Analyze tcp/ip traffic streams

Assignment Help Computer Network Security
Reference no: EM133199081

Assignment - DNS, IP, and TCP Traffic Streams

Preparation
Download and install the TCP/IP packet capture program

Decide on a website of your choice for which you will capture and analyze TCP/IP traffic streams and identify the URL of your selected website?
Use the Week 7 Assignment Template to complete and upload your work to the courseroom.
Resources
Wireshark Documentation.
Wireshark Frequently Asked Questions.
Wireshark User''s Guide - Chapter 2: Building and Installing Wireshark.
Wireshark Essential Training.

Overview
Each protocol in the TCP/IP stack uses a specialized packet to transmit and receive data and protocol-specific information at its layer of the protocol stack. For example, there is the TCP segment packet at the TCP layer and there is the IP datagram packet at the IP layer that encapsulates or includes the TCP segment as its data. Packet capture programs like Wireshark allow us to capture these TCP/IP packets as frames from a network interface card that is connected to the Internet. More importantly, these packet capture programs enable us to analyze TCP/IP traffic and examine the networking information therein.

In this assignment, you will use Wireshark to capture and analyze the DNS, IP, and TCP packets of the traffic streams associated with browsing a website of your choice. You will document your capture and analysis with screenshots highlighting the key information analyzed. You will also explain what you did, interpret the result of your analysis, and reflect on this learning experience in a one-page written summary.

Instructions
Start the TCP/IP packet capture program Wireshark.
Configure Wireshark Time Display Format to display time as "Date and Time of Day" as follows: View > Time Display Format > Date and Time of Day
Do not use the default configuration of Time Display Format as "Seconds Since the Beginning of Capture."
Start Wireshark Capture on your network interface that is connected to the Internet.
In a web browser window, type in the URL of your chosen website and hit ENTER to browse to the website.
Stop Wireshark Capture after a few seconds.
Analyze the Wireshark frame that encapsulates the DNS query about your chosen URL to identify:
The IP address of your network interface as the source IP address.
The URL of your chosen website.
The DNS Queries part of the frame.
Screenshot your identified frame, similar to figure 1.a, below. On the screenshot, highlight the IP address of your network interface as the source IP address, the URL of your chosen website, and the DNS Queries part of the frame.

The line containing the IP address of the network interface is highlighted in red with a note stating "Time displayed as Date and Time of Day." Queries section of the window is also highlighted, including the following text under the Queries heading: www.ibm.com: type A, class IN.

Reference no: EM133199081

Questions Cloud

Communicating the research results effectively : You will practice evaluating and summarizing published scientific research and communicating the research results effectively.
How might mattel have avoided the issues : To what extent is Mattel responsible for issues related to its production of toys in China? How might Mattel have avoided these issues?
Differences between efficacy and effectiveness : What are the differences between efficacy and effectiveness, according to the FDA?
How the knowledge skills or theories of course have applied : How the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
Analyze tcp/ip traffic streams : Decide on a website of your choice for which you will capture and analyze TCP/IP traffic streams and identify the URL of your selected website
Virtual determining population growth : Calculate the birth rate (b) of this population. What is the per capita rate of increase for this black bear population?
Find total interest earned : You want to save $200 a month to buy a new car, which is estimated to cost $50, 000. You have access to an investment which earns 8% compounded monthly.
Describe some methods for motivating employees : Describe some methods for motivating employees and improving behaviors within the workplace. Address a key leadership trait that can assist in managing conflict
How does your product use the distribution channel : How does your product use the distribution channel to create a competitive advantage? Does your company use the Internet to distribute your product? If so, how?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd