Preview

NETW202 W2 Lab Report Perry

Satisfactory Essays
Open Document
Open Document
1389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW202 W2 Lab Report Perry
Anthony Perry
NETW202, Robert Meadows
Current Date 3-15-15 iLab #2, Introduction to Wireshark

Lab Report

Section I: Watch the video on the iLab page about Wireshark and answer the questions below.

1. Is Wireshark open source or proprietary? What does it mean to be open source versus proprietary in the first place? Give an example of something that is open source versus something that is proprietary in the field of networking and telecommunications. (1 point)
Wireshark is Open Source. Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose

2. What is seen in each of the three panes that display the packets seen on a local area network? Hint: For full credit, you must talk about what is displayed in each pane in addition to the name of each pane. (1 point)
Tree view pane- allows the hierarches view of the header view details
Byte view pane- raw data 10x bytes per row.
Packet list pane- shows packets and the information on each packet, that is separated info columns
3. What does a display filter do? Where do you add in a display filter? (1 point)
Allows you to define which packets are displayed in the list pane. You would add it into the filter fields.

4. What does the protocol column show? How can this be helpful to you when troubleshooting? (1 point)
This column shows the protocol that the packet is using. It would be useful when trying to decide if the proper protocol is being used and if it is causing a conflict which could shut the system or program down.

5. How do you expand the details in a layer of the packet in the middle frame? What is shown when you expand the details of a packet? (1 point)
By clicking the (+) sign. The protocol the packet is using as well as the packet information.

6. Wireshark capture files have what file name extension? (1 point) pcapng 7. The time

You May Also Find These Documents Helpful

  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    b. SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number, and the sequence number that the server chooses for the packet is another random number.…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What Field in the TCP header contains a well known port number that maps to the Application that will handle the segment Data Stream?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Network software uses this when my IP does not match any routes on routing chart.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NET310 ILab5

    • 304 Words
    • 1 Page

    2. What is seen in each of the three panes that display the packets seen on a local area…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netstat

    • 481 Words
    • 2 Pages

    1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    Which of the following is not an item that can be used when building Windows Firewall rules?…

    • 436 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    OSI stands for Open Systems OSI model. It is based on a proposal, developed by International Standard Organization (ISO) as a first step towards International standardization of the proposal used in the various layers (Day and Zimmerman 1988).It was revised in 1995.The Model is called ISO OSI(Open System Interconnection) reference model. The OSI has seven layers, placed in a Stack format. The principles that are applied to arrive at the seven layers are. A layer should be created where different abstraction is needed. Each layer performs a well defined function. The function of each layer should be chosen with an eye towards defining Internationally Standard Protocols. The layer boundaries should be chosen to minimize the ‘Information Flow’ across the interface. The number of layer should be large enough that distinct function need not be thrown together in the same layer out of necessity that small enough that the architecture does not become unwieldy. It was created as a framework and reference model to explain how different networking technologies work together and interact. It is not a standard that networking protocols must follow. It is the backbone of Networking.…

    • 320 Words
    • 1 Page
    Satisfactory Essays