Application to exploring network packet capture, Computer Networking

This lab introduces basic network capture concepts using Wireshark.


You will need a PC running Windows for this lab and you will need to install the Wireshark software which you can download from the Internet or which you can get from your instructor.
From the Windows command line:
> ftp
> Webster:" this is username"
> password"abc123"
> mget wire*
> bye

2.1. Installing the Wireshark Software

• Run the wireshark.exe install program from the command window (wireshark.exe)
• Accept the default options. If prompted, DO NOT REBOOT YOUR PC. SELECT REBOOT LATER.
• When the installation is complete, and Wireshark is running, select a network interface via the top menu. (Capture | Interfaces)
o Open a command window and determine your PC's IP address via the ipconfig command.
o Select/Start the interface matching your IP address (Ask for help if you have multiple interfaces and don't know which one to choose)
o If packet capture begins automatically, stop or pause it (Capture | Stop).

Posted Date: 3/21/2013 2:22:26 AM | Location : United States

Related Discussions:- Application to exploring network packet capture, Assignment Help, Ask Question on Application to exploring network packet capture, Get Answer, Expert's Help, Application to exploring network packet capture Discussions

Write discussion on Application to exploring network packet capture
Your posts are moderated
Related Questions
Question Which elementary logic gate is equivalent to this circuit? Show your working.

DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t

Problem 1 Bring out the differences between POP and IMAP4 Problem 2 Discuss User Datagram protocol Problem 3 Explain the various steps in TCP congestion control

What is difference between baseband and broadband transmission? In a baseband transmission, the whole bandwidth of the cable is consumed by a one signal. In broadband transmiss

What is the internal IP address There is a separate set of IP address for a company's internal use, more popularly known as "internal IP address" or subnet IP address. This IP

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Question 1 Write short notes on Reserved IP addresses and Special use IP addresses 2 Explain about the packet switching mechanism based on Virtual Circuit 3 Explain about

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean

Determine the Difficulties arise with database connectivity A number of difficulties arise with database connectivity and the company may have to shell out an enormous amount