
This project needs to be done on visio
I’m going to attach all the requirements below. The two different parts add on each other so I would like as two different projects. Here is the link for the company I chose to work on https://lc.gcumedia.com/itt115/company-website-pro…
Packet Sniffing and Wireshark
Introduction
The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a freeopensourcenetwork protocol analyzer. It is used for network troubleshooting andcommunication protocol analysis. Wireshark captures network packets in real time and
display them in human-readable format. It provides many advanced features including
live capture and offline analysis, three-pane packet browser, coloring rules for analysis.
This document uses Wireshark for the experiments, and it covers Wireshark installation,
packet capturing, and protocol analysis.
Figure 1: Wireshark opening screen
Background
TCP/IP Network Stack
Figure 2: Encapsulation of Data in the TCP/IP Network Stack
This background section brieflyexplains the concept of TCP/IP network stack to help you better understand theexperiments. TCP/IP is the most commonly used network model for Internet services.Because its most important protocols, the Transmission Control Protocol (TCP) and theInternet Protocol (IP) were the first networking protocols defined in this standard, it isnamed as TCP/IP. However, it contains multiple layers including application layer,transport layer, network layer, and data link layer.
Application Layer: The application layer includes the protocols used by mostapplications for providing user services. Examples of application layer protocolsareHypertext Transfer Protocol (HTTP), Secure Shell (SSH), File TransferProtocol (FTP), and Simple Mail Transfer Protocol (SMTP).
Transport Layer: The transport layer establishes process-to-process connectivity, and it provides end-to-end services that are independent of underlying user data.To implement the process-to-process communication, the protocol introduces aconcept of port. The examples of transport layer protocols are Transport ControlProtocol (TCP)and User Datagram Protocol (UDP). The TCP provides flow control,connectionestablishment, and reliable transmission of data, while theUDP is a connectionless transmission model.
Internet Layer: The Internet layer is responsible for sending packets to acrossnetworks. It has two functions: 1) Host identification by using IP addressingsystem (IPv4 and IPv6); and 2) packets routing from source to destination. Theexamples of Internet layer protocols are Internet Protocol (IP), Internet ControlMessage Protocol (ICMP), and Address Resolution Protocol (ARP).
Link Layer: The link layer defines the networking methods within the scope of thelocal network link. It is used to move the packets between two hosts on the samelink. A common example of link layer protocols is Ethernet.
Packet Sniffer
Packet sniffer is a basic tool for observing network packet exchanges in a computer. Asthe name suggests, a packet sniffer captures (“sniffs”) packets being sent/receivedfrom/by your computer; it will also typically store and/or display the contents of thevarious protocol fields in these captured packets. A packet sniffer itself is passive. Itobserves messages being sent and received by applications and protocols running onyour computer, but never sends packets itself.
Figure 3 shows the structure of a packet sniffer. At the right of Figure 3 are theprotocols (in this case, Internet protocols) and applications (such as a web browser orftp client) that normally run on your computer. The packet sniffer, shown within thedashed rectangle in Figure 3 is an addition to the usual software in your computer, andconsists of two parts. The packet capture libraryreceives a copy of every link-layerframe that is sent from or received by your computer. Messages exchanged by higherlayer protocols such as HTTP, FTP, TCP, UDP, DNS, or IP all are eventuallyencapsulated in link-layer frames that are transmitted over physical media such as anEthernet cable. In Figure 1, the assumed physical media is an Ethernet, and so allupper-layer protocols are eventually encapsulated within anEthernet frame. Capturingall link-layer frames thus gives you access to all messages sent/received from/by allprotocols and applications executing in your computer.
The second component of a packet sniffer is the packet analyzer, which displays the
contents of all fields within a protocol message. In order to do so, the packet analyzer
Figure 3: Packet Sniffer Structure
must “understand” the structure of all messages exchanged by protocols. For example,suppose we are interested in displaying the various fields in messages exchanged bythe HTTP protocol in Figure 3. The packet analyzer understands the format of Ethernetframes, and so can identify the IP datagram within an Ethernet frame. It alsounderstands the IP datagram format, so that it can extract the TCP segment within theIP datagram. Finally, it understands the TCP segment structure, so it can extract the
HTTP message contained in the TCP segment. Finally, it understands the HTTP
protocol and so, for example, knows that the first bytes of an HTTP message will
contain the string “GET,” “POST,” or “HEAD”.
We will be using the Wireshark packet sniffer [http://www.wireshark.org/] for this lab,
allowing us to display the contents of messages being sent/received from/by protocols
at different levels of the protocol stack. (Technically speaking, Wireshark is a packet
analyzer that uses a packet capture library in your computer). Wireshark is a free
network protocol analyzer that runs on Windows, Linux/Unix, and Mac computers.
Getting Wireshark
Wireshark can also be downloaded from here:https://www.wireshark.org/download.html
Starting Wireshark
When you run the Wireshark program, the Wireshark graphic user interface will be
shown as Figure 4. Currently, the program is not capturing the packets.
Figure 4: Initial Graphic User Interface of Wireshark
Then, you need to choose an interface. If you are running the Wireshark on your laptop,
you need to select WiFi interface. If you are at a desktop, you need to select the
Ethernet interface being used. Note that there could be multiple interfaces. In general,
you can select any interface but that does not mean that traffic will flow through that
interface. The network interfaces (i.e., the physical connections) that your computer has
to the network are shown.
The attached Figure 5 was taken from my computer.
After you select the interface, Wireshark will start to capture the packets as shown in
Figure 6.
Get professional assignment help cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why choose our academic writing service?
Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently
Figure 5: Capture Interfaces in Wireshark
Figure 6: Capturing Packets in Wireshark
Figure 7: Wireshark Graphical User Interface on Microsoft Windows
The Wireshark interface has five major components:
The command menus are standard pulldown menus located at the top of the window.Of interest to us now is the File and Capture menus. The File menu allows you to save
captured packet data or open a file containing previously captured packet data, and exit
the Wireshark application. The Capture menu allows you to begin packet capture.
The packet-listing window displays a one-line summary for each packet captured,
including the packet number (assigned by Wireshark; this is not a packet number
contained in any protocol’s header), the time at which the packet was captured, the
packet’s source and destination addresses, the protocol type, and protocol-specific
information contained in the packet. The packet listing can be sorted according to any of
these categories by clicking on a column name. The protocol type field lists the highest-level protocol that sent or received this packet, i.e., the protocol that is the source or
ultimate sink for this packet.
The packet-header details window provides details about the packet selected
(highlighted) in the packet-listing window. (To select a packet in the packet-listing
window, place the cursor over the packet’s one-line summary in the packet-listing
window and click with the left mouse button.). These details include information about
the Ethernet frame and IP datagram that contains this packet. The amount of Ethernet
and IP-layer detail displayed can be expanded or minimized by clicking on the rightpointingor down-pointing arrowhead to the left of the Ethernet frame or IP datagram linein the packet details window. If the packet has been carried over TCP or UDP, TCP orUDP details will also be displayed, which can similarly be expanded or minimized.Finally, details about the highest-level protocol that sent or received thispacket are alsoprovided.
The packet-contents window displays the entire contents of the captured frame, in
both ASCII and hexadecimal format.
Towards the top of the Wireshark graphical user interface, is the packet display filter
field, into which a protocol name or other information can be entered in order to filterthe information displayed in the packet-listing window (and hence the packet-headerand packet-contents windows). In the example below, we’ll use the packet-display filter
field to have Wireshark hide (not display) packets except those that correspond to HTTP
messages.
Capturing Packets
After downloading and installing Wireshark, you can launch it and click the name of an
interface under Interface List to start capturing packets on that interface. For example, if
you want to capture traffic on the wireless network, click your wireless interface.
Test Run
Do the following steps:
Start up the Wireshark program (select the WiFi interface).
Start up your favorite browser.
In your browser, go to the ESPN homepage by typing www.espn.com.
After your browser has displayed the http://www.espn.com page, stopWireshark packet capture by selecting stop in the Wireshark capture window.
Color Coding: You’ll probably see packets highlighted in green, blue, and black.Wireshark uses colors to help you identify the types of traffic at a glance. Bydefault, green is TCP traffic, dark blue is DNS traffic, light blue is UDP traffic, andblack identifies TCP packets with problems — for example, they could have beendelivered out-of-order.
You now have live packet data that contains all protocol messages exchangedbetween your computer and other network entities! However, as you will noticethe HTTP messages are not clearly shown because there are many otherpackets included in the packet capture. Even though the only action you tookwas to open your browser, there are many other programs in your computer thatcommunicate via the network in the background. To filter the connections to theones we want to focus on, we have to use the filtering functionality of Wiresharkby typing “http” in the filtering field as shown below:
Notice that we now view only the packets that are of protocol HTTP. However, we alsostill do not have the exact communication we want to focus on because using HTTP asa filter is not descriptive enough to allow us to find our connection tohttp://www.espn.com. We need to be more precise if we want to capture the correct setof packets.
To further filter packets in Wireshark, we need to use a more precise filter. Bysetting the http.host==www.espn.com, we are restricting the view to packetsthat have as an http host the www.espn.com website. Notice that we need twoequal signs to perform the match “==” not just one. See the screenshot below:
Now, we can try another protocol. Let’s use Domain Name System (DNS)protocol as an example here.
Let’s try now to find out what are those packets contain by following one of theconversations (also called network flows), select one of the packets. Click on Analyze then Followthen UDP Stream, and then you will see following screen.
If we close this window and change the filter to“http” and then follow a packet from the list of packetsthat match that filter, we should get the something similar to the followingscreens. Note that we click on Analyze then Follow thenTCP Streamthis time.
Questions for the Lab
Carefully read the lab instructions and finish all tasks above.
If a packet is highlighted by black, what does it mean for the packet?
What is the filter command for listing all outgoing http traffic?
Why does DNS use Follow UDP Stream while HTTP use Follow TCP Stream?
Using Wireshark to capture the FTP password.
Use the FTP site ftp://test.rebex.net/
The usernamefor the FTP server is “demo”, and the password is “password”.
You will use the username and password to login the FTP server while
Wireshark is running. Note that the FTP server is a public FTP server, makesure youselect the right interface for the capturing. You need to explain to mehow you find the password and a screenshot of the password packet. Have fun!
Get Professional Assignment Help Cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor’s, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why Choose Our Academic Writing Service?
Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently
How It Works
1. Place an order
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
2. Pay for the order
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
3. Track the progress
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
4. Download the paper
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH Essay fount TODAY AND GET AN AMAZING DISCOUNT
The post Packet capturing, and protocol analysis appeared first on Essay fount.
What Students Are Saying About Us
.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"
.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."
"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"
