Writing tips and writing guidelines for students. Case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples.
Thursday, January 10, 2019
Netw360 Week 7 Lab
Kyle Pederson NETW360, Ben Brezinski 4/16/12 research lab 7 Hands on Lab Microsoft entanglement Monitor Introduction and Wireless Frames When we spread out shake off 4 the direct strong suit was -60dbm, the data rate was 1mbps, and the SSID in the beacon spew was Amory. In habitus 5, spirit at the Hex Details, the BSSID for this coming demo was 00 15 E9 D1 48. The au then(prenominal)tication office in frame 14 was successful. In frame 15, the Association Response status was in a successful state. When we tried to the Microsoft intercommunicate Monitor we were un qualified to selection up any management parcel of lands during our capture. SNMP management We were able to successfully ping 10. 7. 8. 80 to avow we had access to the managed device. The batch file was strict up with the 10. 27. 8. 80 address and had influences to stay put information from that address. The name of the device was NPIF9460B and the status of it was ready to print. After we downloaded the M IB browser and entered 10. 27. 8. 80 into the address field, we were able to suck up the sysUpTime which was 830 hours 13 min and 2 sec. decision rogue access evens When using the command netsh wireless local area network show networks mode=bssid in the command prompt we were able to stage 17 access ranks. Out of the 17 access drives 11 were not discontinue of the DeVry wireless network.Using the FindAccessPoints. BAT we were able to target 18 access pull downs and 12 of them were not part of the DeVry wireless network. Opening the FindAccessPoints. vbs in notepad we were able to see the script and the foundation of the script worked around the command netsh wlan show networks mode=bssid. After we set up our Linksys as a rogue access point we had no task finding it using the batch file. This would be very handy to ingestion at your home network, if you lived in a congeal where there is many access points, because you could pick up any rogue access points that someone has set up to hear to capture any of your information.Logging Here is our enter file from our Linksys access point. pic Linksys Access point maintenance and troubleshooting The received firmware strain of our Linksys access point was 1. 5. 01 and the current beat was 2012/04/14 154241. The current status of our access point was extend Mode- BG-mixed SSID- net360 DHCP- enabled Channel- 1 Next we were able to embossment our current build to our PC and then we reset the access point to the pulverization defaults. The pulverization defaults were set as business relationship Mode BG-mixed SSID- Linksys DHCP- enabled Channel- 6Once set as the factory we were able to restore our original configuration by uploading the file we created earlier. As curtly as that file uploaded our access point was set up the same as before. This was very straight forward to do and I feel it is a beloved idea to back up your configuration, ripe in case the access point gets reset. Wiresha rk Introduction and Examining Wireless Frames Lab Lab Report 1. Is Wireshark open source or propriety? (7 points) Wireshark is an Open-source program. 2. What is seen in apiece of the three panes that display the megabuckss seen on a local area network? 7 point) The top pane is the packet add up pane that shows all(prenominal) packet on a separate line and has quintette columns with the following information the time that the packet came in, source, destination of each packet, the protocol creation used with the packet, and information about each packet. The second pane is the tree scene pane and it displays the headers of the various protocols captured in the packet and this is displayed in a hierarchal deliberate from physical stratum to the application class. The leash pane is the byte view pane that shows the keen data in a hexadecimal format. . What does a display filter do? (7 points) The display filter enables you to filter what you wish to view when capturing y our packets. So if you wanted to only view the packets that were using the protocol transmission control protocol you could filter those out. You can also use expression filters that lets you be more particularised in what you want to filter. 4. What does the protocol column show? (7 points) The protocol column shows the highest layer protocol in the frame. 5. How do you blow up the details in a layer of the packet in the middle frame? 7 points) To expand the details you must(prenominal) click on the plus sign. 6. In frame 1 what channel is creation used? (7 points) Frame 1 is using channel 6. 7. In frame 1 what oftenness is being used? (7 points) The frequency being used is 2437MHz. 8. In frame 1 what is the signal level? (7 points) The signal level in frame 1 is 11. 9. What type of frame is frame 1? (7 points) Frame 1 is a transmit initiation frame to the access point 10. In frame 1 what is the beacon interval in milliseconds? (7 points) The beacon interval is 102. 4ms.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment