Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayTechnology
Pages:
1 page/≈275 words
Sources:
No Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

WIRESHARK ASSIGNMENT ESSAY. Technology Assignment. (Essay Sample)

Instructions:


WIRESHARK ASSIGNMENT
Student’s Name
Institutional Affiliation
WIRESHARK ASSIGNMENT
The initial step entails running a ping command to test the server connection as shown below via the command prompt. The ping was successfully conducted three times with the third being captured and traced in the Wireshark application.
Ping Traffic in Command Prompt
Wireshark track captured with ping

source..
Content:


WIRESHARK ASSIGNMENT
Student’s Name
Institutional Affiliation
WIRESHARK ASSIGNMENT
The initial step entails running a ping command to test the server connection as shown below via the command prompt. The ping was successfully conducted three times with the third being captured and traced in the Wireshark application.
Ping Traffic in Command Prompt
Wireshark track captured with ping
Drawing of Ethernet Frame
The minimum size of an ICMP packet in an Ethernet frame is 74bytes as seen in the Wireshark capture output. There is an 8 byte ICMP header and 60 byte IP Header. In this case, the diagram of the Ethernet frame is shown below.
Preamble

SFD

Destination Address

Source Address

Type/ Length

Data/Payload

Frame Check Sequence
(CRC)

7 Bytes 1 Byte6 Bytes6 Bytes 2 Bytes46-1500 Bytes 4 Bytes
Drawing of Network Topology
The internet gateway on the router in this case is 192.168.8.1, the first IP address in that subnet. The drawing of the network topology is as shown for the remote server (www.facebook.com) that was pinged.
Broadcast Fra

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • POLICY BUY- IN Case Study. Technology Assignment.
    Description: The Chief Information Officer plays a vital role in ensuring that organizational policies that are associated with IT system are implemented correctly. ...
    2 pages/≈550 words| 1 Source | APA | Technology | Essay |
  • SELECTING A RESEARCH APPROACH. Technology Assignment.
    Description: The research question presented for inquiry in this paper aims to interrogate whether credit card companies who embed their credit cards with Radio Frequency Identification (RFID) chips experience higher credit card fraud than credit card companies who do not utilize this technology...
    2 pages/≈550 words| 3 Sources | APA | Technology | Essay |
  • Security Systems Implementation Technology Essay Paper
    Description: Secure SDLC (Software development life cycle) is an integral part in protecting digital assets for all organizations that implement technology in the day-to-day operations. Information security standards may vary depending to the type of business or activities involved within an organization in relation...
    8 pages/≈2200 words| 3 Sources | APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!