Application to exploring network packet capture, Computer Networking

This lab introduces basic network capture concepts using Wireshark.

Setup

You will need a PC running Windows for this lab and you will need to install the Wireshark software which you can download from the Internet or which you can get from your instructor.
From the Windows command line:
> ftp nosrednab.exavault.com
> Webster:" this is username"
> password"abc123"
> mget wire*
> bye

2.1. Installing the Wireshark Software

• Run the wireshark.exe install program from the command window (wireshark.exe)
• Accept the default options. If prompted, DO NOT REBOOT YOUR PC. SELECT REBOOT LATER.
• When the installation is complete, and Wireshark is running, select a network interface via the top menu. (Capture | Interfaces)
o Open a command window and determine your PC's IP address via the ipconfig command.
o Select/Start the interface matching your IP address (Ask for help if you have multiple interfaces and don't know which one to choose)
o If packet capture begins automatically, stop or pause it (Capture | Stop).

Posted Date: 3/21/2013 2:22:26 AM | Location : United States







Related Discussions:- Application to exploring network packet capture, Assignment Help, Ask Question on Application to exploring network packet capture, Get Answer, Expert's Help, Application to exploring network packet capture Discussions

Write discussion on Application to exploring network packet capture
Your posts are moderated
Related Questions
As we previously know, the merge sort algorithm needs two circuits, i.e. one for merging and second for sorting the sequences. Thus, the sorting circuit has been derived from the a


User Datagram Protocol - UDP is a connectionless oriented transport protocol for use when the upper layers give error-recovery and reliability. UDP does not series data or re-assem

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro

Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A

Name the three ways or wireless data to be propagated.

A typical layer 2 switch has a number of features. Identify and explain 5 features that you think are important that you would consider in your evaluation of L2 switches offered b

When we specifically block, single router update for other routers

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.