Premium Essay

It530

In:

Submitted By FredGrouper
Words 467
Pages 2
Wireshark Wireless
Fred Grouper
Kaplan University
Systems Analysis and Design
MSIT 530
Professor Robert
March 3, 2013

Wireshark Wireless Capture

Source MAC addresses, destination MAC addresses

This screen shot shows the source address of the workstation and a destination address representing a broadcast transmission for the beacon.

This screen shot shows the source and destination packet of the 802.11 packet

State of protection and the authentication algorithm used by the AUTHENTICATION packet.

This screen shows that the Authentication Algorithm is Open System and the packet is not protected.

Cipher suites and authentication keys offered by the AUTHENTICATION packet.

This screen shows the authentication under the tag section of the Microsoft WPA information.
This screen also shows the source address of the Authentication packet beginning the authentication as the workstation.

Which system sent the ASSOCIATION packet:

The destination address is set to 00:18:39:f5:ba:bb which is the address of the endpoint.
The source address is 00:13:02:d1:b6:4f and this is the address of the transmitter and the transmitter is an AP as shown on the screen therefore the send of the association packet is the Access Point.

The 802.11 protocol is more complicated than your standard Ethernet protocol. The wireless protocol must deal additional requirements relating to the connectivity to the access point.
The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.
Another area of interest was the information

Similar Documents

Premium Essay

It530

...CONTINUOUS CASE STUDY This case study can be used as a progressive platform for building and applying data communications and computer networking concepts as students progress through the book. Company Background The company is a division of a Fortune 500 manufacturer of packaging material. This packaging material is used in cookie bags, cigarette cartons, cereal boxes, ice cream containers, and just about every conceivable food-product package. Customers purchase product based on weight (cents per pound or dollars and cents per pound). Additional charges that might be billed to the customer include special packaging charges, storage charges (if the customer requests that product be stored at a public storage facility), and shipping charges (if a contract carrier is utilized to deliver product to the customer). The product is marketed to an existing customer base through an internal sales force that reports directly to the Field Sales Force Manager. The Field Sales Force Manager in turn reports to the Vice President of Marketing and Sales. The combined charter of the marketing department and the sales force team is to maintain and expand product sales to existing customers and develop new sales with existing customers and prospect and develop new customers. The Vice President of Marketing reports to the General Manager of the division, who is an executive VP reporting to the parent company’s chief operations officer or president. Product delivery is supported by the distribution...

Words: 3799 - Pages: 16

Free Essay

It530 - Unit 2 - Access Technologies

...Unit 2 Assignment - Access Technologies Kaplan University IT530 Abstract Access technologies are technologies used by customers to access the Internet. Access technologies include but are not limited to DSL, Cable, and Satellite Internet services. Each of these are widely used in rural and city residential settings. Each technology has its advantages as well as disadvantages; some of which include cost, data download speeds, upload speeds, and availability. To determine which access technology is best a person must research each option and decide based not only on cost but also on need. The Internet Over the last decade or so the Internet has gone from a luxury to a common household item. According to Internet World Stats (2011), between the years 2000 and 2010 the number of Internet users in the U.S. nearly doubled from 124,000,000 user to 239,893,600 users. This is likely due, in part, to the numerous types of Internet services or access technologies being made available to users in all areas. Three of the most popular access technologies are: DSL, Cable, and Satellite. Each of these access technologies provides Internet service, via an Internet Service Provider (ISP), to urban and suburban residential communities. Each of these access technologies has advantages as well as disadvantages over the other. Determining the best access technology may take a bit of research and consideration...

Words: 2682 - Pages: 11

Premium Essay

It530 Assignment Unit 1

...Running Head: DOMAIN NAME SERVERS AND INTERNET PROROCOL Domain Name Servers and Internet Protocol Awaz Barwari Kaplan University Abstract Domain Name System (DNS) is central to the Internet and networking. It converts the host name into an Internet Protocol (IP) addresses. Domain names are in alphabetic form easy for human to remember. Nonetheless, the World Wide Web (WWW) is run based on IP addresses. Therefore, without the DNS the internet would be very difficult to access. Today, there are two versions of IP 4 and 6 that use DNS. With the growing number of devices with internet IP address, IPv4 is running out of addresses and will eventually be replaced by IPv6. But until then, it is important to understand the many similarities and contrast between both versions. Domain Name Servers and Internet Protocol The core of how the internet works is the DNS, which was created to simplify the unmanageable computer naming. Thus, allowing us to use a more human friendly host name while exchanging email or accessing web pages. An IP address is a numerical label assigned by the Internet Assigned Numbers Authority (IANA) to every host in order to communicate. (Gralla, 2006). The DNS will translate host name like www.google.com into a raw IP address number 173.194.40.197. DNS structure is a hierarchical distributed database. At the top level there is a root server. Many categories were created under the root called the top level domains: .Com, .Net, .Org...

Words: 1390 - Pages: 6

Free Essay

It530 - Unit 3 Frame Relay in a Wan

...Abstract This paper will give an overview of a medium-sized business that will need to consider WAN technology using Frame relay technology within the company for the future expansion to other towns and cities. The Frame relay analysis will include the operation of frame relay, what equipment is needed, what switching technologies are employed by frame relay and how frame relay is actually brought into the business premises. Frame Relay in a WAN Frame Relay Frame Relay is one of the most common WAN protocols. This high performance protocol operates at the Physical and Data Link layers of the OSI, performing any type of serial interface. This technology was developed at an attempt to resolve some of the communication problems that the other protocols would not. There was an increased need for higher speeds, an increased need for larger bandwidth efficiency, an increase in intelligent network devices that lower protocol processing, and the need to connect LANs and WANs. The Frame relay evolved passed the X.25 as a less careful, but less burdensome protocol designed to transmit packets across a network. (Horton, 2010) Frame relay is known all around the world in many different networks. There are many terms that describe and refer to Frame relay and Wide Area Networking in telecommunications. These terms are also noted when referring to Local Area Networking as well. The table below describes these terms. (Horton, 2010) Table 1 – Frame Relay Terms CIR Committed...

Words: 1228 - Pages: 5

Free Essay

Ipv4 to Ipv6 to Dns

...Running Head: IPV4 TO IPV6 TO DNS Unit 1: IPv4 to IPv6 to DNS Your Name Here Kaplan University IT530-01 Your Instructor Here Your Date Here Abstract IPv4 is the current standard by which the internet routes connections over the internet by using DNS to make those connections easier to perform. However IPv6 will be replacing that to meet the needs of the growing internet by providing many more addresses that are required to add more connection addresses to the internet. At the same time this is created to add more needed addresses IPv6 has improved the way the data is handled and processed with new security features. IPv4 to IPv6 to DNS IPv4 and IPv6 and how the differences between these two different Internet Protocols will change how the DNS connects systems over the internet. To understand these changes we will need to start from the beginning and breakdown what all these terms mean and how each works together to get a better understanding. What is an IP and how does it work? IP is short for Internet Protocol, and what that means in general is the address of a device or a machine. It could be viewed as a phone number or way to label a device or address in order to contact that machine or device in order to transfer data back and forth to that device. The first version of the Internet Protocol or IP was version 4 or IP4. It is a 32 bit address in that there are 4 numbers represented in a binary value of 8 bits for each of the 4 bytes comes to a total of 32...

Words: 1328 - Pages: 6

Free Essay

It-530-Unit-1

...Assignment 1: IPv4, IPv6, and DNS Bryce Beasley December 19, 2014 IT530-01 Computer Networks Professor: Dr. Thomas Watts, PhD, CISSP Kaplan University Abstract DNS (Domain Name System) is crucial to the activity on the Internet. DNS provides components to resolve a hostname to an IP (Internet protocol) address. The resolution of a hostname occurs over a hierarchy of domain servers. These domain servers consist of name server knowledge for their explicit domain level. A section of the web address will include the domain level. DNS utilizes IP versions 4 (IPv4) and 6 (IPv6) to help resolve hostnames, and also establishes a connection between each host. The connection between the hosts will allow bits to transmit back and forth. These concepts go into more depth in this research paper. The keywords are: IPv4, IPv6, DNS, DNS hierarchy   Introduction The Internet is used daily by millions people browsing the Web. Anyone who wants to look at a specific website will type an address in the browser, and a web page will display the appropriate page in the browser. This process is not possible without the utilization of DNS. DNS has a role similar to what a translation service would achieve. What specifically does DNS translate? It translates a name such as www.yahoo.com into an IP address such as 206.190.36.45. This simple function is attained because of three primary characteristics of DNS. First, the mapping of IP addresses are joined to and then referenced against a database;...

Words: 1468 - Pages: 6

Free Essay

Frame-Relay

.... Unit 3 Kaplan University IT530 Professor Jeffrey Robinson August 20, 2013 Abstract In this discussion we look at some of the history around frame-relay. We then look at some of the equipment necessary to create the frame relay connections, as well as how the connections work both logically and physically. Some limiting factors are discussed as well as committed information rates, burst rates, an error handling. Some of the positive aspects of frame-relay are identified along with some options for the future of WAN technologies. Frame-Relay Operating at the physical and datalink layers of the OSI model, frame relay is a high-performing WAN protocol. It was originally designed for use with ISDN integrated services digital network interfacing. It has evolved into being used on multiple types of network interfaces. In 1984 the initial proposal for frame-relay standardization was presented to the CCITT Consultative Committee on international telephone and telegraph. Because interoperability standards were lacking, frame-relay did not fully take off until the 1990s. In 1990 StrataCom, Northern Telecom, Digital Equipment Corporation (DEC), and Cisco created a consortium that focused on the technical development of frame-relay technology. While the CCITT was already discussing frame-relay, the consortium established specifications that while still conforming to the frame-relay protocol, enhanced the protocol...

Words: 2574 - Pages: 11