Find a network using nat or routable ip addresses

Assignment Help Computer Network Security
Reference no: EM133542964

Assignment:

Protocol Analysers are devices and/or software placed on a network to monitor traffic for improving security and tracking bottlenecks. Some packet analyser performs packet captures, some are used for analysis, and some handle both. Wireshark previously called Ethereal, is one of the analysers, can be used in real time environment to open saved trace files from packet captures also to rebuild the sessions. Download Wireshark from www.wireshark.org. Start it on a system connected to a live network. Perform a capture for approximately 5 minutes and then save the trace file. Visit several web sites and ping to generate traffic. Start Wireshark again and examine the trace file.

a) Based on your analysis, discuss what traffic patterns do you see?

b) Find out whether you are on a network using NAT or routable IP addresses?

c) Does any address appear more than others addresses? Identify the ports which are showing up.

d) Write report on your findings.

Reference no: EM133542964

Questions Cloud

Adea does not cover just-cause terminations : If this is his first offense then the company is required to use progressive discipline because he is over 40 years ol d. No - ADEA does not cover just-cause
Protect herself against a large loss assessment : protect herself against a large loss assessment if the association suffers an underinsured loss, Rosalind should make sure her standard homeowners policy
Differences between thin and thick consent : Explain the differences between thin and thick consent and Discuss vicarious liability and cyberliability. List the top categories of litigation
Discuss a description of the business and its market : Discuss a description of the business and its market of your choice. If you are using an actual business or industry, include links to references
Find a network using nat or routable ip addresses : Based on your analysis, discuss what traffic patterns do you see? Find out whether you are on a network using NAT or routable IP addresses?
Explain the organizations, history, and industry trends : Explain the organizations, history, mission, industry trends, and recent performance over time. Identify at least 2 competitors with a brief summary
Define and draw the customer benefit package : Define and draw the customer benefit package and state Hudson Jewelers's strategy; rank order its competitive priorities, order qualifiers, and order winners
Do you think this type of mobile channel is just a novelty : Do you think this type of mobile channel is just a novelty in fast-food channels or does it have the potential to be a major force for change in the channel
Present the visual you have selected : Include a brief bio of the poet. Present the visual you have selected. Give the background on the visual and explain its relevance to the poem.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Comparison of voice and ear biometrics

Need assistance on how to write a good report on named "comparison of Voice and ear Biometrics as a measure to passport control"

  Briefly describe the concept of spread spectrum technique

Describe the significance of the Nyquist criterion for ISI cancellation. Briefly describe concept of spread spectrum technique and list three important benefit.

  CC7179 Digital Forensics Assignment

CC7179 Digital Forensics Assignment Help and Solution, London Metropolitan University - Assessment Writing Service - used algorithm for verifying the image

  Explain and plan server deployments and images

Explain and plan server deployments and images. Compare and contrast deployment strategies among different application servers and server roles.

  Applications of private and public key cryptography

Explain why GPG encryption and decryption are quite fast - Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken.

  Describe the main elements of fisma in the management

From the e-Activity, describe the main elements of FISMA in the management and governance of federal information systems.

  Determine the owner or user of the computer

CIS 484 Project What identifying information did you find on the hard drive to help determine the owner or user of the computer? Does the computer appear

  Dscribe three 3 ways in which businesses use internet

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Identify work or school-related problem or challenge

identify the work- or school-related problem or challenge you would like to solve.

  Discuss advantages and disadvantages of computer networking

In a 1-2 page APA research paper, discuss the advantages and disadvantages of computer networking, for both personal and business environments.

  Nowadays the internet has been very broadly used as a means

nowadays the internet has been very widely used as a means of receiving and processing lots of information which are

  Design and evaluate improvements in current cyber protection

Design and evaluate improvements in current cyber protection approaches to tackle the cyber security challenges that arise in ICS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd