Describe the exact packet capture that you are analyzing

Assignment Help Computer Engineering
Reference no: EM132187339

IT- Wireshark capturing packets help! i need to capture a packet from a "home LAN" and ping any website (example: can be google.com)

Objective:

The objective of this project is to demonstrate your ability to capture live packets using Wireshark and analyze the data. As a networking professional, the ability to diagnose network problems using tools, such as Wireshark, is essential and necessary. This project will also enable you to apply your TCP/IP networking knowledge gained from this class in a real world scenario.

Instructions:

Obtain a copy of Wireshark (if you don't have one).

Turn the capture on.

Issue a ping command from your command prompt. Example would be ping google.com

Requirements:

1. Describe the exact packet capture that you are analyzing. A paragraph worth of explanation is needed to clearly state the problem statement and the objective.

2. Draw a diagram that illustrates the layers of encapsulation for your captured packet.

3.Your entire packet capture (1 of them) should be included as a HEX string value (Refer to the extra credit problem from the Midterm for an example of a packet HEX string. Note that you cannot use the HEX dump from the Midterm for this project. You must capture your own packet using Wireshark).

4. Captured packet (in HEX) should be color-coded and clearly labeled to show which color indicates which layer of encapsulation. If you do not have a color printer, you can use a color highlighter (Different colors for different parts of the packet capture). Indicate which color corresponds to which encapsulation.

5.Each part of the Ethernet frame should be described. Destination addr, Source addr, type, payload, and CRC (if any). Depending on the version of your Wireshark, you may or may not see CRC value at the end of an Ethernet Frame.

6. Each part of the IP packet should be identified.

7. The IP header should be decoded with all values clearly stated. HEX values should be decoded in decimal.

8. The payload of an IP packet should be identified (UDP, TCP, ICMP, etc.)

9.Your work MUST be neat, clearly organized, and easy to follow. Avoid ambiguities and don't leave anything for me to assume.

10.Your work must be your own. I will know because each MAC address is unique as well as some other values in each header. You are required to attach the actual HEX output capture from Wireshark.

Reference no: EM132187339

Questions Cloud

Discuss your experiences with bluetooth hacking : Discuss how they would envision the devices that they own working together and how that might be done in a secure manner.
What kind of desert is death valley : Look at a map of where, in California, Death Valley is; what kind of desert is Death Valley?
Why not use one-way hash functions instead of hmacs : If HMACs have the properties similar to one-way hash functions then why not use one-way hash functions instead of HMACs?
How many bits are in the net id : How many bits are in the net id? What is the mask in binary, dotted decimal, and slash notation?
Describe the exact packet capture that you are analyzing : Describe the exact packet capture that you are analyzing. A paragraph worth of explanation is needed to clearly state the problem statement.
Describe the stages of preliminary systems investigations : Write a memo to Victoria detailing the need for strategic planning and describing the stages of preliminary systems investigations.
What is a la nina weather event : What is a La Nina weather event? Explain why it occurs. Should we expect wetter winters or dryer winters in L.A. when it occurs?
Find metamorphic rocks : Relate the formation of metamorphic rocks to plate tectonics. Would you expect to find metamorphic rocks at all three types of plate boundaries? Why or why not?
North central pacific basin : Why might it be uncommon to find carbonate ooze in the north central Pacific basin?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down an assembly language program

Write down an assembly language program The product number from one to five (3 characters wide, right justified)

  How has virtualization fuel business interest in data center

How/why has virtualization fueled business interest in data center consolidation? Discuss pros of using consultants to manage data center consolidation project?

  Calculate gate length of my laptop cpu using its clock speed

How can I calculate gate length of my laptop cpu using its clock speed rate like i7- 2.3 Ghz? that is all i got to do the calculations. of course it would be ok to have some reasonable assumptions.

  Calculate the square root of the values and print the values

Calculate the square root of the values and print the values and their corresponding square roots to a file, "output.txt" in a format.

  Write down mips program that prompts user for a string

Write down MIPS program that prompts user for a string

  Describe how a computer and information systems manager

describe how a computer and information systems manager could effectively manage in a virtual environment based on

  Draw a dfa that recognizes language l

Consider language L equal to the set of strings on the alphabet {a, b} such that the final symbol in the string has not appeared earlier in the string.

  Why using euler''s method is the simplest numerical method

This is being solved by computer code in c++ to obtain numerical approx to ODE. Using Euler's method is the simplest numerical process for approximation solving initial value ODE'S.

  What are the possible inputs to your ai system

What are the possible inputs to your AI system? and how will your AI system use these inputs ? what kind of Agent would you use ? what is PEAS in this case ?

  Harley-davidson implements rfid

When Harley-Davidson implements RFID, it will likely use the technology to help manage its relationships with its main customers, which are the local dealerships that sell motorcycles and use replacement parts in their shops.

  How do they differ from the tools you use

What tools do you find most useful in managing projects

  Establish a new shared secret

Suppose that two strangers A and B want to communicate with each other using secret- key cryptography, but do not share a key. Suppose both of them trust a third party C whose public key is well known. How can the two strangers establish a new shar..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd