Question: You are the network administrator for your LAN. You have just captured the network traffic for the last ten minutes and have thousands of packets captured.
Part 1: You are only interested in looking at packets using the AIM protocol. What would you do to view only the desired packets
Part 2: You find several packets that look suspicious to you. How would you find out what the source IP address and the source MAC address of the packets are?
Describe the terms in detail and what would you do to view only the desired packets and how would you realize what the source IP address.