Understanding Wireshark Embedded Tools for Packet Tracing and

School
Arizona State University**We aren't endorsed by this school
Course
Subject
Computer Science
Date
Mar 12, 2023
Pages
18
Uploaded by AdmiralCrown3320
This is a preview
Want to read all 18 pages? Go Premium today.
Already Premium? here
Activity Cover Sheet Name:Sahil DixitProfessor: Helm Activity 1Wireshark embedded tools Title of Report: Activity 1 - Wireshark Embedded Tools Summary (two sentences): In this assignment we used Wireshark to capture and trace packets, understand the types of tracing and the differences in them. Checklist (items included): 1. Cover Sheet4.Results: Data, Tables, & Diagrams 2. Introduction & Background5.Analysis of Results 3. Procedure6. Summary and Conclusions Key Results: Packet tracing, different types of I/O graphs, comparison between the graphs. Key Conclusions (technical): The graphs give a variety of output when transferring packets. The packet transfer procedure helps broadly with understanding network traffic, packet dropping, packet retransmission and successful transfer of packets.
IFT 482-598 ACTIVITY 1 - WIRESHARK EMBEDDED TOOLS 2 Key Conclusions (critical thinking): All the three graphs give examples of how data transfer takes place. We understand why we obtain a RTT graph and when and in what cases a TCP graph is not observed.
IFT 482-598 ACTIVITY 1 - WIRESHARK EMBEDDED TOOLS 3 IFT 598 - NETWORK FORENSICS (SESSION C) ACTIVITY 1 - WIRESHARK EMBEDDED TOOLS SAHIL DIXIT PROFESSOR JIM HELM Figure 1: I/O Graph of File Download
Why is this page out of focus?Because this is a Premium document. Subscribe to unlock this document and more.
Why is this page out of focus?
Because this is a Premium document. Subscribe to unlock this document and more.
Page1of 18
Couldn't fetch data