Computer Network and Management (22685)
Practical No.13: Install Packet Sniffing Software (Wireshark, tcpdump, WinDump) and Analyze Protocols
and Packets in TCP/IP
I. Practical Significance
Packet sniffing tools like Wireshark, tcpdump, and WinDump are essential for analyzing network traffic.
These tools help monitor and troubleshoot network issues, ensuring secure and efficient data
communication. By understanding TCP/IP protocols, users can analyze packet flow, identify potential
vulnerabilities, and optimize network performance.
II. Relevant Program Outcomes (POs)
Discipline Knowledge: Apply networking and computer engineering principles to analyze network
protocols.
Experiments and Practice: Use modern tools for capturing and analyzing network packets. Problem
Solving: Troubleshoot and optimize TCP/IP communication effectively.
III. Competency and Practical Skills
Install and configure packet-sniffing tools like Wireshark, tcpdump, and WinDump.
Capture and analyze network packets for different protocols (e.g., TCP, UDP, HTTP, DNS).
IV. Relevant Course Outcome :
Select Routing protocols along with key principles of Security for the given network.
V. Practical Outcome
Successfully analyze network traffic using packet-sniffing software, understanding the structure and
transmission of TCP/IP packets.
VI. Relevant Affective Domain Outcomes
• Follow ethical practices while analyzing network traffic.
• Handle network configurations carefully to avoid disruptions.
• Adhere to safety and security protocols during the analysis.
VII. Minimum Theoretical Background
Packet Sniffing: The process of intercepting and analyzing network packets.
TCP/IP Protocol Suite: The fundamental protocols (TCP, UDP, IP, HTTP, etc.) enabling internet
communication.
Wireshark: A graphical tool for capturing and analyzing network traffic. tcpdump/WinDump:
Command-line tools for packet capture and analysis.
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
IX. Resources Required :
Sr. Instrument
Specification Quantity
No. /Components
Personal computers Standard computers with
with Internet Broad specifications with 32 bit 1
1.
connectivity with 2GB
RAM
X. Precautions to be Followed :
1. Analyze only authorized networks to comply with ethical guidelines.
2. Avoid capturing sensitive or private data without consent.
3. Ensure packet capture is conducted on a secure and isolated network to avoid misuse.
XI. Procedure
1. Installing Wireshark :
Download: Go to the Wireshark website (https://www.wireshark.org/) and download the installer for
your operating system.
2. Run the installer: Follow the on-screen instructions to install Wireshark.
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
3. Capturing Packets with Wireshark
Open Wireshark: Launch the Wireshark application.
Select interface: Choose the network interface you want to capture traffic from.
Start capture: Click the "Start" button to begin capturing packets.
4. Analyzing Packets with Wireshark
* Filter packets: Use the display filter bar to filter packets based on protocol, source/destination IP
address, port, etc.
View packet details: Double-click on a packet to view its detailed information, including protocol
headers and payload data.
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
5. Common Protocols and Packets in TCP/IP
TCP: Transmission Control Protocol
Provides reliable, ordered, and error-checked delivery of data.
Used for many applications, including web browsing (HTTP), email (SMTP), and file transfer (FTP).
6. UDP: User Datagram Protocol
Provides connectionless, unreliable data delivery.
Used for applications that prioritize speed over reliability, such as streaming media (DNS, DHCP).
7.IP: Internet Protocol
Responsible for addressing and routing packets across networks.
8. ICMP: Internet Control Message Protocol
Used for diagnostic and control functions, such as ping and trace route.
9. ARP: Address Resolution Protocol
Used to map IP addresses to MAC addresses.
By capturing and analysing network traffic with tools like Wireshark, you can gain valuable insights into
network behaviour, troubleshoot connectivity issues, and identify potential security threats.
XII. Resources Used
Sr. Instrument Specification Quantity
No. /Components
1.
2.
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
XIII. Actual Procedure Followed
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
XIV. Precautions Followed
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
XV. Observations
• Number of packets captured: ....................................
• Protocols observed: ....................................
XVI. Result
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
XVII. Interpretation of Results
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
XVIII. Conclusions and Recommendations
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
XIX. Practical Related Questions
1. What are the key differences between TCP and UDP protocols?
2. How can packet sniffing help in troubleshooting network issues?
3. What are the ethical implications of using packet-sniffing tools?
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
[Space for Answers:]
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
XX Assessment Scheme
Performance indicators Weightage
Process related: (15 Marks) 60%
Proper handling of the equipment and making 20%
proper connections
1
Maharashtra State Board of Technical Education
Computer Network and Management (22685)
Use of various commands 20%
2
Assigning proper IP addresses 20%
3
Product related: (10 Marks) 40%
4
Results 20%
5
Practical related questions 10%
6
Submission of report in time 10%
Total (25 Marks) 100 %
Dated signature of
Marks Obtained Teacher
Process Related Product Total
(15) Related (10) (25)
Maharashtra State Board of Technical Education