Question

At this stage, you should be a Wireshark expert. Thus, we are not going to spell...

At this stage, you should be a Wireshark expert. Thus, we are not going to spell out the steps as explicitly as in earlier labs. In particular, we are not going to provide example screenshots for all the steps.


1.   Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets (Note that DNS is using UDP for communications. You can use nslookup commands in Lab 4 to generate DNS packets for UDP). It’s also likely that just by doing nothing (except capturing packets via Wireshark) that some UDP packets sent by others will appear in your trace. In particular, the Simple Network Management Protocol (SNMP – see section 5.7 in the text) sends SNMP messages inside of UDP, so it’s likely that you’ll find some SNMP messages (and therefore UDP packets) in your trace.

2.   After stopping packet capture, set your packet filter so that Wireshark only displays the UDP packets sent and received at your host.

3.   Pick one of these UDP packets and expand the UDP header fields in the details window.

Answer the following questions in your lab report.
When answering questions below, you should submit the screenshot of the packet(s) that you used to answer the question asked.

4.   Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn’t look in the textbook! Answer these questions directly from what you observe in the packet trace.) List the names of these fields.
5.   By consulting the displayed information in Wireshark’s packet content field for this packet, determine the length (in bytes) of each of the UDP header fields. For example, in the following figure, by selecting the source port field in the UDP header in the header window, we can find out that the source port field is 2 bytes.

6.   The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet.
7.   What is the size (in bytes) of the UDP payload?
(Hint: the answer to this question can be determined by your answer to 5 and 6 above)
8.   What is the largest possible source port number?
9.   Examine a pair of UDP packets in which your host sends the first UDP packet and the second UDP packet is a reply to this first UDP packet. (Hint: for a second packet to be sent in response to a first packet, the sender of the first packet should be the destination of the second packet). Describe the relationship between the port numbers in the two packets.

0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
At this stage, you should be a Wireshark expert. Thus, we are not going to spell...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • which of the following statements is not true for local DNS servers? Option: A local DNS...

    which of the following statements is not true for local DNS servers? Option: A local DNS server acts like a proxy. IPS often provide default name servers. A local DNS server provides authorization hostname to IP address mappings. A local DNS servers has a local cache to speed up. Which of the following is unlikely to be one of the transport layers services? Option: Segmenting Reliable data transfer congestion control host-to-host communication What is the data unit exchanged in the...

  • The goal of this first lab was primarily to introduce you to Wireshark. The following questions...

    The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation: 1. List up to 10 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 Step 7: After your browser has displayed the INTRO-wireshark-file1.html page, stop Wireshark packet capture by...

  • 2) Assume a new RFC for TFTP was written for TFTP-16. The only change made was...

    2) Assume a new RFC for TFTP was written for TFTP-16. The only change made was that the max block size for a data packet was changed to 16 bytes instead of 512 bytes. Host A wants to read a text file, 'read_me.txt", with the 35 bytes of content, "For sale: baby shoes... never worn. from Host B in "octet" mode using TFTP-16. Draw the complete sequence diagram for this communication in the space below. For each packet sent across...

  • Hosts A and B are communicating over a TCP connection, and Host B has already received from A all...

    Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up to and including byte 1029. Suppose Host A then sends three segments to Host B back-to-back. The first, second and third segments contain 1200, 150 and 80 bytes of data respectively. In the first segment, the sequence number is 1060, the source port number is 8080, and the destination port number is 80. Host B sends an acknowledgment whenever...

  • You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose...

    You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose and Ross for the following labs. Please read the instructions below for submissions. Upload the shared pcap file (Homework5.pacp) into wireshark. HTTP In this lab, we’ll explore several aspects of the HTTP protocol. Capture packets and filter for http protocol and answer the following questions. (Hint: Apply http filer) What version of HTTP version(1.0 or 1.1) is client running and what is the version...

  • I had tried to work with the wireshark interface and cannot navigate it due to network problems a...

    I had tried to work with the wireshark interface and cannot navigate it due to network problems and cannot find the question solutions, if any one can help with detailed steps it would be a great help. Wireshark Lab #2: Ethernet In this lab, we'll investigate the Ethernet protocol and the ARP protocol. Before beginning this lab, you'l1 probably want to review sections 6.4.1 (Link-layer addressing and ARP) and 6.4.2 (Ethernet) in the text. RFC 826 (ftp://ftp.rfc-editor.org/in- notes/std/std37.txt) contains the...

  • PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the...

    PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the Go-Back-N and Selective repeat protocols, what does the window value signify? The packets that have already been ACKed The packets sent but remain unACKed The sequence numbers available and not yet sent The sequence numbers of packets not yet available None of the above 1 points    QUESTION 2 Which of the following is NOT a component of the TCP congestion control algorithm? Slow...

  • Host A and B are communicating over a TCP connection, and Host B has already received...

    Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...

  • Assignment 4 - Problem Set Homework . Due in 15 hours 3/21 answered Close Question 2:...

    Assignment 4 - Problem Set Homework . Due in 15 hours 3/21 answered Close Question 2: Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up to and including byte 1059. Suppose Host A then sends three segments to Host B back-to- back. The first second and third segments contain 1200, 150 and 80 bytes of data respectively. In the first segment, the sequence number is 1060, the source...

  • Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it...

    Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it reduces the amount of work needed in physical delivery. Do not use any example in the book, the postal service, or the telephone network.1.2 A firm is assigned the network part 128.171. It selects a 10-bit subnet part. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. (Hint: as we don’t use all...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT