Most professional and education institutions use today

Assignment Help Basic Computer Science
Reference no: EM13754237

Wireshark. Answer only deliverables below

Seeing the PDUs in Your Messages

We talked about how messages are transferred using layers and the different Protocol Data Units (PDUs) used at each layer. The objective of this Activity is for you to see the dif-

ferent PDUs in the messages that you send. To do this, we'll use Wireshark, which is one of the world's foremost network protocol analyzers, and is the de facto standard that most professional and education institutions use today. It is used for network troubleshooting, network analysis, software and communications protocol development, and general education about how networks work. computer, as well as some or all of the messages sent by other computers on your LAN, depending on how your LAN is designed. Most modern LANs are designed to prevent you from eavesdropping on other computer's messages, but some older ones still permit this. Normally, your computer will ignore the messages that are not addressed for your computer, but Wireshark enables you to eavesdrop and read messages sent to and from other computers.

Wireshark is free. Before you start this activity, download and install it from www.wireshark.org.

1. Start Wireshark.

2. Click on Capture and then Interfaces. Click the Start button next to the active interface (the one that is receiving and sending packets). Your network data will be captured from this moment on.

3. Open your browser and go to a Web page that you have not visited recently (a good one is www.iana.org).

4. Once theWeb page has loaded, go back toWireshark and stop the packet capture by clicking on Capture and then Stop (the hot key for this is Ctrl + E).

5. You will see results similar to those in Figure 1-9. There are three windows below the tool bar:

a. The top window is the Packet List. Each line represents a single message or packet that was captured by Wireshark. Different types of packets will have different colors. For example, HTTP packets are colored green. Depending on how busy your network is, you may see a small number of packets in this window or a very large number of packets.

b. The middle window is the Packet Detail. This will show the details for any packet you click on in the top window.

c. The bottom window shows the actual contents of the packet in hexadecimal format, so it is usually hard to read. This window is typically used by network programmers to debug errors.

6. Let's take a look at the packets that were used to request the Web page and send it to your computer. The application layer protocol used on the Web is HTTP, so we'll want to find the HTTP packets. In the Filter toolbar, type http and hit enter.

7. This will highlight all the packets that contain HTTP packets and will display the first one in Packet Detail window. Look at the Packet Detail window in Figure 1-9 to see the PDUs in the message we've highlighted. You'll see that it contains an Ethernet II Frame, an IP packet, a TCP segment, and an HTTP packet. You can see inside any or all of these PDUs by clicking on the +box in front of them. In Figure 1-9, you'll see that we've clicked the +box in front of the HTTP packet to show you what's inside it.

Deliverables

1. List the PDU at layers 2, 3, and 4 that were used to transmit your HTTP GET packet.

a. Locate your HTTP Get packet in the Packet List and click on it.

b. Look in the Packet Detail window to get the PDU information.

2. How many different HTTP GET packets were sent by your browser? Not all the HTTP packets are GET packets, so you'll have to look through them to

3. List at least five other protocols that Wireshark displayed in the Packet List window. You will need to clear the filter by clicking on the "Clear" icon that is on the right of the Filter toolbar.

Reference no: EM13754237

Questions Cloud

Explain the capstone checkpoint end of the cold war : Explain the Capstone CheckPoint End of the Cold War.
The proliferation of mobility and mobile applications : Instructions: The proliferation of mobility and mobile applications in enterprise networks has increased the importance of mobile VPNs to provide secure communication channels to support mobile users in a wide variety of organizations
Alumnus of west virginia university : An Alumnus of West Virginia University whishes to start an endowment that will provide scholarship money of $40,000 per year beginning in year 5 and continuing indefinitely. The donor plans to give money now and for each of the next 2 years. If th..
Analyze the importance of standardized data collection : Analyze the importance of standardized data collection and reporting in health care, and support your response. Next, determine two functions of standardized data collection that could improve the quality of health care services on a global scale
Most professional and education institutions use today : Ferent PDUs in the messages that you send. To do this, we'll use Wireshark, which is one of the world's foremost network protocol analyzers, and is the de facto standard that most professional and education institutions use today. It is used for netw..
Unleashing a boost of energy to individual : Voltage Energy Drink aims to rejuvenate the body and mind, unleashing a boost of energy to the individual also offering a great taste.
Sales and customer information in a flower shop : Let's analyze the following situation. You have access to the sales and customer information in a flower shop. You discover that the boyfriend of a woman you know is sending roses to three other women on a regular basis
Why was australia called new holland : Why was australia called new holland?
Create and submit a security policy : Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Show how an assembly might replace this pseudo-instruction

show how an assembly might replace this pseudo-instruction with the true instructions to achieve the same effect. You solution must observe MIPS register use conventions.

  Identify information requirements

Describe how the balanced scorecard with help management to identify information requirements. Discuss the IS system that you would recommend for management to use to obtain this information for each scorecard component. Remember to provide ratio..

  Explain kind of system real-time statistics

Permits customers to see real-time statistics like views and click-throughs about their current banner ads. Which kind of system will most efficiently give a solution.

  Fair and responsible use of college computer

Fair and Responsible Use of College Computers" and is based on the rules and regulation provided by your institution. Does your school have a similar policy? Does it contain all the elements listed in the text?

  What would be the financial advantage of a malware designer

What would be the financial advantage of a malware designer to create lots of different malicious code instances that all exploit the same vulnerability yet have different malware signatures?

  Write a complete program in a class named showdesign

Write a complete program in a class named ShowDesign that uses the DrawingPanel The window is 200 pixels wide and 200 pixels tall. The background is white and the foreground is black.

  Hat does mbsa do to check for weak local account passwords

hat does MBSA do to check for weak local account passwords?

  Incorporate the method into an application that reads

Incorporate the method into an application that reads two value from the user and displays the result

  Write a class encapsulating a course

I must include a constructor, the accessors and mutators, and methods toString and equals. As part of this assignment, I have to write a client class to test all the methods

  The quad procedure

What is the largest value of X that can be used with the QUAD procedure (see page 172)? Hint: At no time may any temporary result exceed 65535

  What is the general solution to handle such game trees

The min max algorithm cannot handle some games (even-with alpha-beta pruning) because of the depth of the search trees involved. What is the general solution to handle such game trees?

  Plans to update the website using css

Karina, just having completed a Web design course, was tasked by her project manager with updating the website for a nursing facility. Karina noticed that the website navigation bar was built in a table, which is not the preferred use of the t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd