Explore the network packets

Assignment Help Computer Networking
Reference no: EM133033575

Wire shark analysis

Objectives

Your day-to-day online interactions generate large volumes of packets that are carefully hidden from you, the end user, and from the application. The TCP/IP model enables this abstraction. The goal of Project 2 is to familiarize yourself with the underlying network activity as several day-to-day online activities are carried out To complete this assignment, you will use Wireshark.

Assignment details

The goal of this assignment is to explore the network packets associated with several typical online activities. You will have the chance to analyze bit-by-bit the flows associated with these services and evaluate different application and protocol parameters across the entire TCP/IP stack including Data Link Layer/Medium Access Control (L2), Network Layer (a.k.a. IP or L3), Transport Layer and Application Layer.

To carry out this analysis, you will use Wireshark. (If you haven't already) you will need to install Wireshark on your own computer. Part of finishing this assignment will be learning how to use Wireshark effectively.

While Wireshark allows you to capture packets on a network interface it can also be used to read previously collected packet traces. For this assignment you will be analyzing a trace that I have already captured. You can download the trace from Blackboard. Some of the activity in this trace contains protocols we have not gone over (or will not be going over). Other protocols, we have studied extensively in this class. In either case, there is an abundance of information in your course materials (and online), and I encourage you to read up if you are not sure what a protocol is used for.

The deliverable of this assignment is a report in which you will explain what you saw in the trace. In order to complete the assignment, you need to do two things: (i) make sense of the trace and (ii) write the report. In both these components, there is one advanced question, which will count as extra credit for undergrads and will be mandatory for graduate students.

The remainder of this assignment provides details on how to approach the trace analysis.

1. Making sense of the trace. Begin your analysis by considering the following questions. As you answer the questions, make a note of the methodology you have used (you will need to explain this in your report):
a. Mandatory for everyone
i. How many packets are in the trace?
ii. What types of packets are these?
iii. What DLL/MAC addresses can you see in the trace?
iv. What IP addresses can you see in the trace?
v. How do IP and MAC addresses map to each other?
vi. Can you tell by the trace what kind of network card was used to capture the trace: an Ethernet adapter or a 802.11 wireless card?
vii. Can you conclude anything about the network topology on which the trace was collected? Which was the machine (IP and MAC address) on which the trace was collected? What is the network mask? What is the default gateway? What is the vendor of the default gateway device? What is the DNS server IP? What is the DHCP server IP? Which hosts are on the local network? How many hosts are there on the local network? Can you determine some of the applications these hosts are running? Which hosts are remote (e.g. outside of the local network of the host collecting the trace)?
viii. How many hops away are the remote hosts? Which is the most "remote" host?
ix. What services/applications were accessed?
x. Did any IP fragmentation occur? Were there any packets in which the "Don't fragment" bit was set?

b. Mandatory for graduate students; extra credit for undergraduate students
i. Find the traceroute session. A part of the activity captured in this trace is a traceroute session. Use what you know about traceroute (e.g. packet types and how certain fields in the packets are modified) in order to locate the traceroute packets in the pcap trace. Once you find the packets, reconstruct the entire path from source to destination. More specifically, draw a diagram with all the routers and their respective IP addresses between the traceroute source and the traceroute destination. In addition to the diagram, create a table that contains the average RTT to each hop on the path.

2. Writing your report. Being able to convey what you have learned from the trace is equally important to understanding what is going on in the trace. This section provides you with guidelines on how to organize your understanding of the trace in a nice, coherent story, so your reader can also learn from your knowledge.

a. Paper format: your submission will be a single PDF file.

b. Paper content Your paper will need to answer the questions above plus any other interesting things you have found in the trace. While the above questions provide a nice framework to analyze the trace, answering them one by one in the report will not lead to a nice coherent story; instead it will produce a hard to read and hard to understand bucket list When writing your report consider presenting your findings in multiple levels of detail. For example, you can first provide a summary of the trace including number of packets, number of hosts and a high-level idea of what these hosts are up to. A figure that depicts the local network architecture, and "interesting" internal and external hosts will make your story visually clear. Then describe the different services/applications you see. For each service dive in details about the packet trace associated with this service. What transport layer protocol did it use? Was that aligned with what we studied throughout the semester? Did you see anything unexpected? Describe the packets you see in the flow associated with this service. Include diagrams where appropriate. You can then conclude your report with a brief summary of what you learned from this trace.

Note that reports submitted by graduate student must contain a description of the traceroute session and the RTT to each hop. Undergraduate students who complete the traceroute analysis will be eligible for up to 20 points extra credit.

Reference no: EM133033575

Questions Cloud

Design an education and vocation department : Design an education and vocation department for a female facility - What courses or vocational trades would you include in your curriculum
Key roles and responsibilities of government : What are some of the key roles and responsibilities of government, industry, academia, and other non-governmental organizations with respect to critical infrast
Compute Dr K Kamukama Taxable income : Incomes from other sources include: gross rent shs 39,000,000. Compute Dr K Kamukama Taxable income
Explain the origins of abolitionism : 1. Explain the origins of abolitionism 2. Discuss the varying tactics African Americans and whites assumed in fighting for abolition.
Explore the network packets : Explore the network packets associated with several typical online activities. You will have the chance to analyze bit-by-bit the flows associated
Why sustainability is now the key driver of innovation : The article "Why Sustainability Is Now the Key Driver of Innovation" by Nidumolu, Prahalad, and Rangaswami discusses the challenge companies face
Enterprise risk management and traditional risk management : What is the difference between enterprise risk management and traditional risk management? Which do you think a risk manager should use?
What is his current marginal tax rate : Marc, a single taxpayer, earns $202,500 in taxable income and $6,250 in interest. What is his current marginal tax rate
Influence deposit receipt contracts : -In the event that two parties disagree after both buyer ane seller have accepted and signed the Deposit Receipt how would a disagreement like this be dealt wit

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine and list the ip address ranges

Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and wil..

  Your manager has assigned you and two other engineers to do

you work for a university that has over 3500 students on campus. the you supports about 600 staff and faculty that are

  Show a diagram of where on the lan the firewalls are placed

In this briefing, you must show a diagram of where on the LAN the firewalls are placed on the network.

  Create a free online account to register for rdm

In the previous project, you created a Remote Desktop connection between two computers. In the real world, you might need to manage several remote connections.

  Displays within the zenmap gui scan report

What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity?

  Keys to designing a successful data communication network

What are the keys to designing a successful data communications network?- How does the traditional approach to network design differ from the building-block approach?

  Discuss current advancements in wireless technologies

Discuss current advancements in wireless technologies in these industries. Analyze the potential areas for advancements in wireless technologies for these industries and determine the driving forces behind those advancements.

  What is software called that manages resources of computer

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

  Implement the given example scenario in packet tracer

Implement the given example scenario in packet tracer

  Create system to find all ad-authenticated logins for server

Create system to find all AD-authenticated logins for all servers and workstations (would include non-windows machines that authenticate to AD). Should be a web-based system. Needs to be secure, only using AD admins.

  Provide network services

Your organization opened seven new branch offices in five states. Each branch office has five floors. All the branch offices use the same Internet domain name.

  A description of what the layer of osi does

Write 2 - 3 paragraphs that include a description of what the layer does, what level it corresponds to in the TCP Model and what it covers in the real world.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd