Preview

NETW202 W2 Lab Report Perry

Satisfactory Essays
Open Document
Open Document
1389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW202 W2 Lab Report Perry
Anthony Perry
NETW202, Robert Meadows
Current Date 3-15-15 iLab #2, Introduction to Wireshark

Lab Report

Section I: Watch the video on the iLab page about Wireshark and answer the questions below.

1. Is Wireshark open source or proprietary? What does it mean to be open source versus proprietary in the first place? Give an example of something that is open source versus something that is proprietary in the field of networking and telecommunications. (1 point)
Wireshark is Open Source. Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose

2. What is seen in each of the three panes that display the packets seen on a local area network? Hint: For full credit, you must talk about what is displayed in each pane in addition to the name of each pane. (1 point)
Tree view pane- allows the hierarches view of the header view details
Byte view pane- raw data 10x bytes per row.
Packet list pane- shows packets and the information on each packet, that is separated info columns
3. What does a display filter do? Where do you add in a display filter? (1 point)
Allows you to define which packets are displayed in the list pane. You would add it into the filter fields.

4. What does the protocol column show? How can this be helpful to you when troubleshooting? (1 point)
This column shows the protocol that the packet is using. It would be useful when trying to decide if the proper protocol is being used and if it is causing a conflict which could shut the system or program down.

5. How do you expand the details in a layer of the packet in the middle frame? What is shown when you expand the details of a packet? (1 point)
By clicking the (+) sign. The protocol the packet is using as well as the packet information.

6. Wireshark capture files have what file name extension? (1 point) pcapng 7. The time

You May Also Find These Documents Helpful

  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for accepting incoming RTSP client connections and for delivering data packets to clients that are streaming by using RTSPT.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    6. Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to distinguish how many of each…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4A

    • 1053 Words
    • 4 Pages

    Layer 2 - [Frame] – This piece of data captured from Wireshark is called a Frame it contains 339 bytes of data that was captured when inspecting a website. The frame protocol is not a real protocol. This type of protocol is used by Wireshark as a base for all protocols. The Ethernet II frame is 38 bytes of overhead data.…

    • 1053 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    function in Wireshark provides you with a breakdown of the different protocol types on the LAN…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    hobo Essay Example

    • 850 Words
    • 4 Pages

    Now that you understand the concepts of network traffic and packet capture, this assignment requires you to answer the questions based on packet capture…

    • 850 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    9. Which of the following is the term for identifying packets used by TCP to establish a connection?…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netstat

    • 481 Words
    • 2 Pages

    1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dish Soap Lab

    • 916 Words
    • 4 Pages

    3. Observe and record the information seen after two (2) minutes within the packet in the space provided…

    • 916 Words
    • 4 Pages
    Good Essays
  • Better Essays

    3. What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP?…

    • 1082 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    Which of the following is not an item that can be used when building Windows Firewall rules?…

    • 436 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rajinder Yadav Copyright © 2007 www.devmentor.org Client / Server Programming with TCP/IP Sockets Author: Rajinder Yadav Date: Sept 9, 2007…

    • 4143 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ethical Hacking Lab

    • 445 Words
    • 2 Pages

    4. Enter the following command to view the pcap file in hexadecimal format (-x) using absolute, instead of relative, TCP sequence numbers (-S).…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TCP/IP refers to Transmission Control protocol/Internet Protocol. Transmission Control Protocol is a Protocol that works with the Internet Protocol (IP) to send packets of data between computers over Internet. Together, the TCP and IP Protocols established rules for how information is passed through the Internet. TCP is known as connection oriented protocols which means the connection is established and maintained the application programs at each end have completed exchanging messages. In the Open System Interconnection (OSI) communication model, TCP is in layer 4, the Transport layer. The Transport Protocol determines the size of the largest data until that’s supported any of the involved networks and segments the data into packets accordingly. It also manages flow control and the…

    • 320 Words
    • 1 Page
    Satisfactory Essays