Preview

Lab 2.6.2: Using Wireshark

Powerful Essays
Open Document
Open Document
2260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2.6.2: Using Wireshark
Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Learning Objectives

• Be able to explain the purpose of a protocol analyzer (Wireshark).

• Be able to perform basic PDU capture using Wireshark.

• Be able to perform basic PDU analysis on straightforward network data traffic.

• Experiment with Wireshark features and options such as PDU capture and display filtering.

Background

Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. Before June 2006, Wireshark was known as Ethereal.

A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can intercept and log data traffic passing over a data network. As data streams travel back and forth over the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications.

Wireshark is programmed to recognize the structure of different network protocols. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.

It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting.

For information and to download the program go to - http://www.Wireshark.org

Scenario

To capture PDUs the computer on which Wireshark is installed must have a working connection to the network and Wireshark must be running before any data can be captured.

When Wireshark is launched, the screen below is displayed.

[pic]

To start data capture it is first necessary to go to the Capture menu and select the Options choice.
The Options dialog provides a range of settings and filters which determines which and how much data traffic is captured.

[pic]
First, it is necessary to ensure that Wireshark is set to monitor

You May Also Find These Documents Helpful

  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Select an ARP frame labeled Who has ##.##.##.##? where ##.##.##.## is the default gateway address recorded on page 1. Make the Ethereal Application window full screen if it isn’t already full screen.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    In this lab, you explored the common tools available in the virtual lab environment. You used…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Comp230 wk4 Ilab

    • 822 Words
    • 4 Pages

    In the space provided below, copy and paste your IP_Array.vbs Program Code. If it doesn’t fit, use the next page for the continuation of your sourcecode program…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    vlab wk 1

    • 1842 Words
    • 9 Pages

    Copy and paste the following screenshots from your Using Show Commands to Investigate Network Status lab.…

    • 1842 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Cisco Works is a bundle of applications that can be used to configure LAN networks easily and efficiently, it includes error management software, Resource management software and a resource monitoring software. For example it provides real-time detailed detection, analysis, and reporting of device faults; often identifies problems before users realize they exist.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses a port within this UDP In port range to receive data packets from the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SIMD Architecture

    • 652 Words
    • 3 Pages

    Since the system is implemented in Manual, so the response is very slow. The transactions are executed in off-line mode, hence on-line data capture and modification is not possible.…

    • 652 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yuffgtf

    • 1299 Words
    • 7 Pages

    18. Tracks Various Activities – “TeleTrack provides the ability to view field activity from privacy of own private Internet website, and is password protected” [ (TeleTrack Time and Attendence solutions, 2007) ].…

    • 1299 Words
    • 7 Pages
    Satisfactory Essays