Assignment title: Information
Describe what the term promiscuous mode means in relation to capturing network traffic with Wireshark and similar network traffic analysers.[ 1 mark ]The Capture > Options dialog allows the Name Resolution of Network Layer names. Describe what this means and describe how it could be used for capturing network traffic.[ 1 mark ]Describe the difference between a network switch and a network hub. Then explain how switched networks limit the network traffic that is visible to Wireshark in comparison to networks that used hubs. (Note – switches are the technology used in today's computer networks) [ 2 marks ]In TCP/IP networking IP addresses are used to identify specific computers (or hosts) on the network, clients use ports numbers to specify a particular instance of a client program (for example a specific tab on a web browser) and servers normally use well known port numbers on which to listen for client requests. For instance ftp at the server uses ports 20 and 21.From the web or any other source determine the well-known port numbers of the following server programs:• ftp data• ftp control• http• NTP• sshAlso find the well know port numbers for 6 other network protocols and describe the function that each protocol performs.[ 2 marks ] There are three types of BPF qualifiers:• Type (3)• Dir (2)• Proto (8)The Type qualifier has three possible options: host, net and port. The other two qualifier types also have associated options, there are 4 options associated with Dir qualifier type and 8 options associated with Proto qualifier type (please disregard the fddi, decnet options as they are seldom used in today's networks).You are required to describe what each qualifier means and list a total of 10 capture filter examples that incorporate at least 1 qualifier and one ID, and explain how each capture filter works.[ 3 marks ]Documenting the 3 logical operators for combining primitivesThe boxed example above show the logical AND operator ( && ) being used to combine two primitives. There are two other such logical operators.Document all three logical operators and give one example of how each could be used in a capture filter.[ 1 mark ]