Expert answer:can you please paraphrase the sentences that highlighted with yellow can do a proofreading for the sentences that highlighted with blue
infs_515_project_2.docx
Unformatted Attachment Preview
Wireshark Project (2)
Abeer Albluwi
George Mason University
Dec 7th, 2017
1
المحتويات
1- Introduction ……………………………………………………………………………………………………………. 3
1.1 A Brief History of Wireshark …………………………………………………………………………………. 3
1.2 The Benefits of Wireshark …………………………………………………………………………………… 3
2- Installing Wireshark…………………………………………………………………………………………………. 3
Figure 1: The interface of the wireshark. ………………………………………………………………….. 4
3. Using Wireshark to Capture and Analyse Traffic ………………………………………………………….. 4
Figure 2: The interface of the wireshark …………………………………………………………………… 5
Figure 3: Wireshark capturing traffic……………………………………………………………………….. 6
Figure 5: Packet Bytes Panel. ………………………………………………………………………………… 7
3- Wireshark Statistics ………………………………………………………………………………………………… 7
Figure 6: Wireshark Flow Graph Window. ………………………………………………………………… 8
Figure 7: Wireshark TCP Graph. ……………………………………………………………………………. 9
Figure 8: Wireshark Statistics protocol Hierarchy. ……………………………………………………..10
4- Diagram of the portion of the mesh network. ……………………………………………………………….10
Figure 9: EdrawMax Interface. ………………………………………………………………………………11
Figure 10: Diagram of the portion of the mesh network. …………………………………………….11
5- Conclusion …………………………………………………………………………………………………………….12
6- References ……………………………………………………………………………………………………………13
2
1- Introduction
1.1 A Brief History of Wireshark
Wireshark is an open source cross-platform packet capture and analysis tool, with versions
for Windows and Linux. The GUI window gives a detailed breakdown of the network protocol
stack for each packet, colorising packet details based on protocol, as well as having functionality
to filter and search the traffic, and pick out TCP streams. Wireshark can also save packet data to
files for offline analysis and export/import packet captures to/from other tools. Statistics can also
be generated for packet capture files. Wireshark has grown dramatically in popularity in 2006, and
its collaborative development team now boasts more than 500 contributors.
1.2 The Benefits of Wireshark
Wireshark offers several benefits that make it appealing for everyday use. It is aimed at
both the journeyman and the expert packet analyst, and offers a variety of features to entice each.
Supported protocols Wireshark excels in the number of protocols that it supports—more than 850
as of this writing. These range from common ones like IP and DHCP to more advanced proprietary
protocols like AppleTalk and BitTorrent. And because Wireshark is developed under an open
source model, new protocol support is added with each update.
User-friendliness The Wireshark interface is one of the easiest to understand of any
packet-sniffing application. It is GUI-based, with very clearly written context menus and a
straightforward layout. It also provides several features designed to enhance usability, such as
protocol-based color coding and detailed graphical representations of raw data. Unlike some of the
more complicated command-line-driven alternatives, like tcpdump, the Wireshark GUI is great for
those who are just entering the world of packet analysis.
Cost Since it is open source, Wireshark’s pricing can’t be beat: Wireshark
is released as free software under the GPL. You can download and
use Wireshark for any purpose, whether personal or commercial.
Operating system support Wireshark supports all major modern operating systems,
including Windows, Mac OS X, and Linux-based platforms. You can view a complete list of
supported operating systems on the Wireshark home page.
2- Installing Wireshark
The Wireshark installation process is surprisingly simple. However, before you install
Wireshark, make sure that your system meets the following requirements:
• 400 MHz processor or faster
• 128MB RAM
• At least 75MB of available storage space
• NIC that supports promiscuous mode
In this project, I have a wireshark Installed on VMware Fusion software on Mac OS X
Systems. Figure 1 shows the interface of the wireshark.
3
Figure 1: The interface of the wireshark.
3. Using Wireshark to Capture and Analyse Traffic
In the section, we ping an IP address of a King Abdulaziz University website
(http://www.kau.edu.sa) in Saudi Arabia which is located more than 2000 miles from the computer
that has a wireshark in which we repeat this 15 times (see figure 2 and 3) through a ping command
and record the paths that the packets take as shown in the figures below.
4
Figure 2: The interface of the wireshark.
The capture is split into 3 parts:
1. Packet List Panel – this is a list of packets in the current capture. It colours the packets
based on the protocol type. When a packet is selected, the details are shown in the two panels
below. See Figure 3.
2. Packet Details Panel – this shows the details of the selected packet. It shows the
different protocols making up the layers of data for this packet. Layers include Frame, Ethernet,
IP, TCP/UDP/ICMP, and application protocols such as HTTP. See Figure 4.
3. Packet Bytes Panel – shows the packet bytes in Hex and ASCII encodings. See Figure
5
5
Figure 3 shows the packet list panel which consists of the time, source IP address,
destination IP address, Protocols, length, and information about each packets. Also, figure 3
shows the Internet address of my computer: 192.168.179.288 and the Internet address of the
destination the www.kau.edu.sa : 127.217.12.46. Moreover, different protocols that appear in the
protocol column in the unfiltered packet-listing window such as HTTP (Hypertext Transfer
Protocol), TCP (Transmission Control Protocol), and ARP (Address Resolution Protocol).
Packet List Panel
Packet Details
Panel
Packet Bytes Panel
Figure 3: Wireshark capturing traffic.
figure 4 shows the packet list panel which presets details about each protocols of a
network traffic between my computer and www.kau.edu.sa. Also, packet list panel window shows
source port as HTTP (80) and destination port number as 36381.
6
Figure 4: Packet Details Panel.
Figure 5 shows the packet bytes panel, which presents a hexadecimal value of each
packets.
Figure 5: Packet Bytes Panel.
3- Wireshark Statistics
Wireshark has a statistic option in which you can display some statistic on the network
traffic that you generate. In figure 6, a statics information of a network traffic that we generated is
presented. You can select the Statistics->Flow Graph menu option. Choose General Flow and
Network Source options, and click the OK button. A window similar to that shown in should be
displayed, showing the flow of traffic.
7
Figure 6: Wireshark Flow Graph Window.
We can figure out from figure 7, there is no retransmitted segments in the trace file. We
can verify that by looking to the sequence number of the TCP segments on the graph (we can
show that by choosing Analyze tab in the wireshark > TCP Stream Graph > Time sequence Graph
(Stevens)), All the sequence number from the source to the destination is increasing steadily with
respect to time. However, if there is a retransmitted segment, the sequence number of
retransmitted segments should be smaller comparing to their neighbors.
8
Figure 7: Wireshark TCP Graph.
Figure 8 shows another statistic option presented by wireshark which it is a protocol
Hierarchy. This hierarchy displays more details about each packet percentage and byte
percentage of a network traffic. You can do it by selecting the Statistics->Protocol Hierarchy menu
option. A window similar to that shown in Figure 8 should be shown displaying statistics.
9
Figure 8: Wireshark Statistics protocol Hierarchy.
4- Diagram of the portion of the mesh network.
In this section, a diagram of the portion of the mesh network is presented to reveal the
result of a generated network traffic. Figure 9 shows EdrawMax software that used to draw the
mesh network.
10
Figure 9: EdrawMax Interface.
Figure 10 shows a diagram of the portion of the mesh network.
Figure 10: Diagram of the portion of the mesh network.
11
5- Conclusion
In this paper, a tutorial of wireshark is presented in which it includes installation and using
wireshark to capture and analyse traffic that been generated between m computer and a campus
IP address ( www.kau.edu.sa), then the traffic has been analyzed and statical option also
included. Finally, datagram of the portion of the mesh network is presented using Edraw Max
software.
12
6- References
https://www.wireshark.org/
https://wiki.wireshark.org/
13
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more