0% found this document useful (0 votes)
19 views26 pages

Faculty of Engineering Department of Computer Science and Engineering (Cyber Security)

Uploaded by

devilattacker125
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
19 views26 pages

Faculty of Engineering Department of Computer Science and Engineering (Cyber Security)

Uploaded by

devilattacker125
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 26

KARPAGAM ACADEMYOF HIGHER E D U C A T I O N

(Deemed to be University Established Under Section 3 Of UGC Act 1956)


Pollachi Main Road, Eachanari Post, Coimbatore – 641 021, INDIA

Faculty of Engineering
Department of Computer Science and Engineering (Cyber Security)

22BECY541 – NETWORK ARCHITECTURE AND SECURITY


LAB MANUAL

Prepared by Verified by

Mrs.J.Angeljulie Dr.R.Roopa Chandrika

AP/CY HOD/CY
LIST OF EXPERIMENTS

1. Study of different network devices in detail.


2. Study of different types of network cables and practically implement the cross-wired cable and straight
through cable using clamping tool.
3. Study of basic network command and Network configuration commands
4. Implement different LAN topologies using Network Simulator.
5. Implement the concept of VLAN using Network Simulator.
6. Implement the concept of static routing
7. Implement the concept of dynamic routing (RIP, OSPF, BGP).
8. Packet capture and header analysis by wire-shark (TCP, UDP, IP)
Ex.No. 1 Network Devices
Date:

Aim: Study of following Network Devices in Detail


a. Repeater
b. Hub
c. Switch
d. Bridge
e. Router
f. Gate Way
Procedure:

Network Devices

1. Repeater:

• Functioning at Physical Layer. Repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other side of an obstruction,
so that the signal can cover longer distances. Repeater have two ports ,so cannot be use to
connect for more than two devices

2. Hub:
• An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.

3. Switch:
• Anetwork switch or switching hub is a computer networking device that connects
network segments.The term commonly refers to a network bridge that processes and routes
data at the data link layer (layer 2) of the OSI model. Switches that additionally process
data at the network layer (layer 3 and above) are often referred to as Layer 3 switches or
multilayer switches.

4. Bridge:

• A network bridge connects multiple network segments at the data link layer (Layer 2)
of the OSI model. In Ethernet networks, the term bridge formally means a device that
behaves according to the IEEE 802.1D standard. A bridge and switch are very much alike;
a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with bridge. Bridges can analyze incoming data packets to determine if
the bridge is able to send the given packet to another segment of the network.

5. Router:

• A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where
multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a
table showing the preferred paths between any two systems on the interconnected
networks.

6. Gate Way:
• In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching devices,
rate converters, fault isolators, or signal translators as necessary to provide system
interoperability. It also requires the establishment of mutually acceptable administrative
procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.

VIVA QUESTIONS:

1. What tools or commands would you use to capture and analyze network traffic?
2. What is the difference between TCP and UDP?
3. Define MAC address and IP address.
4. What is the OSI model? Describe the seven layers and their functions.
5. Explain the difference between a hub, switch, and router.

Result:
The above Network Devices are studied successfully.
Ex.No. 2 Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool
Date:

Aim:
To Study of different types of Network cables and practically implement the cross-wired cable and
straight through cable using clamping tool.

Apparatus (Components):
RJ-45 connector, Climping Tool, Twisted pair Cable
Procedure:
Steps:

To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter the
characteristics of your cable, or even worse render is useless. Check the wires, one more time for
nicks or cuts. If there are any, just whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable,
with one of the ends whacked off, you only have one end to install - the crossed over end. Below
are two diagrams, which show how you need to arrange the cables for each type of cable end.
Decide at this point which end you are making and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection


Diagram shows you how to prepare straight through wired connection

VIVA QUESTIONS:

1. What is the difference between twisted pair, coaxial, and fiber optic cables?
2. What are the different connector types used with network cables?
3. Describe the characteristics and categories of twisted pair cables.
4. What factors should be considered when selecting a network cable type for a specific application?
5. Define Twisted pair Cable.

Result:
Thus, the above details used to study about the different types of Network cables and Practically
implement the cross-wired cable and straight through cable using clamping tool.
Ex.No. 3 Study of basic network command and Network configuration commands.
Date:

Aim: To study of basic network command and Network configuration commands.

Apparatus (Software): Command Prompt and Packet Tracer.

Procedure:
To do this EXPERIMENT- follows these steps:
In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc.

All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to flash
memory or permanent memory.

This command includes:


• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.

ping:
ping (8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see
if a machine is alive. If there is no response, you know something is wrong.
Traceroute:

Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.

nslookup:

Displays information from Domain Name System (DNS) name servers.

NOTE :If you write the command as above it shows as default your pc's server name firstly.

pathping:

A better version of tracert that gives you statics about packet lost and latency.
Getting Help

In any command mode, you can get a list of available commands by entering a question mark

(?). Router>?
To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).

Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.

Router#configure ?

memory Configure from NV memory network Configure from a TFTP network host terminal
Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can abbreviate the show
command to sh.

Configuration Files

Any time you make changes to the router configuration, you must save the changes to memory
because if you do not they will be lost if there is a system reload or power outage. There are two
types of configuration files: the running (current operating) configuration and the startup
configuration.
Use the following privileged mode commands to work with configuration files
VIVA QUESTIONS:

1. What is the purpose of the route command, and how is it used to configure routing tables?
2. What are DHCP client and server configuration commands?
3. Explain the purpose of the netsh command in Windows networking.
4. What is the ipconfig (or ifconfig) command used for?
5. Describe the traceroute (or tracert) command and its utility.

Result:
Thus, detail study about basic network command and Network configuration commands.
EX.4 Implement different LAN topologies using Network Simulator.
Date:

Aim:
To implement different LAN topologies using Network Simulator.

ALGORITHM FOR CREATING A TOPOLOGY:


1. Open your Network Topology. Once you've opened your Network Topology on Cisco Packet
Tracer, access your network and identify the components of your network, for example; Servers,
Routers, End Devices, etc.
2. Complete the cabling. Access the cables section and connect completely and correctly the cables
between the networks in order to ensure connectivity between the devices in the network using the
connections table given.
3. Using the address table still, correctly and completely configure the IP addresses on all end devices.
This can be done by accessing the desktop platform on each device and locating the IP configuration
section. The reason for doing this is to enable the devices be on the right network.
4. After configuring the addresses, you will have to test connectivity by opening a command prompt
window on the end devices and try pinging the address which the network operates on. If it gives
you a reply, it means your network was configured correctly.
The step by procedure of creating Bus topology on Cisco Packet Tracer is shown in Figures 1-
5 below

Fig 1: Simulating network devices


Fig 2: Simulating generic switches

Fig 3: Establish the links between the network devices and generic switches
Fig 4: Enter the IP address to each network devices

Bus Topology

Fig 5: Network devices connected in Bus topology


VIVA QUESTIONS:
1. How Repeaters are different form Hubs?
2. Mention the different types of network switches and the layer where they are used?
3. What do you mean by network topology?
4. Compare and contrast various different types of network topologies

Result:

Thus, to Configure network devices, such as hubs and switches within a network topology using Packet
Tracer software successfully.
9. Ex.No. 5 Implement the concept of VLAN using Network Simulator.

Date:

Aim:
To Implement the concept of VLAN using Network Simulator.
.
Procedure:
1. Launch Packet tracer.
2. Create network topology.
3. Connect devices.
4. Configure VLANs.
5. Assign ports.
6. Configure trunking.
7. Verify configurations.

STEPS FOR HANDLING NETWORK:


Launch Packet Tracer: Start the Packet Tracer software on your computer.
Create the network topology: Build the network topology by dragging and dropping the required
devices from the device list onto the workspace. Include switches, routers, and PCs as needed.
Connect the devices: Connect the devices using appropriate cables. Use Ethernet cables to connect PCs
to switches and switches to routers.
Configure VLANs: Access the switch's configuration interface by double-clicking on it. Navigate to the
VLAN configuration section and create the required VLANs. Assign VLAN IDs and names to each
VLAN.
Assign ports to VLANs: Assign switch ports to specific VLANs. Determine which ports belong to
which VLANs and configure them accordingly. For access ports, assign a single VLAN. For trunk ports,
configure them to allow traffic from multiple VLANs.
Configure trunking: Identify the trunk links between switches. Access the switch's configuration
interface and configure the trunk ports. Enable trunking and specify the allowed VLANs on the trunk
links.
Verify configurations: Verify that the VLANs and trunking configurations are correctly applied. Check
the status of the VLANs and trunk ports to ensure they are active and operational.
Test connectivity: Test the connectivity between devices within the VLANs. Ping devices in the same
VLAN to ensure communication is successful. Ping devices in different VLANs to verify VLAN
isolation.
Troubleshoot and refine: If there are any connectivity issues or misconfigurations, troubleshoot and
refine the configurations. Check VLAN assignments, trunk configurations, and port settings to resolve
any problems.
Document the configuration: Document the VLAN and trunking configurations for future reference.
Include details such as VLAN IDs, names, assigned ports, and trunk configurations.
Monitor and maintain: Monitor the network to ensure VLANs and trunking continue to function as
expected. Regularly review the configurations and make any necessary adjustments or updates.
EXPRIMENT SETUP: Design topology in packet tracer

In Figure the R1 GigabitEthernet 0/0/1 interface is connected to the S1 FastEthernet 0/5 port. The
S1 FastEthernet 0/1 port is connected to the S2 FastEthernet 0/1 port. These are trunk links that are
required to forward traffic within and between VLANs.
G0/0/1.10 10 192.168.10.1/24

G0/0/1.20 20 192.168.20.1/24

G0/0/1.30 99 192.168.99.1/24

Table : Subinterface VLAN IP Address


Step 1 : S1 VLAN and Trunking Configuration
Step 2 : S2 VLAN and Trunking Configuration
Step 3 : R1 Subinterface Configuration
Step 4 : Verify Connectivity Between PC1 and PC2
Step 5: Router-on-a-Stick Inter-VLAN Routing Verification

VIVA QUESTIONS:

1. What is a VLAN (Virtual Local Area Network), and what are its benefits in a network environment?
2. How does VLAN trunking allow for the implementation of VLANs across multiple switches?

Result:
Thus the Configure network topology to implement VLANs with trunking using
PacketTracer software was successfully implemented and verified.
Ex.No. 6 Implement Static Routing
Date:

Aim:
To Configure network topology and implement static routing using Packet Tracer
Software.

Procedure:
1.Network topology.
2.Configure IP Address.
3.Enable Routing.
4.Verify Connectivity.
5.Monitor and Troubleshoot.
6.Document Configuration

STEPS FOR HANDLING NETWORK:


1. Design the Network Topology:
 Identify the devices required for your network, such as routers, switches, and PCs.
 Determine the logical layout of your network, including the IP addressing scheme for
each subnet.
 Use Packet Tracer's device palette to drag and drop the necessary devices onto the
workspace.
 Connect the devices using appropriate cables and configure their interfaces with IP
addresses.
2. Configure IP Addresses:
 Access the CLI (Command Line Interface) of each device (e.g., router or PC) in
Packet Tracer.
 Configure the IP addresses for the interfaces of each device according to the logical
layout you designed.
 Use the "ip address" command followed by the desired IP address and subnet mask
to assign IP addresses to the interfaces.
3. Enable Routing:
 Determine the routing protocol or method you want to use (in this case, static routing).
 Access the CLI of each router in Packet Tracer.
 Configure static routes on each router to direct traffic to the appropriate destination
networks.

 Use the "ip route" command followed by the destination network address, subnet
mask, and next-hop router's IP address to configure static routes.
4. Verify Connectivity:
 Use Packet Tracer's simulation mode to test network connectivity.
 Ping from one device to another to verify that the static routes are correctly
configured.
 Ensure that the ICMP (Internet Control Message Protocol) traffic is allowed through
any firewalls or security features on the devices.
5. Monitor and Troubleshoot:
 Monitor the network for any issues or errors.
 If any connectivity or routing problems arise, use Packet Tracer's logging and
debugging features to troubleshoot.
 Check the routing tables on each router to ensure that the correct static routes are
present.
6. Document the Configuration:
 Document the network topology, including the IP addresses assigned to each device
and the configured static routes.
 Take screenshots or export the configuration files from Packet Tracer for reference
purposes.
EXPRIMENT SETUP : Design network topology

In this lab, each network has two routes to reach. We will configure one route as the main route
andanother route as the backup route. If the link bandwidth of all routes is the same, we use the
route that has the least number of routers as the main route. If the link bandwidth and the number
of routersare the same, we can use any route as the main route and another route as the backup
route.
If we specify two routes for the same destination, the router automatically selects the best route
for the destination and adds the route to the routing table. If you manually want to select a route
that therouter should add to the routing table, you have to set the AD value of the route lower
than other routes. For example, if you use the following commands to create two static routes
for network 30.0.0/8, the route will place the first route to the routing table.

#ip route 30.0.0.0 255.0.0.0 20.0.0.2 10


#ip route 30.0.0.0 255.0.0.0 40.0.0.2 20

Creating, adding, verifying static routes :


Routers automatically learn their connected networks. We only need to add routes for the
networksthat are not available on the router’s interfaces. For example, network 10.0.0.0/8,
20.0.0.0/8 and 40.0.0.0/8 are directly connected to Router0. Thus, we don’t need to configure
routes for these networks. Network 30.0.0.0/8 and network 50.0.0.0/8 are not available on
Router0. We have to create and add routes only for these networks.
The following table lists the connected networks of each router.
Router Available networks on local interfaces Networks available on other routers’ interfaces
Router0 10.0.0.0/8, 20.0.0.0/8, 40.0.0.0/8 30.0.0.0/8, 50.0.0.0/8
Router1 20.0.0.0/8, 30.0.0.0/8, 50.0.0.0/8 10.0.0.0/8, 40.0.0.0/8
Router2 40.0.0.0/8, 50.0.0.0/8 10.0.0.0/8, 20.0.0.0/8, 30.0.0.0/8

Router1 configuration
Router>enable
Router#configure
terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1 10
Router(config)#ip route 10.0.0.0 255.0.0.0 50.0.0.1 20
Router(config)#ip route 40.0.0.0 255.0.0.0 20.0.0.1 10
Router(config)#ip route 40.0.0.0 255.0.0.0 50.0.0.1 20
Router(config)#exit
Router#show ip route static
S 10.0.0.0/8 [10/0] via
20.0.0.1S 40.0.0.0/8 [10/0]
via 20.0.0.1
Router#

Router2 configuration
Router>enable
Router#configure
terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.0.0.0 255.0.0.0 40.0.0.1
Router(config)#ip route 30.0.0.0 255.0.0.0 50.0.0.2
Router(config)#exit
Router#show ip route static
S 10.0.0.0/8 [1/0] via
40.0.0.1S 30.0.0.0/8 [1/0]
via 50.0.0.2
Router#
VIVA QUESTIONS:

1. What is static routing, and how does it differ from dynamic routing?
2. What are floating static routes, and when are they used?
3. How does a router handle packets when using static routes?
4. What are the advantages and disadvantages of static routing?
5. What is the purpose of a default route, and how is it configured statically?
Result:
Thus, configure network topology and implement static routing using Packet Tracer was
successfully implemented and verified.
Ex.No. 7 Implement Dynamic Routing Protocol
Date:

AIM:
To Configure network topology and implement dynamic routing protocol such
as RIP, OSPF etc. using Packet Tracer.

PROCEDURE:
1.launch packet tracer.
2.Design network topology.
3.Configure IP Address.
4.Implement Dyanamic Routing protocol.
5.Verify Routing Protocol functionality.
6.Test Network Resilience and Adaptability.
7.Document and analyze.
8.Troubleshooting.
9.Finalize the Experiment.

STEPS FOR HANDLING NETWORK:


1. Understand the Experiment Requirements:
 Read and familiarize yourself with the experiment guidelines, objectives, and
requirements.
 Ensure you have a clear understanding of the network topology and the
dynamicrouting protocol to be implemented (RIP, OSPF, etc.).
 Take note of any specific configurations or settings mentioned in the
experiment instructions.
2. Launch Packet Tracer:
 Open Packet Tracer on your computer.
 If required, create a new project or load the existing project provided for the
experiment.
3. Design the Network Topology:
 Use the Packet Tracer workspace to design the network topology based
on theexperiment requirements.
 Place the required devices such as routers, switches, and PCs onto the workspace.
 Connect the devices using appropriate network cables to establish the desired
networkconnectivity.
4. Configure IP Addresses:
 Assign IP addresses to the interfaces of the devices in the network.
 Ensure that each device has a unique IP address within the same network segment.
 Verify the connectivity between devices using basic connectivity tests or the
"ping"command.

5. Implement Dynamic Routing Protocol:


 Choose the dynamic routing protocol to be implemented (RIP, OSPF, etc.).
 Configure the routers to enable the chosen routing protocol on their interfaces.
 Set up the necessary parameters for the routing protocol, such as network
addresses, timers, and authentication if required.
6. Verify Routing Protocol Functionality:
 Check the routing tables on the routers to ensure that they have learned the
networkroutes correctly.
 Use commands like "show ip route" or "show ip ospf database" to verify the
routing information.
 Perform connectivity tests between devices to verify that routing is
functioning asexpected.
7. Test Network Resilience and Adaptability:
 Introduce changes to the network topology, such as adding or removing
links ordevices.
 Observe how the dynamic routing protocol adapts to the changes and
updates therouting tables accordingly.
 Verify that devices can still communicate and that the routing protocol
successfullyadjusts to the network changes.
8. Document and Analyze Results:
 Record the configurations made, including IP addresses, routing protocol
settings, and any additional configurations.
 Document the observed behavior of the network, including any issues or
unexpectedoutcomes.
 Analyze the results to ensure that the network topology is functioning
correctly andthe dynamic routing protocol is operating as intended.
9. Troubleshooting (if necessary):
 If any issues arise during the experiment, troubleshoot the network to
identify andresolve the problems.
 Use debugging tools, log files, and relevant commands to investigate and
troubleshoot the network connectivity or routing issues.
10. Finalize the experiment

 Summarize the experiment results and findings in a report or as instructed


by theexperiment guidelines.
 Review the configurations, documentation, and analysis to ensure accuracy
andcompleteness.

EXPRIMENT SETUP: Design network topology

Router0 Configuration :

Router>en
Router#conf t
Router(config)#hostname
Router0
Router0(config)#int s0/3/0
Router0(config-if)#ip add 192.168.3.1 255.255.255.252
Router0(config-if)#no shut
Router0(config-if)#desc connection to
Router1Router0(config-if)#int f0/0
Router0(config-if)#ip add 192.168.0.1
255.255.255.0Router0(config-if)#no shut
Router0(config-if)#desc connection
to LANRouter0(config-if)#exit
Router0(config)#router RIP
Router0(config-router)#netw 192.168.0.0
Router0(config-router)#netw
192.168.3.0Router0(config-
router)#no auto Router0(config-
router)#exit Router0(config)#exit
Router0#copy run start

Router1 Configuration:
Router>en
Router#conf t
Router(config)#hostname
Router1 Router1(config)#int
s0/3/0 Router1(config-
if)#clock rate 64000
Router1(config-if)#ip add 192.168.3.2
255.255.255.252Router1(config-if)#no shut
Router1(config-if)#desc connection to
Router0Router1(config-if)#int s0/2/0
Router1(config-if)#clock rate 64000
Router1(config-if)#ip add 192.168.4.1
255.255.255.252Router1(config-if)#no shut
Router1(config-if)#desc connection to
Router2Router1(config-if)#int f0/0
Router1(config-if)#ip add 192.168.1.1
255.255.255.0Router1(config-if)#no shut
Router1(config-if)#desc connection
to LANRouter1(config-if)#exit
Router1(config)#router RIP
Router1(config-router)#netw 192.168.1.0
Router1(config-router)#netw 192.168.3.0
Router1(config-router)#netw
192.168.4.0Router1(config-
router)#no auto Router1(config-
router)#exit Router1(config)#exit
Router1#copy run start

Router2 Configuration :
Router>en Router#conf t
Router(config)#hostname
Router0Router2(config)#int
s0/3/0
Router2(config-if)#ip add 192.168.4.2
255.255.255.252Router2(config-if)#no shut
Router2(config-if)#desc connection to
Router1Router2(config-if)#int f0/0
Router2(config-if)#ip add 192.168.2.1
255.255.255.0Router2(config-if)#no shut
Router2(config-if)#desc connection
to LANRouter2(config-if)#exit
Router2(config)#router RIP
Router2(config-router)#netw 192.168.4.0
Router2(config-router)#netw 192.168.2.0
Router2(config-router)#no auto
Router2(config-router)#exit
Router2(config)#exit Router2#copy run start
VIVA QUESTIONS:

1. What is dynamic routing, and how does it differ from static routing?
2. Can you explain the concept of routing protocols in dynamic routing?
3. What are the advantages of using dynamic routing protocols in a network?
4. Name some popular dynamic routing protocols and briefly describe how they work.
5. What is the purpose of a routing table in dynamic routing?
6. How does a router determine the best path in dynamic routing?

Result:
Thus, the network topology and implement dynamic routing protocol such as RIP,
OSPF etc. using Packet Tracer was configured successfully.
Ex.No. 8 Packet capture and header analysis by wire-shark
Date:

AIM:
To capture Packet and header analysis by wire-shark.
PROCEDURE:
Install Wireshark:
Ensure Wireshark is installed on your computer. If not, download and install it from the official
website.
Network Setup:
Connect your computer to the network where you want to capture traffic. This could be a local area
network (LAN) or a virtual network if you're using virtual machines.
Launch Wireshark:
Open Wireshark on your computer.
Select Network Interface:
Choose the network interface that corresponds to the network you want to capture traffic from. This
could be your Ethernet adapter or Wi-Fi interface.
Start Capture:
Click on the interface name and then click the "Start" button to begin capturing packets.
Generate Traffic:
Perform various activities on your network, such as browsing websites, sending emails, or accessing
network resources. This will generate network traffic that Wireshark will capture.
Stop Capture:
After capturing enough packets, click the "Stop" button in Wireshark to stop the packet capture.
Analyze Packets:
Explore the captured packets in Wireshark. You can analyze packet headers to identify various
protocols used in the captured traffic.
Look at the source and destination IP addresses to understand the communication between devices.
Analyze the protocol headers (e.g., TCP, UDP, ICMP) to understand the type of traffic and its
characteristics.
Pay attention to any anomalies or suspicious traffic patterns.
Filtering and Sorting:
Use Wireshark's filtering and sorting capabilities to focus on specific types of traffic or protocols.
Experiment with different display filters to isolate traffic of interest.
Capture File Analysis:
Save the captured packets to a capture file for further analysis if needed.
Open the capture file and analyze it using Wireshark or other tools.

VIVA QUESTIONS:
1. What is Wireshark, and what is its primary purpose in network analysis?
2. Describe the process of capturing network packets using Wireshark.
3. Why is it important to capture network packets for analysis?
4. How does Wireshark determine which packets to capture?
5. Explain the significance of packet headers in network communication.

Result:
Thus, the Packet and header was captured by wire-shark.

You might also like