Preview

NETW202 W2 Lab Report Perry

Satisfactory Essays
Open Document
Open Document
1389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW202 W2 Lab Report Perry
Anthony Perry
NETW202, Robert Meadows
Current Date 3-15-15 iLab #2, Introduction to Wireshark

Lab Report

Section I: Watch the video on the iLab page about Wireshark and answer the questions below.

1. Is Wireshark open source or proprietary? What does it mean to be open source versus proprietary in the first place? Give an example of something that is open source versus something that is proprietary in the field of networking and telecommunications. (1 point)
Wireshark is Open Source. Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose

2. What is seen in each of the three panes that display the packets seen on a local area network? Hint: For full credit, you must talk about what is displayed in each pane in addition to the name of each pane. (1 point)
Tree view pane- allows the hierarches view of the header view details
Byte view pane- raw data 10x bytes per row.
Packet list pane- shows packets and the information on each packet, that is separated info columns
3. What does a display filter do? Where do you add in a display filter? (1 point)
Allows you to define which packets are displayed in the list pane. You would add it into the filter fields.

4. What does the protocol column show? How can this be helpful to you when troubleshooting? (1 point)
This column shows the protocol that the packet is using. It would be useful when trying to decide if the proper protocol is being used and if it is causing a conflict which could shut the system or program down.

5. How do you expand the details in a layer of the packet in the middle frame? What is shown when you expand the details of a packet? (1 point)
By clicking the (+) sign. The protocol the packet is using as well as the packet information.

6. Wireshark capture files have what file name extension? (1 point) pcapng 7. The time

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Capture the HTTP frame. Answer all of the questions found below based on the details of your captured HTTP frame.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    Capture the HTTP frame. Answer all of the questions found below based on the details of your captured HTTP frame.…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Network software uses this when my IP does not match any routes on routing chart.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dish Soap Lab

    • 916 Words
    • 4 Pages

    3. Observe and record the information seen after two (2) minutes within the packet in the space provided…

    • 916 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    To begin click the Start button on the Windows Task Bar. Click the All Programs option in the System menu to show all menu choices (Figure 1). Click the Wireshark choice to start the application. Note: If you do not see the Wireshark choices in the menu then you will need to install Wireshark on your computer. Consult Appendix E for detailed instructions on how to download, install, and configure Wireshark.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netstat

    • 481 Words
    • 2 Pages

    1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    Which of the following is not an item that can be used when building Windows Firewall rules?…

    • 436 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    OSI stands for Open Systems OSI model. It is based on a proposal, developed by International Standard Organization (ISO) as a first step towards International standardization of the proposal used in the various layers (Day and Zimmerman 1988).It was revised in 1995.The Model is called ISO OSI(Open System Interconnection) reference model. The OSI has seven layers, placed in a Stack format. The principles that are applied to arrive at the seven layers are. A layer should be created where different abstraction is needed. Each layer performs a well defined function. The function of each layer should be chosen with an eye towards defining Internationally Standard Protocols. The layer boundaries should be chosen to minimize the ‘Information Flow’ across the interface. The number of layer should be large enough that distinct function need not be thrown together in the same layer out of necessity that small enough that the architecture does not become unwieldy. It was created as a framework and reference model to explain how different networking technologies work together and interact. It is not a standard that networking protocols must follow. It is the backbone of Networking.…

    • 320 Words
    • 1 Page
    Satisfactory Essays