Use wireshark tool to capture packets when you download

Assignment Help Operating System
Reference no: EM13380241

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet.  It is advisable that you have attempted the packet capture exercises using Wireshark that are scheduled for Weeks 7-9. This task cannot be completed in any CQUniversity lab.

a) Submit the captured pcap file.  You should filter the file so that only TCP traffic is included.

b) What is the server IP address?

c) What is the application layer protocol involved?

d) What is the client port number for data download?

e) What is the server port number for data download?

f) How many data bytes have been downloaded?

g) What is the size of the downloaded Lecture 1 file?

h) Discuss the difference in your answers to parts f) and

g).  You need to consider the packets formats in your discussion.

Reference no: EM13380241

Questions Cloud

Write two page paper describing xml and json what are they : write two page paper describing xml and json. what are they? why do we need them? are there certain applications that
1 with what kind of network device router or switch do you : 1 with what kind of network device router or switch do you replace device 1 device 2 and device 3? and why? notenbsp
Study carefully the following network topology it is : study carefully the following network topology. it is required that the small business smart office services pty ltd
A rural medical centre in australia plans to improve its : a rural medical centre in australia plans to improve its services to the community by providing telemedicine and
Use wireshark tool to capture packets when you download : use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you
Consider the following udp header dumpbb400045003aff10a : consider the following udp header dumpbb400045003aff10a identify the source port number.b identify the destination port
An organisation has been granted a block of addresses : an organisation has been granted a block of addresses starting with the address 172.154.68.022.a create three subnets
Question nbsprouter x running rip has the following routing : question nbsprouter x running rip has the following routing tabledestinationcostnext routernet17anet23bnet34cnet43da
Security risk assessment is an invaluable tool in an it : security risk assessment is an invaluable tool in an it professionals quest to protect a companys information assets.

Reviews

Write a Review

Operating System Questions & Answers

  Advantages of using smart cards for identification

Describe the advantages of using smart cards for identification and provide at least three examples.

  Java application using the java semaphore

Implementation for problem must only use the semaphore methods to control the concurrency of your solution - Implement a solution to this problem as a Java application using the Java semaphore

  Oracle datatypes for the attributes

Choose Oracle datatypes for the following attributes from a normalized relation including:

  Open systems interconnection model

Discuss the drawbacks and benefits of each of these standards, OSI/CMIP, SNMP/Internet, and TMN. Give any enhancements to these standards.

  Question about processing packets

A CPU in a router can procedure two million packets/sec. The load offered to it is 1.5 million packets per sec. If the route from source to destination contains ten routers

  Select one of two possible short reportsfor your second and

select one of two possible short reportsfor your second and final assignment in this class i would like to ask you to

  Database statistics

In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.

  A plug in and a helper application

Discuss similarities and differences between a plug-in and a helper application?

  How unix administrator distribute the message

I was recently working on our mainframe UNIX system, and suddenly I received a message that the server required to be rebooted on my screen.

  Trends in information management

Assume you have been asked to join with many other IT professionals for an hour on the local cable channel, discussing some of the current trends in information management,

  Creating a system life cycle chart

Create a system life cycle chart, utilizing Microsoft Word, Microsoft PowerPoint, or Microsoft Visio. The chart must include detailed descriptions of the activities performed in each of the following areas:

  Describe a client or server protocol used in everyday life

Suppose a time-sharing operating system allocated time slices of 20 milliseconds and the machine executed an average of 5000 instructions per microsecond. How many instructions could be executed in a single time slice?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd