Preview

lab 5

Satisfactory Essays
Open Document
Open Document
440 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 5
Lab #5 Questions and Answers

1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis?

Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol captures. Wireshark does well at both aspects, which makes it a little better.

2. What is promiscuous mode and how does this allow tcpdump, Wireshark, and NetWitness Investigator to perform protocol capture off a live network?

Promiscuous mode is for a wired network interface controller or wireless network interface controller that causes the controller to pass all traffic to the CPU instead of passing only through the frames the controller is supposed to receive. It allows tcpdump, Wireshark, and NetWitness Investigator to perform protocol capture off a live network because it’s made for packet sniffing, which all these applications perform.

3. What is the significance of the TCP three-way handshake for applications that utilize TCP as a transport protocol? Which application in your protocol capture uses TCP as a transport protocol?

The significance of the TCP three-way handshake is that three messages are transmitted by TCP to negotiate and start a TCP session between the computers. The purpose is so that two computers can negotiate the parameters of the network TCP socket connection before transmitting the data. Wireshark is the application that uses TCP as a transport protocol.

4. How many different source IP host addresses did you capture in your protocol capture?

There were 6 different IP host addresses captured in the protocol capture.

5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?

6. Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to distinguish how many of each

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    To establish a connection, TCP uses a three-way handshake. Before a client attempts to connect with a server, the server must first bind to and listen at a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the three-way (or 3-step) handshake occurs:…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    CAPTURE A FRAME USING WIRESHARK FROM YOUR HOME COMPUTING NETWORK. EXPAND THE PART THAT SHOWS THE ETHERNET FRAME. TAKE A SCREEN DUMP (SHIFT PRINT SCREEN / PAINT) AND PASTE IT HERE.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Section I: Watch the video on the iLab page about Wireshark and answer the questions below.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    “Promiscuous mode is a mode for a wired network interface controller (NIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is intended to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a hub (instead of a switch) or one being part of a WLAN”. This allows tcpdump, Wireshark, and Netwitness Investigator to perform protocol capture off a live network.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NTC 406 Week 3

    • 362 Words
    • 1 Page

    Compare video, voice, and data formats. Identify at least three bandwidth techniques and how you would manage them with either UDP or TCP protocols.…

    • 362 Words
    • 1 Page
    Good Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    1. Which of the following protocols are examples of TCP/IP transport layer protocols? (More than one answer could be correct.)…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    5. What is the difference between a traditional IP Stateful Firewall and a Deep Packet Inspection Firewall?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Capsa Vs Wireshark

    • 1241 Words
    • 5 Pages

    Some users that do not have much experience might prefer Capsa over Wireshark due to all the capability through display. Capsa is easier to read and has much more options for visual aids unlike Wireshark. On the other hand if the user has some experience with networking they might prefer Wireshark due to the fact that it can support more protocols over Capsa and also that Wireshark is much cheaper than Capsa. Therefore witch ever tool the users are using there will be pros and cons but both of the tools are packet sniffing tool. With these tools the analysis can determine weather the network traffic are from the enemy or not. Each tools has it own use, if the user has the capability, one should never restrict themselves with just one tool and expand their mind and…

    • 1241 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    15 1.6 Significance of study…………………………………… .15 1.7 Definition of terms……………………………………… .15 1.8 Network criteria………………………………………… .16 1.9 Network monitoring tools……………………………….. 16 CHAPTER TWO 2.0 Review of related literature………………………………20 2.1 What is network monitoring……………………………...…

    • 8604 Words
    • 35 Pages
    Satisfactory Essays
  • Good Essays

    Osi References

    • 962 Words
    • 4 Pages

    ✦ The application layer on the receiving host consumes the network data produced and transmitted by the sender host.…

    • 962 Words
    • 4 Pages
    Good Essays