CAPTURING NETWORK TRAFFIC IN A NETWORKED ENVIROMENT USING WIRESHARK

  • Type: Project
  • Department: Software Systems Engineering
  • Project ID: SSE0008
  • Access Fee: ₦5,000 ($14)
  • Pages: 3 Pages
  • Format: Microsoft Word
  • Views: 90
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

What is Wireshark?

Wireshark is a network packet analyzer. A network packet analyzer used to capture network packets and display that packet data as detailed as possible.

My network capturing was done on wireshark on kali linux,


Some intended uses of wireshark

1.Network administrators use it to troubleshoot network problems

2.Network security engineers use it to examine security problems

3.Engineers use it to verify network applications

4.Developers use it to debug protocol implementations

5.People use it to learn network protocol internals


Features of wireshark

The following are some of the many features Wireshark provides:

1.Available for UNIX, LINUX and Windows.

2.Capture live packet data from a network interface.

3.Open files containing packet data captured with tcpdump/WinDump, Wireshark, and a number of other packet capture programs.

4.Import packets from text files containing hex dumps of packet data.

5.Display packets with very detailed protocol information.

6.Save packet data captured.

7.Export some or all packets in a number of capture file formats.

8.Filter packets on many criteria.

9.Search for packets on many criteria.

10.Colorize packet display based on filters.

11.Create various statistics.


CAPTURING NETWORK TRAFFIC IN A NETWORKED ENVIROMENT USING WIRESHARK
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Software Systems Engineering
  • Project ID: SSE0008
  • Access Fee: ₦5,000 ($14)
  • Pages: 3 Pages
  • Format: Microsoft Word
  • Views: 90
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Software Systems Engineering
    Project ID SSE0008
    Fee ₦5,000 ($14)
    No of Pages 3 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT The load balancing is the most important issues to reduce congestion in Autonomous computer networks. The inter-domain traffic control methods have been addressed by researchers. In this paper, we are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based... Continue Reading
    ABSTRACT The load balancing is the most important issues to reduce congestion in Autonomous computer networks. The inter-domain traffic control methods have been addressed by researchers. In this paper, we are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based... Continue Reading
    CHAPTER ONE 1.0                                     INTRODUCTION 1.1              BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communication of which telecommunication is a key player. The quantum development in the telecommunications... Continue Reading
    Abstract 1.1Introduction Traffic0monitoring0is0a0very0difficult0task0for0traffic0control0department,0especially0in0large cities.0This0prototype0project0is0designed0to0monitor0a0traffic0light0controlled0intersection0by0us ing0a0camera,0whenever0a0vehicle0breaks0the0traffic0rules0the0camera0takes0a0snap0shot.... Continue Reading
    Abstract Vehicles provide an efficient way of transportation across the cities of Greater Accra in Ghana. Technology has impacted the transportation sector through variety of modes such as applications for routing. An example of this is the google maps mobile application. However, due to bad road networks and a time sequenced traffic control... Continue Reading
    Abstract This work investigates an improved protection solution based on the use of artificial neural network on the 330kV Nigerian Network modelled using Matlab R2014a. Measured fault voltages and currents signals decomposed using the discrete Fourier transform implemented via fast Fourier transform are fed as inputs to the neural network. The... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years.  The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special... Continue Reading
    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    Call Us
    whatsappWhatsApp Us