Custom written essays, Online classes handling, Proctored exams, Dissertation projects

Engage us and get your service from professionals we’ve hand-picked for you. +(254) 729707173

Top quality
Full confidentiality
High punctuality
5/5 GoogleReviews
4.7/5 SiteJabber.com

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

Our essay writing service values your opinion

Our essay writing service has a nearly-perfect rating on Sitejabber that speaks for itself, but we always listen to what customers have to say about our help.

  • HCA Organization
    Business Studies
    Awesome
  • Mini Essay 1&2
    Management
    Very Quality Services
  • Writer's choice
    Business Studies
    Thanks to the admin for sending the paper
  • Writer's choice
    Management
    perfect
  • Mastery Assignment 1
    Sociology
    Excellent team, quality work
  • PRESENTATION [IoT]
    Management
    I use these papers to get ideas of how to write better papers. I am learning as reviewing this paper. thank you.
  • Writer's choice
    Art (Fine arts, Performing arts)
    Thank you!
  • Module 12 Discussion: Community Based Conservation
    Anthropology
    Excellent team, quality work
  • Mastery Assignment 2
    Anthropology
    Excellent team, quality work
  • Writer's choice
    Business Studies
    Great group of writers. Would highly recommend using their services

Buy an original and custom paper

Average vs. our advanced writers: experts win!

Let’s take a look at the scores of the average online writers vs. the performance of our professionals. Based on the results of our internal research

  • 100%
  • 80%
  • 60%
  • 40%
  • 20%
  • 0%
  • 65%
    95%
    Quality
    Undergraduate (yrs. 1‑2)
  • 70%
    92%
    Speed
    Undergraduate (yrs. 1‑2)
  • 75%
    100%
    Instructions followed
    Undergraduate (yrs. 1‑2)
  • 66%
    95%
    Citation accuracy
    Undergraduate (yrs. 1‑2)
  • 60%
    90%
    Quality
    Undergraduate (yrs. 1‑2)
  • 65%
    92%
    Speed
    Undergraduate (yrs. 1‑2)
  • 75%
    100%
    Instructions followed
    Undergraduate (yrs. 1‑2)
  • 70%
    97%
    Citation accuracy
    Undergraduate (yrs. 1‑2)
  • 70%
    95%
    Quality
    Undergraduate (yrs. 1‑2)
  • 65%
    92%
    Speed
    Undergraduate (yrs. 1‑2)
  • 70%
    100%
    Instructions followed
    Undergraduate (yrs. 1‑2)
  • 65%
    95%
    Citation accuracy
    Undergraduate (yrs. 1‑2)
  • 65%
    95%
    Quality
    Undergraduate (yrs. 1‑2)
  • 75%
    92%
    Speed
    Undergraduate (yrs. 1‑2)
  • 80%
    100%
    Instructions followed
    Undergraduate (yrs. 1‑2)
  • 70%
    97%
    Citation accuracy
    Undergraduate (yrs. 1‑2)
  • 70%
    92%
    Quality
    Undergraduate (yrs. 1‑2)
  • 70%
    95%
    Speed
    Undergraduate (yrs. 1‑2)
  • 80%
    100%
    Instructions followed
    Undergraduate (yrs. 1‑2)
  • 70%
    95%
    Citation accuracy
    Undergraduate (yrs. 1‑2)
Average Advanced

Top-level essay writer ready to help you

With a team of 476 professionals, we always have a writer who can meet your highest expectations. Take a look at the profiles of our specialists to learn more about them.

  • writers
    Ted Alvarez
    Rating:
    5 yearsof experience
    3147papers written
    Degree:
    Graduate
    Competences:
    Marketing, Business studies
  • writers
    Alex Reynolds
    Rating:
    3 yearsof experience
    1987papers written
    Degree:
    Graduate
    Competences:
    Criminal justice, Law
  • writers
    Lucy Blair
    Rating:
    2 yearsof experience
    635papers written
    Degree:
    Undergraduate
    Competences:
    Nursing, Social work
  • writers
    Emily McCook
    Rating:
    3 yearsof experience
    2006papers written
    Degree:
    Undergraduate
    Competences:
    Management, Economics
  • writers
    Daniel Benson
    Rating:
    6 yearsof experience
    3974papers written
    Degree:
    Graduate
    Competences:
    Biology, Medicine
  • writers
    Jeff Williamson
    Rating:
    2 yearsof experience
    1204papers written
    Degree:
    Undergraduate
    Competences:
    Psychology, Nursing
  • writers
    Peter Clayton
    Rating:
    5 yearsof experience
    4216papers written
    Degree:
    Graduate
    Competences:
    Business studies, Economics
  • writers
    Martha Ford
    Rating:
    2 yearsof experience
    1314papers written
    Degree:
    Undergraduate
    Competences:
    Nursing, Medicine
  • writers
    James Bowen
    Rating:
    4 yearsof experience
    2665papers written
    Degree:
    Graduate
    Competences:
    English literature, History
  • writers
    Vanessa Hayward
    Rating:
    2 yearsof experience
    564papers written
    Degree:
    Undergraduate
    Competences:
    Law, Political science
  • writers
    Ted Alvarez
    Rating:
    5 yearsof experience
    3147papers written
    Degree:
    Graduate
    Competences:
    Marketing, Business studies
  • writers
    Alex Reynolds
    Rating:
    3 yearsof experience
    1987papers written
    Degree:
    Graduate
    Competences:
    Criminal justice, Law
  • writers
    Lucy Blair
    Rating:
    2 yearsof experience
    635papers written
    Degree:
    Undergraduate
    Competences:
    Nursing, Social work
  • writers
    Emily McCook
    Rating:
    3 yearsof experience
    2006papers written
    Degree:
    Undergraduate
    Competences:
    Management, Economics
  • writers
    Daniel Benson
    Rating:
    6 yearsof experience
    3974papers written
    Degree:
    Graduate
    Competences:
    Biology, Medicine
  • writers
    Jeff Williamson
    Rating:
    2 yearsof experience
    1204papers written
    Degree:
    Undergraduate
    Competences:
    Psychology, Nursing
  • writers
    Peter Clayton
    Rating:
    5 yearsof experience
    4216papers written
    Degree:
    Graduate
    Competences:
    Business studies, Economics
  • writers
    Martha Ford
    Rating:
    2 yearsof experience
    1314papers written
    Degree:
    Undergraduate
    Competences:
    Nursing, Medicine
  • writers
    James Bowen
    Rating:
    4 yearsof experience
    2665papers written
    Degree:
    Graduate
    Competences:
    English literature, History
  • writers
    Vanessa Hayward
    Rating:
    2 yearsof experience
    564papers written
    Degree:
    Undergraduate
    Competences:
    Law, Political science
  • writers
    Ted Alvarez
    Rating:
    5 yearsof experience
    3147papers written
    Degree:
    Graduate
    Competences:
    Marketing, Business studies
  • writers
    Alex Reynolds
    Rating:
    3 yearsof experience
    1987papers written
    Degree:
    Graduate
    Competences:
    Criminal justice, Law

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
    See full FAQ

     

    ITECH1003/ITECH5003 Networking Assignment

    Wireshark Capture Filter assignment

    This assignment requires students to:

    · Become familiar with Wireshark capture filters.

    · Document the qualifiers used in capture filters.

    · Construct and use capture filters to capture specific network traffic.

    · Include screen shots of captured network traffic and present them with associated discussion.

    Part 1 – Wireshark and traffic capture basics

    Describe what the term promiscuous mode means in relation to capturing network traffic with Wireshark and similar network traffic analysers.

    [ 1 mark ]

    The Capture > Options dialog allows the Name Resolution of Network Layer names. Describe what this means and describe how it could be used for capturing network traffic.

    [ 1 mark ]

    Describe the difference between a network switch and a network hub. Then explain how switched networks limit the network traffic that is visible to Wireshark in comparison to networks that used hubs. (Note – switches are the technology used in today’s computer networks)

    [ 2 marks ]

    In TCP/IP networking IP addresses are used to identify specific computers (or hosts) on the network, clients use ports numbers to specify a particular instance of a client program (for example a specific tab on a web browser) and servers normally use well known port numbers  on which to listen for client requests. For instance ftp at the server uses ports 20 and 21.

    From the web or any other source determine the well-known port numbers of the following server programs:

    · ftp data

    · ftp control

    · http

    · NTP

    · ssh

    Also find the well know port numbers for 6 other network protocols and describe the function that each protocol performs.

    [ 2 marks ]

    Part 2 : Capture filters 

    In this section of the assignment you are required to learn the syntax for creating Wireshark Capture Filters. Then document and use capture filters to capture specific network traffic.

    Discussion of Berkeley Packet Filter (BPF) syntax

    The following discussion gives a brief explanation of the BPF syntax to help you get started with constructing your own capture filters.

    Wireshark capture filters use the Berkeley Packet Filter (BPF) syntax to specify particular traffic. This syntax is used by the libpcap (in Unix/Linux) and Winpcap (in Windows) libraries that are used by Wireshark to capture network traffic. 

    Note – WinDump is the Windows version of a Linux/Unix program called TCPDump and hence TCPDump documentation applies to capture filter syntax as used on Windows machines.

    Syntax

    The BPF syntax consists of one or more Primitives that specify a particular type of traffic to capture.

    Some examples of simple primitives are shown below:

    (i) host 192.168.12.22

    (ii) host google.com

    (iii) src host google.com

    (iv) tcp port 80

    Things to note about these primitives:

    · Primitives start with one or more qualifiers (eg. host, src host, dst host etc.)

    · Primitives end with an ID (eg. 192.168.12.22, google.com, 80 etc.)

    Note –  If you use named IDs like google.com then you need to enable name resolution in the capture filter dialog box when specifying capture filters.

    In summary a capture filter consists of one or more primitives and those primitives consist of one or more qualifiers followed by an ID.

    { <——- primitive ——> } { operator } { <- primitive -> }

    dst host 192.168.12.13 && tcp port 80

    The references dst, host, tcp and port are called qualifiers.

    The references 192.168.12.13 and 80 are called ID’s.

    The boxed example above also shows the AND operator being used to join two primitives to make a capture filter expression. The AND operator is one of the three possible operators that are allowed in capture filters, the other two are OR and  NOT.

    Sources of documentation of the Berkeley Filter Syntax that you should refer to are:

    Documentation that describes the BPF syntax can be found at https://www.winpcap.org/docs/docs_40_2/html/group__language.html 

    There are also good cheat sheets for TCPDump (Wireshark Capture Filters) and Wireshark Display filters at: http://packetlife.net/library/cheat-sheets/

    The Wireshark Users Guide (Access from Help in Wireshark)

    End of discussion of BPF syntax

    Documenting BPF qualifier syntax

    There are three types of BPF qualifiers:

    · Type (3)

    · Dir (2)

    · Proto (8)

    The Type qualifier has three possible options: host, net  and port. The other two qualifier types also have associated options, there are 4 options associated with Dir qualifier type and 8 options associated with Proto qualifier type (please disregard the fddi, decnet options as they are seldom used in today’s networks).

    You are required to describe what each qualifier means and list a total of 10 capture filter examples that incorporate at least 1 qualifier and one ID, and explain how each capture filter works.

    [ 3 marks ]

    Documenting the 3 logical operators for combining primitives

    The boxed example above show the logical AND operator ( && ) being used to combine two primitives. There are two other such logical operators.

    Document all three logical operators and give one example of how each could be used in a capture filter.

    [ 1 mark ]

    Implementing BPF capture filters

    In this section of the assignment you are required to create a range of capture filters, implement those capture filters in Wireshark and take a screenshot of associated captured traffic.

    Your screen captures must include the Time, Source, Destination and Protocol fields of the Wireshark display along with at least two packets (the graphic below shows three, packets 7,8 & 9). 

    Because the Time field is displayed to such a fine resolution your screenshot capture will be unique from all other students doing this assignment. This will therefore act as an automatic plagiarism detector.

    After creating an appropriate capture filter you may need to generate appropriate traffic for Wireshark to capture. For instance, if you create a Capture Filter to capture ftp traffic you will need to run an ftp client to effect the traffic capture. Likewise, when capturing web traffic you could use a browser to generate appropriate traffic. To capture ICMP traffic you might use the ping command because it uses the ICMP protocol to query other hosts.

    Example capture filter:

    Filter requirements

    Capture all traffic between your computer (that is running Wireshark) and the Google search engine in response to the query “caviar” being entered.

    Procedure:

    Open a browser to www.google.com

    From the Wireshark interface select:

    Capture > Options >

    Select the desired interface (or select all interfaces)

    Enter host google.com in the capture filter entry area

    Select the display option Resolve network layer names

    Start the capture

    Then enter the word caviar into the google query field of the browser

    Wireshark will captures the require traffic.

    Note –  Make sure you have selected the correct network interface, or select all interfaces if you are unsure.

    Capturing traffic from/to another machine (2 marks)

    In network analysis you will frequently need to capture all traffic or specific traffic between your machine that is running Wireshark and another specified machine.

    For this exercise you should generate traffic between the machines with the ping command.

    Create capture filters that will:

    1. Capture all traffic between your machine (the one running Wireshark) and another machine. Use the IP address of the other machine to identify it in the filter.

    2. Capture all traffic between your machine (the one running Wireshark) and another machine. Use the MAC address of the other machine to identify it.

    3. Capture all traffic from the other machine. Use either the IP or MAC address of the remote machine to identify it.

    4. Capture only ICMP traffic between the two machines

    Your discussion for this section should:

    · include two screenshots

    · list all capture filters you used

    · describe how each capture filter works.

    Excluding particular network traffic (2 marks)

    Create a set of capture filters that will:

    · Capture broadcast traffic only

    · Exclude broadcast traffic

    · Capture all traffic from a range of network addresses but exclude broadcast traffic

    Briefly discuss how each capture filter works.

    Using port numbers in capture filters (1 mark)

    Create capture filters that will capture the following types of network traffic:

    1. DNS traffic

    2. DNS traffic being sent from your machine

    3. DHCP traffic in either direction

    Briefly discuss how each capture filter works.

    Challenge exercise (zero marks)

    The BPF syntax can detect specific content at specific offsets from the start of network packets.

    An example of such syntax would be tcp[13] & 4 == 4

    This particular capture filter can detect TCP packets that have the RST flag set.

    Describe this syntax so that a layman could understand how such filters work.

    Marking Criteria

    This assignment is worth 15% of ITECH1003 assessment.

    The assignment must be submitted before the due date/time to ensure assessment penalties as stipulated in the course description are not applied.

    The marks for each section are shown against each requirement above.

    Students are required to demonstrate their understanding of each part of the assignment clearly and concisely and if specified include associated Wireshark screenshots and clear discussion to demonstrate you have fully understood the topic.

    Students should realise that any screenshot taken by them will be unique by virtue of Wireshark’s precise time display, hence if identical screenshots appear in two separate assignments then it will be immediately identified as plagiarism. Therefore, all students need to interact with Wireshark to capture their own traffic and ensure that no other student has access to their screenshot files.

    All screen captures that you use in the assignment report must include the Time, Source, Destination and Protocol fields of the Wireshark display along with at least two network packets as outlined on page 3 of this assignment specification.

    Please acknowledge by way of referencing, if you have used information from books, papers, websites and other published and unpublished materials. 

    Students should submit their completed report as a single word or pdf document to Moodle by the due date as specified on your ITECH1003 course description.

    Dispelling myths about academic writing companies and experts

    Unfortunately, there are many misconceptions about our industry. However, that shouldn’t prevent you from getting professional essay writing services, so let’s look at popular myths and bust them.

    All academic assistance companies are scams.

    We admit that there are some dishonest companies that cheat customers out of their money or provide works of poor quality. There’s also plenty of legit professional essay services as well.

    Our goal is to deliver quality academic help that’s tailored to your needs, so we match you with high-level professionals who get corresponding payments.

    Academic assistance services only sell plagiarized papers.

    Again, some companies do that. But that will never happen if you purchase from a legitimate essay writer service like ours. We complete each order from scratch, so your papers can only contain original content and properly cited information.

    We check each essay or research before we send it to you to guarantee that your paper is exclusive.

    Using online writing services is illegal.

    Actually, it’s entirely lawful if you’re doing it correctly. For instance, you can’t use professional essay writing assistance to cheat on a test. If you follow the rules, you won’t have anything to worry about.

    Unique hand-crafted papers that match your needs can serve as excellent examples and boost your understanding of any subject.

    Essay writers for hire aren’t qualified.

    On the contrary, anyone who wants to be an essay writer online has to go through a strict selection process. They need to be highly competent to complete this type of work, and many freelance authors on our team hold academic degrees, from Bachelor’s to PhDs.

    In the end, only the best essay writers get to work for our homework writing service.

    Take your studies to the next level with our experienced specialists

    WhatsApp
    Hello, Send us a message or inquiry, and we will respond right away