NETWORK & DATA COMMUNICATION

 

Wireshark Assignment Instructions

Assignment: Wireshark Exploration

I want you to install and run Wireshark, gather some data, and begin to decipher/understand the information it is giving you.  Use the Wireshark Exploration submission link to submit a document including screenshots of you running Wireshark and a detailed description of what the Wireshark output is telling you. Run Wireshark to look at both local network activity and remote network activity. 

I have created a separate Wireshark Getting Started tutorial to help you get started by successfully connecting, capturing, and interpreting to a site and file.

Do not submit the read out or interpretation of the tutorial for your assignment. If you do, you will not receive any points for the assignment. It is just a tutorial to get you acquainted with the most basic feature of Wireshark. After you have run through the tutorial and just looked at your network traffic, work through the activity below and you can filter and see the process of data transmission in layer 2 and 3. 

A good way to get started with this assignment is to ping your Raspberry Pi. So, I would suggest completing the Pie setup assignment prior to completing this Wireshark assignment.

  1. Open Wireshark on the host (should be you laptop or desktop) 
  2. Click the Wi-Fi adapter (assuming you’re not using a wired Ethernet connection). This will start a live capture. 
  3. In the filter box (below the toolbar at the top), type arp or icmp and hit Enter. – this will filter the captured data.
  4. In the command line on the host, ping the IP address of your Pi. 
  5. In Wireshark, you should see an ARP Request, an ARP Reply, as well as four ICMP Echo Requests and Replies. Click the red square icon (second from the left) on the toolbar at the top to stop the capture. 
  6. In the middle Wireshark pane (Packet Details), look for the first ARP, and expand the triangle next to Ethernet_II and the triangle next to Address Resolution Protocol (Request)

Things to note 

  • In the Ethernet frame, the source MAC address is the MAC address of the host machine, and the destination MAC address is the Layer 2 Broadcast Address (12 Fs). 
  • In the ARP (which is encapsulated inside the Ethernet frame), the Sender MAC and Sender IP address belong to the host machine. Also notice that the Target MAC is all 0s (the sender left that field blank), but the Target IP address is that of the Pi. 
  • In the top pane (Packet List), Wireshark turns this into a nice English question in the Info column. 
  • The next frame, below the Packet List, is the response. Compare the fields in the Ethernet frame and the ARP in this response to the frame above, the request. ARP is a pure Layer 2 protocol. It is not routable. There is no IP header. Even though you did see IP addresses in the ARP fields, that does not make it a Layer 3 routable protocol. 

Now that the host machine got the ARP reply, with the MAC address of the Pi, it can send the ICMP Echo Replies. The next 8 rows should be 4 ICMP Echo Requests and 4 ICMP Echo Replies. ICMP is a Layer 3 protocol. 

  1. Select the first ICMP Echo Request. 
  2. Notice how ICMP is encapsulated inside of an IP packet, which is encapsulated inside an Ethernet frame. 
  3. Expand the fields of all protocols, by clicking the triangles. 

Notice with the ICMP Echo Requests that the source MAC address and the source IP address are those of the host machine, while the destination MAC address and the destination IP address are those of the Pi. 

  • For the ICMP Echo Replies, the pairs are reversed. This is local communication. The source determined that the destination was on the same subnet by first logically ANDing its IP address with its subnet mask, and then logically ANDing the destination IP address subnet mask with the source subnet mask. When both resultant network IDs came out the same, the source realized it had to ARP for the MAC address of the actual destination. 

Now try Viewing Remote Communication (not on your local network)

  1. Start a new Wireshark capture by clicking the blue fin (first icon from the left), with the same filter as in Step 3 under Use Wireshark to view network activity (arp or icmp). 
  2. Open up a new command line interface with Administrator privileges, by clicking the Start button, typing cmd, right clicking on the icon, selecting Run As Administrator, and clicking the Yes button. 
  3. At the prompt, type arp -d, which will clear the host’s ARP cache. Then, immediately type ping www.google.com (Links to an external site.). You will have a new set of ARPs and ICMPs. 

In a Word document I want you to try looking at the general traffic on your network, what do you see? Interpret it and use screenshots. Do not just resubmit the tutorial. You can submit the Pi activity above for credit (10pts) but you will need provide additional information about the traffic on your network. So run Wireshark and then try to to explain what you are seeing on your network (10pts).

Next, Ping a remote location (not Google.com or TWU.edu) and use Wireshark to figure out its ip address, MAC address and other components. Again, include screenshots and explain in detail what you see and what you found (10pts).

In your document address the following (10 pts):

  1. Explain what is the difference in ICMP Echo Requests sent from your machine, when pinging a local destination vs. a remote destination.
  2. Explain what is the difference in ICMP Echo Replies sent to your machine, when pinging a local destination vs. a remote destination.

NOTE:  All screenshots should show your application (Wireshark, SSH client, etc.) running in a non-maximized window, and should show part of your desktop background as well as the time/date in the taskbar/menu bar/status bar. 

I have set up an optional discussion folder in Canvas called Wireshark Exploration for you to use to ask questions  and provide insight to each other in the completion of this assignment.  You are NOT required to participate in this discussion (unlike other discussions) as it is just for support in this assignment. Do not post direct answers or tutorials in this discussion.

Submit your document to the submission link titled Wireshark Exploration dropbox on Canvas.

NOTE:  All screenshots should show your application (Wireshark, SSH client, etc.) running in a non-maximized window, and should show part of your desktop background as well as the time/date in the taskbar/menu bar/status bar. 

Discussion

 

Wk 12 Discussion

Wireshark is one of the most widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the preferred standard across many commercial and non-profit enterprises, government agencies, and educational institutions. GlassWire is a free network monitor & security tool with a built-in firewall. Review the features of these two products and explain how you could benefit from using either of these network management tools.
https://www.glasswire.com/
https://www.wireshark.org/

 

Week 12 Discussion

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

An initial post must be between 250-300 words 

Subject : Software Engineering

 

Try to answer the following question, 

why are evolutionary models considered by many to be the best approach to software development in a modern context?

 Please refer to Section 2.5.3 from the textbook

This is discussion Post.

Excel 1G Regional Sales

#Excel_1G_Regional_Sales

 

Change the Theme to Retrospect. (If the Retrospect theme is not available on your computer, in the Themes gallery, click Browse for Themes, and then select the theme from your downloaded project files.) Set the width of column A to 80 pixels and the width of columns B:H to 110 pixels. If any columns are too narrow to display all the data, apply AutoFit to the column.
Mac users: Set column A to 68 pixels and columns B:H to 95 pixels. If any columns are too narrow to display all the data, apply AutoFit to the column.

Merge and center the title across the range A1:H1, and then apply the Title cell style. Merge and center the subtitle across the range A2:H2, and then apply the Heading 1 cell style.

Select the seven column titles, apply Center formatting, and then apply the Heading 4 cell style.

By using the Quick Analysis tool, Sum the Quarter 1 sales, and then copy the formula across for the remaining Quarters; the Quick Analysis tool formats totals in bold.
Mac users: Instead of the Quick Analysis tool, use the AutoSum button, and then apply 
bold formatting to the results. 

Select the Northeast sales for the four quarters, and then display the Quick Analysis gallery for Totals. Click the second Sum option—the sixth item in the gallery—which displays the column selection in yellow. Copy the formula down through cell F7; recall that the Quick Analysis tool formats sums in bold.
Mac users: Instead of the Quick Analysis tool, use the AutoSum button, and then apply Bold formatting to the total.

Apply the Accounting Number Format to the first row of sales figures and to the total row. Apply the Comma Style to the remaining sales figures. Format the totals in row 7 with the Total cell style. Increase the column widths as needed.

888

Insert a new row 6 with the row title Midwest and the following sales figures for each quarter: 110985.45 and 118674.91 and 100548.50 and 120621.17 Copy the formula in cell F5 down to cell F6 to sum the new row.

669

Using absolute cell references as necessary so that you can copy the formula, in cell G4 construct a formula to calculate the Percent of Total Sales for the first region. Copy the formula down for the remaining regions.

101010

To the computed percentages, apply Percent Style with two decimal places, and then center the percentages.

6811

Insert Line sparklines in the range H4:H7 that compare the quarterly data. Do not include the totals. Show the sparkline Markers and apply a style to the sparklines using the second style in the second row.

Note, Mac users, select the first style in the second row.

5.6812

To compare the quarterly sales of each region visually, select the range that represents the sales figures for the four quarters, including the quarter names and each region—do not include any totals in the range. With this data selected, by using the Recommended Charts command, insert a Clustered Column chart with the regions as the category axis and the Quarters as the legend.

Apply Chart Style 8. Change the colors by applying the third row of colors under Colorful. Position the upper middle sizing handle of the chart on the line between column D and column E and just below row 9.

Change the Chart Title to Regional Sales to Fitness Clubs

Deselect the chart. Change the page orientation to Landscape. Center the worksheet horizontally on the page, and then insert a Footer with the File Name in the left section.

Show the document properties. As the Tags, type fitness clubs, regional sales In the Subject box, type your course name and section number. Be sure your name displays as the Author.

Save and close the workbook, and then submit for grading.

Encoding and traversing (through Python) the Neo4J network

  

please look into the uploaded homework document and Please include the Cypher statements that you use to upload the CSV file into the Neo4j Desktop. Ând  Place them at the top of your Python file and comment them out. Please download the MS Word file which contains the Homework instructions 

Operational Excellence W6

  

Information Systems for Business and Beyond Questions

Chapter 11 – study questions 1-10, Exercise 1

Chapter 12 – study questions 1-11, Exercise 1

Information Technology and Organizational Learning Assignment:

Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.

Chapter 10 – Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude?

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Computer and Information Networking

Question-1 

Write a descriptive comparative review of  IPv4 and IPv6 and

explain what IPv4 and IPv6 are. Discuss and compare the following features:

a) Addressing method

b) Number of classes

c) Configuration 

d) Routing information protocol

e) Network Configuration

f) Best feature

g) Security

g) Mobility & Interoperability

i) Compatibility with mobile devices

k)Can they communicate with each other? Do we need both of these protocols?

Note:   Please list your reference/s

Firewall

Two pages must be completed. Due by 10 pm tonight and please see attachment for directions.

NEW AUTHENTICATION PROPOSAL A relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at the following link: Secure Quick Reliable Login (Links to an external site.)Links to an external site. Briefly summarize ho

 

NEW AUTHENTICATION PROPOSAL

A relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at the following link:

Briefly summarize how SQRL works and indicate how it fits into the categories of types of user authentication. Provide the benefits and identify any possible security issues with SQRL.

Your well-written paper should meet the following requirements:

  • Paper length: 2-3 pages
  • Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
  • Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.
  • Format according to APA guidelines