Write a display filter expression to count all tcp packets

Assignment Help Computer Networking
Reference no: EM131077475

Wireshark Packet Capture

Download the appropriate Wireshark platform and install it on your computer https://www.wireshark.org/download.html

View the below links for some Wireshark tutorials.

https://www.howtogeek.com/104278/how-to-use-wireshark-to-capture-filter-and-inspect-packets/

https://www.youtube.com/watch?v=y-4UQSXkqig

Search for online tutorials and other handy information, such as YouTube videos for using Wireshark in addition to the above.

Packet Capture Experiment Description Write the exact packet capture filter expressions to accomplish the following:

1. Capture all TCP traffic to/fromhttps://webcampus.wilmu.edu, during the time when you are logging in to your Webcampus account. Your capture should already be running.

2. Capture all HTTP traffic to/from Webcampus, when you log in to your Webcampus account

3. Find a popular YouTube video and play it while capturing all traffic to/from YouTube.

4. Save all your captured packets as you will need to submit them along with your report.

After you run Wireshark with the above capture filters and collect the data, do the following:

1. Write a DISPLAY filter expression to count all TCP packets (captured under item #1) that have the flags SYN, PSH, and RST set. Show the fraction of packets that had each flag set.

2. Use a DISPLAY filter expression to separate the packets sent by your computer vs. received from Webcampus and YouTube Note that when sniffing out TCP packets, you will be receiving TCP packets, SSL packets, and HTTP packets. This is because HTTP/SSL run on top of TCP and you capture their packets by default because they are subclasses of TCP packets. So, capture them all and store in a local database. Then use display filters to separate the subset of TCP packets that are also HTTP packets. (You can do this by filtering only packets on port 80). Note that some of your sessions, e.g., Facebook, may be using secure HTTP (HTTP/SSL or HTTPS), which uses the port number 443.

Report Preparation and Submission

The report should contain the following information:

Location where the experiments were run (University campus/lab, home, other) and the type of your computer. Exact Wireshark filters used for capture and display. To improve the readability of your report, provide the filter expressions in separate lines and use the Courier font to write the filters. Screenshots of the filters results Explanation for every component of your filter expressions. The exact URL for all Youtube videos that you visited for this experiment. Include any reference sources. Attach the captured packets files to your submission.

Reference no: EM131077475

Questions Cloud

Opportunity to receive and respond to instructor feedback : After you submit your assignment on time, you will have the opportunity to receive and respond to instructor feedback. Guided by specific feedback provided by your instructor, you will be able to make improvements to your assignment and potentiall..
Describe merits of social and behavioral science policies : Discuss the influences of social, organizational and individual factors on the use of information technology by end users. Engage in dialogue and learning from others to advance public health goals.
What recommendations do you suggest to help keep training : From my experience, including screen shots seem to help. Lynn and class, what recommendations do you suggest to help keep training interesting?
Complete external analysis - elements in the pest analysis : Complete your external analysis using each of the four elements in the PEST analysis. When considering economic data, use the most current data you can find.
Write a display filter expression to count all tcp packets : Write a DISPLAY filter expression to count all TCP packets (captured under item #1) that have the flags SYN, PSH, and RST set. Show the fraction of packets that had each flag set.
Write a c++ interface for the set : Then write a C++ interface for the set. Include javadoc -style comments in your code.
The following system of non-linear equations : 1. In an Excel worksheet titled "Solver", solve the following system of non-linear equations using the Solver and find u, v, and t. Eqn
Middle eastern market : Lydia went out of town and wanted someone to feed her pet. Joe told me he gave her cat food. He has no reason to lie, and so I believe him. So, Joe gave Lydia cat food. That's a bizarre going away gift. So Joe gives very strange gifts.
Post your thoughts on perception vs reality of cyber threat : Read the article "Cyber Security Risk: Perception vs. Reality in Corporate America". After reading the article, please post your thoughts on the perception vs. reality of a cyber threat against a SCADA system.

Reviews

Write a Review

Computer Networking Questions & Answers

  What version of http is the server running

List and discuss the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.

  Previous to the present network set-up your friends shop

your friend has a small design shop with windows nt 4.0 windows 2000 and windows xp workstations. he has one older

  Make case for assigning unique flow label to each long-term

The question arises as to which packets generated by a source should carry nonzero IPv6 flow labels. For some applications, the answer is obvious. Small exchanges of data should have a zero flow label because it is not worth creating a flow for a ..

  An application-level and a circuit-level one

What is a gateway, and what is the difference between an application-level and a circuit-level one?

  Create an access list that will allow your pptp

Your home IP address is 182.50.142.98. Your server is located at 144.39.203.50 and the PPTP service uses TCP 1723. create an access list that will allow your PPTP connection,deny other PPTP connections,and permit all other traffic

  What is effect of singlebit transmission error in ciphertext

What is the effect of a single-bit (transmission) error in the ciphertext when using the ECB and CBC modes of operation?

  The interconnections between network devices

The interconnections between network devices and The Internet cloud, generically, to represent your network's interface to the Internet

  Where will you use routing switching and bridging

What are the top two network-related factors that should be kept in mind while selecting routers for this network and why? Where will you use routing, switching, and bridging on the organization's network and why

  Cd-quality music channels can be transmitted over ethernet

Determine how many CD-quality music channels can be transmitted simultaneously over the 10-Mbps Ethernet, assuming that no other traffic is performed on same network and ignoring overhead?

  What kind of os to use all along with the file system and

the cto informed you that the board of executives showed great interest in building a new network based on the work you

  What cli command does produce the output below

What CLI command does produce the output below. Complete the table below based on the dynamic routes displayed in the routing table above.

  How network design support dial-up or vpn remote access

Explain whether or not network design will support dial-up or VPN remote access. Write down the disadvantages to solution. - Format your paper according to APA standards. - Write a minimum of two references.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd