The goal of this assignment is to explore the network packets associated with several typical online activities. You will have the chance to analyze bit-by-bit the flows associated with these services and evaluate different application and protocol parameters across the entire TCP/IP stack including Data Link Layer/Medium Access Control (L2), Network Layer (a.k.a. IP or L3), Transport Layer and Application Layer. To carry out this analysis, you will use Wireshark. Part of finishing this assignment will be learning how to use Wireshark effectively. While Wireshark allows you to capture packets on a network interface it can also be used to read previously collected packet traces.  Make sure to show the full steps and screenshots of capturing network packets on Wireshark.  Attached is the image of the Wireshark trace that needs to be analyzed.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

WireShark:

The goal of this assignment is to explore the network packets associated with several typical online activities. You will have the chance to analyze bit-by-bit the flows associated with these services and evaluate different application and protocol parameters across the entire TCP/IP stack including Data Link Layer/Medium Access Control (L2), Network Layer (a.k.a. IP or L3), Transport Layer and Application Layer. To carry out this analysis, you will use Wireshark. Part of finishing this assignment will be learning how to use Wireshark effectively. While Wireshark allows you to capture packets on a network interface it can also be used to read previously collected packet traces.  Make sure to show the full steps and screenshots of capturing network packets on Wireshark. 

Attached is the image of the Wireshark trace that needs to be analyzed.

 
 
p2-trace-F23 (3).pcapng
File Edit View Go Capture Analyze Statistics
Apply a display filter ... <Ctrl-/>
Time
No.
1 0.000000
2 0.004699
30.010849
4 0.011092
5 0.011511
6 0.045700
7 0.053579
8 0.054355
9 0.058034
10 0.059027
11 0.063062
12 0.063467
13 0.066921
14 0.067644
15 0.071300
16 0.071449
17 0.073925
18 0.088311
19 0.088393
20 0.088817
21 0.090717
22 0.091781
Source
Cisco_a6:ec:a8
Apple_dc:ec:8b
Apple_dc:ec:8b
0.0.0.0
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec: 8b
Cisco_a6:ec: a8
Apple_dc:ec: 8b
Cisco_a6:ec:a8
Apple_dc :ec:8b
Cisco_a6:ec:a8
Apple_dc:ec: 8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
⠀⠀
Apple_dc:ec:8b
fe80::185b:e831:efb...
Apple_dc:ec:8b
Cisco_a6:ec:a8
Telephony Wireless Tools Help
p2-trace-F23 (3).pcapng
Destination
Apple_dc:ec:8b
Cisco_a6:ec:a8
AristaNe_00:00:99
255.255.255.255
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
Cisco_a6:ec:a8
Apple_dc:ec:8b
ff02: :1: ffb5:4013
Cisco_a6:ec:a8
ff02: :2
AristaNe_00:00:99
Apple_dc:ec: 8b
Protocol Length Info
EAP
EAP
ARP
DHCP
EAP
TLSv1.2
EAP
EAP
EAP
EAP
EAP
EAP
EAP
EAP
EAP
EAP
TLSv1.2
ICMPv6
TLSv1.2
ICMPv6
ARP
TLSv1.2
63 Request, Identity
42 Response, Identity
42 Who has 169.226.94.1? Tell 169.226.94.7
342 DHCP Request - Transaction ID 0x43a675d7
24 Request, Protected EAP (EAP-PEAP)
179 Client Hello
1052 Request, Protected EAP (EAP-PEAP)
24 Response, Protected EAP (EAP-PEAP)
1048 Request, Protected EAP (EAP-PEAP)
24 Response, Protected EAP (EAP-PEAP)
1048 Request, Protected EAP (EAP-PEAP)
24 Response, Protected EAP (EAP-PEAP)
1048 Request, Protected EAP (EAP-PEAP)
24 Response, Protected EAP (EAP-PEAP)
1048 Request, Protected EAP (EAP-PEAP)
24 Response, Protected EAP (EAP-PEAP)
41 Server Hello, Certificate, Server Key Exchange, Server Hello Done
86 Neighbor Solicitation for fe80::185b:e831:efb5:4013
154 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
62 Router Solicitation
42 Who has 169.226.94.1? Tell 169.226.94.7
79 Change Cipher Spec, Encrypted Handshake Message
> Frame 1: 63 bytes on wire (504 bits), 63 bytes captured (504 bits) on interface enº, id 0
> Ethernet II, Src: Cisco_a6:ec:a8 (38:90:a5:a6:ec:a8), Dst: Apple_dc:ec:8b (a4:83:e7:dc:ec:8b)
> 802.1X Authentication
> Extensible Authentication Protocol
0000 a4 83 e7 dc ec 8b 38 90
0010 00 2d 01 01 00 2d 01 00
0020 64 3d 65 64 75 72 6f 61
0030 55 41 2d 57 43 31 2c 70
a5 a6 ec a8 88 8e 02 00
6e 65 74 77 6f 72 6b 69
6d 2c 6e 61 73 69 64 3d
6f 72 74 69 64 3d 38
Packets: 9385. Displayed: 9385 (100.0%)
I
0
-8
..- . . networki
d-eduroa m,nasid=
UA-WC1,p ortid=8
X
Profile: Defau
Transcribed Image Text:p2-trace-F23 (3).pcapng File Edit View Go Capture Analyze Statistics Apply a display filter ... <Ctrl-/> Time No. 1 0.000000 2 0.004699 30.010849 4 0.011092 5 0.011511 6 0.045700 7 0.053579 8 0.054355 9 0.058034 10 0.059027 11 0.063062 12 0.063467 13 0.066921 14 0.067644 15 0.071300 16 0.071449 17 0.073925 18 0.088311 19 0.088393 20 0.088817 21 0.090717 22 0.091781 Source Cisco_a6:ec:a8 Apple_dc:ec:8b Apple_dc:ec:8b 0.0.0.0 Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec: 8b Cisco_a6:ec: a8 Apple_dc:ec: 8b Cisco_a6:ec:a8 Apple_dc :ec:8b Cisco_a6:ec:a8 Apple_dc:ec: 8b Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 ⠀⠀ Apple_dc:ec:8b fe80::185b:e831:efb... Apple_dc:ec:8b Cisco_a6:ec:a8 Telephony Wireless Tools Help p2-trace-F23 (3).pcapng Destination Apple_dc:ec:8b Cisco_a6:ec:a8 AristaNe_00:00:99 255.255.255.255 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec:8b Cisco_a6:ec:a8 Apple_dc:ec:8b ff02: :1: ffb5:4013 Cisco_a6:ec:a8 ff02: :2 AristaNe_00:00:99 Apple_dc:ec: 8b Protocol Length Info EAP EAP ARP DHCP EAP TLSv1.2 EAP EAP EAP EAP EAP EAP EAP EAP EAP EAP TLSv1.2 ICMPv6 TLSv1.2 ICMPv6 ARP TLSv1.2 63 Request, Identity 42 Response, Identity 42 Who has 169.226.94.1? Tell 169.226.94.7 342 DHCP Request - Transaction ID 0x43a675d7 24 Request, Protected EAP (EAP-PEAP) 179 Client Hello 1052 Request, Protected EAP (EAP-PEAP) 24 Response, Protected EAP (EAP-PEAP) 1048 Request, Protected EAP (EAP-PEAP) 24 Response, Protected EAP (EAP-PEAP) 1048 Request, Protected EAP (EAP-PEAP) 24 Response, Protected EAP (EAP-PEAP) 1048 Request, Protected EAP (EAP-PEAP) 24 Response, Protected EAP (EAP-PEAP) 1048 Request, Protected EAP (EAP-PEAP) 24 Response, Protected EAP (EAP-PEAP) 41 Server Hello, Certificate, Server Key Exchange, Server Hello Done 86 Neighbor Solicitation for fe80::185b:e831:efb5:4013 154 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message 62 Router Solicitation 42 Who has 169.226.94.1? Tell 169.226.94.7 79 Change Cipher Spec, Encrypted Handshake Message > Frame 1: 63 bytes on wire (504 bits), 63 bytes captured (504 bits) on interface enº, id 0 > Ethernet II, Src: Cisco_a6:ec:a8 (38:90:a5:a6:ec:a8), Dst: Apple_dc:ec:8b (a4:83:e7:dc:ec:8b) > 802.1X Authentication > Extensible Authentication Protocol 0000 a4 83 e7 dc ec 8b 38 90 0010 00 2d 01 01 00 2d 01 00 0020 64 3d 65 64 75 72 6f 61 0030 55 41 2d 57 43 31 2c 70 a5 a6 ec a8 88 8e 02 00 6e 65 74 77 6f 72 6b 69 6d 2c 6e 61 73 69 64 3d 6f 72 74 69 64 3d 38 Packets: 9385. Displayed: 9385 (100.0%) I 0 -8 ..- . . networki d-eduroa m,nasid= UA-WC1,p ortid=8 X Profile: Defau
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Follow-up Questions
Read through expert solutions to related follow-up questions below.
Follow-up Question

Where are the screenshots of how to capture and analyze packets on WireShark? Make sure to show screenshots of each step on WireShark. 

Solution
Bartleby Expert
SEE SOLUTION
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY