Join Lisa Bock for an in-depth discussion in this video Understanding encapsulation, part of Troubleshooting Your Network with Wireshark.
- Let's look at the encapsulation process…and how the layers look in Wireshark.…In this concept, we're going to be talking…about the OSI Model layers,…the appropriate Protocol Data Unit, and the addressing.…Layers in the OSI Model are represented…in many different ways that you might be familiar of.…For example, in the…Local Areas Connections Properties dialog box,…you can see the OSI Model at work.…When you take a look at the network interface card itself,…there's where you'll see the Physical and Data Link.…
When you look at your bindings…for Client for Microsoft Networks…and File and Printer Sharing,…that is the Application Presentation and Session layers.…And when we look at the Internet Protocol,…or TCP/IP suite, this is where you see…the Network and Transport layers.…When we understand how encapsulation works,…as data travels down the OSI Model,…it readies it in proper frame formation.…A standard frame has the following elements.…We have the Frame header, which includes…the source and destination MAC address,…
Author
Updated
11/9/2016Released
4/16/2015- Exploring the Wireshark interface
- Using display and capture filters
- Dissecting the OSI model
- Analyzing TCP, IPv4, and other protocols
- Detecting denial-of-service attacks and password attacks
- Using security tools for ethical hacking
Skill Level Intermediate
Duration
Views
Q: Where can I download the exercise files?
A: You can download some of the exercise files from lynda.com for this course. Others are available for download from other sources. Watch the video titled “Downloading the exercises files” for more information on downloading each external file.
Related Courses
-
Introduction
-
Welcome1m 11s
-
-
1. Traffic Capture and Analysis
-
Traffic capture overview2m 32s
-
Managing capture options3m 28s
-
-
2. Review of the Open Systems Interconnection (OSI) Model
-
Dissecting the OSI model3m 35s
-
-
3. Deep Packet Analysis of Common Protocols
-
Analyzing TCP4m 1s
-
Exploring IPv46m 11s
-
Discovering HTTP6m 46s
-
Mastering DNS6m 14s
-
Grasping UDP6m 48s
-
Examining FTP6m 49s
-
Dissecting ICMP10m 32s
-
-
4. Normal and Abnormal Behavior
-
5. Common Attack Signatures
-
Identifying network scans2m 25s
-
Examining macof attacks6m 33s
-
6. Security Tools
-
Conclusion
-
Next steps36s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Understanding encapsulation