Shri Ramdeobaba College of Engineering and Management, Nagpur Department of Computer Science Engineering & Emerging Trends Session: 2024-25
GUEST LECTURE ON: Networking TOOLs (Computer Networks)
Date and Time of Event: 21/10/24, 8.30am-10.30am
Name of Speaker: Mr. Atharva Deshpande
Name of Faculty In-Charge: Dr. D. Naidu
Introduction to the Speaker:
Mr. Atharva Deshpande is a Cybersecurity Analyst at VCF Cyber Solutions Pvt. Ltd., Nagpur. He is Certified in Cyber Security & Ethical Hacking, Certified Ethical Hacking(C|EH) from EC Council, Masters of Science in Electronics, Bachelor of science in Electronics He has an Experience of 2 years in Vulnerability Assessment, Penetration Testing (VAPT), Web Application Penetration Testing (WAPT), Network Penetration Testing, Digital Forensics and Security Audit & Security Compliance
EVENT DETAILS:
On 21 October 2024, a guest lecture was organized by Ramdeobaba University featuring an industry expert, Mr. Atharv M. Deshpande, specializing in computer networks. The lecture provided an indepth understanding of the core concepts related to computer networks, with a focus on practical tools and techniques used in the industry. The session covered topics ranging from OSI models to advanced tools like Wireshark, demonstrating their relevance in modern network management and security. Following points were taken.
- OSI Reference Model
The lecture began with a discussion on the OSI (Open Systems Interconnection) model, which forms the foundation of computer networking. The speaker explained the seven layers—Physical, Data Link, Network, Transport, Session, Presentation, and Application—and how each layer contributes to the smooth functioning of network communication. The significance of the OSI model in diagnosing and troubleshooting network issues was emphasized.
- Ports
The next section delved into the concept of network ports, a critical element in the transmission of data across networks. The expert explained how different applications use specific ports (e.g., HTTP uses port 80, HTTPS uses port 443) and the role ports play in network security, particularly in filtering inbound and outbound traffic.
- APIs and Network Communication
Application Programming Interfaces (APIs) were discussed as an integral part of modern network communication, facilitating interaction between different software components. The lecture touched upon how APIs function within networks and how they are used to manage various network services, enhancing interoperability across platforms.
- Firewalls: Traffic Management
The guest speaker provided a detailed overview of firewalls, focusing on their function in managing inbound and outbound traffic by applying predefined policies. The types of firewalls, including software and hardware-based solutions, were explained. The speaker highlighted commonly used firewalls in large-scale organizations, such as Comodo, Fortinet, and FortiGate, providing real-world examples of their applications in managing enterprise-level security.
- Packet Sender
An introduction to Packet Sender, a tool used for sending and receiving packets, was given. The speaker demonstrated how network professionals use this tool for testing firewalls, routers, and networks by sending custom packets to specific ports and checking the results. Packet Sender helps simulate network traffic for diagnosing problems in real-time.
- Packet Encryption and Decryption
The importance of encrypting and decrypting packets to ensure secure communication was underscored. The expert explained different encryption methods and how they are applied in packet transfer. Concepts such as hexadecimal to base64 to text conversions were also touched upon, showcasing their use in network security.
- Wireshark Tutorials
The session concluded with an interactive tutorial on Wireshark, a powerful tool used for network traffic analysis. Two different environments were demonstrated:
Wireshark on Windows: The expert walked through how to filter network traffic, capture packets, and analyze the results, emphasizing practical scenarios such as identifying malicious traffic. Wireshark on Kali Linux: A more advanced demonstration was conducted using Wireshark in the Kali Linux environment, focusing on its use in penetration testing and cybersecurity.
The guest lecture provided a comprehensive overview of key concepts in computer networking, ranging from the basics of the OSI model to advanced packet analysis using Wireshark. Students were taught into how modern tools and techniques are applied in real-world scenarios, particularly in network security and traffic management. The lecture proved to be highly informative for both students and professionals, bridging the gap between theoretical knowledge and practical application.