Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
1 views2 pages

Experiment 1 Computer Network

The document outlines the installation and basic usage of Wireshark, a network protocol analyzer. It details steps for installation, capturing live network traffic, and using filters to analyze specific types of packets. The conclusion emphasizes the importance of packet analysis for understanding network protocols and enhancing network security.

Uploaded by

sangwanharsh575
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views2 pages

Experiment 1 Computer Network

The document outlines the installation and basic usage of Wireshark, a network protocol analyzer. It details steps for installation, capturing live network traffic, and using filters to analyze specific types of packets. The conclusion emphasizes the importance of packet analysis for understanding network protocols and enhancing network security.

Uploaded by

sangwanharsh575
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Experiment 1

Aim: To install and study Wireshark.

Steps for Installing Wireshark:


1.​ Go to the official website → https://www.wireshark.org/download.html.
2.​ Download the Windows Installer (64-bit).
3.​ Run the installer and follow the setup.
○​ Select WinPcap or Npcap (Npcap is preferred).
○​ Install with default options.
4.​ After installation, launch Wireshark.

Basic Wireshark Usage:


1.​ Open Wireshark → You’ll see a list of available network interfaces (like Wi-Fi,
Ethernet).
2.​ Select your active network interface (the one connected to the internet).
3.​ Click the blue shark fin button (Start Capturing).
4.​ You’ll see live network traffic being captured.

Studying Network Traffic:


Wireshark captures packets. Each packet contains:
●​ Protocol (HTTP, TCP, UDP, DNS, ARP, etc.)
●​ Source & Destination IPs
●​ Ports
●​ Payload data

Useful Filters:
●​ http → Show only HTTP traffic.
●​ tcp.port == 80 → Show TCP traffic on port 80.
●​ ip.addr == 192.168.1.1 → Show traffic to/from a specific IP.
●​ dns → Show only DNS queries and responses.​
arp → Show ARP packets.

Example Study:
●​ Open Google.com in browser while capturing.
●​ Filter with dns → You’ll see your system asking for Google’s IP.
●​ Filter with tcp → You’ll see TCP handshakes (SYN, SYN-ACK, ACK).
●​ Filter with http or tls → You’ll see website requests.

Conclusion
The installation and use of Wireshark as a packet sniffer successfully demonstrated how
network traffic can be captured, filtered, and analyzed in real time. By performing simple
packet captures such as DNS queries, HTTP requests, TCP handshakes, and ARP exchanges,
it was observed that Wireshark provides detailed insights into the structure and behavior of
network protocols. This exercise helped in understanding the flow of data, the role of each
protocol in communication, and the importance of packet analysis in troubleshooting,
monitoring, and securing computer networks.

You might also like