What percentage of your traffic relied on ip

Assignment Help Computer Engineering
Reference no: EM131910802

Assignment

The purpose of this lab is to learn about a widely-used network protocol analyzer protocol that lets you see what's happening on your network at the microscopic level. It is the de facto standard across many commercial and non-profits enterprises, government agencies and educational institutions.

Note: It is important in this lab to not only discuss the processes and results but also show them. Make sure to take screenshots, embed them, and discuss them in your document and label them (e,g,, Lab1-Image1)

Deliverable: In the dropbox folder under lab1, turn in your answer via a PDF document with your lastname and page number at the bottom-right of each page. Use your bowie state domain name-Lab1.

1. create a new group of data by generating and capturing about two minutes of traffic over the Web and via the command line interface.

2. Wireshark provides several methods for analyzing a group of data. To begin, click Statistics in the main menu and then click Summary. The Wireshark Summary window appears.

3. How many packets did you capture? What was their average size?

4. Close the Wireshark: Summary window.

5. Click Statistics in the main menu and then click Protocol Hierarchy. The Wireshark: Protocol Hierarchy Statistics window appears, revealing, for example, the percentage of your traffic that used Ethernet frames, the percentage that used IP and TCP, and so on.

a. Did any of your traffic use a type of frame that was not Ethernet?
b. What percentage of your traffic relied on IP?
c. How many of your packets, if any, used IPv6?

6. Close the Wireshark: Protocol Hierarchy Statistics window.

7. Click Statistics on the main menu and then click Endpoints. The Endpoints window appears, with the Ethernet tab selected by default. Wireshark defines endpoints as a logical end of any transmission, such as a node, and identifies each endpoint with an IP address or MAC address.

8. In the Ethernet tab, nodes are listed in order of the highest volume of traffic generated and received, cumulatively. What node sits at the top of this list, and what kind of equipment does it represent?

9. Click the IPv4 tab. A list of endpoints appears. As with the endpoints listed in the Ethernet tab, the one responsible for the greatest number of bytes transmitted and received (cumulatively), is listed first. Which IP address is at the top of this list? To what node does it belong?

10. Click the IPv6 tab. How many transmissions and protocols were using this protocol?

11. Close the Endpoints window.

12. When network engineers are diagnosing a problem with a particular connection, it often helps to filter out unrelated traffic and follow the data through the troubled connection. There are several ways to do this in Wireshark. As an example, right-click on a line that represents a frame carrying HTTP data, then choose Follow TCP Stream.

13. The Follow TCP Stream window appears, displaying frames belonging to each endpoint highlighted with different colors. Meanwhile, the main capture display has changed to include only traffic involved in the same data exchange. From what you can tell, what happened during this exchange?

14. Click Close to leave the Follow TCP Stream window.

15. Continue exploring the features of Wireshark if you like or click File on the main menu and then click Quit to close the program.

16. You will be asked whether you want to save your capture file before quitting. Click Quit without Saving.

Reference no: EM131910802

Questions Cloud

Describe the chosen organisation and industry : Critically evaluate the vision, mission and values statements of your chosen organisation and discuss their appropriateness.
What criteria are used in this financial report audit : PACC6002 Auditing and Assurance Services - Explain the difference between the auditors responsibility and management's responsibility for financia
What part of project requirements is critical to it project : Personally, what one part of the project requirements is critical to the success of an IT project? Please explain.
Standard deviation of the population of times : Question:The records of the 100 postal employees at a postal station in a large city showed that the average time these employees had worked
What percentage of your traffic relied on ip : Did any of your traffic use a type of frame that was not Ethernet? What percentage of your traffic relied on IP? How many of your packets used IPv6?
Analysis of the policies and approach to corporate social : Analysis of the policies and approach to Corporate Social Responsibility by the firm you have chosen in one geographic location.
Describe your personal and household financial goals : Briefly list any financial problems you face personally or as a household, such as too much debt not enough savings, or not enough income.
Find value of call option using binomial option pricing : Find the value of a call option using the binomial option pricing formula for single period when given the following information:
Draw a use case diagram for the given scenario : List two functional requirements (FRs). List two non-functional requirements. List the actors of the WebApp. Draw a use case diagram for the given scenario.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd