Preview

Nt1310 Unit 3 Assignment 1

Good Essays
Open Document
Open Document
2469 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Wireshark Lab: Getting Started

Version: 2.0 © 2007 J.F. Kurose, K.W. Ross. All Rights Reserved

Computer Networking: A Topth down Approach, 4 edition.

“Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that
…show more content…
In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the …show more content…
We’ll assume that your computer is connected to the Internet via a wired Ethernet interface. Do the following 1. Start up your favorite web browser, which will display your selected homepage. 2. Start up the Wireshark software. You will initially see a window similar to that shown in Figure 2, except that no packet data will be displayed in the packetlisting, packet-header, or packet-contents window, since Wireshark has not yet begun capturing packets. 3. To begin packet capture, select the Capture pull down menu and select Options. This will cause the “Wireshark: Capture Options” window to be displayed, as shown in Figure

You May Also Find These Documents Helpful

  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking - Task 3

    • 354 Words
    • 2 Pages

    Task 3: Document and analyses the network test results you obtained in task 2 above and compare them with the expected results. You should provide snips of the test results to support your answer.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Network 320

    • 979 Words
    • 3 Pages

    First, I have to define the term RFC. The acronym "RFC" stands for "Request for Comment". This refers to a description of a standard for new or modified internet or networking protocols. When standards are proposed, they are made available for public comment so that they can be refined and agreed upon. The document which details the proposed standards is called a "request for comment" document, or RFC. When the standards are finalized, they keep the same "RFC" Three organizations under the Internet Society are responsible for the actual work of standards development and publication: Three organizations under the Internet Society are responsible for the actual work of standards development and publication:name. Now a Request for Comments (RFC) is a publication of the Internet Engineering Task Force (IETF) and the Internet Society, the principal technical development and standards-setting bodies for the Internet. Request for Comments documents were invented by Steve Crocker in 1969 to help record unofficial notes on the development of ARPANET. RFCs have since become official documents of Internet specifications, communications protocols, procedures, and events. Today, it is the official publication channel for the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), and — to some extent — the global community of computer network researchers in general. A new model was proposed in 2008, refined, and published in August 2009, splitting the task into several roles, including the RFC Series Advisory Group (RSAG). (The model was updated in 2012. The RFC series contains three sub-series for IETF RFCs. Not all RFCs are standards. Each RFC is assigned a designation with regard to status within the Internet standardization process. This is a partial list of RFCs (request for comments memoranda). I wasn 't aware of how many RFC 's there are, and found to my…

    • 979 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. As data streams travel back and forth over the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications.…

    • 2074 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Tcp/Ip

    • 1481 Words
    • 6 Pages

    Currently, About 2.4 billion people use the internet, yet there probably is only a small percentage who understands how the internet sends information or where the technology to send the data originated. (Miniwatts Marketing Group, 2008)…

    • 1481 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Sample Lan Design

    • 379 Words
    • 2 Pages

    At the human level, some communication rules are formal and others are simply understood, or implicit, based on custom and practice. For devices to successfully communicate, a network protocol suite must describe precise requirements and interactions.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will be examining the process that this protocol entails by providing a diagram and an explanation of how the diagram (protocol) works.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    WIMAX

    • 1166 Words
    • 5 Pages

    The Internet protocols are the world’s most open system protocol suite because they can be used to communicate across any set of interconnected networks and are equally well suited for LAN and WAN communications. The Internet protocol consists of a suite of communication protocols, of which the two best known are TCP (Transmission Control Protocol) and IP (Internet Protocol). The IP suits not only include the lower layer protocol (such as TCP and IP) , but it also specifies some of the applications such as: Electronic mail and File Transfer.…

    • 1166 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    iperf3 -s -p 5555: On execution of this command, the host is prompted to run on server mode and the server is made to listen or connect to port number 5555.…

    • 1371 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Step 1 - First of all download wireshark from the official website and install it.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Power Line Communication

    • 17540 Words
    • 71 Pages

    Once upon a time, before the advent of electricity, home automation had a different name: servants…

    • 17540 Words
    • 71 Pages
    Satisfactory Essays
  • Good Essays

    Warrior Net

    • 653 Words
    • 3 Pages

    And then because of the video clip titled the warriors of the net also known as the dawn of the net, give answer to my questions. Because the video were discussing clearly, systematically, and easily the cycle of information we are working within a computer network. The characters involved on that movie are the data circulating inside a network which are the TCP packet, ICMP ping packet, UDP packet, router, ping of death, router switch, network routes , firewall and of course the net and they are being animated so that the video clip turns the whole discussion more visible to me.…

    • 653 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The World Wide Web: Http

    • 4074 Words
    • 17 Pages

    The client program and server program, executing on different end systems, talk to each other by exchanging HTTP messages. HTTP defines the structure of these messages and how the client and server exchange the messages. It is useful to review some Web terminology.…

    • 4074 Words
    • 17 Pages
    Powerful Essays