Please see file Preparation 1. Download and install the TCP/IP packet capture program 2. Decide on a website of your choice

Please see file

Preparation

1. Download and install the TCP/IP packet capture program

2. Decide on a website of your choice for which you will capture and analyze TCP/IP traffic streams and identify the URL of your selected website (e.g.,

3. Use the 

Week 7 Assignment Template


 Download Week 7 Assignment Template
to complete and upload your work to the course room.

Resources

·

Wireshark DocumentationLinks to an external site.
.

·

Wireshark Frequently Asked QuestionsLinks to an external site.
.

·

Wireshark User’s Guide – Chapter 2: Building and Installing WiresharkLinks to an external site.
.

·

Wireshark Essential TrainingLinks to an external site.
.

Overview

Each protocol in the TCP/IP stack uses a specialized packet to transmit and receive data and protocol-specific information at its layer of the protocol stack. For example, there is the TCP segment packet at the TCP layer and there is the IP datagram packet at the IP layer that encapsulates or includes the TCP segment as its data. Packet capture programs like Wireshark allow us to capture these TCP/IP packets as frames from a network interface card that is connected to the Internet. More importantly, these packet capture programs enable us to analyze TCP/IP traffic and examine the networking information therein.

In this assignment, you will use Wireshark to capture and analyze the DNS, IP, and TCP packets of the traffic streams associated with browsing a website of your choice. You will document your capture and analysis with screenshots highlighting the key information analyzed. You will also explain what you did, interpret the result of your analysis, and reflect on this learning experience in a one-page written summary.

Instructions

1. Start the TCP/IP packet capture program 

WiresharkLinks to an external site.
.

2. Configure Wireshark Time Display Format to display time as “Date and Time of Day” as follows: View > Time Display Format > Date and Time of Day

· Do not use the default configuration of Time Display Format as “Seconds Since the Beginning of Capture.”

3. Start Wireshark Capture on your network interface that is connected to the Internet.

4. In a web browser window, type in the URL of your chosen website and hit ENTER to access the website.

5. Stop Wireshark Capture after a few seconds.

6. Analyze the Wireshark frame that encapsulates the DNS query about your chosen URL to identify:

· The IP address of your network interface as the source IP address.

· The URL of your chosen website.

· The DNS Queries part of the frame.

Screenshot your identified frame, similar to figure 1.a, below. On the screenshot, highlight the IP address of your network interface as the source IP address, the URL of your chosen website, and the DNS Queries part of the frame.

7. Analyze the Wireshark frame that encapsulates the DNS response to the query about your chosen URL to identify:

· The IP address of your network interface as the destination IP address.

· The URL of your chosen website.

· The DNS Answers part of the frame.

Screenshot your identified frame, similar to Figure 1.b, below. On the screenshot, highlight the IP address of your network interface as the destination IP address, the URL of your chosen website, and the DNS Answers part of the frame.

8. Analyze the Wireshark frame that encapsulates the TCP handshake’s first SYN TCP segment from your network interface to your chosen URL to identify:

· The header checksum in the IP packet.

· The source IP address, the destination IP address in the IP packet.

· The source port number and the destination port number in the TCP packet.

Screenshot your identified frame, similar to figure 2.a below. On the n screenshot, highlight the header checksum, the source IP address, and the destination IP address in the IP packet. Clearly highlight on the screenshot the source port number and the destination port number in the TCP packet.

9. Analyze the Wireshark frame that encapsulates the TCP handshake’s SYN, ACK TCP segment from your chosen URL to your network interface to identify:

· The header checksum in the IP packet.

· The source IP address, the destination IP address in the IP packet.

· The source port number and the destination port number in the TCP packet.

Screenshot your identified frame, similar to that shown in Figure 2.b below. On the screenshot, highlight the header checksum, the source IP address, and the destination IP address in the IP packet. Clearly highlight on the screenshot the source port number and the destination port number in the TCP packet.

10. Analyze the Wireshark frame that encapsulates the TCP handshake’s last ACK TCP segment from your chosen URL to your network interface to identify:

· The header checksum in the IP packet.

· The source IP address, the destination IP address in the IP packet.

· The source port number and the destination port number in the TCP packet.

Screenshot your identified frame, similar to that shown in Figure 2.c below. On the screenshot, highlight the header checksum, the source IP address, and the destination IP address in the IP packet. Clearly highlight on the screenshot the source port number and the destination port number in the TCP packet.

Use the Week 7 Assignment Template to submit the following:

11. The screenshots you took. The screenshots should be labeled, in the same order as these instructions, and highlighted to identify the requested analysis information.

12. Write at least 1 page on each of the following for a 3 – 5 page summary:

· Explaining the overall process.

· Interpreting your analysis results.

· Reflecting on your learning experience.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the 

Library site
 for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

· Analyze TCP/IP traffic packets to interpret key protocol information.

image1.png

image2.png

image3.png

image4.png

image5.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

 This week, explore the relationship between strategic goals and alignment with projects and best practices from the five process groups, especially

 This week, explore the relationship between strategic goals and alignment with projects and best practices from the five process groups, especially focusing on executing, monitoring, and controlling projects. This assessment is the first component of your course project.   In this assessment, you will write a topic definition statement for your

  For this discussion, compare and contrast the characteristics of quantitative and qualitative research, addressing the philosophical assumptions of

  For this discussion, compare and contrast the characteristics of quantitative and qualitative research, addressing the philosophical assumptions of both. Based on your review of the assigned readings, identify and describe what you believe to be meaningful about the qualitative research design and methodology. Define and describe the context in

  this week, explore scholarly literature on critical success factors and project management success. Specifically, focus on complex projects and their

  this week, explore scholarly literature on critical success factors and project management success. Specifically, focus on complex projects and their success or failures, which may include tools, templates, processes, procedures, and metrics, and their relationship to the five process groups: initiating, planning, executing, monitoring and controlling, and closing. Post

IT 226 Project Two Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competencies: ·

IT 226 Project Two Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competencies: · Determine appropriate ways to communicate information to internal and external stakeholders · Apply communication techniques to effectively negotiate and manage conflict Scenario You are the manager of a team of 10 software developers working on a new application for your company, Optimum Way Development, which is based out of Raleigh, North Carolina. Your organization recently acquired a smaller software company based in San Jose, California. You have been informed that your team will be bringing on five people from this newly acquired company; all five people will be moving to Raleigh to join your team. You schedule a phone call with the five new team members and discover that they are upset about the recent impersonal message they received from human resources informing them that they would have to relocate to Raleigh in order to stay employed; no one expressed excitement about joining the team. During this conversation, you also discover that many of the new team members have more education and experience than the people currently on your team. Based on the conversation, you notice that most of these team members are likely older than you, whereas all of the current Raleigh team members are younger than you. After the call, one of your current senior team members approaches you about rumors that are circulating concerning the Raleigh team being required to train the new team members from San Jose. They heard that there are plans to eliminate positions and are concerned the new hires will ultimately be taking their positions. The director who oversees your division has requested that you create and present a recommendation report that documents your plans for managing the conflicts that currently exist or may arise on your team. The director has an advanced degree in a computer science-related field and has worked in technology for over a decade. Directions In order to identify and resolve existing and future conflicts, you have been asked to compose and present your plan for managing conflict for this project. In addition to identifying and resolving the conflicts, you are also responsible for keeping the development of the new application moving forward by continuing to meet scheduled milestones. To do this, you will create a recommendation report and corresponding presentation. The audience for both deliverables is your director. As you create your report and presentation, remember to  use communication techniques and platforms that are appropriate for your audience’s preferences and motivations. Both deliverables should be based on the above scenario and include the following: 1. To start,  explain the major elements of the software application, including background, audience, functions, and features. 2. Next,  explain the areas of conflict for the team. Make sure to include contributing factors and the possible impacts. 3. Articulate the desired outcome of any conflict resolution activities. · How would you like to see this conflict resolved? · What is the “best-case” scenario? 4. Recommend action steps for managing areas of possible conflict with a detailed explanation on how the action steps contribute to conflict resolution. 5. In the presentation only,  use dialogue to communicate the appropriate main ideas to the audience. Although you will not give this presentation over video, you should use the speaker’s notes section in PowerPoint to write the accompanying speech. What to Submit To complete this project, you must submit the following: Recommendation Report Your report should be at least 2 full pages in length (not including a title page), single-spaced and submitted as either a Word document or PDF. Outside resources are not required, but any resources used must be appropriately cited using APA style. You may use the  Recommendation Report Template Word Document for this submission. Presentation Your presentation should be in a presentation format (such as PowerPoint) and  provide an overview of the main ideas from the recommendation report. Using the speaker’s notes section of PowerPoint, include the speech that would accompany the presentation. Outside resources are not required, but any resources used must be appropriately cited using APA style. Supporting Materials The following resource(s) may help support your work on the project: Resource:  Software Design Documents Use one of these software design documents to summarize the application in your report and presentation. Shapiro Library Resource:  Shapiro Library APA Style Guide This Shapiro Library guide goes over the basics of APA-style formatting and citations.

STUDENT COVER SHEET- Student and Trainer/Trainer Details

STUDENT COVER SHEET- Student and Trainer/Trainer Details Student ID Student name Contact number Email address Trainer name Jason Chu Course and Unit Details Course code ICT50118/ICT60115 Course name Diploma/Advanced Diploma of IT Unit code ICTICT608 Unit name Interact with a client on a business level Assessment Title Assessment 1 –