[](https://)# Wireless Communications Study (personal page) ###### tags: `Wireless Communications` ## :notebook_with_decorative_cover: Personal Information :::info - Name:Tomas Romanovas - Research Direction: Electronics engineering - Briefly summarize your background and why you want to take this course: I'm a batchelor studying electronics enginering and I want to take this course to atleast have some basic knowledge of wireless communication, because I might want to do my final project related to this topic. ::: ## :notebook_with_decorative_cover: Study Notes :::warning - **A1: Basic Wireshark (12pt)** - **Deadline : 12:00, Oct. 7** - **Goal:** - Students will be able to use Wireshark to perform basic packet capture and analysis, and understand the structure of network packets. - **Reference:** - [Wireshark-Basics.pdf](https://drive.google.com/file/d/15hqyIT_i-IEboLMnthlA8ZcC5HRLAgtp/view?usp=sharing) - **Deliverable:** * Study Note: How to Use Wireshark (7 pts) * **Packet Capture:** Demonstrate how to start and stop capturing network traffic. * **Filtering:** Apply display and capture filters to isolate specific protocols or packets of interest. * **Data Analysis:** Explain how to analyze packets using the **Packet List Pane**, **Packet Details Pane**, and **Packet Bytes Pane**. * Presentation Video (5 mins) (5pts) ::: :::warning - **A2: 5G End-To-End Log Analysis (13pt) -> Provided by Prof. MA** - **Deadline : 12:00, Nov. 18** - **Goal:** - Students will be able to analyze sample pcap traces to understand the 5G End-to-End (E2E) Call Flow, gaining familiarity with the complete procedure from UE through RAN, core network, and user data transmission. - **Reference:** - **Deliverable:** - Study Note: Analyze 5G E2E Log (7pts) - A clear summary of the entire 5G E2E Call Flow - Log analysis highlighting key parameters (e.g., Registration, Authentication...) - Presentation Video (5 mins) (6pts) ::: :::info Add the hyperlink of your study note when available. During your studying, try to address the key tasks/knowledge identified by [IEEE WCET Handbook](https://www.comsoc.org/media/6771/download). ::: :::danger # Assignment 1 ### study note link: https://hackmd.io/hE6Zye_JROCnMaO6pbMX1w?view ::: google disk link (video and packet files): https://drive.google.com/drive/folders/12KX44f-rlggPq8q-cA7UD-P1Yh6fbi9j?usp=drive_link :::warning Task: Capture packets: access the NTUST homepage ::: - **What I did:** started capturing packets; opened up the ntust weblink in browser; stopped packet capturing; saved the file; reopend it and typed in: tls.handshake.extensions_server_name =="www.ntust.edu.tw" :::info viewed the destination ip address of NTUST homepage: ![image_2025-10-01_121947072](https://hackmd.io/_uploads/BJ3Vz_93eg.png) ::: confirmed that it is the ntust website address via [https://www.nslookup.io/domains/www.ntust.edu.tw/dns-records](https://); :::info found the port of the source(my computer) and destination( NTUST hompage):![image_2025-10-01_123227222](https://hackmd.io/_uploads/S1V4rOqhxl.png) ::: :::info - Process of three-way handshake:![image_2025-10-01_124922647](https://hackmd.io/_uploads/rJ3XKd5hll.png) packet 306: Client sends SYN to server; packet 308: Server replies with SYN + ACK; packet 310: Client acknowledges with ACK; ::: Explanation: The TCP three-way handshake is how two computers establish a reliable connection before sending data. It synchronizes both sides’ sequence numbers and confirms that each can send and receive packets properly. My PC (140.118.178.223) connects to the NTUST server (140.118.242.124) on port 443 (HTTPS). The process happens twice (two simultaneous browser connections) -SYN – The client (PC) sends a packet with the SYN(synchronisation) flag to the server, asking to start a connection. -SYN-ACK – The server (NTUST) replies with a packet that has SYN and ACK flags, acknowledging the request and sending its own sequence number. -ACK – The client sends back a final packet with the ACK(acknowledgment) flag, confirming the server’s response. After these 3 steps, the connection is established and data can start flowing. | :::warning Task: Using dns filter find DNS packet ::: :::info from the following image: - IP address of the DNS server: 168.95.1.1 - port: 53 ![image_2025-10-01_140458841](https://hackmd.io/_uploads/rJ9Jjtq2ll.png) ::: :::info domain name:![image_2025-10-01_141132479](https://hackmd.io/_uploads/By0whY92gx.png) ::: from the following images: ![image_2025-10-01_141913823](https://hackmd.io/_uploads/BysN0tcnee.png) ![image_2025-10-01_142114718](https://hackmd.io/_uploads/Bk4nCYq3xx.png) :::info Protocol list of the DNS packet: Ethernet2 Layer 2 – Link Layer IP(Internet protocol)(IPv4) Layer 3 – Network Layer UDP(User Datagram Protocol) Layer 4 – Transport Layer DNS(Domain Name System) Layer 5 – Application Layer ::: :::warning Task: access HTTP page ::: from the following images: ![image](https://hackmd.io/_uploads/S1kS-cc3gl.png) ![image_2025-10-01_143118751](https://hackmd.io/_uploads/Byef-q93le.png) ![image](https://hackmd.io/_uploads/rJePW553xl.png) :::info I can see that accessed this http page: http://www.gzxyzn.com/Article/bjrk2/1644.html ::: :::info \ The IP address of the server hosting the page(destination) is 61.183.8.129 and the port is 80: ![image_2025-10-01_143851124](https://hackmd.io/_uploads/rJVAM5cngx.png) ::: :::info \ ![image](https://hackmd.io/_uploads/S1VXr95hge.png) The GET request method is an HTTP method used by a client (my browser) to request data from a server. When a GET request is sent, the server returns the requested resource (such as a web page or file) without making any changes on the server side. ::: :::info ![image](https://hackmd.io/_uploads/Hy21_cq3ll.png) Response status code: 200 OK Meaning: The request succeeded and server is sending the page. ::: :::danger # Assignment 2 ### study notes link (answers): https://hackmd.io/@v4RNewXHQ0O1LiSDKoVzJg/BJ44TNnZZg :::