0% found this document useful (0 votes)
57 views4 pages

QT Lab 05 by 17-16TL20

This document discusses queueing theory lab 5 submitted by Saad Khan. It includes screenshots of the Wireshark installation process and discusses different protocols like ARP, HTTP, DNS, TCP, and UDP. It also answers four lab tasks about network sniffers. It defines a sniffer as a tool that allows monitoring internet traffic in real time. It states there are two types of sniffers - active and passive. It provides different terms used for packet sniffers like packet analyzer. It describes Wireshark as an open-source network protocol analyzer and its main purposes for troubleshooting and teaching. It gives an example of how internet traffic sniffing can be used for traffic analysis to obtain user activity data.

Uploaded by

Saad Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views4 pages

QT Lab 05 by 17-16TL20

This document discusses queueing theory lab 5 submitted by Saad Khan. It includes screenshots of the Wireshark installation process and discusses different protocols like ARP, HTTP, DNS, TCP, and UDP. It also answers four lab tasks about network sniffers. It defines a sniffer as a tool that allows monitoring internet traffic in real time. It states there are two types of sniffers - active and passive. It provides different terms used for packet sniffers like packet analyzer. It describes Wireshark as an open-source network protocol analyzer and its main purposes for troubleshooting and teaching. It gives an example of how internet traffic sniffing can be used for traffic analysis to obtain user activity data.

Uploaded by

Saad Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Queueing theory

Lab_5
1.Wireshark installation Process screenshots:

Submitted by: Saad Khan 
Roll No. 17‐16TL20 
Queueing theory
Lab_5

DIFFERENT PROTOCOLS:
ARP

Submitted by: Saad Khan 
Roll No. 17‐16TL20 
Queueing theory
Lab_5
HTTP

DNS

TCP

Submitted by: Saad Khan 
Roll No. 17‐16TL20 
Queueing theory
Lab_5
UDP

LAB TASKS: Lab Task: 1. What is traffic sniffer? Give details of how many different types of traffic
sniffers are used?
Ans: A sniffer is a software or hardware tool that allows the user to “sniff” or monitor your internet
traffic in real time, capturing all the data flowing to and from your computer. administrators use sniffing
tools to maintain a steady flow of traffic through their networks.
There are major two types through we can sniff the traffic
Active sniffers – this is sniffing that is conducted on a switched network. A switch is a device that
connects two network devices together. Attackers take advantage of this by injecting traffic into the LAN
to enable sniffing.
Passive sniffers– passive sniffing uses hubs instead of switches. Hubs perform the same way as switches
only that they do use MAC address to read the destination ports of data. All an attacker needs to do is to
simply connect to LAN and they are able to sniff data traffic in that network.

Lab Task: 2. What are different terminologies use for packet sniffers?

Ans: We can use different terms for packet sniffers for example:A packet sniffer — also known
as a packet analyzer, protocol analyzer or network analyzer.
Lab Task: 3. What is Wireshark and what are the main purposes of Wireshark?
Ans: Wireshark is an open-source network protocol analysis software program started by Gerald
Combs in 1998. Wireshark is absolutely safe to use. Government agencies, corporations, non-
profits, and educational institutions use Wireshark for troubleshooting and teaching purposes. It
captures network traffic on the local network and stores that data for offline analysis.
Lab Task: 4. Explain briefly one application scenario where internet traffic sniffing can be
favorable.
Ans: Traffic analysis using the internet is an activity to record data from user activities in using
the Internet. This study aims to obtain data about the results of traffic in a graphical form so that
it can find out the number of users who access the internet.

Submitted by: Saad Khan 
Roll No. 17‐16TL20 

You might also like