Lab 5 - Use Wireshark To View Network Traffic
Lab 5 - Use Wireshark To View Network Traffic
Network Traffic
Topology
Objectives
Part 1: Capture and Analyze Local ICMP Data in Wireshark
Part 2: Capture and Analyze Remote ICMP Data in Wireshark
Background / Scenario
Wireshark is a software protocol analyzer, or “packet sniffer”
application, used for network troubleshooting, analysis, software
and protocol development, and education. As data streams travel
back and forth over the network, the sniffer “captures” each
protocol data unit (PDU) and can decode and analyze its content
according to the appropriate RFC or other specifications.
Required Resources
1 PC (Windows with internet access)
Additional PCs on a local-area network (LAN) will be used to
reply to ping requests.
Instructions
1) The top section displays the list of PDU frames captured with
a summary of the IP packet information listed;
2) the middle section lists PDU information for the frame selected
in the top part of the screen and separates a captured PDU frame
by its protocol layers; and
3) the bottom section displays the raw data of each layer. The
raw data is displayed in both hexadecimal and decimal form.
a. Click the first ICMP request PDU frames in the top section of
Wireshark. Notice that the Source column has your PC IP
address, and the Destination column contains the IP address
of the teammate PC that you pinged.
Note: When you ping the URLs listed, notice that the Domain
Name Server (DNS) translates the URL to an IP address. Note the
IP address received for each URL.
d. You can stop capturing data by clicking the Stop Capture icon.
IP address
Mac Address
How does this information differ from the local ping information
in Part-1 and remote host ping information Part-2?
Why does Wireshark show the actual MAC address of the local
hosts, but not the actual MAC address for the remote hosts?
MAC addresses for remote hosts are not known on the local
network, so the MAC address of the default-gateway is used.