Hands-On Projects 3-1

Description: This project shows you how to capture packets on a network, select a specific packet, and examine the IPv4 header data for the packet. You may capture your own data to analyze, or you may start Wireshark, open the ch03_IPv4Fields.pcapng file available from the Student Companion Web site, and skip to Step 8.

  1. Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then click Wireshark. In Windows 10, click the Start button, click All apps, and then scroll down and then click Wireshark in the menu. Alternately, use the Start menu search box [Windows 7] or the Search box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the resulting list.)
  2. Click the Capture menu, and then click Options. The Capture Interfaces window appears.
  3. Several network interfaces may appear. Locate the first one showing real-time traffic under the Traffic column, select it, and then click Start. The Capturing window appears.
  4. Open a command prompt window. (Use the Start menu search box or the Search box on the task bar. Type cmd and then press Enter.)
  5. Ping the IPv4 address of a computer on your local network. If you don’t know the IPv4 address of a host on your network, ask your instructor.
  6. Type exit and press Enter in the command prompt window to close it.
  7. In Wireshark, click Capture on the menu bar and then click Stop (or click the Stop icon on the toolbar).
  8. Select a TCP packet in the packet list pane (the upper pane).
  9. In the packet details pane (the middle pane), expand Internet Protocol Version 4, as shown in Figure 3-21.
  10. Examine the values for the Version and Header length fields.
  11. Expand Differentiated Services Field, examine the values of the Total Length and Identification fields, and then collapse the section.
  12. Expand Flags, examine the Fragment offset, Time to live, and Protocol fields, and then collapse the section.
  13. Expand Header checksum, examine the contents, and then collapse the selection.
  14. Examine the Source and Destination fields.
  15. If told to do so by your instructor, save the capture file and then close Wireshark.

Part 1

When you reach step # 5, please ping these following addresses

  • 172.16.111.101 – my workstation
  • 172.16.5.16 – dns
  • 17.178.96.59

Part 2

When you reach step # 5, please go to a web browser and go to the following site and begin watching the video.

The Fallen of World War II from Neil Halloran on Vimeo.