Princess
Princess
_____________________________________________________________________________________
5. Notice the column headers along the top of the capture, as shown in Figure 2. Of particular
interest are the Source and Destination columns, the Protocol column, and the Info column. Find
a UDP message that has an IPv4 Source address and click on it. In the middle pane, click on
each line to expand that layer’s information. What pieces of information stand out to you? Which
device on your network do you think sent this message, and which device(s) received it?
As we can see that the UDP OSI layers(User Datagram Protocol) Contains 8 fields.
And the other OSI layers information have a different information packet trace.
<insert screenshot here>
1.
NET 101 - NETWORKING
_____________________________________________________________________________________
7. To filter for a particular kind of message in your capture, type the name of the protocol in the Filter
box (identified in Figure 3). Figure 5 shows a filter for ICMP messages, which are currently
highlighted in bright green. These ICMP messages were generated when pinging another host on
the network. Try filtering for other protocols discussed in this and earlier chapters, and see how
many different types you can find in your capture. Click the red X to clear filters between
searches.
Which protocols did you find?
ICMPv6, ICMP, DNS, HTTP.
<insert screenshot here>
NET 101 - NETWORKING
_____________________________________________________________________________________
9. Click on an ICMP message and count the layers of information available in the middle pane. In
Figure 6, there are four layers of information, which correspond to Layer 2 (Frame and Ethernet II)
and Layer 3 (Internet Protocol Version 4 and Internet Control Message Protocol).
10. Examine an HTTP message. Figure 7 shows five layers of information in the middle pane. This
time, Layer 7 (Hypertext Transfer Protocol) and Layer 4 (Transmission Control Protocol) are
NET 101 - NETWORKING
_____________________________________________________________________________________
represented, in addition to Layer 3 (Internet Protocol Version 4) and Layer 2 (Ethernet II and
Frame).
11. Recall that TCP is a connection-oriented protocol. You can filter a capture to follow a TCP stream
so you can see how these messages go back and forth for a single session. Clear your filter box,
and then find a TCP message. Right-click it, point to Follow, and click TCP Stream (see Figure 8).
Next, click Close to close the Follow TCP Stream window and notice that Wireshark has filtered
the capture for this stream’s messages.
<insert screenshot here>
NET 101 - NETWORKING
_____________________________________________________________________________________
12. In the Info column, you can see both SYN and ACK flags, which you learned about in this chapter.
What is the purpose of these messages? Scroll to the bottom of the TCP stream. What flag
indicates the stream is ending?.
The purpose is use for indicate a particular state of connection and use for trouble shooting purpose
to handle a control of particular connection.
And the last flag that indicates the last stream ending is Z.
13. Click on any message that includes a Source or Destination MAC address on the Ethernet II line
of output in the middle pane. What protocol is listed for the message you selected? Was
Wireshark able to resolve the name of the manufacturer for this device? If so, what is it?