Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

DNS, IP, and TCP Traffic Streams

Please see file

Preparation

1. Download and install the TCP/IP packet capture program

2. Decide on a website of your choice for which you will capture and analyze TCP/IP traffic streams and identify the URL of your selected website (e.g.,

3. Use the 

Week 7 Assignment Template


 Download Week 7 Assignment Template
to complete and upload your work to the course room.

Resources

·

Wireshark DocumentationLinks to an external site.
.

·

Wireshark Frequently Asked QuestionsLinks to an external site.
.

·

Wireshark User’s Guide – Chapter 2: Building and Installing WiresharkLinks to an external site.
.

·

Wireshark Essential TrainingLinks to an external site.
.

Overview

Each protocol in the TCP/IP stack uses a specialized packet to transmit and receive data and protocol-specific information at its layer of the protocol stack. For example, there is the TCP segment packet at the TCP layer and there is the IP datagram packet at the IP layer that encapsulates or includes the TCP segment as its data. Packet capture programs like Wireshark allow us to capture these TCP/IP packets as frames from a network interface card that is connected to the Internet. More importantly, these packet capture programs enable us to analyze TCP/IP traffic and examine the networking information therein.

In this assignment, you will use Wireshark to capture and analyze the DNS, IP, and TCP packets of the traffic streams associated with browsing a website of your choice. You will document your capture and analysis with screenshots highlighting the key information analyzed. You will also explain what you did, interpret the result of your analysis, and reflect on this learning experience in a one-page written summary.

Instructions

1. Start the TCP/IP packet capture program 

WiresharkLinks to an external site.
.

2. Configure Wireshark Time Display Format to display time as “Date and Time of Day” as follows: View > Time Display Format > Date and Time of Day

· Do not use the default configuration of Time Display Format as “Seconds Since the Beginning of Capture.”

3. Start Wireshark Capture on your network interface that is connected to the Internet.

4. In a web browser window, type in the URL of your chosen website and hit ENTER to access the website.

5. Stop Wireshark Capture after a few seconds.

6. Analyze the Wireshark frame that encapsulates the DNS query about your chosen URL to identify:

· The IP address of your network interface as the source IP address.

· The URL of your chosen website.

· The DNS Queries part of the frame.

Screenshot your identified frame, similar to figure 1.a, below. On the screenshot, highlight the IP address of your network interface as the source IP address, the URL of your chosen website, and the DNS Queries part of the frame.

7. Analyze the Wireshark frame that encapsulates the DNS response to the query about your chosen URL to identify:

· The IP address of your network interface as the destination IP address.

· The URL of your chosen website.

· The DNS Answers part of the frame.

Screenshot your identified frame, similar to Figure 1.b, below. On the screenshot, highlight the IP address of your network interface as the destination IP address, the URL of your chosen website, and the DNS Answers part of the frame.

8. Analyze the Wireshark frame that encapsulates the TCP handshake’s first SYN TCP segment from your network interface to your chosen URL to identify:

· The header checksum in the IP packet.

· The source IP address, the destination IP address in the IP packet.

· The source port number and the destination port number in the TCP packet.

Screenshot your identified frame, similar to figure 2.a below. On the n screenshot, highlight the header checksum, the source IP address, and the destination IP address in the IP packet. Clearly highlight on the screenshot the source port number and the destination port number in the TCP packet.

9. Analyze the Wireshark frame that encapsulates the TCP handshake’s SYN, ACK TCP segment from your chosen URL to your network interface to identify:

· The header checksum in the IP packet.

· The source IP address, the destination IP address in the IP packet.

· The source port number and the destination port number in the TCP packet.

Screenshot your identified frame, similar to that shown in Figure 2.b below. On the screenshot, highlight the header checksum, the source IP address, and the destination IP address in the IP packet. Clearly highlight on the screenshot the source port number and the destination port number in the TCP packet.

10. Analyze the Wireshark frame that encapsulates the TCP handshake’s last ACK TCP segment from your chosen URL to your network interface to identify:

· The header checksum in the IP packet.

· The source IP address, the destination IP address in the IP packet.

· The source port number and the destination port number in the TCP packet.

Screenshot your identified frame, similar to that shown in Figure 2.c below. On the screenshot, highlight the header checksum, the source IP address, and the destination IP address in the IP packet. Clearly highlight on the screenshot the source port number and the destination port number in the TCP packet.

Use the Week 7 Assignment Template to submit the following:

11. The screenshots you took. The screenshots should be labeled, in the same order as these instructions, and highlighted to identify the requested analysis information.

12. Write at least 1 page on each of the following for a 3 – 5 page summary:

· Explaining the overall process.

· Interpreting your analysis results.

· Reflecting on your learning experience.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the 

Library site
 for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

· Analyze TCP/IP traffic packets to interpret key protocol information.

image1.png

image2.png

image3.png

image4.png

image5.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Connecting Everything – The Internet of Things

1) How can existing and emerging technologies (IoT, Artificial Intelligence, Cloud Computing, Machine Learning, Collaboration Technologies, etc,) inform and enhance the administration and delivery of Public Sector services, i.e., 2) What is possible? 3) How to maximize?

Information Systems Advances in Technology Assignment

Advances in Technology Assignment Overview In this assignment, you will examine how advances in technology and telehealth have improved health care in rural communities. Transportation, health monitoring, timelines, and communication within the health care system are key areas where telehealth can reduce or minimize challenges and burdens with patient encounters.

Telehealth and Virtual Medicine

 2 paragraphs, include reference. Student response will be posted under NOTE PAD.  How have health care providers taken advantage of telehealth and virtual medicine to promote access to patient care during the COVID-19 pandemic? What are some advantages and disadvantages of virtual health care? Be sure to respond to at

Assignment 1

Due 5/23/2024 A professional and appealing document is expected. As required by the Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state ideas in your own words or use quotation marks. image1.png image2.png image3.png

Information Systems Assignment 1-2

Written Essay Assignment 1-3: Due May 23,2024 No more than 3 pages · Relate the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security rules to NIST standards and encryption technologies to ensure confidentiality of ePHI transmission · Evaluate the requirements for a health care organization to become compliant

1-1

Written Essay Assignment 1-1: Due May 23,2024 No more than 3 pages · Research the Enron fraud case as well as SOX requirements · Identify the key elements of fraud committed by Enron that led to the Sarbanes-Oxley (SOX) compliance law. · Identify other compliance laws in the United States

INTRODUCTION TO OM FOR DX

Assignment #2 Assignment Submission: Submit your assignment on d2l that has a SINGLE ZIP file that has 1. All Visio/draw.io/Modelio Diagrams 2. The PDF document that has all the diagrams and the answers inline below every question including the essay/textual questions. Assignment Deliverables: Provide your answers for the following requirements

Response 2

200 word response due 5/17/2024 Franco 2a When recruiting employees for cybersecurity focused work, the vetting process is very important. These prospective employees are more thoroughly vetted than in non-security positions because of the nature of the work. A cyber employee’s main objectives will be to strengthen the cybersecurity posture

Response 1

200 word response due 5/17/2024 2a. Why is it incumbent on employers of cybersecurity personnel to vet prospective employees more thoroughly than in non-security positions? Employers, in charge of hiring cybersecurity professionals are required to assess employees more than those in no security roles. This rigorous vetting process is crucial

Topic 2

Topic 2 Answer the following questions Due 5/17/2024 2a. Why is it incumbent on employers of cybersecurity personnel to vet prospective employees more thoroughly than in non-security positions? (answer with 100 words) 2b. To what extent should the workplace peruse applicants through social media sites? (i.e. Facebook, LinkedIn). At what

Response 2

200 word response 1 reference/intext citation Due 5/16/2024 Jackson The Sarbanes-Oxley Act, or Sox, is a United States law “to protect investors by preventing fraudulent accounting and financial practices at publicly traded companies” (Fruhlinger, 2020). Specifically, the section of the SOX compliance law that requires proper controls and integrity of

Response 1

300 word response 1 reference/intext citation Due 5/16/2024 Quintana HIPAA regulations require health care organizations to have an incident response plan and team that handles potential security incidents and breaches in order to protect and safeguard patient privacy and information and to properly respond to security incidents. The data and

Discussion 1

Discussion #1 The Scope of an IT Compliance Audit 300 word response 1 reference/intext citation Due 5/14/2024 Under the HIPAA Security Rule, it is a requirement for a health care organization to have a security incident response plan and team to handle potential security incidents and breaches. Why is this

Data Analysis Using R

2 paragraph, include reference. 1 student response  Describe what R programming language is and how R programming is used in health care. What are the advantages and disadvantages of R in daily health care IT? Be sure to respond to at least one of your classmates’ posts.

R Programming Activity

Week 7 Activity – R Programming Overview In this learning activity, you will explore the use of R programming in health care. R is an open-source free software used for statistical computing and graphics. You will write an essay to examine how R is used for data analytics and decision-making

Summative assessment

Summative assessment UU – MBA – 714 Summative Assessment Point 2 1 | P a g e Summative Assessment Point 2 Brief, Guidelines and Marking Criteria For this assignment, you are required to find and promote an innovative product/service within an organization of your choice. In your assignment, you need

Database Analysis Using Python

2 paragraph include reference and 1 student response List the components of a relational database and how they are used for Python programming. How is Python programming used in health care IT? List some advantages and disadvantages of Python programming. Be sure to respond to at least one of your

2 IT/Biblical

1) Why are managing information and maximizing technology important to you as a citizen and public sector stakeholder? 2) Which Biblical principles will guide you in sifting through data and analyzing information to better serve the healthcare field?  3) Synthesize the above with a Biblical model of government and statesmanship.