![]() Recall that since the HTTP message was carried inside a TCP segment, which was carried inside an IP datagram, which was carried within an Ethernet frame, Wireshark displays the Frame, Ethernet, IP, and TCP packet information as well. ![]() The packet-contents window shows details of the selected message (in this case the HTTP OK message, which is highlighted in the packet-listing window). 2 Figure 1: Wireshark Display after HTTPwireshark-file1.html has been retrieved by your browser The example in Figure 1 shows in the packet-listing window that two HTTP messages were captured: the GET message (from your browser to the gaia.cs. web server) and the response message from the server to your browser. If you are unable to run Wireshark on a live network connection, you can download a packet trace that was created when the steps above were followed. Ross, Addison-Wesley/Pearson, 2020.ΔΆ Your Wireshark window should look similar to the window shown in Figure 1. 1 References to figures and sections are for the 8 th edition of our text, Computer Networks, A Top-down Approach, 8 h ed., J.F. Enter the following to your browser Your browser should display the very simple, one-line HTML file. Wait a bit more than one minute (we ll see why shortly), and then begin Wireshark packet capture. (We re only interested in the HTTP protocol here, and don t want to see the clutter of all captured packets). Enter http (just the letters, not the quotation marks) in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packet-listing window. ![]() Start up the Wireshark packet sniffer, as described in the Introductory lab (but don t yet begin packet capture). Before beginning these labs, you might want to review Section 2.2 of the text The Basic HTTP GET/response interaction Let s begin our exploration of HTTP by downloading a very simple HTML file - one that is very short, and contains no embedded objects. In this lab, we ll explore several aspects of the HTTP protocol: the basic GET/response interaction, HTTP message formats, retrieving large HTML files, retrieving HTML files with embedded objects, and HTTP authentication and security. Ross, All Rights Reserved Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. 1 Wireshark Lab: HTTP v8.0 Supplement to Computer Networking: A Top-Down Approach, 8 th ed., J.F. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |