没有合适的资源?快使用搜索试试~ 我知道了~
Week1-Lab-Wireshark-Intro-v8.0 wireshark使用
0 下载量 61 浏览量
2023-12-22
21:59:01
上传
评论
收藏 1.46MB PDF 举报
温馨提示
试读
10页
Week1-Lab-Wireshark_Intro_v8.0 wireshark使用
资源推荐
资源详情
资源评论
Wireshark Lab:
Getting Started v8.0
Supplement to Computer Networking: A Top-Down
Approach, 8
th
ed., J.F. Kurose and K.W. Ross
“Tell me and I forget. Show me and I remember. Involve me
and I understand.” Chinese proverb
© 2005-2020, J.F Kurose and K.W. Ross, All Rights Reserved
One’s understanding of network protocols can often be greatly deepened by “seeing
protocols in action” and by “playing around with protocols” – observing the sequence of
messages exchanged between two protocol entities, delving down into the details of
protocol operation, and causing protocols to perform certain actions and then observing
these actions and their consequences. This can be done in simulated scenarios or in a
“real” network environment such as the Internet. In the Wireshark labs you’ll be doing in
this course, you’ll be running various network applications in different scenarios using
your own computer. You’ll observe the network protocols in your computer “in action,”
interacting and exchanging messages with protocol entities executing elsewhere in the
Internet. Thus, you and your computer will be an integral part of these “live” labs.
You’ll observe, and you’ll learn, by doing.
In this first Wireshark lab, you’ll get acquainted with Wireshark, and make some simple
packet captures and observations.
The basic tool for observing the messages exchanged between executing protocol entities
is called a packet sniffer. As the name suggests, a packet sniffer captures (“sniffs”)
messages being sent/received from/by your computer; it will also typically store and/or
display the contents of the various protocol fields in these captured messages. A packet
sniffer itself is passive. It observes messages being sent and received by applications and
protocols running on your computer, but never sends packets itself. Similarly, received
packets are never explicitly addressed to the packet sniffer. Instead, a packet sniffer
receives a copy of packets that are sent/received from/by application and protocols
executing on your machine.
Figure 1 shows the structure of a packet sniffer. At the right of Figure 1 are the protocols
(in this case, Internet protocols) and applications (such as a web browser or email client)
that normally run on your computer. The packet sniffer, shown within the dashed
rectangle in Figure 1 is an addition to the usual software in your computer, and consists
of two parts. The packet capture library receives a copy of every link-layer frame that
is sent from or received by your computer over a given interface (link layer, such as
资源评论
背包客研究
- 粉丝: 618
- 资源: 111
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功