Preview

Lab 4A

Satisfactory Essays
Open Document
Open Document
1053 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 4A
1457325-33337500
194437028194000
Lab 4: Capturing packets on your network
Name: Jaimin SurtiAssignment: Lab 4
Course: ECET-415
Date Submitted: October 27, 2014
Submitted to: Professor Khader
Table of Contents
Deliverable 1…………………………………………………………………………………. 2
Deliverable 1…………………………………………………………………………………. 3
Deliverable 2…………………………………………………………………………………. 4
Deliverable 3…………………………………………………………………………………. 4
List of Figures
Figure 1……………………………………………………………………………………….2
Figure 2……………………………………………………………………………………….2
Figure 3……………………………………………………………………………………….2
Figure 4……………………………………………………………………………………….3
Figure 5……………………………………………………………………………………….3
Figure 6……………………………………………………………………………………….3
Figure 7……………………………………………………………………………………….4
Deliverable 1 - A PDU (Protocol Data Unit) is an important term related to the initial four layers of the OSI model. In Layer 2 it contains the frame, in layer 3 it contains a packet, and in layer 4 it is a segment. Layer 5 contains the data. The PDU has four field’s destination access point, source service point, control field and information field. The source where Wireshark retrieved the data from was www.cnn.com
List the layer 2, 3, 4, and 5 PDUs that are used in your network to send a request to get a Web page.
The HTTP Get Packet sends a request to get a Web page.
Figure 1- Is a base for all protocols it shows information from capturing
35242513906500
Layer 2 - [Frame] – This piece of data captured from Wireshark is called a Frame it contains 339 bytes of data that was captured when inspecting a website. The frame protocol is not a real protocol. This type of protocol is used by Wireshark as a base for all protocols. The Ethernet II frame is 38 bytes of overhead data. Figure 2
51435013716000
51435013271500The Ethernet Frame is a unit of packets that is formatted into information that consists of 6 different packets on a 38 byte overhead.
Preamble (7 bytes) & Delimiter (1 byte)
Destination

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Being made up of various parts each layer has a unique function in the network. Additionally, each layer incorporates things to the data which is transmitted from one point to the other. The protocols which work on this layer are HDLC, PPP as well as the frame relay protocol. HDLC protocol means High-Level Data Link Control protocol. An additional protocol which works on layers of the OSI model is the Point-to-Point protocol (PPP) that is just like HDLS protocol. The frame relay protocol works at the data links layer of the OSI model (Cisco, 2008).…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Frame Relay- A widely popular packet-switching technology and service that emerged in the market in the 1990s, using permanent virtual circuits (PVC) between pairs of routers that can…

    • 445 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 6: The presentation layer...This is a layer, usually part of an operating system, that converts incoming and outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly arrived text). Sometimes called the syntax layer.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    (Copper, wires ect) Defines the mechanical procedures that are required to establish and maintain physical links.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    2. What is seen in each of the three panes that display the packets seen on a local area network? Hint: For full credit, you must talk about what is displayed in each pane in addition to the name of each pane. (1 point)…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    For the first section of this Mid Term, I will describe the fields in the IP version 4 (IPv4) packet header. (What is the structure (each field) of an IPv4 packet?). The first field is a 4-bit version field. Next we have a 4-bit Internet Header Length (IHL) that tells the number of 32-bit words in the IPv4 header. The next field is an 8-bit Type of Service (ToS) field. This technology was never fully implemented so new technology has been developed to utilize this portion of the header. It now relays the DiffServ and Explicit Congestion Notification (ECN) to help the reliability of real time data streaming technologies. The Total Length filed is next. This is a 16-bit field that shows the entire datagram size including header and data, in 8-bit bytes. Next we have a 16-bit Identification field. This field is used primarily to uniquely identify fragment of an original IP datagram. A 3-bit field to control or identify fragments is next. This field must either be zero for reserved, don't fragment, and more fragments. The fragment offset field in next and is a 13-bit field used to determine the particular place of a fragment in the original IP datagram. The 8-bit Time to Live (TTL) field follows. This field stops a datagram from going in circles on a network. It used to be measured in seconds, but is now a hop count field. Once the field comes to zero after passing each switch or router, the packet is no longer forwarded. The 8-bit protocol field follows to show the protocol used in the data portion of the datagram. There are predestinated values for different protocols such as ICMP (1), TCP (6), and UDP (17). Next is the 16-bit header Checksum field. Since some values in an IPv4 header may change, the checksum must be adjusted through the network. Following the checksum field there is a 32-bit Source address field directly followed by another 32-bit Destination address field. Finally, before the data, there can also be additional header fields…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Good Essays

    User Datagram

    • 844 Words
    • 4 Pages

    UDP packets, called user datagrams, have a fixed size header of 8 bytes. The below diagram shows the format of a user datagram.…

    • 844 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Compo

    • 1064 Words
    • 5 Pages

    Frames - are used to display multiple HTML documents in a single browser window - allows division of a window into several rectangular areas where separate documents are displayed in each rectangle - a frames page does not have a body. It is a composite of multiple HTML documents…

    • 1064 Words
    • 5 Pages
    Satisfactory Essays