Preview

Using Wireshark to View Network Traffic

Powerful Essays
Open Document
Open Document
2074 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Using Wireshark to View Network Traffic
Lab - Using Wireshark to View Network Traffic
Topology

Objectives
Part 1: (Optional) Download and Install Wireshark
Part 2: Capture and Analyze Local ICMP Data in Wireshark
Start and stop data capture of ping traffic to local hosts.
Locate the IP and MAC address information in captured PDUs.
Part 3: Capture and Analyze Remote ICMP Data in Wireshark
Start and stop data capture of ping traffic to remote hosts.
Locate the IP and MAC address information in captured PDUs.
Explain why MAC addresses for remote hosts are different than the MAC addresses of local hosts.
Background / Scenario
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. As data streams travel back and forth over the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications.
Wireshark is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting. This lab provides instructions for downloading and installing Wireshark, although it may already be installed. In this lab, you will use Wireshark to capture ICMP data packet IP addresses and Ethernet frame MAC addresses.
Required Resources
1 PC (Windows 7, Vista, or XP with Internet access)
Additional PC(s) on a local-area network (LAN) will be used to reply to ping requests.
Part 1: (Optional) Download and Install Wireshark
Wireshark has become the industry standard packet-sniffer program used by network engineers. This open source software is available for many different operating systems, including Windows, Mac, and Linux. In Part 1 of this lab, you will download and install the Wireshark software program on your PC.
Note: If Wireshark is already installed on your PC, you can skip Part 1 and go directly to Part 2. If Wireshark is not installed on your PC, check

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Mid-Term Exam Study Sheet Chapter 1 1.Kilobye (KB), Megabyte(MB),Gigabyte(GB), Terabyte (TB) –Approx. number of bytes in each 2.Capacitor charge to represent 0 or1 3. Convert binary to decimal 4.Hexadecimal 5.Disk drive – platters, tracks, sectors Chapter 2 6.Digital voice calls 7.Video compression 8.Web address – identify protocol, server, web page 9.Internet core 10.Device drivers 11.Network topologies Chapter 3 12.Networking standards 13.De Facto standard 14.TCP/IP model 15.OSI model 16.Routers role in network 17.…

    • 720 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4A

    • 1053 Words
    • 4 Pages

    Layer 2 - [Frame] – This piece of data captured from Wireshark is called a Frame it contains 339 bytes of data that was captured when inspecting a website. The frame protocol is not a real protocol. This type of protocol is used by Wireshark as a base for all protocols. The Ethernet II frame is 38 bytes of overhead data.…

    • 1053 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1 Exercise 1

    • 835 Words
    • 3 Pages

    First, there is a physical connection running between two computers that want to connect. This could be…

    • 835 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    “Promiscuous mode is a mode for a wired network interface controller (NIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is intended to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a hub (instead of a switch) or one being part of a WLAN”. This allows tcpdump, Wireshark, and Netwitness Investigator to perform protocol capture off a live network.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this lab, you created and captured traffic from the machines in this lab using tcpdump, a command line…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 2.6.2: Using Wireshark

    • 2260 Words
    • 10 Pages

    Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. Before June 2006, Wireshark was known as Ethereal.…

    • 2260 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    What was the DHCP allocated source IP host address for the student VM, DHCP Server, and IP default gateway router?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays