Preview

Lab 2.6.2: Using Wireshark

Powerful Essays
Open Document
Open Document
2260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2.6.2: Using Wireshark
Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Learning Objectives

• Be able to explain the purpose of a protocol analyzer (Wireshark).

• Be able to perform basic PDU capture using Wireshark.

• Be able to perform basic PDU analysis on straightforward network data traffic.

• Experiment with Wireshark features and options such as PDU capture and display filtering.

Background

Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. Before June 2006, Wireshark was known as Ethereal.

A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can intercept and log data traffic passing over a data network. As data streams travel back and forth over the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications.

Wireshark is programmed to recognize the structure of different network protocols. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.

It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting.

For information and to download the program go to - http://www.Wireshark.org

Scenario

To capture PDUs the computer on which Wireshark is installed must have a working connection to the network and Wireshark must be running before any data can be captured.

When Wireshark is launched, the screen below is displayed.

[pic]

To start data capture it is first necessary to go to the Capture menu and select the Options choice.
The Options dialog provides a range of settings and filters which determines which and how much data traffic is captured.

[pic]
First, it is necessary to ensure that Wireshark is set to monitor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses a port within this UDP In port range to receive data packets from the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    What is a device that lets your computer send data to and receive data from other computers or to a network?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    6. Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to distinguish how many of each…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4A

    • 1053 Words
    • 4 Pages

    Layer 2 - [Frame] – This piece of data captured from Wireshark is called a Frame it contains 339 bytes of data that was captured when inspecting a website. The frame protocol is not a real protocol. This type of protocol is used by Wireshark as a base for all protocols. The Ethernet II frame is 38 bytes of overhead data.…

    • 1053 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    In this lab, you explored the common tools available in the virtual lab environment. You used…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    On this paper I will be talking about and describing the definition of the RMON (Remote Network Monitoring) and how RMON probes are utilized in the network management system to help manager to better manage the network.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. What does the protocol column show? How can this be helpful to you when troubleshooting? (1 point)…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SIMD Architecture

    • 652 Words
    • 3 Pages

    Since the system is implemented in Manual, so the response is very slow. The transactions are executed in off-line mode, hence on-line data capture and modification is not possible.…

    • 652 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yuffgtf

    • 1299 Words
    • 7 Pages

    18. Tracks Various Activities – “TeleTrack provides the ability to view field activity from privacy of own private Internet website, and is password protected” [ (TeleTrack Time and Attendence solutions, 2007) ].…

    • 1299 Words
    • 7 Pages
    Satisfactory Essays