Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Description: This project requires that you work in a group (or as an individual) to do some research regarding the protocols used in the Wireshark

 

   Description: This project requires that you work in a group (or as an individual) to do some research regarding the protocols used in the Wireshark captures provided to try and determine what is happening in the capture. Keep in mind that documentation is a big part of what you will do in the real world in your career. You will have to explain to others your findings and propose solutions. “Hands on” means using your brain, too!

Use the capture files in the Project Work Module in D2L (you will have to unzip the zip files to extract the individual capture files) to answer the following questions:

Part I – HTTP

1.    Review the first capture file (Project Part I-a) and determine what is happening with the HTTP traffic. 


a.    Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

b.    Take a screenshot of the actual packets within the capture file that you observed this behavior. 

2.    Review the second capture file (Project Part I-b) and determine what is happening with the HTTP traffic in this capture. 

c.    How is the traffic different from the first capture? Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

a.    Take a screenshot of the actual packets within the capture file that you observed. 

Part II – PPP

3.    Review the third capture file (Project Part II-a) and determine what is happening with the PPP traffic in this capture. 

a.   Research one of the protocols relating to PPP and describe it here.

b.    Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

c.    Take a screenshot of the actual packets within the capture file that you observed this behavior. 

4.    Review the third capture file (Project Part II-b) and determine what is happening with the PPP traffic that you are investigating in this capture. What else is involved?

a.   Research one of the protocols relating to PPP and describe it here.

d.    Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

e.    Take a screenshot of the actual packets within the capture file that you observed this behavior. 

5.    Review the third capture file (Project Part II-c) and determine what is happening with the PPP traffic in this capture. What else is involved?

a.   Research one of the protocols relating to PPP and describe it here.

f.     Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

g.    Take a screenshot of the actual packets within the capture file that you observed this behavior. 

Part III – 802.11

6.    Review the first capture file (Nokia) and determine what is happening with the 802.11 traffic.  Hint: use the Analyze/Conversation Filter


d.    Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

e.    Take a screenshot of the actual packets within the capture file that you observed this behavior. 

7.    Review the second capture file (wpa) and determine what is happening with the WPA traffic in this capture. (password is “Induction”). Hint: Use Edit->preferences, Protocol IEEE 802.11, decryption with “Induction”); Look at the packets prior to and after decryption. Use this 

https://wiki.wireshark.org/HowToDecrypt802.11 . You are STILL required to answer the following questions in your own words and provide a screenshot!

f.     What do you different once you have decrypted the packets? What is decrypted and what is happening? (include source, destination, time of capture)

h.    Take a screenshot of the actual packets within the capture file that you observed. 

Part IV – Ipv6 – Ipv4

8.    Review the third capture file (toredo) and determine what is happening with the Ipv4-IPv6 traffic in this capture. 

a.   Research Toredo for encapsulation relating to Ipv6 using the content links in the course and describe it here.

i.     Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture) (Hint: look at all Ipv6 packets that have Toredo in their details)

j.     Take a screenshot of the actual packets within the capture file that you observed this behavior. 

9.    Review the fourth capture file (6to4) and determine what is happening with the Ipv4- IPv6 traffic in this capture. What else is involved?

a.   Research 6to4 protocol using the content links in the course relating to 6to4 and describe it here.

k.    Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

l.     Take a screenshot of the actual packets within the capture file that you observed this behavior. 

10. How do the two different methods differ? 

11. Are there any other transitioning methods for IPv6 that you came across in your research that are noteworthy? 


Group Members: (List your group Members Here if you worked in a group)

Task List: (List the tasks that were performed in this project and which team members were involved in this task, plus the % of their contribution to the project)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Analyzing Data And Making Decisions Statistics For Business Microsoft Excel 2010 Updated

Authors: Judith Skuce

2nd Edition

9780132844727, 013292496X, 132844729, 978-0132924962

More Books

Students also viewed these Computer Network questions

Question

Graph one period of each function. y = 4 cos x

Answered: 1 week ago