Protocols that appear in the protocol column

Assignment Help Basic Computer Science
Reference no: EM131406800

What to hand in

The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you've been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation:

  1. List up to 10 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7
  2. How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packet- listing window is the amount of time, in seconds, since Wireshark tracing began. To display the Time field in time-of-day format, select the Wireshark View pull down menu, then select Time Display Format, then select Time-of-day.)
  3. What is the Internet address of the gaia.cs.umass.edu (also known as www- net.cs.umass.edu)? What is the Internet address of your computer?
  4. Print the two HTTP messages displayed in step 9 above. To do so, select Print from the Wireshark File command menu, and select "Selected Packet Only" and "Print as displayed" and then click
  5. Lab Report

Write a minimum of two type-written pages with a minimum of 12-point font describing what you learned in the lab. Do NOT simply repeat the steps you performed, summarize the purpose of the lab by explaining the concepts covered.

Your lab report will be submitted automatically to turnitn.com (Links to an external site.) when you submit it to Canvas. You do not need to do anything besides submit the assignment to Canvas. Be sure you write your report in your own words. If you don't I will know it and you will receive zero points for the lab and face possible other consequences. Although you may work with other to compete the lab procedure, your report MUST be your original work.

Reference no: EM131406800

Questions Cloud

Identify examples of 19th century impressionist painting : The Project Paper focuses on a suggested topic related to art, architecture, history, music, or literature. The project will reflect your views and interpretation of the topic. This project is designed to help you stretch your mind and your abilit..
Determine the regression equation : Determine the regression equation and test the hypothesis that the population slope is zero using a 1% level of significance.
Disadvantages of losing languages : What are the advantages and disadvantages of losing languages? Overall, is it a significant problem?
Interface design strategy of guidance for user : Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.
Protocols that appear in the protocol column : The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you've been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, bas..
Discuss the interpersonal communication in the workplace : Utilizing publicly available search engines, identify an example whereby lack of information sharing among criminal justice organizations may have contributed towards a negative outcome. Discuss some factors that served as a barrier to exchanging..
Numeric value for first-case sensitive java type for second : The array stores _______________   values of ________________   type. (numeric value for first; case sensitive Java type for second)  The first element, x[______  ], is initialized to ___________  .  (numeric values)
Differences between 3g and 4g : Interpret the differences between 3G and 4G, analyse what forces, technological or otherwise, brought 4G into existence, and predict the next steps (5-10 years) of cellular access technology.
What is the state of the steam leaving the heating coils : what is the state of the steam leaving the heating coils of the evaporator? For a surroundings temperature of 300 K, make a thermodynamic analysis of the process.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Do systems connected to the internet violate the principle

Given that the Internet is a shared network, discuss whether preventing denial of service attacks is inherently possible or not possible. Do systems connected to the Internet violate the principle of least common mechanism?

  Importance in technological innovation in firm

What is technology diffusion and discuss its importance in technological innovation in a given firm?

  How would this change affect the project technology

The project controls manager decides to change the software his team uses to track project activities from Microsoft Project to Primavera. Few of the staff in that department are familiar with Primavera. How would this change affect the project te..

  How success or failure of restoration effort is estimated

Expalin why and how is success or failure of restoration effort estimated? Write down some significant considerations in creating monitoring plan to estimate restoration effort?

  Calculate the cyclomatic complexity number

a. Construct a control flow graph for one of the modules in the program. b. Calculate the cyclomatic complexity number for one of the modules in the program. c. Construct the design flow graph for the program. d. Calculate the design complexity of th..

  Describe the areas of technical design

Describe the areas of technical design in which data visualization is important. How does data visualization differ from traditional engineering graphics?

  Describe history of portfolio design in graphics design

Describe the history of portfolio design in the graphics design industry, and role of a graphic designer. Discuss current trends in portfolio design, and the possible future technologies for the industry.

  An msp430-based system interfaces 4 external devices

An MSP430-based system interfaces 4 external devices (ED0, ED1, ED2, ED3), each capable of generating an interrupt request.

  How this systematic method may be developed

how this systematic method may be developed.

  Commercial project for an institution

You are a software developer doing a commercial project for an institution. Taking Python as your development language, give two advantages of using python for that task.

  Identify the primary key

Consider the following tables: CLIENT(CL_ID, CL_LNAME, CL_FNAME, CL_PHONE) PROJECT(PR_CODE, PR_DESCRIPTION, PR_PRICE, CL_ID)

  Expected rate of return on investment

Modigliani and Miller's Proposition 1 and 2 are contradictory. Shareholders cannot be indifferent to the use of debt when it increases the expected rate of return on their investment. Comment on this statement.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd