Protocols that appear in the protocol column

Assignment Help Basic Computer Science
Reference no: EM131406800

What to hand in

The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you've been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation:

  1. List up to 10 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7
  2. How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packet- listing window is the amount of time, in seconds, since Wireshark tracing began. To display the Time field in time-of-day format, select the Wireshark View pull down menu, then select Time Display Format, then select Time-of-day.)
  3. What is the Internet address of the gaia.cs.umass.edu (also known as www- net.cs.umass.edu)? What is the Internet address of your computer?
  4. Print the two HTTP messages displayed in step 9 above. To do so, select Print from the Wireshark File command menu, and select "Selected Packet Only" and "Print as displayed" and then click
  5. Lab Report

Write a minimum of two type-written pages with a minimum of 12-point font describing what you learned in the lab. Do NOT simply repeat the steps you performed, summarize the purpose of the lab by explaining the concepts covered.

Your lab report will be submitted automatically to turnitn.com (Links to an external site.) when you submit it to Canvas. You do not need to do anything besides submit the assignment to Canvas. Be sure you write your report in your own words. If you don't I will know it and you will receive zero points for the lab and face possible other consequences. Although you may work with other to compete the lab procedure, your report MUST be your original work.

Reference no: EM131406800

Questions Cloud

Identify examples of 19th century impressionist painting : The Project Paper focuses on a suggested topic related to art, architecture, history, music, or literature. The project will reflect your views and interpretation of the topic. This project is designed to help you stretch your mind and your abilit..
Determine the regression equation : Determine the regression equation and test the hypothesis that the population slope is zero using a 1% level of significance.
Disadvantages of losing languages : What are the advantages and disadvantages of losing languages? Overall, is it a significant problem?
Interface design strategy of guidance for user : Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.
Protocols that appear in the protocol column : The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you've been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, bas..
Discuss the interpersonal communication in the workplace : Utilizing publicly available search engines, identify an example whereby lack of information sharing among criminal justice organizations may have contributed towards a negative outcome. Discuss some factors that served as a barrier to exchanging..
Numeric value for first-case sensitive java type for second : The array stores _______________   values of ________________   type. (numeric value for first; case sensitive Java type for second)  The first element, x[______  ], is initialized to ___________  .  (numeric values)
Differences between 3g and 4g : Interpret the differences between 3G and 4G, analyse what forces, technological or otherwise, brought 4G into existence, and predict the next steps (5-10 years) of cellular access technology.
What is the state of the steam leaving the heating coils : what is the state of the steam leaving the heating coils of the evaporator? For a surroundings temperature of 300 K, make a thermodynamic analysis of the process.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Composing and using regular expressions

Regular expressions became popular with the introduction of the UNIX operating system in 1960s and its text processing tools such as grep and ed. Write a two to three (2-3) page paper in which you:

  Rap about classes that rivals the javadev group

The JavaDev group made the "Java Life" rap video on coding in Java. You can watch themhere. Your challenge is to write a rap about classes that rivals the JavaDev group. Write just a few sentences

  Dmz zone in a businesses

Should there be a DMZ zone in a businesses so staff can access their personal email, social media? Name four reasons why.

  Virtualization imagine you are a senior systems

imagine you are a senior systems administrator who has been tasked with considering whether or not to implement server

  Type of malicious code

When the administrator's user ID is deleted, the system suddenly begins deleting files. This is an example of what type of malicious code?

  What inheritance relationships would you establish

What inheritance relationships would you establish among the following classes? · Student · Professor · TeachingAssistant · Employee · Secretary · DepartmentChair · Janitor · SeminarSpeaker · Person · Course ·Seminar · Lecture · ComputerLab

  What encryption methods should be used

Each frame in the 802.11 wireless protocol contains the MAC addresses of the sender and receiver. Thus, both sender and receiver are identified in every frame, giving more data to an interceptor who might want to spoof either party. Are both da..

  How could bob and alice mitigate this situation?

If so, how could she do it, and would Bob or Alice know that Eve was reading their messages? How could Bob and Alice mitigate this situation?

  Polymorphic class hierarchy for sets and bags

Implement the following Set class. A set is a collection of items with no duplicates. The following class implements a set of integers.

  Difference between a shallow copy and deep copy

What's the difference between a shallow copy and deep copy in computer science and when would you use either?

  What sort of penalties should be levied

Did the two law school students overreact in filing a lawsuit over these postings? What sort of penalties should be levied against the anonymous posters?

  Describe the vulnerability that the attack exploits

Describe the vulnerability that the attack exploits, including how or why the vulnerability exists, what versions of software are vulnerable. Include a technical overview of the category of vulnerability (for example, command injection, buffer ove..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd