What are mac addresses for each of unique pair of machines

Assignment Help Computer Engineering
Reference no: EM131744078

Assignment

Overview: For this lab, you will analyze 5 Wireshark files (provided to you). Download these files from the desktop of Lab Resources, locate the PCAP files and place them in a location within WINATK01 where you can find them (Wireshark files have the extension name of .pcap).

The 5 files you are going to analyze are:

1. mysql_complete.pcap
2. HTTP.pcap
3. ospf simple password authentication.pcap
4. telnet.pcap
5. gmail.pcapng.pcap

As you analyze the results of each file, consider the following questions:

• what are the unique pair of IP addresses that are communicating with one another, based on their being noted in the Source and Destination addresses in the top frame of Wireshark's data display?

• For each unique pair of IP addresses communicating, what protocol(s) does Wireshark indicate that they are using?

• What port numbers are indicated as being used for the source and destination, when you click on a packet line in the top frame and open the Transmission Control Protocol in the middle frame? Identify the port numbers (Src Port and Dst Port) for each unique pair of IP addresses communicating for each unique protocol they are using (like TCP or HTTP, and so forth).

• What are the MAC Addresses for each of the unique pair of machines that are communicating with one another? (HINT: this can be see in the middle frame on the line that is for the Ethernet II layer, and a MAC address is indicated as six double digit numbers separated by colons).

• What plaintext information (if any) can you find in any of the packets in the upper frame of Wireshark, when you select the bottom most OSI layer in the bottom row in the middle frame, when you look at the hexidecimal and ASCII interpretation of the data in the packet in the lower frame of the window?

Reference no: EM131744078

Questions Cloud

Compute the eva for the wallace division for year : Biddle Company uses EVA to evaluate the performance of division managers. Required: Compute the EVA for the Wallace Division for year 3
Organize all the steps necessary for implementing security : Search the Internet for data backup techniques. Organize all the steps necessary for implementing security on both a wired and wireless network.
Describe the health care company or product : Describe the health care company or product . Describe how you will market your health care company or product.
Concept of ethics in one or two sentences : 1. In your own words, define the concept of ethics in one or two sentences. 2. If you were a manager, how would you motivate your employees to follow ethical
What are mac addresses for each of unique pair of machines : What are the MAC Addresses for each of the unique pair of machines that are communicating with one another?
Scientific perspective or artistic perspective on strategy : Should strategic managers adopt a scientific perspective or an artistic perspective on strategy? Why
Statements regarding suppliers is true : The life cycles analogy technique fits best with which of the following applications? Which of the following statements regarding suppliers is true?
Determine the manufacturing overhead rate : Sports Unlimited makes softballs and baseballs for recreational use. Determine the manufacturing overhead rate
What is the single monthly mortality rate : Also, suppose the actual payments received are $600,000. What is the Single Monthly Mortality Rate (SMM)?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd