Question: Lab Practical Complete the laboratory part, titled Wireshark Lab: HTTP v8.1. The grade for this question is 50 points. Provide the screenshots for all of

 Lab Practical Complete the laboratory part, titled "Wireshark Lab: HTTP v8.1".

Lab Practical Complete the laboratory part, titled "Wireshark Lab: HTTP v8.1". The grade for this question is 50 points. Provide the screenshots for all of the major steps/processes in your experiments as well as the answers to the laboratory questions. Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we're now ready to use Wireshark to investigate protocols in operation. In this lab, we'll explore several aspects of the HTTP protocol: the basic GET/response interaction, HTTP message formats, retrieving large HTML files, retrieving HTML files with embedded objects, and HTTP authentication and security. Before beginning these labs, you might want to review Section 2.2 of the text.1 1. The Basic HTTP GET/response interaction Let's begin our exploration of HTTP by downloading a very simple HTML file - one that is very short, and contains no embedded objects. Do the following: 1. Start up your web browser. 2. Start up the Wireshark packet sniffer, as described in the Introductory lab (but don't yet begin packet capture). Enter "http" (just the letters, not the quotation marks, and in lower case) in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packet-listing window. (We're only interested in the HTTP protocol here, and don't want to see the clutter of all captured packets). 3. Wait a bit more than one minute (we'll see why shortly), and then begin Wireshark packet capture. 4. Enter the following to your browser http://gaia.cs.umass.edu/wireshark-labs/HTTP-wireshark-file1.htmI Your browser should display the very simple, one-line HTML file. 5. Stop Wireshark packet capture. 1 References to figures and sections are for the 8 th edition of our text, Computer Networks, A Top-down Approach, 8 h ed., J.F. Kurose and K.W. Ross, Addison-Wesley/Pearson, 2020, Our authors' website for this book is http://gaia.cs, umass,edu/kurose_ross You'll find lots of interesting open material there

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!