Use wireshark tool to capture packets when you download

Assignment Help Operating System
Reference no: EM13380241

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet.  It is advisable that you have attempted the packet capture exercises using Wireshark that are scheduled for Weeks 7-9. This task cannot be completed in any CQUniversity lab.

a) Submit the captured pcap file.  You should filter the file so that only TCP traffic is included.

b) What is the server IP address?

c) What is the application layer protocol involved?

d) What is the client port number for data download?

e) What is the server port number for data download?

f) How many data bytes have been downloaded?

g) What is the size of the downloaded Lecture 1 file?

h) Discuss the difference in your answers to parts f) and

g).  You need to consider the packets formats in your discussion.

Reference no: EM13380241

Questions Cloud

Write two page paper describing xml and json what are they : write two page paper describing xml and json. what are they? why do we need them? are there certain applications that
1 with what kind of network device router or switch do you : 1 with what kind of network device router or switch do you replace device 1 device 2 and device 3? and why? notenbsp
Study carefully the following network topology it is : study carefully the following network topology. it is required that the small business smart office services pty ltd
A rural medical centre in australia plans to improve its : a rural medical centre in australia plans to improve its services to the community by providing telemedicine and
Use wireshark tool to capture packets when you download : use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you
Consider the following udp header dumpbb400045003aff10a : consider the following udp header dumpbb400045003aff10a identify the source port number.b identify the destination port
An organisation has been granted a block of addresses : an organisation has been granted a block of addresses starting with the address 172.154.68.022.a create three subnets
Question nbsprouter x running rip has the following routing : question nbsprouter x running rip has the following routing tabledestinationcostnext routernet17anet23bnet34cnet43da
Security risk assessment is an invaluable tool in an it : security risk assessment is an invaluable tool in an it professionals quest to protect a companys information assets.

Reviews

Write a Review

Operating System Questions & Answers

  Regulation of the telecommunications industry

Discuss how has the telephone service changed over the past sixty years also explain how regulation of the telecommunications industry changed and what ar some of the outcomes of that change?

  Organization institutionalizes policies

The answer gives the learner with an understanding of management's role in the development and enforcement of data security policies, standards, practices, precess and guidelines.

  Information such as parameters, resources used

Write a brief description about the following system calls used in Unix/Linux. Include information such as parameters, resources used, expected results/return values, and possible error conditions.

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Multiplexor and demultiplexor?

statistical time division multiplexing with 24 stations inputting data at 9600 bps, and assuming that only 60 percent of those stations transmit at one time, what is the minimal speed necessary for the high speed link connecting multiplexor and demul..

  Delete all sub-directories within

Delete all sub-directories within "temp" directory if not empty. In Python program change the current working directory to [temp].

  Provide the design and justification for your mechanism

Provide the design and justification for your mechanism that supports process dispatching and discuss the design advantage and disadvantage of each approach throughout the process lifecycle.

  What is a user friendly text editor

What is a user friendly text editor which comes pre-installed in Mint that can be used directly in the terminal?

  Determine the average seek time of traversed disk

Traversed Disk receives request to access random sector on random track. Suppose head starts at track 0. Determine the average seek time?

  Question about internet usage

Do you think that an workers internet usage at a corporation should be audited and governed through usage policy?

  Manually assemble the programs

Manually assemble the given programs. All memory addresses include the starting and ending addresses.

  Differences between olap and oltp

Business intelligence systems are sometimes called online analytical processing systems. These online analytical processing systems are used to make decisions and are characterized

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd