C语言冒泡排序算法实现详解
- Pointofix截屏:轻松实现高效截图体验
- Matlab实现SVM数据分类与预测教程
- 基于JSP+SQL的网站流量统计管理系统设计与实现
- C语言实现删除字符中重复项的方法与技巧
- e-sqlcipher.dll动态链接库的作用与应用
- 浙江工业大学自考网站开发与继续教育官网模板设计
- STM32 103C8T6 OLED 显示程序实现指南
- 高效压缩技术:删除重复字符压缩包
- JSP+SQL智能交通管理系统:违章处理与交通效率提升
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功