• Like
Group Apres
Upcoming SlideShare
Loading in...5
×
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
167
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BY CHARISMA H A N D R I K A A M Y A RIDEV I A D H U R A NETWORK PROTOCOL ANALYSIS
  • 2. MADHURA S KARANTH NAGCHANDRIKA RAO M RAMYA SRIDEVI YV
  • 3.
      1.WHAT IS A PROTOCOL?
      2.WHAT IS NETWORK PROTOCOL ANALYSIS/ANALYSER? 3.WHAT ARE THE USES OF NETWORK PROTOCOL ANALYSIS? 4.WHO NEEDS IT?
    • 5.IP PACKET STRUCTURE
    • 4. 5a.IP HEADER
    • 5. 5b.TCP HEADER
    • 6. 5.DEMO
    INDEX
  • 7. What is a protocol? It is the implementation of rules determining the format and transmission of data. IP suite TCP UDP
  • 8. What is Network Protocol Analyser? A Protocol Analyzer intercepts t raffic passing over a digital network or part of a network. Etherdetect EffeTech Wireshark Fiddler Colasoft Caspa What is Network Protocol Analysis? It is a process for a program or a device to decode network protocol headers and trailers.
  • 9. 1.Analyze network problems. 2.Detect network intrusion attempts. 3.Monitor network usage. 4.Gather and report network statistics. 5.Spy on other network users and collect sensitive information such as passwords. 6.Debug client/server communications. USES
  • 10. 1. Programmer of C++, .net, Java, ASP, JSP, PHP, SOAP, REST, or ruby on rails 2.Network Administrator 3.Company Managers 4.Parents 5.Web site owner " ... It could tell me whether my employees have visited irrelevant sites at work time ... " A manager WHO NEEDS IT?
  • 11. Version: 4 bits IHL: 5 Total Length Identification: 16 bits Time To Live: 8 bits Service Type:0 Header Checksum: 16 bits Source Address: 32 bits Destination Address: 32 bits Fragment Offset: 13 bits IP PACKET STRUCTURE IP HEADER
  • 12. Type of Service: 8 bits Bits 0-2: Precedence. Bit 3: 0 = Normal Delay, 1 = Low Delay. Bit 4: 0 = Normal Throughput, 1 = High Throughput. Bit 5: 0 = Normal Relibility, 1 = High Relibility. Bit 6-7: ECN Field.
  • 13. FLAGS 1st Flag - URGent Pointer 2nd Flag - ACKnowledgement 3rd Flag – Push(PSH) Flag 4th Flag - Reset (RST) Flag 5th Flag - SYNchronisation Flag 6th Flag - FIN Flag TCP HEADER
  • 14. THANK YOU