Most professional and education institutions use today

Assignment Help Basic Computer Science
Reference no: EM13754237

Wireshark. Answer only deliverables below

Seeing the PDUs in Your Messages

We talked about how messages are transferred using layers and the different Protocol Data Units (PDUs) used at each layer. The objective of this Activity is for you to see the dif-

ferent PDUs in the messages that you send. To do this, we'll use Wireshark, which is one of the world's foremost network protocol analyzers, and is the de facto standard that most professional and education institutions use today. It is used for network troubleshooting, network analysis, software and communications protocol development, and general education about how networks work. computer, as well as some or all of the messages sent by other computers on your LAN, depending on how your LAN is designed. Most modern LANs are designed to prevent you from eavesdropping on other computer's messages, but some older ones still permit this. Normally, your computer will ignore the messages that are not addressed for your computer, but Wireshark enables you to eavesdrop and read messages sent to and from other computers.

Wireshark is free. Before you start this activity, download and install it from www.wireshark.org.

1. Start Wireshark.

2. Click on Capture and then Interfaces. Click the Start button next to the active interface (the one that is receiving and sending packets). Your network data will be captured from this moment on.

3. Open your browser and go to a Web page that you have not visited recently (a good one is www.iana.org).

4. Once theWeb page has loaded, go back toWireshark and stop the packet capture by clicking on Capture and then Stop (the hot key for this is Ctrl + E).

5. You will see results similar to those in Figure 1-9. There are three windows below the tool bar:

a. The top window is the Packet List. Each line represents a single message or packet that was captured by Wireshark. Different types of packets will have different colors. For example, HTTP packets are colored green. Depending on how busy your network is, you may see a small number of packets in this window or a very large number of packets.

b. The middle window is the Packet Detail. This will show the details for any packet you click on in the top window.

c. The bottom window shows the actual contents of the packet in hexadecimal format, so it is usually hard to read. This window is typically used by network programmers to debug errors.

6. Let's take a look at the packets that were used to request the Web page and send it to your computer. The application layer protocol used on the Web is HTTP, so we'll want to find the HTTP packets. In the Filter toolbar, type http and hit enter.

7. This will highlight all the packets that contain HTTP packets and will display the first one in Packet Detail window. Look at the Packet Detail window in Figure 1-9 to see the PDUs in the message we've highlighted. You'll see that it contains an Ethernet II Frame, an IP packet, a TCP segment, and an HTTP packet. You can see inside any or all of these PDUs by clicking on the +box in front of them. In Figure 1-9, you'll see that we've clicked the +box in front of the HTTP packet to show you what's inside it.

Deliverables

1. List the PDU at layers 2, 3, and 4 that were used to transmit your HTTP GET packet.

a. Locate your HTTP Get packet in the Packet List and click on it.

b. Look in the Packet Detail window to get the PDU information.

2. How many different HTTP GET packets were sent by your browser? Not all the HTTP packets are GET packets, so you'll have to look through them to

3. List at least five other protocols that Wireshark displayed in the Packet List window. You will need to clear the filter by clicking on the "Clear" icon that is on the right of the Filter toolbar.

Reference no: EM13754237

Questions Cloud

Explain the capstone checkpoint end of the cold war : Explain the Capstone CheckPoint End of the Cold War.
The proliferation of mobility and mobile applications : Instructions: The proliferation of mobility and mobile applications in enterprise networks has increased the importance of mobile VPNs to provide secure communication channels to support mobile users in a wide variety of organizations
Alumnus of west virginia university : An Alumnus of West Virginia University whishes to start an endowment that will provide scholarship money of $40,000 per year beginning in year 5 and continuing indefinitely. The donor plans to give money now and for each of the next 2 years. If th..
Analyze the importance of standardized data collection : Analyze the importance of standardized data collection and reporting in health care, and support your response. Next, determine two functions of standardized data collection that could improve the quality of health care services on a global scale
Most professional and education institutions use today : Ferent PDUs in the messages that you send. To do this, we'll use Wireshark, which is one of the world's foremost network protocol analyzers, and is the de facto standard that most professional and education institutions use today. It is used for netw..
Unleashing a boost of energy to individual : Voltage Energy Drink aims to rejuvenate the body and mind, unleashing a boost of energy to the individual also offering a great taste.
Sales and customer information in a flower shop : Let's analyze the following situation. You have access to the sales and customer information in a flower shop. You discover that the boyfriend of a woman you know is sending roses to three other women on a regular basis
Why was australia called new holland : Why was australia called new holland?
Create and submit a security policy : Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare how the gestures data is generated and represented

Analyze the accuracy of the input generated by each of the following input devices compared to electrical signals based methods of processing

  Write overall approach when application developer needs data

Describe overall approach when application developer needs to show in form data from the database table

  Identify create, update, and delete privileges

Part 1: Identify Create, Update, and Delete PrivilegesFor each piece of information, first identify who has create, update, and delete privileges. Include any individuals or departments that have these sorts of information privileges. There may be se..

  Write program displays the following pattern on the screen

Write a program that displays the following pattern on the screen

  Explaining multicategory case a set of samples

In multicategory case a set of samples is said to be linearly separable if there exists linear machine which can classify them all correctly.

  What features would you look for on the switches

What features would you look for on the switches you purchase for design and explain why you would want each feature. Do you need to include any other devices in this design?

  Write a simple program in which the value added three times

Write a simple program in which the value, $55, is added three times HCS12

  Explaining resulting scheme is not ind-cpa-secure

Let a variant of CBC-mode encryption where sender simply increments the IV by 1 each time a message is encrypted. Illustrate that resulting scheme is not IND-CPA-secure.

  Ratio of the frequency of the second processor to first one

The frequency of the processor is proportional to the voltage at which it is run. Considering only dynamic power, what will be the ratio of the frequency of the second processor to the first one?

  Estimate the final dbm value for a radio

Estimate the final dBm value for a radio if the radio has .1 Watt of power, if there is a 4:1 amplifier before transmission, and if there is attenuation to 1/8 the original signal strength between the sender and receiver.

  Describe the output following series of stack operations

Describe the output of the following series of stack operations: push(5),push(3), push(2), push(8), pop(), top(), push(9), push(1), pop(), push(7),push(6), top(), pop(), push(4), pop()

  Deterministic context free and context free grammar

Classify the languages given below as a) deterministic context free, b) context free but not deterministic, c) not context free. Give explanantion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd