Most professional and education institutions use today

Assignment Help Basic Computer Science
Reference no: EM13754237

Wireshark. Answer only deliverables below

Seeing the PDUs in Your Messages

We talked about how messages are transferred using layers and the different Protocol Data Units (PDUs) used at each layer. The objective of this Activity is for you to see the dif-

ferent PDUs in the messages that you send. To do this, we'll use Wireshark, which is one of the world's foremost network protocol analyzers, and is the de facto standard that most professional and education institutions use today. It is used for network troubleshooting, network analysis, software and communications protocol development, and general education about how networks work. computer, as well as some or all of the messages sent by other computers on your LAN, depending on how your LAN is designed. Most modern LANs are designed to prevent you from eavesdropping on other computer's messages, but some older ones still permit this. Normally, your computer will ignore the messages that are not addressed for your computer, but Wireshark enables you to eavesdrop and read messages sent to and from other computers.

Wireshark is free. Before you start this activity, download and install it from www.wireshark.org.

1. Start Wireshark.

2. Click on Capture and then Interfaces. Click the Start button next to the active interface (the one that is receiving and sending packets). Your network data will be captured from this moment on.

3. Open your browser and go to a Web page that you have not visited recently (a good one is www.iana.org).

4. Once theWeb page has loaded, go back toWireshark and stop the packet capture by clicking on Capture and then Stop (the hot key for this is Ctrl + E).

5. You will see results similar to those in Figure 1-9. There are three windows below the tool bar:

a. The top window is the Packet List. Each line represents a single message or packet that was captured by Wireshark. Different types of packets will have different colors. For example, HTTP packets are colored green. Depending on how busy your network is, you may see a small number of packets in this window or a very large number of packets.

b. The middle window is the Packet Detail. This will show the details for any packet you click on in the top window.

c. The bottom window shows the actual contents of the packet in hexadecimal format, so it is usually hard to read. This window is typically used by network programmers to debug errors.

6. Let's take a look at the packets that were used to request the Web page and send it to your computer. The application layer protocol used on the Web is HTTP, so we'll want to find the HTTP packets. In the Filter toolbar, type http and hit enter.

7. This will highlight all the packets that contain HTTP packets and will display the first one in Packet Detail window. Look at the Packet Detail window in Figure 1-9 to see the PDUs in the message we've highlighted. You'll see that it contains an Ethernet II Frame, an IP packet, a TCP segment, and an HTTP packet. You can see inside any or all of these PDUs by clicking on the +box in front of them. In Figure 1-9, you'll see that we've clicked the +box in front of the HTTP packet to show you what's inside it.

Deliverables

1. List the PDU at layers 2, 3, and 4 that were used to transmit your HTTP GET packet.

a. Locate your HTTP Get packet in the Packet List and click on it.

b. Look in the Packet Detail window to get the PDU information.

2. How many different HTTP GET packets were sent by your browser? Not all the HTTP packets are GET packets, so you'll have to look through them to

3. List at least five other protocols that Wireshark displayed in the Packet List window. You will need to clear the filter by clicking on the "Clear" icon that is on the right of the Filter toolbar.

Reference no: EM13754237

Questions Cloud

Explain the capstone checkpoint end of the cold war : Explain the Capstone CheckPoint End of the Cold War.
The proliferation of mobility and mobile applications : Instructions: The proliferation of mobility and mobile applications in enterprise networks has increased the importance of mobile VPNs to provide secure communication channels to support mobile users in a wide variety of organizations
Alumnus of west virginia university : An Alumnus of West Virginia University whishes to start an endowment that will provide scholarship money of $40,000 per year beginning in year 5 and continuing indefinitely. The donor plans to give money now and for each of the next 2 years. If th..
Analyze the importance of standardized data collection : Analyze the importance of standardized data collection and reporting in health care, and support your response. Next, determine two functions of standardized data collection that could improve the quality of health care services on a global scale
Most professional and education institutions use today : Ferent PDUs in the messages that you send. To do this, we'll use Wireshark, which is one of the world's foremost network protocol analyzers, and is the de facto standard that most professional and education institutions use today. It is used for netw..
Unleashing a boost of energy to individual : Voltage Energy Drink aims to rejuvenate the body and mind, unleashing a boost of energy to the individual also offering a great taste.
Sales and customer information in a flower shop : Let's analyze the following situation. You have access to the sales and customer information in a flower shop. You discover that the boyfriend of a woman you know is sending roses to three other women on a regular basis
Why was australia called new holland : Why was australia called new holland?
Create and submit a security policy : Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd